paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1710.08528
1
1710
2017-10-23T22:12:51
A Two-Level Classification Approach for Detecting Clickbait Posts using Text-Based Features
[ "cs.SI", "cs.CL" ]
The emergence of social media as news sources has led to the rise of clickbait posts attempting to attract users to click on article links without informing them on the actual article content. This paper presents our efforts to create a clickbait detector inspired by fake news detection algorithms, and our submission to the Clickbait Challenge 2017. The detector is based almost exclusively on text-based features taken from previous work on clickbait detection, our own work on fake post detection, and features we designed specifically for the challenge. We use a two-level classification approach, combining the outputs of 65 first-level classifiers in a second-level feature vector. We present our exploratory results with individual features and their combinations, taken from the post text and the target article title, as well as feature selection. While our own blind tests with the dataset led to an F-score of 0.63, our final evaluation in the Challenge only achieved an F-score of 0.43. We explore the possible causes of this, and lay out potential future steps to achieve more successful results.
cs.SI
cs
A Two-Level Classification Approach for Detecting Clickbait Posts using Text-Based Features The snapper Clickbait Detector at the Clickbait Challenge 2017 Olga Papadopoulou, Markos Zampoglou, Symeon Papadopoulos, Ioannis Kompatsiaris Centre for Research and Technology Hellas - Information Technologies institute, Greece {olgapapa, markzampoglou, papadop, ikom}@iti.gr 7 1 0 2 t c O 3 2 ] I S . s c [ 1 v 8 2 5 8 0 . 0 1 7 1 : v i X r a ABSTRACT The emergence of social media as news sources has led to the rise of clickbait posts attempting to attract users to click on article links without informing them on the actual article content. This paper presents our efforts to create a clickbait detector inspired by fake news detection algorithms, and our submission to the Clickbait Challenge 2017. The detector is based almost exclusively on text- based features taken from previous work on clickbait detection, our own work on fake post detection, and features we designed specifically for the challenge. We use a two-level classification approach, combining the outputs of 65 first-level classifiers in a second-level feature vector. We present our exploratory results with individual features and their combinations, taken from the post text and the target article title, as well as feature selection. While our own blind tests with the dataset led to an F-score of 0.63, our final evaluation in the Challenge only achieved an F-score of 0.43. We explore the possible causes of this, and lay out potential future steps to achieve more successful results. 1. INTRODUCTION The number of people turning to social media to get information online, as opposed to traditional news sources such as the websites of news agencies, newspapers and TV channels, has significantly risen in recent years. This has caused a major shift in how news is presented, and has allowed the emergence of new actors in the news market, in the form of outlets that disseminate fake information or rely on "clickbait" practices to draw readers' attention. Clickbait can be defined as the phenomenon where a short post in a social network platform introduces an article by promising exciting or surprising information, but without being sufficiently explanatory for the reader to decide if they are going to be interested in the article or not before clicking. Thus, the article itself may fail to deliver, but the phrasing of the post manages to attract traffic for the site nonetheless. Clickbaiting is thus a marketing technique for attracting readers even in the absence of interesting content. While not strictly illegal or dangerous, clickbaiting is often frowned upon as dishonest. Facebook in particular is taking steps in reducing the presence of clickbait posts from users' timelines1. Such efforts, however, require a reliable way of automatically detecting clickbait in order to filter results. This paper presents our submission to the Clickbait Challenge 2017 [8], aimed at building a system that detects whether a social media post is clickbait or not based on the post, any accompanying media, and the article itself, including its title, description, keywords, and text. 1https://newsroom.fb.com/news/2017/05/ news-feed-fyi-new-updates-to-reduce-clickbait-headlines/ Table 1 shows the two main fields for six items from the Challenge dataset, plus their annotations. In the rest of this paper we present the methodology we decided to follow and the rationale behind it, the results we achieved using the provided validation data, and the results achieved during the final evaluation. Given the significant discrepancy between the validation results and the actual evaluation, we attempt to explain its causes and plan for more successful future attempts. 2. RELATED WORK The problem of clickbait posts is relatively recent, yet active research is already developing around it. One of the first publications on the subject [5] proposed a set of potential features that could be used for the task, without providing a quantitative analysis of their potential. The proposed features included lexical and semantic features in order to distinguish between high- vs low-quality text by analyzing their stylometry, and syntactic and pragmatic features to measure the emotional impact of headlines. Besides textual features, they also proposed image and user behavior analysis in order to extract information from the context of the post. Notable attempts to create clickbait detection systems include an approach using a large number of text features over various classifiers [7] and a statistical analysis of the value discrepancies between clickbait and non-clickbait posts over a number of features [4]. The latter approach also attempts to detect clickbait posts using an SVM classifier, and proposes specialized models using only subsets of features to reflect different user definitions of clickbait. Both approaches rely on various text features, ranging from length statistics and bag-of-words features to common bait phrases. On the other hand, a different approach to clickbait detection would be to train a deep learning classifier. Two recent approaches have been proposed [1, 10]. While both begin by an embedding layer -as is common in neural networks for language processing-, the former uses a Recurrent Neural Network (RNN) layers, while the latter is based on Convolutional Layers. While we had no prior experience with clickbait detection, we noted a striking similarity of the task to that of fake post detection. While the task of misleading (fake) post detection [3], i.e. evaluating whether a post contains true information or not, is not the same as clickbait detection, the approach of extracting text-based features from a post and training a classifier on them is very similar, as are the expectations concerning the distinguishing features for clickbait posts and fake posts. For example, low readability or the increased presence of punctuation are related with both fake and clickbait posts. Given our previous experience with fake post detection [2], we decided to follow a similar approach for our submission to the clickbait detection challenge. Table 1: Clickbait Challenge examples: post text, associated target article title, and assigned clickbait scores by five annotators. High values correspond to clickbait, while low ones to non-clickbait. Post text SAPVoice: One solution that turns shipping delays to your advantage i thought michelle obama already made this happen? UK's response to modern slavery leaving victims Panama Papers: Europol links 3,500 names to suspected criminals Two dead after standoff with cops in Philadelphia @nbcphiladelphia Donald Trump's biggest fan is worried he won't follow through on immigration 'promises' Target article title SAPVoice: One Solution That Turns Shipping Delays To Your Advantage Escaped Chibok Girl on Anniversary of Abduction by Boko Haram: "Bring Those Girls Back" "Inexcusable" failures in UK's response to modern slavery leaving victims destitute while abusers go free, report warns Panama Papers: Europol links 3,500 names to suspected criminals 2 Men Die in Apparent Murder-Suicide During Barricade Situation in Philly Ann Coulter warns Donald Trump of voter backlash if he 'betrays' them on immigration Clickbait scores [0.33, 0.33, 0.67, 0.67, 1.00] [0.00, 1.00, 1.00, 1.00, 1.00] [0.00, 0.33, 1.00, 1.00, 1.00] [0.00, 0.00, 0.00, 0.00, 0.33] [0.00, 0.00, 0.33, 0.33, 0.67] [0.00, 0.00, 0.33, 1.00, 1.00] 3. APPROACH Our approach was to use a committee of classifiers, each trained on a different class of text features. The entire list of features was inspired by previous works [2, 4, 7] and is presented in Table 2. Since the task did not include contextual features, either in the form of information on the user account that made the post, or in the form of social media activity around the post (e.g., retweets, replies, etc.), we had to focus on text features from the post and the target. The bulk of the features were taken from our own previous work on fake post detection [2] and was enriched with ideas from [7] and [4]. All features were extracted from the post text and the target title. We also considered extracting features from the target paragraphs and description. However, since not all items in the dataset had values in these fields we decided not to implement an approach for missing values but instead to focus on the fields that were present in all items. Furthermore, we tried to leverage the media information provided by using visual features related to them. Three such features were tried: a binary value indicating the presence or not of media in the post, visual features extracted from the AlexNet FC6 or FC7 activations to see if there are any patterns in the visual content of images that may distinguish clickbait posts, and the presence of ImageNet concepts as detected through GoogleNet (1000 values) to see if there is any correlation between the presence of certain semantic concepts and clickbait. Features from our recent work on tweet verification [2] include the number of characters, words, question marks, exclamation marks, negative and positive sentiment words, presence of happy and sad emoticon, presence of question and exclamation mark, presence of first, second and third order pronoun, number of slang words, presence of hashtag, and readability score. Most of these features are straightforward to extract, while for the most complex of those instructions can be found in [2]. A second set of features were taken from [4], using the provided code2. These include the average word length, longest dependency, presence of determiners and pronouns, number of common words, presence of punctuations, whether the text begins with a digit, number of hyperbolic terms, subject of title, percentage of stop words, and presence of word contractions. Finally, we wrote our own extraction code for a number of features, including presence of colon, presence of "please", presence of @. Number of nouns, number of adjectives, number of verbs, number of adverbs, text voice, Part-Of-Speech (POS) histogram, Named Entity histogram, and sentiment were extracted using the Stanford NER library3. Bag-of-words and n-grams were extracted using WEKA4. GID categories were extracted using the General Inquirer5. The post text similarity to the target title, and similarly the post text 2https://github.com/bhargaviparanjape/clickbait 3https://nlp.stanford.edu/software/CRF-NER.shtml 4https://www.cs.waikato.ac.nz/ml/weka/ 5http://www.wjh.harvard.edu/~inquirer/homecat.htm Table 2: A categorization of tested features. Each block was treated as an entire descriptor through concatenation. The presence or absence of media was also used as a descriptor, but since it was a single value, it was concatenated to the other de- scriptors and not tested on its own Stylistic (STY) # slang words Readability score has colon (:) has "please" begins with digit has hashtag has @ has contractions has punctuations Grammatical (GRA) POS histogram NE histogram text voice is passive voice # adjectives # verbs subject of title % of stop words Morphological (MOR) # characters # words # question marks # exclamation marks # uppercase chars has question mark has exclamation mark has 1st/2nd/3rd person pronoun average word length longest dependency has determiners & pronouns # common words text simlarity to target title text simlarity to target descr. Bag-of-Words (BoW) BoW GID 182 categories Sentiment (SEN) # pos/neg words has happy/sad emoticon # hyperbolic terms overall sentiment Total length: ∼1000 (depends on training dataset) n-grams (NGR) 1-4 grams Total length: ∼2000 (depends on training dataset) Total length: 182 Total length: 6 Vis. Concepts (VIS1) ImageNet classes Vis. Content (VIS2) AlexNet FC6 activations or FC7 activations Total length: 1000 Total length: 4096 similarity to the target description were calculated by tokenizing all texts and counting the percentage of shared words. Finally, the visual concepts and visual features were extracted using Caffe6. The classification approach was based on a combination of early and late fusion with redundancy, where classifiers were trained on a number of different feature vectors to form a final committee. Text features from the post text and target title were extracted individually. We experimented with both individual features and concatenations of different feature types for the same text source. Figure 1 presents a visual overview of the proposed classification scheme. In all experiments, the features were normalized and -following early experiments with a number of different classifiers- a Logistic Re- gression classifier was used to create a classification model. We further evaluated the impact of feature selection on the concatenated feature vectors. Since these experiments resulted in multiple models 6http://caffe.berkeleyvision.org/ Figure 1: The proposed two-level classification architecture. with outputs that do not overlap entirely, for second-level fusion we tested both majority voting and building a second-level classifier. The task datasets were not only annotated with binary tags (1/0: clickbait/non-clickbait) but also with five quantitative scores from different annotators. As can be seen in Table 1, these scores may differ significantly between annotators, which makes the task much more challenging. We decided to approach the task through the mean of these five values, but it is a consideration that the variance of the values might also have to be taken into consideration. Motivated by the non-binary provided annotation, we considered two training schemes: one based on binary outputs, resulting from the binarization of the annotation, and another based on a more nuanced class scheme with four classes (corresponding to mean scores in the ranges [0, 0.25), [0.25, 0.5), [0.5, 0.75), [0.75, 1]. However, the latter did not produce promising results, thus we decided to focus on binary classification and indirectly use the output probability of the logistic regression as a metric of how clickbaity an item is. We used the union of the provided training and validation sets [9] to randomly create three subsets in order to train and evaluate our classifiers. The entire dataset contained 22,034 items out of which we selected 18,234 at random to use as the main training set (Set A). A second set of 2,000 items was used for testing the first-level classifiers during the preliminary tests, and for training the second-level classifier during the final model design (Set B). Finally, the 1,800 remaining items were used for testing the second-level classifier (Set C). The code of our approach is available on GitHub7. 4. EVALUATION RESULTS An initial set of experiments assessed the potential of the two image-based descriptors (concept- and content-based). However, both approaches led to very poor results. Combined with the fact 7https://github.com/clickbait-challenge/snapper that many posts did not contain images at all, we decided to only take into account the presence or absence of images as a binary feature, concatenated with the text features. The first set of text-based evaluations concerned the individual and combined performance of features using a single-level classifier. The features extracted from the post text and the target title were used to train a Logistic Regression classifier on Set A and evaluated on Set B. The results are presented in Tables 3 and 4. A number of observations can be made from these first results. First, it is clear that, in most cases individual features on either source of text are not adequate for classification. The highest F-score in this case is achieved with grammatical features, reaching 0.54 for the post text and 0.46 for the target title. All other features perform significantly poorer when taken in isolation. By looking at the results from the feature concatenations, another observation is that a combination of only two features for the post text (morphological and grammatical) reaches an F-score of 0.58, which is very close to the highest F-score achieved in this way through a concatenation of all five feature classes (0.59). Generally, the performance of grammatical features and all concatenations where it participates is higher than for the rest of features, highlighting the importance of grammatical features in detecting clickbait posts. The same applies for both the post text and the target title, although in the latter case the performance of the classifier is significantly lower. Overall, the best performance achieved in this manner is 0.59 for the concatenation of all five features extracted from the post text. This is admittedly a rather low score for the task, so further experiments were carried out towards improving the results. Another run was based on feature selection on the feature set that worked best, i.e. the five feature concatenation from post text. We used correlation-based feature subset selection in the hopes of improving performance, however this led to a decreased F-score of 0.53 (Precision: 0.69, Recall: 0.43). Post text featuresMORSTYGRAMOR+STYMOR+STY+GRA+SEN+GID...MOR+GRABOWNGRFeat. Selection...Target title featuresMORSTYGRAMOR+STYMOR+STY+GRA+SEN+GID......MOR+GRAFirst level classifiersMORPost textMORTarget titleMOR+STYPost text......MOR+STY+GRA+SEN+GIDPost text...Feat. SelectionPost textMOR+STY+GRA+SEN+GIDTarget titleSecond level features...Second level classifierClickbait score34Descriptors31Descriptors65Models65Features Table 3: The performance of individual features and feature concatenations extracted from the post text. Table 4: The performance of individual features and feature concatenations extracted from the target title. Features Morph Styl Gram Sent GID Morph_Styl Morph_Gram Morph_Sent Morph_GID Styl_Gram Styl_Sent Styl_GID Gram_Sent Gram_GID Sent_GID Morph_Styl_Gram Morph_Styl_Sent Morph_Styl_GID Morph_Gram_Sent Morph_Gram_GID Morph_Sent_GID Styl_Gram_Sent Styl_Gram_GID Styl_Sent_GID Gram_Sent_GID Morph_Styl_Gram_Sent Morph_Styl_Gram_GID Morph_Styl_Sent_GID Morph_Gram_Sent_GID Styl_Gram_Sent_GID Morph_Styl_Gram_Sent_GID F-score 0.47 0.22 0.54 0.03 0.36 0.51 0.58 0.49 0.53 0.57 0.26 0.41 0.55 0.56 0.39 0.59 0.52 0.54 0.58 0.58 0.53 0.57 0.58 0.44 0.57 0.59 0.59 0.55 0.58 0.58 0.59 Precision 0.71 0.67 0.70 0.59 0.66 0.73 0.72 0.72 0.70 0.72 0.65 0.68 0.70 0.71 0.65 0.73 0.72 0.71 0.72 0.71 0.70 0.72 0.72 0.67 0.71 0.73 0.72 0.71 0.71 0.71 0.72 Recall 0.35 0.13 0.44 0.01 0.25 0.40 0.48 0.37 0.42 0.47 0.16 0.29 0.45 0.47 0.28 0.49 0.40 0.44 0.49 0.49 0.43 0.47 0.49 0.33 0.48 0.50 0.50 0.44 0.49 0.49 0.51 Our next set of experiments were run using 10-fold cross- validation on Set A in order to have a more stable estimate of the feature performance. We performed these evaluations for the concatenation of the five features for four variations: extracted from the post text, extracted from the target title, extracted from both and concatenated, and concatenated from both followed by feature selec- tion. The results are shown in Table 5. A clear improvement can be seen for the concatenation of the two sources (post text and target title). Again, feature selection led to deterioration of the overall performance. Having trained all these different models, we finally designed a classifier to take advantage of them and evaluated whether we could exploit their potential complementarity to increase the overall performance. The final classifier consisted of 65 individual models, fused in a second-level training scheme. We trained 31 classifiers on the 31 feature vectors listed in Tables 3 and 4. We used these features extracted from the post text, and 31 more formed from the concatenation of those extracted from the post text and the target title. To these 62 features we added the BoW descriptor extracted and the n-gram feature, both extracted from the post text, and finally the feature-selected five-feature vector extracted from the post text. 65 logistic regression classifiers were trained on these features and a 10-fold cross-validation was run on all 65 models on Set A. Thus, we acquired an estimate for each item and each model, without it having participated in the training set. The 65 outputs were concatenated in a single feature vector, and a second-level logistic Features Morph Styl Gram Sent GID Morph_Styl Morph_Gram Morph_Sent Morph_GID Styl_Gram Styl_Sent Styl_GID Gram_Sent Gram_GID Sent_GID Morph_Styl_Gram Morph_Styl_Sent Morph_Styl_GID Morph_Gram_Sent Morph_Gram_GID Morph_Sent_GID Styl_Gram_Sent Styl_Gram_GID Styl_Sent_GID Gram_Sent_GID Morph_Styl_Gram_Sent Morph_Styl_Gram_GID Morph_Styl_Sent_GID Morph_Gram_Sent_GID Styl_Gram_Sent_GID Morph_Styl_Gram_Sent_GID F-score 0.31 0.25 0.46 0.20 0.31 0.35 0.46 0.33 0.38 0.46 0.31 0.38 0.46 0.48 0.35 0.46 0.36 0.40 0.46 0.48 0.40 0.46 0.48 0.39 0.48 0.46 0.48 0.41 0.48 0.48 0.48 Precision 0.58 0.55 0.57 0.51 0.54 0.59 0.58 0.58 0.56 0.57 0.54 0.54 0.57 0.56 0.53 0.58 0.58 0.56 0.58 0.57 0.56 0.57 0.56 0.54 0.56 0.58 0.56 0.56 0.57 0.56 0.56 Recall 0.21 0.16 0.39 0.13 0.22 0.24 0.38 0.24 0.29 0.38 0.22 0.29 0.39 0.42 0.27 0.38 0.26 0.31 0.38 0.41 0.31 0.38 0.42 0.30 0.42 0.38 0.41 0.32 0.42 0.42 0.42 Table 5: The performance of individual features and feature concatenations extracted from the target title. F-score 0.52 0.53 0.62 0.44 Precision 0.92 0.70 0.86 0.58 Source Post text Target title Both Feature selection Recall 0.36 0.43 0.49 0.35 regression classifier was trained on all items. Finally, the resulting 2nd-level model was evaluated on Set C. The resulting F-score was 0.63 (Precision: 0.91, Recall: 0.49), and this was the approach we decided to use in our final submission. For our final submission we followed the same architecture, but trained on a broader base: to get the 1st level outputs, we ran a 10-fold cross-validation of all 65 models on Set A, and at each fold we kept the 65 outputs for all items in the validation set. Then, the second level classifier was trained on all these estimates from Set A. The final submission was evaluated through TIRA [6]. However, there was a significant discrepancy in the performance achieved dur- ing the classification of our test set, to the one achieved using TIRA. Although our achieved F-score was 0.63, the model performed much worse on TIRA, yielding an F-score of 0.43 (Precision: 0.28, Recall: 0.89). There was a very significant bias towards False Positives, which was the exact opposite behaviour than the one observed in our own evaluations. Furthermore, the feature extraction process and the classification using 65+1 classifiers for each item led to a very slow final model compared to all other submissions. Admittedly, an F-score of 0.63 is in itself not satisfactory for any detection task. However, given the final evaluations results, it would have been average compared to other submissions. This may be taken to highlight the difficulty of the task itself, especially when approached with a traditional methodology of extracting text fea- tures and feeding them to a classifier. However, our final evaluation output was much lower than that. Barring the presence of an error in the submitted code from our side, this may be indicative of a significant difference between the datasets used for training/testing and the one used for the final evaluation. It may also point to a lack of generalization ability of our own classifier. 5. CONCLUSION We presented our submission to the 2017 Clickbait Challenge. The submission was based almost exclusively on text features. The approach used established features from similar approaches in the literature, combined with features from our own experience from fake post detection, plus a number of features specifically tailored for the Challenge. The features were fused using both concatenation and a second-level classifier, in a system which combined features from the post text only and features from the text post concatenated with features from the target title. It was shown that features from the text post gave the best performance (F-score 0.59), and the combination of all features gave a small improvement (F-score 0.63). Despite this performance being on par with other submissions in the Challenge, the final evaluation result on TIRA led to an F-score of 0.43, which may have been the result of overfitting on our training data, despite the measures we took (keeping a separate subset for testing, which did not participate in training). Overall, our evaluations showed the limitations of our approach, as even the best F-score of 0.63 is unsuitable for real-world settings. Our extensive evaluations showed that text features alone or in complex combinations could not reach satisfactory performance. In our future efforts, we would like to focus more on specifi- cally exploiting inconsistencies between the post text and the target text/title, instead of separately describing both. In our current fea- ture set, the only features that did that were the similarity percentage between the post and target, categorized under "grammatical", and it may be no coincidence that these features were the ones that performed best. We should also put more effort in finding ways to exploit the accompanying data provided for each item, such as the available media and keywords. Our attempts to incorporate visual information did not contribute to the results, so we should reconsider the description approach for images or other associated media. In conclusion, despite the unsatisfactory performance of the sub- mitted system, there were many lessons learned during this year's Clickbait Challenge, which may lead to more successful attempts in future editions of the challenge. References [1] A. Anand, T. C. 0002, and N. Park. We used neural networks to detect clickbaits: You won't believe what happened next! CoRR, abs/1612.01340, 2016. URL http://arxiv.org/abs/1612.01340. [2] C. Boididou, S. E. Middleton, Z. Jin, S. Papadopoulos, D.-T. Dang-Nguyen, G. Boato, and Y. Kompatsiaris. Verifying information with multimedia content on twitter. Multimedia Tools and Applications, Sep 2017. ISSN 1573-7721. . URL https://doi.org/10.1007/s11042-017-5132-9. [3] C. Castillo, M. Mendoza, and B. Poblete. Information credibility on twitter. In Proceedings of the 20th international conference on World wide web, pages 675–684. ACM, 2011. [4] A. Chakraborty, B. Paranjape, S. Kakarla, and N. Ganguly. Stop clickbait: Detecting and preventing clickbaits in online news media. CoRR, abs/1610.09786, 2016. URL http://arxiv.org/abs/1610.09786. [5] Y. Chen, N. J. Conroy, and V. L. Rubin. Misleading online content: Recognizing clickbait as "false news". In M. Abouelenien, M. Burzo, R. Mihalcea, and V. Pérez-Rosas, editors, Proceedings of the 2015 ACM Workshop on Multimodal Deception Detection, WMDD@ICMI 2015, Seattle, Washington, USA, November 13, 2015, pages 15–19. ACM, 2015. ISBN 978-1-4503-3987-2. URL http://doi.acm.org/10.1145/2823465. [6] M. Potthast, T. Gollub, F. Rangel, P. Rosso, E. Stamatatos, and B. Stein. Improving the Reproducibility of PAN's Shared Tasks: Plagiarism Detection, Author Identification, and Author Profiling. In CLEF, pages 268–299. Springer, 2014. [7] M. Potthast, S. Köpsel, B. Stein, and M. Hagen. Clickbait detection. In N. Ferro, F. Crestani, M.-F. Moens, J. Mothe, F. Silvestri, G. M. D. Nunzio, C. Hauff, and G. Silvello, editors, Advances in Information Retrieval - 38th European Conference on IR Research, ECIR 2016, Padua, Italy, March 20-23, 2016. Proceedings, volume 9626 of Lecture Notes in Computer Science, pages 810–817. Springer, 2016. ISBN 978-3-319-30670-4. [8] M. Potthast, T. Gollub, M. Hagen, and B. Stein. The Clickbait Challenge 2017: Towards a Regression Model for Clickbait Strength. In Proceddings of the Clickbait Chhallenge, 2017. [9] M. Potthast, T. Gollub, K. Komlossy, S. Schuster, M. Wiegmann, E. Garces, M. Hagen, and B. Stein. Crowdsourcing a Large Corpus of Clickbait on Twitter. In (to appear), 2017. [10] M. M. U. Rony, N. Hassan, and M. Yousuf. Diving deep into clickbaits: Who use them to what extents in which topics with what effects? CoRR, abs/1703.09400, 2017. URL http://arxiv.org/abs/1703.09400.
1904.07188
1
1904
2019-04-15T17:01:31
Cyberbullying and Traditional Bullying in Greece: An Empirical Study
[ "cs.SI" ]
The rapid evolution of technology is a preferred method of interacting. A new world was created for young people who are sending emails, visiting websites, using webcams and chat rooms, and instant messaging through social media. In the past years, people used face-to-face communication though, in recent years, people are using internet technology in order to communicate with each other. As a consequence the communication change, created a new type of bullying, cyberbullying, in which bullying is taking place by using internet technology. Cyberbullying is a phenomenon which is increasing day by day over the world. This was one of the reasons that prompted us to do this survey. Furthermore, bullies aggressive reaction is affected by four factors which are conductive during childhood.
cs.SI
cs
Cyberbullying and Traditional Bullying in Greece: An Empirical Study Vaggelis Saprikis Dept. Of Business Administriation Western Macedonia Univ. of Applied Sciences, Kozani, Hellas George F. Fragulis Lab. of Web Technologies & Applied Control Systems Dept. Of Electrical Engineering Western Macedonia Univ. of Applied Sciences, Kozani, Hellas Maria Papatsimouli, John Skordas, Lazaros Lazaridis, Eleni Michailidi Lab. of Web Technologies & Applied Control Systems Dept. Of Electrical Engineering Western Macedonia Univ. of Applied Sciences, Kozani, Hellas Abstract -- The rapid evolution of technology is a preferred method of interacting. A new world was created for young people who are sending emails, visiting websites, using webcams and chat rooms, and instant messaging through social media. In the past years, people used face-to-face communication though, in recent years, people are using internet technology in order to communicate with each other. As a consequence the commu- nication change, created a new type of bullying, cyberbullying, in which bullying is taking place by using internet technology. Cyberbullying is a phenomenon which is increasing day by day over the world. This was one of the reasons that prompted us to do this survey. Furthermore, bullies aggressive reaction is affected by four factors which are conductive during childhood. traditional bullying, victims, Index Terms -- Cyberbullying, adolescents, victimization, Bullies. I. INTRODUCTION According to [13], and [8] Bullying is described as an aggressive or intentional act or behavior that is carried out in a repeatedly way against a victim who cannot defend himself. By using the previous definition, we can define the term of cyberbullying such as an aggressive or intentional act or behavior that is carried out in a repeatedly by using an electronic form of contact. It can be said that cyberbullying is the evolution of bullying. The Internet has become the new Wild West of the 21st century and has to be explored because it provides excitement and adventure, thus as Wild West, Internet is full of dangers. Also, [14] mentioned that "We need to be sheriffs in this new Wild West -- a cyber -- world buzzing with kids just a few keystrokes away from harming other people, often for no other reason than that the sheriffs are sleeping. As anyone who has ever been a victim of bullying and harassment will tell you the bullets may not be real, but they can hurt" . II. BULLYING According to [6], bullying can be defined as a student is be- ing bullied or victimized when he or she is exposed, repeatedly and over time, to negative actions on one or more students. A negative action, with the aggressive behavior definition, when someone intentionally inflicts or attempt to inflict, injury upon another [5]. In bullying, there is the physical contact with bully and victim, in which negative actions carried out by words or in other ways, for examples such as making grimaces or unpleasant gestures, spreading rumors and intentional excluse him/her from a group. A. Bullies aggressive reaction According to [7], there are four factors that affect bullies aggressive reaction. These factors are the answers to the question "What kind of rearing and other conditions during childhood are conductive to the development of an aggressive reaction pattern?". The factors that mentioned before are: 1) The basic emotional attitude of the caretaker, who usu- ally is the mother, to the child during the early years. A negative emotional attitude can be characterized by the absence of warmth and involvement. 2) The aggressive behavior level of the child is increasing when there is a tolerant attitude from the caretaker. Caretakers have to set clear limits when there is an ag- gressive behavior towards peers, brothers and sisters, and other adults. Power-assertive methods which are using to child upbringings such as physical punishment and violent emotional outbursts are likely to make children more aggressive than the average child. In other words, "violence begets violence". 3) Physical punishment and violent emotional outbreaks methods are likely to affect children to have an aggres- sive attitude. When parents use those kinds of methods, children are more likely to become aggressive. It is already known that "violence begets violence" 4) The way of treatment to a child is inherited. A child who has a "short-tempered" temperament is more likely to be an aggressive youngest than a child with a common temperament. 9 1 0 2 r p A 5 1 ] I S . s c [ 1 v 8 8 1 7 0 . 4 0 9 1 : v i X r a According to above factors, it can be deduced that the child who had too little love and care, and too much freedom in his childhood is more likely to become aggressive. Thus, the socio-economic conditions of the family are not related to the aggressive behavior of the child. victims and found that bullies and bully-victims experienced less parental responsiveness than victims ([31], [32], [33]). Both dimensions however co-exist and influence each other [39], [34]. Figure 1, shows the four parenting styles and the combination of both dimensions results [3]. III. CYBERBULLYING Cyberbullying is the evolution of traditional bullying by using the internet technology. According to researchers, cyber- bullying refers to bullying of others by using mobile phones and the internet [9]. Such as bullying, can take part in all countries, without being relevant to the culture and the religion of the victim [2]. The anonymity, the invasion of personal life, and the fact that the victim cannot hide from torturers in the electronic world are characteristics that make electronic bullying more painful to the victims [4]. A. Cyberbulling and parenting The role of parenting in cyberbullying is something new which cannot provide us a lot of information. Children exclude their parents from internet activities be- cause it is considered that their privacy is valued [15]. Thus, cyberbullying is not as visible as traditional bullying. Further- more, young people are not telling their parents about the involvement in cyberbullying because they are afraid of the punishment, the loss of computer privileges and the isolation of peers ([16], [17], [4]). These means that parents are often unaware of their child is a cyberbully or is cyberbullied ([18], [3]). There are studies that examined the relationship between parenting characteristics and cyberbullying. They found that children who cyberbully experience limited parental monitor- ing, stronger parental discipline and a weaker emotional bond with their parents than children who do not cyberbully [10], [12]. Insufficient parenting reduces the social competence of their children as an example, the ability to develop positive friend- ships. On the contrary, parents who oversee their children and get involved in them, the aggressive behavior of the children within and without family is more likely to be reduced [19], [20], [21]. The way that parents interact with their children affects children to interact with others in the same way. If parents interact with their children in a hostile and cold manner, encourage them to use the same manner in their interactions. This affect children socialization and children are more likely to be a bully [22]. Anti-social behavior is unlikely to happen in a child who has grown up with supervision, discipline, and affection ([23], [24], [25], [26], [20], [27]). There were a lot of researchers who investigated parental responsiveness and traditional bullying. A negative association is the result of these elements relation in which as parents were less responsive, their children are more likely to have a bully- ing behavior and victimization is increased ([28], [29], [30]). Some other researchers compared bullies, bully-victims and Fig. 1. Parenting styles Various researches examined the relation between the char- acteristics of parenting and cyberbullying. The results were that children with cyberbully experience had limited parental monitoring, stronger parental discipline and weaker emotional in contrast bond with their parents, to children with no cyberbully experience [10], [12],[11]. B. Cyberbullying and Traditional Bullying Traditional bullying and cyberbullying have the same fea- tures which are repetitiveness, intentionality and power bal- ance. In the case of cyberbullying, is appeared the risk of misunderstanding as is bereft of non-verbal cues. This means that a joke may be misunderstanding and could be perceived as intentional and hurtful. Further, the cyberbullying perpetrators may be unknown, contrary to traditional bullying [3], [35], [36], [10], [38]. IV. SURVEY METHODOLOGY This section presents the design of the survey, the process of designing the questionnaire, its structure, the sampling method, the sample as well as the data analysis techniques used. Non-probable sampling method was applied. The data was collected via an electronic questionnaire which was developed based on extended literature review. Specifically, it was devel- oped by the use of Google forms and distributed via e-mail and social media. Our questions based on the sub-scales from the bully/Victim Questionnaire, and parenting with an adjusted version of the parenting style Questionnaire. Regarding the respondents, anyone could complete it anony- mously with our aim to ensure confidentiality. In the present survey, the primary data collection method, which is known as a quantitative method and based on a sample survey using a standardized questionnaire, was also selected. This questionnaire included closed-ended questions. Closed type questions are the questions that are accompanied by a series of suggested answers to the respondent from which to select one. In the present questionnaire, there are "yes- no" questions, multiple choice questions, and Likert scale questions. In the Likert scale questions the Likert scale with 5 grades was used, where option 1 does not indicate any option and option 5 means very high. A. Questionnaire Structure The questionnaire consists of six units. The first unit con- sists of the demographic questions. In the second, questions about internet use and the reasons for were applied. The third unit consists of questions about cyberbullying. In this section, the form, the feelings, the con- sequences and the way that came up against the cyberbullying phenomenon were asked to be completed. The next unit consists of questions about traditional bully- ing. In this section, the respondents asked to answer questions about the genre of traditional bullying, if victims had a solution to this problem and in which way. The fifth unit consists of questions about cyber bullies. In this unit, respondents have to answer if they became bullies, for which the reasons and in each way. Finally, in the sixth section there was a validation question in order to verify that a human completed the measurement item and not a machine. The questions about cyberbullying and traditional bullying were adjusted and based on [6] questionnaire, and questions about the parenting dimensions were measured by using adjusted questions of the parenting style questionnaire of [40]. Prior to the study, the questionnaire was pre-tested by 20 students who did not participate in the study. As a result of the pretest, some questions were adjusted to facilitate clarity, understanding,and ease in answering the questions. 1) Research Questions: • To what extent is cyberbullying represented in Greece? • Which gender is more vulnerable to bullying? • Which is the family relationship associated with the cyberbullying victims? • Is cyberbullying associated with the hours spent on the • Is there an association between traditional bullying vic- tims and cyberbullying victims? • Is there an association between cyberbullying victims and internet? bullies? Data gathering period was from March up to April 2018. 525 responses were collected; but only 466 of them were valid. Afterwards, data were encoded and analysed using the SPSS Statistical program. V. MAIN RESULTS A. Gender Results The sample consisted of 466 valid questionnaires. Of 466 participants, 282 participants (60.5%) were women and 184 (39.5%) were men. B. Age results About the age of the participants we had: • 128 (27.5%) participants were under the age of 18 • 191 (41%) participants were between 19-25 • 32 (6.9%) participants were between 26-30 • 38 (8.2%) participants were between 36-40 • 53 (11.4%) participants were over the age of 40 years old C. Hours that spends online results About the hours that our respondents spend online, we have: • 193 (41.4%) of our participants spent 1-3 hours online • 179 (38.4%) of our participants spend 4-6 hours online • 64 (13.7%) of our participants spend 7-9 hours online • 30 (6.4%) of our participants spend more than 9 hours online D. Gender and cyberbullying victims results In order to examine which gender is more vulnerable to cyberbullying, we used cross-tabulation in SPSS. The results are: • 61 of our respondents have been cyberbullying victims. • 18 cyberbullying victims were male (29.5%). • 42 cyberbullying victims were female (70.5%). One of the research questions was to identify which gender is more vulnerable to cyberbullying. The answer to this question is that women are more vulnerable to cyberbullying as 70.5% of cyberbullying victims were women, in contrast to 29.5% of men victims. E. Age and cyberbullying victims Getting results about the age of cyberbullying victims, SPSS cross-tabulation was used. The results were: • <18 age scale, 14 of our respondents were cyberbullying • 19-25 age scale, 31 of our respondents were cyberbully- victims (23%) ing victims (50.8%). • 26-30 age scale, 4 of our respondents were cyberbullying • 31-35 age scale, 4 of our respondents were cyberbullying • 36-40 age scale, 2 of our respondents were cyberbullying • >40 age scale, 6 of our respondents were cyberbullying victims (6.6%). victims (6.6%). victims (3.3%). victims (9.7%). Our survey showed that the weakest age group is the 19-25 with 31 participants to be victims of cyberbullying. Continuing, the age group with the less cyberbullying victims is the age group of 36-40 with 0.4%. F. Cyberbullying victims and hours that spend online results SPSS cross-tabulation was used in order to examine the hours that cyberbullying victims spend online. Our survey showed that most of the cyberbullying victims (41%) spend 4- 6 hours online. The next following percentage is 27.9% where cyberbullying victims spend 1-3 hours online. So the answer to our research question is that most cyberbullying victims spend online 4-6 hours. G. Cyberbullying victims and faced the problem results. In order to examine if cyberbullying victims faced their problem, we used cross-tabulation in SPSS. The results that we have from crosstabulation were: V in order to compare the strength of the coefficient between the variables. Phi and Cramer's V are estimated factors of the intensity (size) of the connection between two quality vari- ables. In the case of independence between the two variables, the value of the factors is close to zero (0). In our case, Phi Coefficient is 0.133 and this means that there is a relationship between bullies and cyberbullying victims. • 48 of the cyberbullying victims (78.7%) faced up their problem. • 13 of the cyberbullying victims (21.3%) didn't find a solution to their problem. H. Cyberbullying victims and traditional bullying victims re- sults In order to examine the number of cyberbullying victims and traditional bullying victims, cross-tabulation was used in SPSS. The results showed us: Fig. 3. Cyberbullying victims/bullies • 291 (62.4%) respondents haven't been cyberbullying vic- tims and haven't been traditional bullying victims as well. • 114 (24.5%) respondents haven't been cyberbullying vic- tims but have been traditional bullying victims. • 28 (6%) respondents have been cyberrbullying victims but they haven't been traditional bullying victims. • 33 (7.1%) respondents have been cyberbullying victims and traditional bullying victims too. I. Cyberbullying victims and traditional bullying victims Figure 2 shows that 13.1% of our respondents were cyber- bullying victims in contrast to the traditional bullying victims who were the 31.5%. Also, 5.4% of our participants bullied other people. Fig. 4. Chi-Square Tests Fig. 2. Cyberbullying victims,traditional victims,and bullies According to Figure 2, the answer to our research inquiry about the extension of cyberbullying in Greece is that, cyber- bullying appears in half of the proportion compared to the traditional bullying. J. Cyberbullying victims and bullies According to Figure 2, 61 of our respondents have been cyberbullying victims and 8 respondents have been bullying someone else too. From the Figures 3, 4 and 5, we can see that the significance value is lower than the "a" value (0.004<0.05) and there is a statistical dependence between the variables on the level of significance a=0.05. Statistically significant dependence was identified and it is following the assessment of its intensity. For this reason, we used the causation coefficients Phi Cramer's Fig. 5. Symmetric Measures Finally, in order to determine the existence of dependence between bullied other people and cyberbullying victims, the Chi-square test of independence was used to determine if there is a significant relationship between the two variables. Also, Phi and Cramer's V coefficients were calculated. According to the results, there is a significant relationship on the Level of significance a=0.05 between the bullied other people and cy- berbullying victims(x2=8.303, sig=0.004). As Phi dependence coefficient is 0.133, there is a small dependence between the bullied other people and the cyberbullying victims. K. Cyberbullying victims and traditional bullying victims According to Figures 6, 7 and 8 respondents have been traditional bullying victims and 33 respondents have been cyberbullying victims too. We can see that the sig. value is lower than the "a" value (0.000<0.05). According to this, the null hypothesis is rejected and there is a statistical dependence between the variables on the level of significance a=0.05: Fig. 6. Traditional and cyber bullying Cross-tabulation Fig. 8. Symmetric Measures Fig. 7. Traditional and cyber bullying Chi-Square Tests Statistically, significant dependence was identified and it is following the assessment of its intensity. For this reason, we are using the causation coefficients Phi Cramer's V in order to compare the strength of the coefficient between the variables. Phi Coefficient is 0.188 and this means that there is a relationship between traditional bullying victims and in cy- berbullying victims. Finally, for determining the existence of dependence be- tween traditional bullying victims and cyberbullying victims, the Chi-square test of independence was used to determine if there is a significant relationship between the two variables. Also, Phi and Cramer's V coefficients were calculated. Ac- cording to the results, there is a significant relationship in the Level of significance a=0.05 between the bullied other people and cyberbullying victims(x2=16.533, sig.=0.004). As Phi dependence coefficient is 0.188, there is a small depen- dence between the bullied other people and the cyberbullying victims. Therefore, we reject the null hypothesis. According to Figures 9 and 10, we have the following research hypothesis. H0: There is no difference between the family relation with the cyberbullying victims H1: There is a difference between the family relation with the cyberbullying victims Also, we have the following research hypothesis. H00: Family relation is not related to the cyberbullying victims H10: Family relation is related to the cyberbullying victims Sig value of the Levene's Test for Equality of Variances is 0.139(>0.05). This means that we reject hypothesis H10 and we accept H10 hypothesis. Also, we accept the hypothesis H1 because of Sig. (2-tailed) value is 0.002 (<0.05). This means that there is a correlation between the cyberbullying victims and the family relation. Fig. 9. Group Statistics From Figure 9 we can see that respondents who have been cyberbullying victims were less well connected with their family (M=4.07) compared with the respondents who were cyberbullying victims (M=4.42). Therefore, we can say that family relation is related to cyberbullying victimization. VI. CONCLUSIONS Cyberbullying is based on the bullying by using the technol- ogy. Also, technology offer opportunities and can be painful for those who are targets of cyberbullying. Our survey aimed to explore the extent of bullying and cyberbullying in Greece. In order to answer the research ques- tions, we collected data which analyzed by SPSS statistical program. The important results that we have are: • Cyberbullying has a small extent in Greece, in contrast to traditional bullying which has a larger area. • Girls are more vulnerable to cyberbullying. • Cyberbullying victims spend 4-6 hours online. • There is a statistical dependence between cyberbullying victims and traditional bullying victims. • There is a correlation between cyberbullying victims and family relation. From our research results, it can be said that parents and schools need to help and prepare children from the hazards of the new technology as cyberbullying will evolve as technology continues to evolve. Future studies need to explore a larger sample size. Also elements such as cyberbullying and bullying relation and the parenting styles of cyberbullying and bullying victims need to be explored deeper. Fig. 10. Independent Samples Test [25] Demetriou, L. & Christodoulides, P. (2011). Personality and psycholog- ical adjustment of Greek-Cypriot youth in the context of the parental Acceptance-Rejection theory. The Cyprus Review, 23(1), 81-96. [26] Getachew, K. & Sintayehu, M. (2007). Types, magnitude, predictors and controlling mechanismes of aggression in secondary schools of Jimma zone. Ethiopian Journal of Education and Science, 2(2), 51-61 [27] Luyckx, K., Tildesley, E. A., Soenens, B., Andrews, J. A., Hampson, S. E., Peterson, M., & Duriez, B. (2011). Parenting and trajectories of childrens maladaptive behaviors: A 12-year prospective community study. Journal of Clinical Child & Adolescent Psychology, 40(3), 468- 478. [28] Flouri, E., & Buchanan, A. (2002). Lifesatisfaction in teenage boys: The moderating role of father involvement and bullying. Aggressive Behavior, 28, 126-133. [29] Georgiou, S.N. (2008). Parental style and child bullying and victim- ization experiences at school. Social Psychology of Education, 11(3), 213-227. [30] Ok, S. & Aslan, S. (2010). The school bullying and perceived parental style in adolescents. Procedia-Social and Behavioral Sciences, 5, 536- 540. [31] Demaray, M.K., & Malecki, C.K. (2003). Perceptions of the frequency and importance of social support by students classified as victims, bullies, and bully/victims in an urban middle school. School Psychology Research, 32(3), 471-489. [32] Smith, P.K., & Myron-Wilson, R. (1998). Parenting and school bullying. Clinical Child Psychology and Psychiatry, 3(3), 405-417. [33] Stevens, V., Bourdeaudhuij, I., de, & Oost, P., van. (2002), Relationship of the family environment in bully/victim problems at school. Journal of Youth and Adolescence, 31(6), 419-429. [34] Spera, C. (2005). A review of the relationship among parenting prac- tices, parenting styles, and adolescent school achievement. Educational Psychology Review, 17(2), 125-146 to childrens involvement [35] Dempsey, A.G., Sulkowski, M.L., Dempsey, J., & Storch, E.A. (2011). Has cyber technology produced a new group of peer aggressors? CyberPsychology, Behavior, and Social Networking, 1(5), 297-302. [36] Huang, Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26, 1581-1590). [37] Ybarra, M.L., Diener-West, M., & Leaf, P.J. (2007). Examining the overlap in Internet harassment and school bullying: implications for school intervention. Journal of Adolescent Health, 41(6), 42-50. [38] Dehue, F., Bolman, C., Vollink, T., & Pouwelse, M. (2012). Coping with bullying at work and health related problems. International Journal of Stress Management, 19(3), 175-197. http://dx.doi.org/10.1037/a0028969 [39] Baumrind, D. (1991). The influence of parenting style on adolescent competence and substance use. Journal of Early Adolescence, 11(1), 56-95. [40] Exter Blokland, E.A.W., den, Engels, R.C.M.E., & Finkenauer, C. (2001). Parenting practices, self-control, and adolescent delinquency. Aggressive Behavior, 27(3), 216-217. REFERENCES [1] Kowalski, R., Limber, S. and Agatston, P. (2012), Cyberbullying, Malden, MA: Wiley-Blackwell. [2] Berger, K. S. (2007). Update on bullying at school: Science has forgotten? Development Review,27,90-126. [3] Dehue, Francine & Bolman, Catherine & Ullink, Trijntje & Pouwelse, Mieneke. (2012). Cyberbullying and traditional bullying in relation to adolescents'perception of parenting. Journal of Cybertherapy and Rehabilitation. 5. 25-33. [4] Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and online: Children and youth's perceptions of cyberbullying. Children and Youth Services Review, 31(12), 1222-1228. [5] Olweus, D. (1973b). Personality and aggression. In J.K. Cole, & D.D. Jensen (Eds), Nebraska Symposium on Motivation 1972 (pp. 261-321). Lincoln: University of Nebraska Press. [6] Olweus, D. (1993a). Bullying at school: What we know and what we can do. Oxford, UK, and Cambridge, MA, USA: Blackwell Publishers. [7] Olweus, D. (1996). Bully/victim problems in school. Prospects,26, 331- 359 [8] Olweus, D. (1997). Bully/victim problems in school: Facts and interven- tion, European Journal of Psychology of EducationUniversity of Bergen, Norway. [9] Smith, P.K., Mahdavi, J.,Carvalho, M. &Tippett, N. (2006) . An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Retrieved Safeguarding/e-Safety/Task-to-Finish-Group/Task-to-Finish-Group- Documentation/Cyber-Bullying -- Final-Report.pdf https://www.staffsscb.org.uk/Professionals/Key- from [10] Ybarra, M.L., & Mitchell, K.J. (2004). Youth engaging in onlineharass- ment: Associations with caregiver-child relationships,Internet use, and personal characteristics.Journal of Adolescence, 27(3), 319-336. [11] Wong, Y.C. (2010): Cyber-parenting: Internet benefits, risks,and parent- ing issues, Journal of Technology in HumanServices, 28(4), 252-273. [12] Wang, J., Iannotti, R. J., & Nansel, T. R. (2010). School bullying among adolescents in the United States: Physical,Verbal, Relational, and cyber. Journal of Adolescent Health, 45(4), 368-375. [13] Whitney, I., & Smith, P.K. (1993). A survey of the nature and extent of bullying in junior/middle and secondary schools. Educational Research. [14] Franek, M. (2005/2006). Foiling cyber bullies in the new wild west. Educational Leadership, 63, 39-43. [15] Subrahmanyam, K. & Greenfield, P. (2008). Online communication and adolescent relationships. The Future of Children, 18(1), 119-146. [16] Bath, C.S. (2008). Cyber bullying: overview and strategies for school counsellors, guidance officers, and all school personnel. Australian Journal of Guidance & Counselling, 18(1), 53-66. [17] Kraft, E.M. & Wang, J. (2009). Effectiveness of cyber bullying preven- tion strategies: A study on students perspectives. International Journal of Cyber Criminology, 3(2), 513-535. [18] Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish adolescents CyberPsychology & Behavior, 11(3), 253-261. [19] Duman, S., & Margolin, G. (2007). Parents aggressive influences and childrens aggressive problem solutions with peers. Journal of Clinical Child and Adolescent Psychology, 36(1), 42-55. [20] Knutson, J.F., DeGarmo, D.S., & Reid, J.B. (2004). Social disadvantage and neglectful parenting as precursors to the development of antisocial and aggressive child behavior: Testing a theoretical model. Aggressive Behavior, 30(3), 187-205 [21] Mazefsky, C.A., & Farell, A.D. (2005). The role of witnessing violence, peer provocation, family support, and parenting practices in the aggres- sive behavior of rural adolescents. Journal of Child and Family Studies, 14(1), 71-85 [22] Pontzer, D. (2010). A theoretical test of bullying behavior: Parenting, personality, and the bully/victim relationship. Journal of Family Vio- lence, 25(3), 259273 [23] Bacchini, D., Miranda, M. C., & Affuso, G. (2011). Effects of parental monitoring and exposure to community violence on antisocial behavior and anxiety/depression among adolescents. Journal of Interpersonal Violence, 26(2), 269-292. [24] Brown, S.A., Arnold, D.H., Dobbs, J., & Doctoroff, G.L. (2007). Parenting predictors of relational aggression among Puerto Rican and European American school-age children. Early Childhood Research Quarterly, 22(1), 147-159.
1505.04943
1
1505
2015-05-19T10:24:14
The User Behavior in Facebook and its Development from 2009 until 2014
[ "cs.SI" ]
Online Social Networking is a fascinating phenomena, attracting more than one billion people. It supports basic human needs such as communication, socializing with others and reputation building. Thus, an in-depth understanding of user behavior in Online Social Networks (OSNs) can provide major insights into human behavior, and impacts design choices of social platforms and applications. However, researchers have only limited access to behavioral data. As a consequence of this limitation, user behavior in OSNs as well as its development in recent years are still not deeply understood. In this paper, we present a study about user behavior on the most popular OSN, Facebook, with 2071 participants from 46 countries. We elaborate how Facebookers orchestrate the offered functions to achieve individual benefit in 2014 and evaluate user activity changes from 2009 till 2014 to understand the development of user behavior. Inter alia, we focus on the most important functionality, the newsfeed, to understand content sharing amongst users. We (i) yield a better understanding on content sharing and consumption and (ii) refine behavioral assumptions in the literature to improve the performance of alternative social platforms. Furthermore, we (iii) contribute evidence to the discussion of Facebook to be an aging network.
cs.SI
cs
The User Behavior in Facebook and its Development from 2009 until 2014 Thomas Paul+, Daniel Puscher+, Thorsten Strufe∗ TU Darmstadt+ and TU Dresden∗ [email protected], [email protected], [email protected] 5 1 0 2 y a M 9 1 ] I S . s c [ 1 v 3 4 9 4 0 . 5 0 5 1 : v i X r a Abstract—Online Social Networking is a fascinating phenom- ena, attracting more than one billion people. It supports basic human needs such as communication, socializing with others and reputation building. Thus, an in-depth understanding of user behavior in Online Social Networks (OSNs) can provide major insights into human behavior, and impacts design choices of social platforms and applications. However, researchers have only limited access to behavioral data. As a consequence of this limitation, user behavior in OSNs as well as its development in recent years are still not deeply understood. In this paper, we present a study about user behavior on the most popular OSN, Facebook, with 2071 participants from 46 countries. We elaborate how Facebookers orchestrate the offered functions to achieve individual benefit in 2014 and evaluate user activity changes from 2009 till 2014 to understand the development of user behavior. Inter alia, we focus on the most important functionality, the newsfeed, to understand content sharing amongst users. We (i) yield a better understanding on content sharing and consumption and (ii) refine behavioral assumptions in the literature to improve the performance of alternative social platforms. Furthermore, we (iii) contribute evidence to the discussion of Facebook to be an aging network. Index Terms—Online Social Network, Facebook, Timeline, Content Sharing I. INTRODUCTION Online Social Networks (OSNs) offer a rich set of different communication and content sharing functionalities to their users and change the way how people interact. They support basic human needs such as communication, socializing with others and reputation building. Facebook1 is the dominating social networking service in the world that attracts more than one billion people2. Because of their importance for both, the individual users and the modern society, OSNs are subject in many research areas. Inter alia, researchers examine user interactions [11], the information diffusion [3] or novel social networking architectures e.g. [8], [5], [18]. An in-depth understanding of user behavior in OSNs can provide major insights into human behavior, and impacts design choices in social platforms and applications. However, user behavior in OSNs is still not deeply understood, because researchers have only limited access to behavioral data. To this end, we present a study to understand how users orchestrate Facebook’s functions to gain benefit for themselves as well as to understand the benefit that the most important function (Figure 4), the newsfeed, provides to Facebook users. 1https://facebook.com/; Accessed 2015-05-06 2http://allfacebook.de/userdata/; Accessed 2015-05-06 We also take the changes of user behavior from 2009 till 2014 into account to understand the success and aging process of Facebook, and compare our findings with user behavior assumptions in the literature. Our study is based on data, which is collected at the client- side. We gathered it from 2,071 users via web-browser plug-in to overcome limitations of crawled datasets ([7], [16], [12], [10]), click streams [21] or social network aggregator data [4]. Our plug-in is able to measure client-side activity such as scrolling or deactivating tabs to estimate the time that users invest to examine newsfeed posts. The plug-in has access to profile details endowed with user’s rights and is able to read activity logs that encompass historical actions regardless of their origin from mobile or stationary devices. To find volunteers for this study who are eager to install our plug-in, we sent a solicitation to join this study to users of our previous work [20] where we created a new interface to simplify audience selection. This interface is based on a color coding and minimizes the effort as well as error rates when changing the visibility of content items. We published a browser extension (plug-in) for Firefox and Chrome, called Facebook Privacy Watcher (FPW), which implements this new type of interface on purpose to yield benefit to people. Both versions (Chrome and Firefox) of the FPW have together been installed by more than 44,000 Facebook users. We asked the FPW users to join a user study about user behavior in Facebook by installing a second browser extension that anonymously collects the data for the study which is pre- sented in this paper. 2,071 FPW users allowed us to evaluate their user behavior in detail. We collected basic demographical data such as gender and age, data on usage patterns with respect to functionalities, data about communication partners w.r.t. to the social graph distance as well as metadata about the content which is shared. This metadata consists of the type of content, the time when it has been created or watched as well as its size in bytes (if available). We respect the privacy of all probands by not storing or evaluating any content or identifier! To understand the user behavior on Facebook, we evaluate the dataset with focus on the questions: How do people or- chestrate the vast variety of functions? Who produces content in Facebook? How much and which kind of information do people share on Facebook? Who consumes which content? How old is the shared content until it is viewed and how long is it commonly consumed? How does the observed user behavior change over time? The main findings are that Facebook sessions are very short, compared with assumptions in the literature and users’ content contributions are extremely disparate in type and quantity. A major share of newsfeed stories is posted by a minority of users and consists of reshared, liked or commented issues rather than original user-generated content. Facebook manages to compensate this lack of high quality content by transforming commercial posts into regular newsfeed content that is accepted by FPA users equally beside user-generated content. Evaluating the history of user actions from 2009 till 2014, we show that users tend to befriend with less other users. Also, actions that cause little effort, such as reshares and likes, recently became more popular than status updates and comments. With this work, we contribute to better understand the usage of Facebook with respect to churn, content contribution and consumption, as well as communication patterns. We also help authors of alternative (e.g. P2P-based) OSN architectures to make well-founded design choices and provide evidence for Facebook to be an aging network by analyzing dynamics of user behavior over time. The remainder of the paper is structured as follows: We dis- cuss related works in Section II and describe the experimental setup in Section III. We examine the attention that users pay to Facebook by evaluating the session durations and frequencies (churn) in Section IV, and evaluate the popularity of different functionalities in Facebook in Section V. We elaborate the newsfeed with respect to content creation, composition and consumption in Section VI, evaluate communication patterns of FPA users in Section VII and examine dynamics in user behavior in Section VIII. In Section IX, we summarize our work and draw major conclusions. II. RELATED WORK A vast amount of related work in the field of user behavior in OSNs has been done by now. Prior work can be classified by the research discipline (e.g. computer science and psychology), the data collection method as well as the social network that has been analyzed (e.g. Twitter, Facebook, Google+). We aim to understand what is the technical core of Face- book’s success. In the remainder of this section, we thus focus on related work in computer science about Facebook that evaluates functionality rather than e.g. the social graph. Unlike works in the field of psychology or sociology, we do not aim to contribute in exploring OSN user’s individual properties or any relation between OSNs and societies. We take the system’s point of view and want to know how users use Facebook’s functionality and how to build excellent systems that support user’s needs. Since capturing functionality usage causes strin- gent requirements on the data collection process, we examined related work based on this criteria in the remainder of this Section. Many works on user behavior are based on crawler-gathered data [7], [16], [12], [10]. Datasets which are acquired by employing crawlers contain static elements of user profiles. Dynamics can be estimated by frequently crawling the same information to detect changes. Also activity counters such as page view counters can detect some types of dynamics [24]. Page view counters have been also used by Lin et al. [14]. They crawled Renren and Sina which offer pageview counters and allow to crawl a list of the last nine visitors. This type of information allows insights into profile visits by building directed and weighted graphs. However, datasets which are acquired by employing crawlers are not sufficient for our purpose to understand how users use Facebook since they neither reflect the use of all kinds of functionality (such as messaging, likes or the ’Timeline’ usage) or their interplay nor do they allow to evaluate exact timings. Schneider et al. [21] analyzed passively monitored click streams of Facebook, MySpace, LinkedIn, Hi5, and StudiVZ. They analyzed feature and service popularity (churn), click sequences and profile usage but do not evaluate information about the newsfeed and profile page compositions or historical data. We can confirm the finding that users are trapped when using a specific functionality. If users view pictures, the likelihood is extremely high that the next action is again to view pictures. However, Schneider et al. did not evaluate content consumption nor content contribution habits of users. Benvenuto et al. [4] elaborated click stream data from 37,024 users of Orkut, MySpace, Hi5, and LinkedIn in a twelve days period, collected by a Brazil social network aggregator. They additionally analyzed crawler data which was collected at Orkut. The main results of this work are session descriptions containing information such as how long and how often users use which function of the system. With the help of the crawler data on Orkut, Benvenuto et al. analyzed function usage with respect to friend relations. In contrast to this work, we focus on Facebook in 2014. Due to client-side data collection, we know timing issues such as pre-click times, can distinguish between stranger profiles and professional sites and are able to do long-term evaluations based on activity log data. Another aggregator study in the middle east that measures session properties such as session durations can be found in [22]. To overcome these dataset implicated downsides in un- derstanding Facebook usage, Facebook-internal applications and client-side data collection methods have been developed. Mondal et al. [17] leveraged a Facebook app to examine Social Access Control Lists and Luarn et al. [15] developed a Facebook app to test and confirm the hypothesis that people’s network degree is positively correlated with the the frequency of information dissemination. Client-side data collection can be found at [26], [25]. However, these works do not analyze OSNs but web surfing behavior in general. The allocation of attention amongst friends has been ana- lyzed by Facebook [2]. The main findings are that Facebook users concentrate their attention on a small fraction of friends while messaging is much more focused on few individuals than profile page views. Backstrom et al. observed a gender homophily: “We find that females send 68% of their messages to females, while males send only 53% of their messages to females. This distinction is consistent with gender homophily — in which each gender has a bias toward within-gender communication — modulated by the overall distribution of Facebook messages. On the other hand, we see much smaller differences in viewing: for typical activity levels, both females and males direct roughly 60% of their profile viewing activity to female users.” In contrast to Backstrom et al. [2], we evaluate user behavior patterns more detailed with respect to timings and content contribution and consumption. We further evaluate historical and device usage independent data to understand the development of user behavior over time. III. EXPERIMENTAL SETUP In this Section, we describe our ethical considerations regarding this study, the data collection process, the amount and the composition of the data that we collected. We further describe the bias of the data with respect to the differences to the complete set of Facebook users. A. Ethical Considerations We acquired our participants by asking FPW users to par- ticipate in this study. Before installing the FPA, we explained the reason for collecting the data to our study participants and allowed users to access and verify all data before sending it to our server with consent. We further did not violate any rule on Facebook since we directly gathered our data from our participant’s browser. All data that we used for this study is anonymized and en- crypted for transmission with state-of-the-art technology. We did not collect or store any content or messages but metadata about the user behavior such as content types, time stamps and hashes of ids to be able to distinguish amongst actors without being able to identify individuals. Nevertheless, we keep the collected data confidential to protect all study participants from deanonymization attempts and do only publish aggregated data. B. Sample Generation We published the browser extension (FPW) to simplify audience selection for posts on Facebook. Enclosed into an FPW update, we asked our users whether they would be willing to help us with a user behavior study and thus share the necessary data with us. 11,572 FPW users filled out the questionnaire: 11.8% of the users answered “yes” 21.3% of the user “maybe” and the rest answered with “no”. This questionnaire was intended to be a risk reducing pre-test before developing the data collection plug-in to make sure that a reasonable number users are willing to help us. Subsequently to this successful pretest, the development of the data collection plug-in started as a statistic module of the Facebook Privacy Watcher and was thus called Facebook Privacy Analyzer. However, we decided the FPA to be a stand- alone plug-in. The FPA version for the Chrome browser was published at Chrome web store on 24th of November 2013. After fixing several bugs, the Firefox Version was published on 16th of January 2014. FPW users who have previously agreed to join the study have immediately been asked to install the plug-in by showing a pop-up window in FPW. All other FPW users were asked a second time again two weeks later. To incentivise study participation, the data collecting plug-in FPA provided statistics to users about their own behavior. The statistics also could be shared on Facebook and compared with friends. C. Sample Bias Since we cannot force any randomly chosen person to join our study, we only studied persons which were eager to help us in doing research. The data that we collected is thus neither a result of a random sampling process nor the complete Facebook dataset. We thus suffer from a bias that is evaluated in this Section. The majority of our participants joined us by following an invitation via pop-up message in the FPW. The FPW became popular by newspaper articles and radio station broadcasts that reached even less technology-savvy people of all ages. Beside some international media such as “golem” or “Der Standard”, the center of FPW news coverage was in Germany. Hence, the overwhelming majority of the FPA users are originated from Germany (84.87%), too. The rest of the participants are - according to the information in their profiles - from 45 other countries. Fig. 1. Friend relations amongst FPA users; singletons are excluded The heterogeneity of our sample is illustrated by Figure 1. It shows the friendship relations amongst 621 FPA users. Study participants without friends who also use the FPA (singletons; 68.02%) are not part of this graph. Only 3 bigger clusters of 31, 11 and 8 users exist. We assume the biggest clusters to consist of persons acquainted with one of the authors. To further estimate the sample bias, we recorded the gender and the year of birth of our participants from their user profiles. 77.6% of the participants are male, 21.13% are female and the rest did not share this information with us. Some users claimed to be born before 1925 or after 2010. However, we assume the majority of age information to be correct. The majority of our participants are born between 1960 and 1985. Our median participant is a 44 years old male Facebook user. Compared with average Facebook users, our participants are older and males are overrepresented. data that has been collected after 1st of January 2014. During our observation period of 123 days, 2071 users installed the FPA. However, not every study participant joined at the first day and not every participant stayed the whole rest of the time. We thus observed our participants on average 34 days. D. Details on Collected Data F. Mobile Device Usage To understand the Facebook usage, we require data that describes both components of interaction together with the respective timing information: the actions performed by users as well as the information flow from Facebook to the users. We mainly collected four data types, using the FPA: the performed actions of users, the friend lists of users, activity logs and basic demographic information about the FPA users. Furthermore, we measured exact session durations by storing the time when activating and deactivating browser tabs in case of active Facebook sessions. In the remainder of this section, we explain the four main types of collected information and their necessity for our study. a) Performed Actions: Every action that a user per- formed in Facebook has been recorded in the database, to- gether with a timestamp and the browser tab ID. We recorded further metadata about the actions such as the hashes of persons who are involved in those actions. b) Friend Lists: We recorded the friend list as set of UIN hashes. We needed this information for several reasons: We checked whether two-sided actions such as messaging or profile views are performed amongst friends or strangers, we counted the number of friends of each FPA user to calculate the node degree within the ego-graph and we checked newsfeed posts whether they are originated from friends. c) Activity Logs: The FPA is a powerful tool. However, it can only gather data in case the user uses a web browser based Facebook access. Facebook maintains an activity log as a part of the user profiles. This activity log contains activity records back till the time of registration at Facebook independent from the access channel (e.g. mobile app or browser). These records contain almost all actions which have been performed on Facebook together with the timestamp and some metadata such as communication partners. Private messaging e.g. is not included in the activity logs. Nevertheless, it is a very valuable data source for our analysis since it allows us to estimate the fraction of actions that we can observe in the browser. We can thus bridge the gap that would appear in case of only evaluating data from Firefox or Chrome browsers. Furthermore, due to the activity log’s long term records, we can evaluate changes in user behavior during time. We can thus trace the learning process of new users joining Facebook. d) User Demographics: Based on ethical considerations to protect user’s privacy, we only stored basic user data such as age and gender. We need this data to estimate the bias of our sample. E. Data Quantification Since we changed parts of the code basis through updates after the first publication of the plug-in, we decided to use only As explained above, the activity logs contain even those actions which have been performed on mobiles devices or stationary devices without an installed FPA instance. Further- more, the information flow from Facebook to users (e.g. the newsfeed) is independent from the devices that have been used to create and post the original content. We thus can include mobile actions in the majority of our analysis. However, we can neither evaluate content consumption nor churn on mobile devices. IV. CHURN Churn denotes in this work the behavior of users starting and ending Facebook sessions. In this Section, we describe the churn behavior that we observed to provide insights into the importance of Facebook for the FPA user’s daily life. Caused by the properties of web-based systems in which communication is triggered by user activity (events), different methods exist to measure churn. The related work (e.g. [21]) use inter alia the absence of activity (timeouts) as an indicator for users to leave the system. In contrast to the related work, the browser plug-in FPA has access to more precise information such as whether a tab is activated or not. To ensure comparability, we include four different measurements instead of only presenting the most precise measurements. We distinguish amongst the following four measurement methods: • Basic: A session always starts with the login on Face- book and ends with either a logout or with closing the last open browser tab with an open Facebook session. However, this session definition leads to extreme cases of sessions lengths lasting several days. It does not realistically reflect the user’s attention. We thus included a timeout of three hours starting after the last action was performed by the user. • Timeout: The timeout measurements are conform to the previous measurements, using a more aggressive timeout of 5 minutes. We ague that this short timeout reflects user attention better than previous. • Basic without timeout: We included the previous mea- surements without timeout to quantify the effect of the timeouts on our basic measurements. Comparing ’basic’ and ’basic without timeout’ indicates how many users log themselves off or close Facebook tabs while leaving. • Precise: Since the FPA notices tabs to be activated and deactivated, the most precise measurement is to count a session to start as soon as either a users performs a login action on Facebook or a browser tab on Facebook is activated. The session ends in case the browser (or the tab) is either closed or deactivated or a logout action is performed. tures is very popular, too. Surprisingly, users spend more time with topic-related interest groups (named ’groups’ in Figure 4) and the enclosed newsfeeds (’list newsfeed’) than with exchanging messages with others. The median FPA user spends more time with maintaining the own profile than with running apps on Facebook. However, running apps is not unpopular in general. A minority of users spends a big fraction of their time with apps. The page transition matrix in Figure 5 shows relations between different functions in Facebook by depicting page type transitions. Two main findings can be quickly realized: Users tend to repeat actions several times (e.g. view a picture after viewing a picture) and the newsfeed is the dominating functionality getting the most page hits from other transition sources. A. Third Party Applications In this section, we evaluate the usage of third party appli- cations (apps) which are completely integrated into Facebook itself and leverage the Facebook platform to provide benefit to their users. For these evaluations, we only included data from users who never accessed their newsfeed to exclude strangers and those who joined our experiment for less than one week. We thus only used the data of 1,068 users. The mutual benefit of the app creator and Facebook are that Facebook’s functionality is extended by third parties and the third parties can leverage Facebook platform functionality. Based on the platform functionality, the App instances of different users can communicate with each other and the platform allows the apps to receive information about the users, such as the friendship connections or interests, in case of user’s consent. The apps can thus leverage the social graph to fortify collaboration amongst friends and to establish or support a feeling of togetherness. 29.96% of the FPA users used at least one app and 50,88 % of all app users used exactly one app. On average, app Fig. 4. functionalities Fraction of time that FPA users spent using different Facebook Fig. 2. measurement methods on a logarithmic scale Distribution of session durations with respect to four different Figure 2 shows the duration of sessions. The ’precise’ and ’timeout’ measurements depict very short Facebook sessions of 2:16 minutes on average (median: 0:17) for ’precise’ and an average of 5:32 (median 2:21) for ’timeout’. The average results of the ’basic’ measurements (31:40 minutes) are roughly in line with the results of Schneider et al. [21] and the measurements without timeout show unrealistic lengths of 240:01 minutes. Fig. 3. Average number of sessions per day Beside the session duration, the average number of sessions is important, too. Figure 3 shows the distribution of average session numbers. The ’precise’ measurement indicates an average of 2.97 sessions, the ’timeout’ method 1.28 and the ’basic’ indicates an average of 0.79 sessions per day. The observed session duration as well as the total online duration per day (average session duration × average number of sessions) are shorter than those in the evaluation assump- tions of many Peer-to-Peer based decentralized OSNs (e.g. [18], [13], [23]). Our dataset provides evidence that assuming shorter session durations, the absence of stable nodes as well as an average of less than three sessions per day may be more realistic. V. FUNCTION POPULARITY Beside its third-party app ecosystem, Facebook itself com- prises a rich compilation of functions which characterize the service. Figure 4 contains box-whisker plots which show the relative fraction of time that users spend with each function. The box-whisker plots are ordered by the median time that users spend with each function. The newsfeed, called ’Timeline’, dominates Facebook us- age, followed by viewing other user’s profiles. Viewing pic- lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00NewsfeedForeign profilePhotoList−NewsfeedGroupMessagesOwn profileAppFind groupsEventSettingsRelative retention time mainly a gaming platform. This result is in line with our session duration observations in Section IV. However, a few third-party applications are used by roughly 30% of the users. VI. THE FACEBOOK NEWSFEED Being the core of Facebook, we dedicate this Section to the Timeline. Attracting users to generate and contribute content to the Timeline, such as pictures, videos status updates and text messages, is crucial for the success of social networking platforms like Facebook. However, the platform operator needs to solve a chicken-and-egg problem: content contributors need to be incentivised to contribute content by the existence of an audience that is interested in their submissions and the crucial incentive for a potential audience to spend their attention to the platform is the existence of interesting content. Thus, Facebook’s role is to be an information mediator that manages two scarce resources: valuable and interesting content as well as attention of the audience. “The goal of News Feed is to deliver the right content to the right people at the right time so they don’t miss the stories that are important to them. Ideally, we want News Feed to show all the posts people want to see in the order they want to read them.“ [1] The straightforward way to only leverage friendship connec- tions as communication channels while respecting restrictions arising from privacy settings is not sufficient to find an interested audience for content. The matchmaking is a hard task to solve for two reasons: a minority of users posts a lot of content which is not interesting for all of their friends and the amount of posts quickly becomes too high to be read by others [1]. Facebook thus decides which content to place in which user’s Timeline to provide the most interesting news to the users during their period of attention. This matchmaking can be improved by understanding two determinants: the interests of users in content as well as by understanding the meaning of content. In the remainder of this Section, we first examine user’s content contribution to understand Facebook’s initial situation for placing content in timelines. We then explain the newsfeed arrangement which reflects Facebook’s assumptions and wishes which content to view. The consumption of presented content is evaluated thereafter. Finally, we show the impact of the provided content based on the measured user reactions such as comments and likes. The following Timeline related evaluations are based on the subset of 774 users who viewed at least 100 posts (788938 in total) to avoid outliers to affect our results. A. Content Generation The Timeline contains not only user generated content. Facebook itself is creating a big portion of posts that appear in the Timeline e.g. to inform users about status or profile picture updates of their friends. Companies (add pages) can also post regular newsfeed messages. However, in the remainder of this Section (VI-A), we focus on user-generated content rather than content generated from Facebook itself or commercial pages. Users can create different types of content: status updates which only consist of pure text messages, shared links to Fig. 5. Page transition matrix; the row values sum up to 100 % Fig. 6. Box-whisker-plots: distributions of the number of apps FPA users are using and the time they are spending with apps users use a total number of 2.55 apps and spend 14.97 % of their time on Facebook with running apps. Figure 6 shows the distributions of the number of apps the users from the evaluation set are using as well as the distribution of the fraction of time they spend. Unfortunately, because of our privacy limitations, we recorded the hash values of app IDs rather than their name. We hence cannot evaluate which application is the most popular one. In spite of this limitation, Figure 7 shows the popularity distribution of apps amongst users. We can learn from that figure that the overwhelming portion of app usage concentrates on very few apps. The most popular two applications each are used by 20% of all FPA users and the 3rd popular application is only use by roughly half that many users. Fig. 7. the names of the apps and thus numbered them Popularity of apps; caused by privacy limitations, we do not know Evaluating the app usage suggests that Facebook is not 00071000120079003011453102400118021015120412101180010015206125035111210112363413101901000510468190120011930214403100273600412101430120030084465126014000005004080217900023193051390170165703002029110002319305139017011027712238152302100210630310100EventNoteNewsfeedMessagesLists newsfeedGroupForeign profilePhotoSettingsOwn profilePostLogged outApp CenterAppAppApp CenterLogged outPostOwn profileSettingsPhotoForeign profileGroupLists newsfeedMessagesNewsfeedNoteEventToFrom0204060Problllllllllllllllllllllllll05101520Apps per Userllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00Fraction of their time users spend with apps0.000.050.100.150.20123456789101112131415AppFraction of usersusing a certain app friend’s profiles whereof 36.42% of them have been directly posted via the sidebar of birthday congratulation pages. B. Newsfeed Composition In this Section, we evaluate the composition of the news- feed. We examine who authors the newsfeed content to depict the nature of the service and we evaluate which fraction of friends contributes to the newsfeed to scrutinize Facebook’s eligibility as a tool to keep in touch with friends. Facebook was initially planned for students to establish and maintain connections between friends. Figure 10 shows the distribution of newsfeed entries with respect to the authorship. Nowadays, the average fraction of friend-generated content dropped to 49.5%. While introducing professional pages as a tool for companies to communicate with their customers, Facebook became an important advertising platform that now reaches an average fraction of 41.4% of commercial newsfeed entries. Only a very small fraction of content was initially posted by strangers (9.1%). Content from strangers may appear in the personal newsfeed in case that friends interact with it (e.g. attach likes or comments). Fig. 8. Content type internal or external pages as well as media such as photos or videos. In general, publishing content is not very popular. 36.37% of the users who viewed at least 100 posts during the observation period did not post anything. We excluded them from further content generation evaluations. Fig. 9. Content posting targets Fig. 10. Authors of newsfeed entries; red dots mark the averages Figure 8 shows the popularity of the three kinds of content uploads. The main finding is that the average number of posts per week is extremely diverse with respect to different users. The relative frequency of sharing content can be represented by a long tailed distribution. For example, we observed users to share more than 200 links per week on average. However, the overwhelming majority only posts very few items. Our FPA users created on average 4.36 posts per week. Most frequently, they shared already existing content amongst others (2.43 times per week). Status updates and photo and video uploads happen less often. On average, 1.57 Status updates and 0.35 photos have been posted. Beside the own profile, users can also leverage other chan- nels to post content. Figure 9 shows what type of content is posted on the own profile, at a friend’s profile or on a group’s newsfeed. The overwhelming majority of Links are shared on the own Timeline and most photos and videos are published there as well. However, elaborating details regarding status update posts depict different patterns. Facebook invites users to send birthday congratulations via e-mail notification and provides a dedicated page for this purpose. The the result is that the majority of status updates has been published on The fraction of friends appearing in the newsfeed is critical for Facebook as a service that allows users to stay in touch with the whole set of friends. The intuitive assumption is that the fraction of friends that contributes to the newsfeed of users decreases with an increasing set of friends. This assumption is based on the facts that an increasing set of friends means a bigger set of stories for Facebook to choose for including into the Timeline while users only spend a limited amount of attention to the newsfeed. Figure 11 shows the linear regression on the size of the set of friends versus the fraction of friends in the newsfeed. It shows both: that the decreasing assumption holds as well as that the relation is not very strong (-0.32). Our interpretation is that Facebook tries to include as many friends as possible into the Timeline. Some users with the huge set of more than 700 friends still see content of more than 50% of their contacts in their newsfeed. This leads to a huge amount of newsfeed entries and suggests that Facebook scales the number of content items in the newsfeed according to the attention that it receives. Most newsfeed entries are very fresh until they are displayed (Figure 12): 84.79% are not older than 24 hours and 25.77% 0.000.050.100.150.100.250.501.002.005.0010.0025.0050.00100.00200.00Mean number of actions per weekFraction of usersAction Photo/video upload Status update ShareStatus update Share Photo/video upload0.000.250.500.751.00Target Friend Group Own profilellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllPageFriendStranger0.000.250.500.751.00Fraction of viewed newsfeed entriesType of author Fig. 11. Relation between the total number of friends and the fraction of friends appearing in the newsfeed (linear regression) Fig. 13. The time that newsfeed entries stay in the browser viewport with respect to the authors of entries diverse checking time than others. While there is a peak at 1.5 seconds, there are is also a higher value at 60 seconds compared with posts from friends or pages. Fig. 12. Age of newsfeed posts until being displayed in hours are created less than one hour before. However, a small fraction of entries is very old: 4.02% are older than 7 days 1.73% are older than 30 days. One reason for very old content to appear or reappear in the newsfeed are friends liking or commenting old content. C. Content Consumption In this Section, we provide insights into the content con- sumption habits of the FPA users. We first evaluate how long different types of newsfeed entries stay in the viewport of the browser before being clicked. This gives an idea about how much effort FPA users invest into the decision which content they view. We then evaluate how many newsfeed entries have been viewed on average per day to estimate the amount of attention a user pays to the newsfeed. Finally, we examine the types of accessed content to allow comparing the posted with the viewed content. Figure 13 shows the time a newsfeed entry stays in the browser viewport before being clicked. This information il- lustrates the time investments of users to check a certain entry. Most users invest between one and ten seconds (average 9.5s) to decide whether to click on an entry or not. This is valid for all types of entries independent from the authorship. Very interesting is that posts from commercial pages receive a similar attention than posts from friends or strangers (9.8s vs. 9.1s). However, posts from strangers cause a slightly more Fig. 14. Distribution (Histogram) of the average number of newsfeed entries that have been viewed by FPA users during the observation period; each bar indicates the fraction of users viewing the respective average number of posts Fig. 15. Number and fraction of newsfeed entries that are viewed by FPA users On average, users view 43 posts per day. A histogram that allows to estimate the distribution can be found in Figure 14. Figure 15 shows the composition of newsfeed entry views. The biggest fraction of viewed posts consists of shared links (41.76%), photos (27.34%) and status updates (16.77%). 0.000.250.500.751.00101001000Number of friendsFraction of friends in newsfeed0.00.20.40.60,1125103060120300Viewing time [s]DensityTypeStrangersFriendsPages0.000.020.040.060.081025501002505001000Average number of read newsfeed−entries / dayFraction of users1.3%27.34%0.91%41.76%1.11%16.77%4.18%4.14%0.04%1.71%0.75%Suggested postOthersAdded photos to albumPost to wallFacebook Graph APIYoutubeVideoEventStatus updatePhotoShared link0e+002e+054e+056e+05Number of viewed entriesType of entry Considering the authorship of posts, it is surprising for us that the clicked shares of commercial posts roughly equal those of friends or strangers. FPA users seem to accept commercial newsfeed posts equally as regular news beside user-generated content. pages that represent companies or prominent persons such as actors or musicians. In Figure 17, we further distinguish amongst friend’s, friend-of-friend’s and stranger’s profiles as well as between liked and unliked professional pages. FPA users visit on average 33.51% pages of friends, 30.19 % ’un- liked’ professional pages 15.32% pages of friend-of-friends, 11.22 % stranger’s pages and 9.76 % liked professional pages. B. Communication with Friends Facebook is widely known as a tool to communicate with friends. To understand this communication amongst friends, we elaborate the two-sided functionalities. Figure 18 shows the percentages of friends that have been communicated with during the observation period by using a certain communica- tion function. Since this analysis is affected by a too short observation time, we only included data from 714 users who participated for more than four weeks in our study. Fig. 16. Number of comments and likes of newsfeed entries Figure 16 shows the long tailed distributions of the number of comments, attached to newsfeed entries. This long tailed distribution shows the number of comments and likes to be extremely disparate amongst FPA users. On average, they like roughly 4% and comment 1% of all newsfeed posts. VII. COMMUNICATION PATTERNS In this Section, we provide insights into communication patterns of FPA users. We first separately evaluate the user profile views as such representing the most popular two-sided communication functionality. In case of viewing user profiles, the profile owners are information sender and the user who is accessing the profile is the information receiver. A. User Profile Access Fig. 17. distinguish professional pages in liked and not liked (unliked) pages Profile page access with respect to the social graph distance; we Profiles in Facebook can be classified into two major categories: profiles of individuals and profiles of professional Fig. 18. Percentage of friends with whom the FPA users communicate with respect to the communication function; red dots mark averages With outstanding advance, the most popular type of commu- nication between friends is viewing newsfeed entries of each other, followed by clicking on shared links, viewing profiles and liking content. On the other side of the spectrum, least popular communication functions are poking, timeline posts and commenting. Excluding the extreme cases of poking and viewing newsfeed entries, the most popular functions are those which imply the lowest commitment of the acting user. Both poking and viewing newsfeed entries are exceptional cases for different reasons. Poking is exceptional because it is only intensively used by a very small fraction of users and the newsfeed is arranged by Facebook’s algorithms without an explicit choice of the users. Facebook shows newsfeed entries of friends in case of communicating with them using any other function. The set of friends, appearing in the newsfeed, contains all other sets in Figure 18 almost completely (98%). Thus the majority of FPA users communicates with only a minority of friends. This is especially true for users with more than 80 friends (Figure 11: more dots are below the 50% marker than above). VIII. DYNAMICS IN USER BEHAVIOR ON FACEBOOK The social networking phenomena has recently appeared and the idea still disseminates amongst world’s population. 0.000.050.100.151e+011e+031e+05# Comments/likesFraction of entriesType: CommentsLikesllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.00FriendFriend of friendStrangerLiked pageUnliked pageShow newsfeed-entryShow timeline-entryCommentVisit profileLikeClick shared linkPokePost to timelineSend message0,05%0,1%0,25%0,5%1%2,5%5%10%20%40%65%100%Percentage of friends that was communicated withType of communication The establishment of best practices as well as the process of users to learn how to use social networking tools like Facebook is an ongoing process. Furthermore, Facebook is permanently working hard to improve the service. Thus, usage patterns evolve over time and examining user behavior in the field of social networking means to examine a quickly moving target. Fortunately for us, Facebook encloses an activity log into user profiles. It contains all actions of many categories that users have performed, starting from the day when a user is registering her account at Facebook. Our tool, FPA, is able to read this information. To show the development of usage patterns, we compare the popularity of the seven most popular activities on Facebook per year in Figure 19. The evaluation of our dataset yielded several different findings. We summarize them in as follows: • Sessions in Facebook are shorter and less frequent than assumed in the literature. In particular, very long sessions are missing. • The newsfeed is the most intensively used function of Facebook. • Content contribution is very disparate. A few users con- tribute a major share of content. • FPA users consume many items in a short time per day (average: 43 items in 6:44 minutes). • Shared content in Facebook is very fresh. 84.79% of all posts are not older than 24 hours until being shown to the recipients. • The probability of a commercial newsfeed entry to be viewed roughly equals those of friend’s posts in average. • User behavior in Facebook is changing at the scale of years. While low effort actions, such as likes and reshares, recently became more popular, the contribution of photos, status updates and comments is decreasing. • Facebook became mature and stable. This is reflected not only by decreasing user growth rate but also by decreasing establishment of new connections amongst the existing set of users. Users discover fewer new people to add as friend. Fig. 19. Comparison of Facebook usage from 2009 till 2014 This plot strikingly showcases the maturity of Facebook and its decreased growth rates. The fraction of friend-adding actions dropped from year to year. This indicates that the process of new friends joining the network as well as the es- tablishment of friendship connections converged to the natural social dynamics in the society. Also noticeable is that the share of actions which require little effort from users increases: Likes and sharing of content recently became much more popular than in 2009. The fraction of sharing actions increased by factor 4.62 from 2009 till 2014. Accordingly, the fraction of comment, status update actions and photo uploads decreased. IX. SUMMARY AND CONCLUSION In this paper, we presented a study on user behavior in Facebook, based on data from 2,071 participants. We elabo- rated the session durations, the average number of sessions per day and the function usage. The goal was to examine how intensive users use Facebook and to determine which is the dominating function of Facebook. We further evaluated the newsfeed and depicted what kind and how much information is shared amongst which actors. Since Facebook is widely known as a tool to communicate with friends, we checked this assumption by explicitly elaborating how often the study participants communicated with their friends using a certain functionality. Finally, we elaborated the user behavior from 2009 till 2014 to understand the recent development. We conclude from these observations that users recently seem to use Facebook with a higher speed and lower effort than before, preferring quick actions with low commitment (e.g. likes and reshares). Also, users prefer extremely fresh content. As a consequence, alternative OSN architectures, such as P2P-based OSNs (e.g. [9], [18], [23], [6], [19]), could be de- signed in a lightweight way without the burden to persistently store stale content in large user profiles. Because of their low storage overhead, the large fraction of shared (external) links in the newsfeeds supports the idea of small user profiles, too. Furthermore, focus of alternative OSN architectures should be brought on dynamic environments, caused by short session durations. This work has also highlighted the dynamics in user behav- ior at a scale of years. We assume both technological influ- ences, such as advances in the sector of mobile computing, as well as the social reasons, e.g. learning curves of users and privacy discussions, to be drivers of dynamics in user behavior. User behavior in OSNs thus should be studied while being aware of dynamics and old user models should be carefully used to evaluate novel systems. Surprisingly for us, users spend a major share of their attention and time with commercial pages. The probability of a commercial newsfeed entries to be viewed roughly equals those of friend’s posts (does not hold for a small set of close friends). Thus, Facebook seems to be successful to target the recipients of commercial news and it seems to insert a compatible amount of commercial content into the newsfeed. n = 1428n = 960n = 2597n = 1574n = 2668n = 4962009201020112012201320140.000.250.500.751.00Share of the action in the activity logYearActionCommentLikeNew friendPhotoShareStatus−UpdatePost to timeline [24] Thorsten Strufe. Profile popularity in a business-oriented online social network. In SNS, 2010. [25] Ganesan Velayathan and Seiji Yamada. Investigating user browsing behavior. In WI-IAT. IEEE, 2007. [26] Harald Weinreich, Hartmut Obendorf, Eelco Herder, and Matthias Mayer. Off the beaten tracks: exploring three aspects of web navigation. In WWW, 2006. X. ACKNOWLEDGEMENTS This work has been co-funded by the German Research Foundation (DFG) in the Collaborative Research Center (SFB) 1053 ’MAKI – Multi-Mechanisms-Adaptation for the Future Internet. REFERENCES [1] News Feed FYI: A Window Into News Feed. https://www.facebook.com/ business/news/News-Feed-FYI-A-Window-Into-News-Feed. Accessed: 2014-11-23. [2] Lars Backstrom, Eytan Bakshy, Jon M Kleinberg, Thomas M Lento, and Itamar Rosenn. Center of attention: How facebook users allocate attention across friends. ICWSM, 2011. [3] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The role of social networks in information diffusion. In WWW. ACM, 2012. [4] F. Benvenuto, T. Rordrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social network. IMC, 2009. [5] S. Buchegger, D. Schioberg, L. Vu, and A. Datta. Peerson: P2p social networking - early experiences and insights. SNS, 2009. [6] Sonja Buchegger, Doris Schiöberg, Le Hung Vu, and Anwitaman Datta. PeerSoN: P2P Social Networking - Early Experiences and Insights. In Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems 2009, co-located with Eurosys 2009, Nürnberg, Germany, March 31, 2009. [7] Salvatore A. Catanese, Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, and Alessandro Provetti. Crawling facebook for social network analysis purposes. In WIMS, 2011. [8] A. Cutillo, R. Molva, and T. Strufe. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In WoWMoM, 2009. [9] Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust. IEEE Communications Magazine, 2009. [10] L. Gyarmati and T.A. Trinh. Measuring user behavior in online social networks. Network, IEEE, 2010. [11] J. Jiang, C. Wilson nad X. Wang, P. Huang, W. Sha, Y. Dai, and B. Y. Zhao. Understanding latent interactions in online social network. IMC’10, 2010. [12] Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang, Yafei Dai, and Ben Y Zhao. Understanding latent interactions in online social networks. ACM Transactions on the Web (TWEB), 2013. [13] David Koll, Jun Li, and Xiaoming Fu. Soup: An online social network by the people, for the people. In Middleware, 2014. [14] Jiali Lin, Zhenyu Li, Dong Wang, Kavé Salamatian, and Gaogang Xie. Analysis and comparison of interaction patterns in online social network and social media. In ICCCN, 2012. [15] Pin Luarn, Jen-Chieh Yang, and Yu-Ping Chiu. The network effect on information dissemination on social network sites. Computers in Human Behavior, 2014. [16] Pasquale de Meo, Emilio Ferrara, Fabian Abel, Lora Aroyo, and Geert- Jan Houben. Analyzing user behavior across social sharing environ- ments. ACM Trans. Intell. Syst. Technol., 5(1), January 2014. [17] Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P Gummadi, and Alan Mislove. Understanding and specifying social access control lists. In SOUPS, 2014. [18] Rammohan Narendula, Thanasis G Papaioannou, and Karl Aberer. A decentralized online social network with efficient user-driven replication. In PASSAT. IEEE, 2012. [19] Thomas Paul, Antonino Famulari, and Thorsten Strufe. A survey on decentralized online social networks. Computer Networks, 2014. [20] Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, and Thorsten Strufe. C4ps-helping facebookers manage their privacy settings. In Social Informatics. Springer, 2012. [21] F. Schneider, A. Feldmann, B. Krishnmurthy, and W. Willinger. Un- derstanding online social network usage from a network perspective. IMC’09, 2009. [22] Mehrdad Zaker Shahrak, Shahriar Mohammadi, and Hamid Safarpour. Middle east user navigation in online social networks and interactions in e-commerce, an analogy. Advances in Computer Science, 2014. [23] Nashid Shahriar, Shihabur Rahman Chowdhury, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba, and Bertrand Mathieu. Ensuring beta- availability in p2p social networks. In ICDCSW, 2013.
1308.1746
3
1308
2013-11-26T20:12:51
Online Decision Making in Crowdsourcing Markets: Theoretical Challenges (Position Paper)
[ "cs.SI", "cs.CY", "cs.HC" ]
Over the past decade, crowdsourcing has emerged as a cheap and efficient method of obtaining solutions to simple tasks that are difficult for computers to solve but possible for humans. The popularity and promise of crowdsourcing markets has led to both empirical and theoretical research on the design of algorithms to optimize various aspects of these markets, such as the pricing and assignment of tasks. Much of the existing theoretical work on crowdsourcing markets has focused on problems that fall into the broad category of online decision making; task requesters or the crowdsourcing platform itself make repeated decisions about prices to set, workers to filter out, problems to assign to specific workers, or other things. Often these decisions are complex, requiring algorithms that learn about the distribution of available tasks or workers over time and take into account the strategic (or sometimes irrational) behavior of workers. As human computation grows into its own field, the time is ripe to address these challenges in a principled way. However, it appears very difficult to capture all pertinent aspects of crowdsourcing markets in a single coherent model. In this paper, we reflect on the modeling issues that inhibit theoretical research on online decision making for crowdsourcing, and identify some steps forward. This paper grew out of the authors' own frustration with these issues, and we hope it will encourage the community to attempt to understand, debate, and ultimately address them. The authors welcome feedback for future revisions of this paper.
cs.SI
cs
PO S I T ION PA P E R Online Decision Making in Crowdsourcing Markets: Theoretical Challenges Aleksandrs Slivkins∗ Jennifer Wortman Vaughan† May 2013 This version: November 2013 Abstract Over the past decade, crowdsourcing has emerged as a cheap and efficient method of obtaining solutions to simple tasks that are difficult for computers to solve but possible for humans. The popularity and promise of crowdsourcing markets has led to both empirical and theoretical research on the design of algorithms to optimize various aspects of these markets, such as the pricing and assignment of tasks. Much of the existing theoretical work on crowdsourcing markets has focused on problems that fall into the broad category of online decision making; task requesters or the crowdsourcing platform itself make repeated decisions about prices to set, workers to filter out , problems to assign to specific workers, or other things. Often these decisions are complex, requiring algorithms that learn about the distribution of available tasks or workers over time and take into account the strategic (or sometimes irrational) behavior of workers. to address these challenges in a As human computation grows into its own field, the time is ripe principled way. However, it appears very difficult to captur e all pertinent aspects of crowdsourcing markets in a single coherent model. In this paper, we re flect o n the modeling issues that inhibit theoretical research on online decision making for crowdsourcing, and identify some steps forward. This paper grew out of the authors’ own frustration with these issues, and we hope it will encourage the community to attempt to understand, debate, and ultimately address them. 1 Introduction Crowdsourcing markets have emerged as a tool for bringing together requesters, who have tasks they need accomplished, and workers, who are willing to perform these tasks in a timely manner in exchange for payment. Some crowdsourcing platforms, such as Amazon Mechanical Turk, focus on small “microtasks” such as labeling an image or filling out a survey, with payment s on the order of ten cents, while other platforms, such as oDesk, focus on larger jobs like designing websites, for significantly larger payments, but most share the common feature of repeated interaction. In these markets, workers, requesters, and the platform itself can all adjust their behavior over time to adapt to the environment. For example, requesters can choose which workers to target (or filter out) for their ta sks and which prices to offer, and can update these choices as they learn more about salient features of the environment, such as workers’ skill levels, ∗Microsoft Research. Email: [email protected]. †Microsoft Research. Email: [email protected]. 1 the difficulty of their tasks, and workers’ willingness to ac cept their tasks at given prices. In principle, the platform could also make smarter decisions over time as it learns more about the quality of both requesters and workers. Naturally, as crowdsourcing has gained popularity and human computation has grown into its own field, researchers have taken an interest in modeling and analyzing the problem of online decision making in crowdsourcing markets. There is plenty of prior work on which to build. Online decision algorithms have a rich literature in operations research, economics, and several areas of computer science including machine learning, theory of algorithms, artificial intelligence, a nd algorithmic mechanism design. A large portion of this literature is concerned with the tradeoff between exploration (obtaining new information, perhaps by sacrificing near-term gains) and exploitation (making optimal decisions based on the currently available information). This tradeoff is often studied under the name multi-armed bandits; a reader can refer to Cesa- Bianchi and Lugosi [14], Bergemann and V alim aki [7], Gittins et al. [26], and Bubeck and Cesa-Bianchi [11] for background and various perspectives on the problem space. Another (somewhat overlapping) stream of work concerns dynamic pricing and, more generally, revenue management problems; see Besbes and Zeevi [8] for an overview of this work in operations research, and Babaioff et al. [3] for a theory-of-algorithms perspective. Further, there is extensive literature on online decision problems in which all information per- tinent to a given round is revealed, either before or after the algorithm makes its decision for this round; see Borodin and El-Yaniv [10], Buchbinder and Naor [13], and Cesa-Bianchi and Lugosi [14] for background. Despite the vast scope of this existing work, crowdsourcing brings an array of domain-specific chal- lenges that require novel solutions. To address these challenges in a principled way, one would like to formulate a unified collection of well-defined algorithmic q uestions with well-specified objectives, allowing researchers to propose novel solutions and techniques that can be easily compared, leading to a deeper un- derstanding of the underlying issues. However, it appears very difficult to capture all of the pertinent aspects of crowdsourcing in a coherent model. As a result, many of the existing theoretical papers on crowdsourcing propose their own new models. This makes it difficult to compa re techniques across papers, and leads to uncertainty about which parameters or features matter most when designing new platforms or algorithms. There are several reasons why developing a unified model of cr owdsourcing is difficult. First, there is a tension between the desire to study models based on existing platforms, such as Mechanical Turk, which would allow algorithms to be implemented and tested immediately, and the desire to look ahead and model alternative platforms with novel features that could potentially lead to improved crowdsourcing markets further down the line. A plethora of different platform designs are possible, and different designs lead to both different models and different algorithmic questions. Second, even after a model of the platform has been determined, one must take into account the diversity of tasks and workers that use the platform. Some workers may be better at some tasks than others, and may find some tasks harder than others. It is natural to take this d iversity into account when designing algorithms (especially for a problem like task assignment), but the way in which this diversity is modeled may impact the choice of algorithm and the theoretical guarantees that are attainable. Third, crowdsourcing workers are human beings, not algorithmic agents (with the possible exception of spambots, which bring their own problems). They may act strategically, maximizing their own welfare in response to the incentives provided by the requesters and the platform. Taking into account this strategic behavior is essential. Moreover, workers also may act in ways that are even less predictable and seemingly irrational. As just one example, empirical studies have shown that workers may not know their own costs of completing a task, and are susceptible to the anchoring effect in which they judge the value of a task based on the first price they see (see Mason and Watts [43], Mason and Suri [42], Yin et al. [65] and the literature reviews therein). One must be aware of these nuances when modeling worker behavior. This paper offers a detailed reflection on the modeling issue s that inhibit theoretical research on repeated decision making in crowdsourcing. Our goal is not to offer a single unified model, but to raise awareness of 2 the issues and spark a discussion in the community about the best ways to move forward. To this end, we identify a multitude of modeling choices that exist, and describe a few specific models that appear promising in that they potentially capture salient aspects of the problem. A note on our scope. There have been some recent empirical or applied research projects aimed at devel- oping online decision making algorithms that work well in practice on existing crowdsourcing platforms, primarily for the problems of task assignment and label aggregation (see, for example, Chen et al. [16], Ipeirotis et al. [31], and Wang et al. [62]). While it is of course valuable for anyone interested in theoretical models of crowdsourcing to be aware of related empirical advances, we do not attempt to provide a complete survey of this work here. A similar attempt has been made to categorize future directions of crowdsourcing research within the human-computer interaction and computer-supportive cooperative work communities [36]. While their pa- per discusses many of the same broad problems as ours (such as quality control, platform design, and reputation), the research agenda they lay out is heavily focused on the high-level design of the technical and organizational mechanisms surrounding future crowd work systems, while we focus more specifically on low-level modeling and algorithmic challenges for online decision making. 2 Informal problem statement Let us start with an informal and very general description of the class of problems that fall under the umbrella of online decision making in crowdsourcing markets. There are three parties: workers, requesters, and the crowdsourcing platform. Over time, requesters submit tasks to the platform. Workers get matched with requesters, perform tasks, and receive payments. Workers and requesters may arrive to the platform and leave over time. Some workers may be better than others at some tasks; some tasks may be more difficult than others for some workers. Some workers may enjoy some tasks more than others. All parties make repeated decisions over time. All parties can learn over time, which may help them in their decision making. All decision makers receive partial feedback: they see the consequences of their decisions, but typically they do not know what would have happened if they had made different decisions. Workers and requesters can behave strategically, so their incentives need to be taken into account. The problem is to design algorithms for decision making, on behalf of the platform, the requesters, or perhaps even the workers. We can think about this setting from the point of view of each of the three parties, who face their own choices and have differing motivations and goals: • Requesters can choose the maximal price they are willing to offer for a given task, and specify any budget constraints that they have. They may also be able to choose which prices to offer to given (categories of) workers for given (categories of) tasks. Further, they may be able to choose which (categories of) workers they are willing to interact with, and which instances of tasks to assign to each (category of) worker. The utility of the requester is typically (an increasing function of) the value that he obtains from completed work minus the price that he has to pay for this work. • The platform may match (subsets of) requesters to (subsets of) workers. In principle, the platform may also be able to modify the offered prices, within constraints specified by the requesters, and to determine how to charge requesters and/or workers for their use of the platform. In the long run, the platform cares about maximizing long-term revenue. In the short term, the platform may care about keeping workers and requesters happy to attract more business, especially in the presence of competing platforms. 3 • Workers can decide whether to accept a task at a given price, and how much effort to put into it. They may be able to choose between (categories of) tasks, and may be asked to provide some information such as their interests, qualifications, and asking prices. Workers care about the amount of money that they earn, the cost of their labor (in terms of time or effort), and perhaps the amount of enjoyment they receive from completing tasks. As parties interact over time, they may be able to learn or estimate workers’ skill levels, how much workers value their effort and time, the difficulty of tasks, and the quality level of particular workers on particular tasks. We focus on two natural versions of the problem: requester-side and platform-side.1 The requester-side problem is to design a mechanism which makes repeated decisions for a specific requester. The platform- side problem is to design a mechanism which makes repeated decisions for the platform. Both versions should take into account realistic constraints and incentives of workers and requesters. 3 Possible modeling choices To study and understand any particular aspect of repeated decision making for crowdsourcing markets, one must first determine a model or framework in which to work. To date, most theoretical papers on crowdsourcing have proposed their own models, which are often hard to compare, and with good reason; one could come up with any number of valid models, and each has its own appeal. However, we would argue that in order to extract and solve the fundamental issues that are present in any crowdsourcing market, one must be keenly aware of the (implicit or explicit) modeling choices they make, and the extent to which their algorithmic ideas and provable guarantees are sensitive to their modeling assumptions — essentially how robust results are to modifications in the model. In this section, we identify a variety of modeling choices for repeated decision making in crowdsourcing, some of which have been discussed in prior work and some of which have not. We break these choices roughly into five categories: task design, platform design, quality of work, incentives and human factors, and performance objectives, though other categorizations are possible. Task design. A wide variety of tasks can be crowdsourced. In many tasks, such as translation [66], audio transcription [40], image/video analysis [61, 46], or trip planning [67], the workers’ output is unstructured. On the other hand, in many applications currently deployed in the Internet industry, the workers’ output has a very specific, simple structure such as a multiple-choi ce question or a free-form labeling question. In particular, most tasks that the assess relevance of web search results are structured as multiple-choice ques- tions. The output structure (or lack thereof) determines whether and how workers’ output can be aggregated. Below we survey some possibilities in more detail. • Multiple-choice questions. The simplest structure is a binary question (Is this a correct answer? Is this spam?). Alternatively, a question can include more than two options (Which of these web search results is more appropriate for a given query? Which of these categories is more appropriate for this website?) or allow workers to submit more than one answer when appropriate. Further, the possible answers may be numeric or otherwise ordered (What age group does this person belong to?), in which case the similarity between the answers should be taken into account. • Free-form labeling. In image labeling and various classification tasks, a worker may be allowed to submit arbitrary labels or categories. A worker may be allowed to submit more than one label for the same task. Some task designs may include a list of prohibited labels so as to obtain more diverse results. 1 In principle, one could also consider the decision making problems faced by workers. This area is still largely unexplored and could be a source of interesting research questions. However, we do not consider it here. 4 • Rankings and weights. Some tasks strive to compute more complex structures such as rankings or relative weights for a given pool of alternatives [47, 41]. Each worker may be asked to provide either a full ranking or weight vector or only a comparison between a given pair of alternatives. Platform design. All interaction between workers and requesters takes place in the context of a particular crowdsourcing platform. The platform designer controls the way in which requesters and workers may interact. In modeling crowdsourcing markets, one may wish to model the features of a specific existing platform (such as Amazon Mechanical Turk, oDesk, or TaskRabbit) or explore alternative platform designs that may lead to improved crowdsourcing markets in the future. In either case, one must consider the following modeling issues. • Selection of workers. Does the platform allow requesters to limit their tasks to specific (categories of) workers, and if so, how? Possibilities range from coarse platform-defined categories of workers (e.g., fil- tering by demographic information or feedback rating/reputation) to allowing requesters to specify arbitrary workers by worker ID. • Selection of tasks. How does the platform allow workers to select tasks? Does a worker see all offerings that are currently in the market? If so, how are they sorted? Alternatively, the platform could limit the options presented to a given worker. When the task(s) from a given requester are offered to a given worker, does the platform allow the requester to restrict which offerings from other requesters this worker is exposed to? • Feedback to the requester. What is the granularity of feedback provided to a given requester by the platform? In particular, does the platform expose the workers’ performance by individual IDs or only coarse categories? Does the platform expose some or all of the workers’ attributes? Does the platform expose workers’ performance for other requesters? If a worker views a task but ultimately does not decide to complete it, does the requester of that task learn that it was viewed? • Temporal granularity. How often does the platform allow a requester to adjust its selection prefer- ences? How frequently does the platform provide feedback to requesters? When is it reasonable to assume that workers complete a given task sequentially, one at a time, and when is it necessary for a model to allow multiple tasks to be accepted or completed simultaneously? • Price negotiation. How do requesters negotiate prices with workers? Typically it is assumed that requesters post one take-it-or-leave-it price, but this is not the only possibility. Can a requester post different prices to different workers depending on the workers’ attributes? Can the requester update the price over time? Alternatively, one could imagine a crowdsourcing platform on which workers communicate minimal asking prices to the requesters and prices are determined via an auction. • Payments. How do payments happen? The simplest version is that each worker, upon completion of a task, receives the posted price for that task. Can a requester specify a payment that depends on the quality of submitted work? If so, must he declare the exact payment rule up front? In particular, must he commit to a specific way of determining the quality of submitted work? • Persistent identities. Does a platform ensure persistent worker identities? How difficult or expensive is it for a worker to abandon his old identity and create a new one, or to create multiple identities? • Platform-wide reputation. Does the platform maintain a platform-wide reputation score for each worker and/or requester? If so, then how exactly is this score defined? What properties of this score are guaranteed? How are reputations used? How are workers and requesters prevented from manipulating their own reputations and the reputations of others? • Qualifying tests. Does the platform allow requesters to require workers to pass a qualification test 5 before being allowed to work for money? The quality of work. In crowdsourcing environments, both tasks and workers are highly diverse. Naturally certain workers will be able to complete certain tasks more proficiently than others, yielding higher quality results, possibly for less effort. Although the difficulty o f a task and the skills of each worker are generally not known to the platform or requester a priori, they can be learned and refined over time, though this is made more difficult when the quality of a completed task is not observable or easily measured, or when the users of the market are themselves changing over time. • Worker skills and task difficulty levels. Some workers may be better than others at some tasks, and worse than others at other tasks. Ideally, an online algorithm should learn estimates of workers’ skills for various tasks over time. However, if each worker has an arbitrary skill level for each task, it will be impossible to generalize based on observed performance. Therefore, it is desirable to model some type of structure on tasks or workers. Can the inherent skill level of a given worker be summarized by a single number? Can the inherent difficulty of a task be summarized by a single number? More generally, how should one model a given worker’s proficiency at a given task? • Effort. The quality of a worker’s output may also depend on the amount of effort that the worker puts into the task. How can one model the effect of varying levels of effort on the quality of completed work? • Time dependence. Workers’ skills and the quality of their completed work may change over time, either because of learning (perhaps after completing the same task several times) or changes in effort level. Additionally, properties of the population of workers (such as the size of the population or their average quality) may change over time, for example based on time of day. • Measurable vs. unmeasurable quality. Some tasks, such as labeling an image as containing a face or not, or answering a multiple-choice question, have objective measures of quality; either the provided answer is correct, or it is not. For other tasks, such as translating a paragraph from one language to another or drawing a picture, the quality of the work is more difficult to quantify. For tasks without objective measures of quality, it is necessary to clearly define criteria on whic h a task will be judged. • Observable vs. unobservable quality. Even if the response to a task is objectively right or wrong, as is the case in the image labeling task above, the quality of submitted work may not be immediately observable; if the requester already knew the correct label, he wouldn’t need the worker to provide it. For many tasks of this form, it is possible for the requester to assign the same question to multiple workers and estimate the correct answer by consensus; if a statistically significant (weighted) majority agrees on some answer, it may be safe to assume it is correct. • Availability of gold standard tasks. In some cases in which task quality is not observable, a requester may have access to a set of “gold standard” tasks for which the correct answer is known a priori. He can then use these tasks to bootstrap the process of learning workers’ skill levels (possibly as part of a separate qualifying test, if allowed). Incentives and other human factors. Perhaps the most difficult and controversial aspect of forma lizing the repeated decision making problem in a crowdsourcing environment is modeling the incentives of par- ticipants. In the economics literature, it is standard to model agents as self-interested and rational utility maximizers. Empirical research studying the behavior of workers on Mechanical Turk suggests that there may be difficulties applying such models in crowdsourcing se ttings in which workers do not have a good sense of their own costs of completing a task and may choose particular tasks based on intangible qualities such as fun. This leads to another set of modeling issues. • Rationality. Do workers behave rationally when choosing tasks to complete at particular prices? The 6 standard model from economics is that each worker maximizes a simple well-defined notion of “utility,” (an increasing function of) payment received minus production cost. However, workers may also take into account other factors, such as perceived value to society and personal enjoyment. The significance of these intangible factors in crowdsourcing environments is not well-understood. • Effort levels. Can the workers strategically alter the amount of effort that they put into a given task, or is it assumed that workers complete each task to the best of their ability? • Costs. How do the workers evaluate their internal costs for completing a given task or putting forth a given level of effort? Is this internal cost even a well-defi ned quantity? It may, in principle, depend on subjective perceptions (such as value to society and personal enjoyment), and also on the offered prices (the so-called anchoring effect [59, 43]). Even if the internal cost is a well-defined quantit y, do workers know it? • Fair price. Workers may have a perception of a “fair price” which is separ ate from their internal costs, and may be reluctant to accept a task at a lower price [43, 65]. In some cases, workers may be motivated by task-specific fact ors. For • Task-specific motivations. example, if a task involves creating content to be posted on the web, workers may be motivated by the possibility of receiving attention [25]. • Myopia vs. long term strategies. How myopic are the workers? When making a decision about a particular task, do they take into account the effects of this decision on their future? For example, a worker may be reluctant to accept highly priced tasks that she is not suitable for, because her bad performance on these tasks would impact her reputation score with the platform and/or the requester, and therefore affect what she is offered in the future. For a similar reason, a worker may accept an easy but low paying task, or exert additional effort. More generally, workers may be able to strategically alter their behavior in order to affect the long-term behavior of a particular requester or the platform. • Strategic timing. Can the workers strategically choose the time intervals during which they are online? If a requester is using an online learning algorithm, some phases of this algorithm may be more beneficial for workers than others. For example, if a requester starts out with a low price for a given category of tasks, and then gradually adjusts it upwards, then workers may want to arrive later rather than sooner. Performance objectives. The statement of an algorithmic problem should include a specific performance objective to be optimized, perhaps under some constraints. A requester-side decision making algorithm typically maximizes the utility of this requester, i.e., the value of completed tasks minus the payment to the workers. If the requester has a pre-specified budget, the algorithm may instead maximize the value of completed tasks subject to budget constraints. In some settings it may be feasible to take into account the workers’ happiness, so as to encourage them to stay with this requester in the future. Specifically, in incentive-co mpatible mechanisms that elicit workers’ production costs one may wish to optimize the social welfare – the utility of the requester plus the total utility of the workers – or some other weighted sum of these two quantities. For platform-side algorithms, the performance objective might take into account the utility of requesters, workers, and the platform itself. Assuming the platform receives a fixed percentage of every transaction, the platform’s revenue is simply a fixed fraction of the total pay ment from requesters to workers. One reasonable objective is a weighted sum of the platform’s revenue and the total utility of the requesters; the choice of weights is up to the platform. Moreover, the platform may wish to ensure some form of fairness, so that no requesters are starved out. Further, the platform may have additional forward-looking objectives that are not immediately comparable with the platform revenue and requesters’ utility, such as the market share and the workers’ happiness (to encourage workers to stay with the platform in the future). 7 4 Specific directions Given the abundance of modeling choices identified, it appea rs hopeless to seek out a single unified model that attempts to capture all aspects of repeated decision making in crowdsourcing markets. Nevertheless, it may be possible to study, understand, and solve the fundamental issues that arise in this problem space by carefully choosing specific (families of) models that enc apsulate specific salient features — especially if we, as a community, keep generalizability and robustness in mind as we make our modeling and algorithmic choices. Below we identify and discuss several directions in the problem space that appear ripe for near-term progress. As it happens, these directions encompass most existing work of which we are aware. 4.1 Adaptive task assignment One problem of interest is assigning tasks to workers with the goal of maximizing the quality of completed tasks at a low price or subject to budget constraints. In this task assignment problem, strategic issues are ignored in order to gain analytical tractability; the model typically does not touch on the way in which prices are set, and does not include workers’ strategic responses to these prices. It can be studied in settings in which the quality of work performed is immediately observable or settings in which it is not. Much of the existing work on task assignment focuses on classification tasks , in which workers are asked multiple-choice questions to provide labels for images, websites, web search results, or other types of queries. Then it is natural to assume that the quality of performed work (i.e., the correct label) is not immediately observable; instead, the requester may have a limited supply of gold standard tasks that can be used to learn more about workers’ skills. While the problem of inferring the solutions to classification problems using labels from multiple sources has been studied for decades in various forms [20, 53, 18, 19, 21, 63], here we focus on the problem of choosing workers in an online fashion to provide the labels; this problem is relatively new. Existing research on task assignment typically focuses on the problem faced by a single requester. Each worker charges a fixed and known cost per task completed (whic h may or may not be the same for all workers), and each task may be assigned to multiple workers in order to the improve the quality of the final result (as is necessary for classification tasks). The objec tive is to optimize a tradeoff between the total cost and the quality of the completed tasks, for example, minimizing the total cost of work subject to the quality being above a given threshold. Partial information on the task difficulty and the workers’ skills may or may not be known, e.g., in the form of reputation scores or Bayesian priors. In the most common variant of this problem, workers arrive online and the requester must assign a task (or sequence of tasks) to each new worker as she arrives. Karger et al. [34, 35] introduced one such model for classification tasks and proposed a non-adaptive a ssignment algorithm based on random graph generation along with a message-passing inference algorithm inspired by belief propagation for inferring the correct solution to each task. They proved that their technique is order-optimal in terms of budget when each worker finds all tasks equally difficult. Other models of this form have been studied both for tasks with observable quality [27] and for classification tasks with un observable quality but access to gold standard tasks [29]. In these papers, the authors utilize online primal-dual techniques [13, 23] and show that adaptive task assignment yields an improvement over non-adaptive assignment when the pool of available workers and set of tasks are diverse. Alternatively, one might consider a model in which the requester may choose a particular worker or category of workers to assign to a particular task rather than choosing a task to assign to a particular worker. This setting already encompasses a variety of specific model s of varying levels of difficulty, but even a version with a single task assigned multiple times is quite challenging [1]. 8 It is worth noting that the models described above are not covered by prior work on multi-armed bandits (where an algorithm observes a reward after each round and the goal is to maximize the total reward over time). Essentially, this is because in adaptive task assignment each rounds brings information rather than reward; the value of this information is not immediately known, and in any case the goal is not to maximize the total value of collected information but to arrive at high-quality solutions for the tasks. On the other hand, multi-armed bandit formulations are more directly applicable to versions of adaptive task assignment in which the quality or utility of each completed task is immediately observable, and the goal is to maximize the total utility over time. The basic version in which the tasks are homogeneous and the algorithm chooses among workers has been studied in Tran-Thanh et al. [58]; the novelty here is that one needs to incorporate budget constraints. This version falls under the general framework that was later defined and optimally solved in Badanidiyuru et al. [6]. The problem formulations surveyed above are quite different from one another, and the algorithms and theoretical guarantees are therefore incomparable. There is a lot of room for further work extracting the key features of the task assignment problem and take-away messages that generalize to a wider range of models and assumptions. 4.2 Dynamic procurement Dynamic procurement focuses on repeated posted pricing, as applied to hiring workers in a crowdsourc- ing market.2 Each interaction between the requester and the workers follows a very simple protocol: the requester posts a price (for a given task) which can be either accepted or rejected by the workers. The basic model of dynamic procurement is as follows. In each round, the requester posts a task and a price for this task, and waits until either some worker accepts the task or the offer times out. The objective is to maximize the number of completed tasks under fixed constra ints on budget and waiting time. A standard model of workers’ rationality is assumed. In particular, each worker has a fixed “internal cost” which is known to the worker but not to the mechanism. A worker accepts a task only if the posted price for this task matches or exceeds her internal cost. If multiple such tasks are offered at the same time, the worker picks the one which maximizes her utility (offered price minus the internal cost). The requester typically has a very limited knowledge of the supply curve, the distribution of workers’ internal costs. However, the supply curve may be learned over time. The basic model described above assumes several significant simplifications as compared to the discus- sion in Section 3. First, workers cannot strategically manipulate their effort level in response to the offered prices. Second, workers are myopic, in the sense that they do not take into account the effects of their de- cision in a given round on the future rounds. A standard way to model myopic workers is to assume that the requester interacts with a new worker in each round. Third, the supply curve does not change over time. Finally, the issues of (explicit) task assignment are completely ignored. Despite all the simplifications, this basic model is very non -trivial. Considerable progress has been made in a recent line of work [4, 6, 5, 55], but it is not clear whether the current results are optimal. Further, multiple extensions are possible within the basic model. For instance, the requester may be interested in multiple categories of tasks, and may offer more complicated “menus” that allow workers to perform multiple tasks of the same type.3 One can also consider a platform-side version of dynamic procurement, in which the platform is in charge of setting posted prices for all requesters, under budget constraints submitted by the requesters or imposed by the platform. The most basic goal would be to maximize the total number of completed tasks 2The term “dynamic procurement ” is from Badanidiyuru et al. [ 4, 6, 5]. 3The general result in Badanidiyuru et al. [6, 5] applies to some of these extensions, but the particular guarantees are likely to be suboptimal. 9 over all requesters, perhaps under some fairness constraints. It is worth noting that dynamic procurement is closely related to dynamic pricing: repeated posted pricing for selling items. In particular, dynamic procurement on a budget with unknown supply curve has a natural “dual” problem about selling items: dynamic pricin g with limited inventory and unknown demand curve. The latter problem has received some attention (e.g., [8, 3, 9, 6]). Moreover, Badanidiyuru et al. [6] consider a general framework which subsumes both problems. Dynamic procurement can be compared to a more general class of game-theoretic mechanisms in which workers are required to explicitly submit their preferences (see, e.g., Singer and Mittal [54]). Dynamic procurement is appealing for several reasons (as discussed, for example, in Babaioff et al. [3] and Chawla et al. [15]). First, a worker only needs to evaluate a given offer rather than exactly determine her internal costs and preferences; humans tend to find the former task to b e much easier than the latter. Second, a worker reveals very little information about themselves: only whether she is willing to accept a particular offer. Third, posted pricing tends to rule out the possibility that workers may strategically alter their behavior in order to manipulate the requester. However, it is possible that more general mechanisms may achieve better guarantees in some scenarios. Behavioral effects. In order to ensure that results are applicable to real-world markets, apart from ad- dressing dynamic procurement under the traditional assumptions on workers’ rationality, it is desirable to incorporate more complicated behaviors, such as perceived fair prices and the anchoring effect. Then the prices offered by the requester may influence the properties of the worker population, namely change work- ers’ perception of fair prices and/or production costs. The challenge here is to model such influence in a sufficiently quantitative way, and design dynamic pricing a lgorithms that take this influence into account. However, the existing empirical evidence [43, 65] appears insufficient to suggest a particular model to design algorithms for; further, even surveying the potentially relevant models is not easy. To make progress, there needs to be a convergence of empirical work on modeling that is geared towards algorithmic applications, and algorithm design work that is fully aware of the modeling issues. One can draw upon a considerable amount of prior work on reference prices [60, 49, 32, 57], and some recent work on dynamic pricing with reference price effects [48, 45]. However, all of this work is usually in the context of selling items to consumers, and therefore may not be directly applicable to crowdsourcing. Moreover, Popescu and Wu [48] and Nasiry and Popescu [45] assume a known demand distribution. In view of the above, one wonders how significant the behavior al effects are in real-life crowdsourcing markets, and whether it is safe to ignore them in the context of dynamic procurement. To the best of our understanding, this issue is currently unresolved; while significant behavioral effects have been observed in specifically designed, very short-term experiments, it is n ot clear whether the significance is preserved in longer-running systems. 4.3 Repeated principal-agent problem Consider an extension of dynamic procurement to a scenario in which the workers can strategically change their effort level depending on the price or contract that they are offered. The chosen effort level probabilisti- cally affects the quality of completed work, determining a distribution over the possible quality levels. Each worker is characterized by a mapping from effort levels to costs and distributions over the quality levels; this mapping, called worker’s type, is known to the worker but not to the mechanism. Crucially, the choice of effort level is not directly observable by the requester, and cannot (in general) be predicted or inferred from the observed output. The single-round version of this setting is precisely the principal-agent problem [39], the central model in contract theory, a branch of Economics.4 4 In the language of contract theory, the requester is the “pri ncipal ” and workers are “agents.” 10 Posted pricing is not adequate to incentivize workers to produce high-quality work in this setting since workers could exert the minimal amount of effort without any loss of payment. Instead, requesters may want to use more complicated contracts in which the payment may depend on the quality of the completed work. Note that contracts cannot directly depend on the worker’s effort level, as the latter is not known to the requester. The mechanism may adjust the offered contract over time, as it learns more about the worker population. To make the problem more tractable, it would probably help to assume that workers are myopic, and that the quality of completed tasks is immediately observable. As in dynamic procurement, the issues of task assignment are completely ignored. Even with these simplifications, the repeated principal-agent setting described above is significantly more challenging than dynamic procurement. Essentially, this because the principal-agent problem is a vast generalization of the simple accept/reject interaction in dynamic procurement. The space of possible contracts and the space of possible types are much richer than their counterparts in dynamic procurement, and the mapping from an action to requester’s expected utility is more difficult to characterize and analyze. In particular, contracts are not limited to mappings from observed outcomes to payments. In principle, the requester can specify a menu of several such mappings, and allow a worker to choose among them. (It is well-known that using such “menus” one can maximize the requ ester’s expected utility among all possible interaction protocols between a single requester and a single worker [39].) A notable additional complication is that it may be advantageous to reduce the action space – the class of contracts that an algorithm considers. While reducing the action space may decrease the quality of the best feasible contract, it may improve the speed of convergence to this contract, and make the platform more user- friendly for workers. For example, one may want to reduce the number of items in the “menu” described above (perhaps all the way to single-item menus), reduce the granularity of the quality levels considered, or restrict attention to human-friendly “monotone” contra cts, in which higher quality levels always result in higher payments to the workers. Perhaps surprisingly, the rich literature in contract theory sheds little light on this setting. Most work focuses on a single interaction with an agent whose type is either known or sampled from a known distri- bution, see Laffont and Martimort [39] for background. Some papers [2, 44] have studied settings in which the principal interacts with multiple agents, but makes all its decisions at a single time point. In Sannikov [51], Williams [64], and Sannikov [52], the principal makes repeated decisions over time, but the requester interacts with only a single agent who optimizes the long-term utility. The agent’s type is sampled from a known prior. Conitzer and Garera [17] consider the basic version of the repeated principal-agent problem — with single-item “menus” and no budget constraints — adapt sever al algorithms from prior work to this setting, and empirically compare their performance. In an ongoing project, Ho et al. [30] design algorithms with (strong) provable guarantees for the same basic version, drawing on the connection with some prior work [38, 12, 56] on multi-armed bandit problems. However, their guarantees make significant restrictions on the action space. We are not aware of any other directly relevant work (beyond the work on dynamic pricing, which does not capture the unobservable choice of worker’s effort level). Progress on repeated principal-agent problems might suggest improvements in the design of crowd- sourcing platforms. In particular, it may inform the platform’s choice of the action space. Currently even the basic version of the repeated principal-agent problem is not well-understood. 4.4 Reputation systems Persistent reputation scores for workers may help limit spam and encourage high quality work. Likewise, persistent reputation scores for requesters may encourage requesters to be more considerate towards the 11 workers. Thus, one may want to design a stand-alone “reputat ion system ” which defines and maintains such scores (perhaps with the associated confidence levels), as a tool which can be used in different applications and in conjunction with different higher-level algorithms. Reputation systems may be designed to address issues related to either moral hazard (when workers’ effort is desirable but not immediately observable) or adverse selection (when similar-looking workers may be different from one another, and it is desirable to attract workers who are more skilled or competent), or a combination of the two. There is already a rich literature on reputation systems for online commerce, peer-to-peer networks, and other domains; see, for example, Friedman et al. [24], Resnick et al. [50], or the seminal paper of Dellarocas [22]. However, the basic models for reputation systems have several limitations when applied to crowdsourcing markets. First, there may be domain-specific design goals that depend on a particular application or (even worse) on a particular algorithm which uses the reputation scores. Then it may be necessary to design the reputation system and the platform’s or requesters’ algorithms in parallel, as one inter-related problem. Second, reputation systems are typically designed separately from task assignment, which artificially restricts the possibilities and can ther efore lead to sup-optimal designs. Third, whenever the properties of the worker population are not fully known, there is an issue of exploration: essentially, it may be desirable to give the benefit of a doubt to some low-rate d workers, so as to obtain more information about them. Zhang and van der Schaar [68] and Ho et al. [28] examine the problem of designing a reputation system specific to crowdsourcing markets, building on the idea of social norms first proposed by Kandori [33]. So- cial norms consist of a set of prescribed rules that market participants are asked to follow, and a mechanism for updating reputations based on whether or not they do. They pair reputation systems with differential service schemes that allocate more resources or better treatment to those with higher reputation in such a way that market participants have the incentive to follow the prescribed rules of the market. The social norms designed by Zhang and van der Schaar [68] and Ho et al. [28] address only the moral hazard prob- lem, ignoring issues related to adverse selection by making assumptions about known types, and do so on greatly simplified models that capture some salient feature s of crowdsourcing systems (such as the difficulty of perfectly evaluating the quality of work and the fact that the population may be changing over time) but ignore many others (such as the vast diversity of workers and requesters in real systems and the fact that workers may be learning over time). There is significant room for further research studying more realistic models, looking simultaneously at moral hazard and adverse selection, and better defining wh at an “optimal” reputation system means in general. 4.5 One common theme: The exploration-exploitation tradeoff Most models surveyed in this section exhibit a tradeoff between exploration and exploitation, i.e., between obtaining new information and making optimal per-round decisions based on the information available so far [14, 7, 11]. This tradeoff is present in any setting with repeated decisions and partial, action-dependent feedback, i.e., whenever the feedback received by an algorithm in a given round depends on the algorithm’s action in this round. The explore-exploit tradeoff occurs in many areas, including the design of medical trials, pay-per-click ad auctions, and adaptive network routing; numerous substantially different models have been studied in the literature, to address the peculiarities of the various application domains. An issue which cuts across most settings with explore-exploit tradeoff, including those arising in crowd- sourcing markets, is whether to use a fixed schedule for explo ration, or to adapt this schedule as new ob- servations come in. In the former case, one usually allocates each round to exploration or exploitation (either randomly or deterministically, but without looking at the data), chooses uniformly at random among the available alternatives in exploration rounds, and maximizes per-round performance in each exploitation 12 round given the current estimates for the unknown quantities. In the latter case, which we call adaptive ex- ploration, exploration is geared towards more promising actions, without sacrificing too much in short-term performance. Often there is no explicit separation between exploration and exploitation, so that in each round the algorithm does a little of both. Adaptive exploration tends to be better at taking advantage of the “niceness” of the problem instance (where the particula r notion of “niceness” depends on the model), whereas non-adaptive exploration often suffices to achieve the optimal worst-case performance. For a concrete example, consider a simple, stylized model in which an algorithm chooses among two actions in each round, each action x brings a 0-1 reward sampled independently from a fixed distri bution with unknown expectation µx , and the goal is to maximize the total reward over a given time horizon of 100 rounds. One algorithm involving non-adaptive exploration would be to try each action 10 times, pick the one with the best empirical reward, and stick with this action from then on. (However, while in this example choosing the best action in each exploitation round is trivial, in some settings this choice can be the crux of the solution [29].) On the other hand, one standard approach for adaptive exploration is to maintain a numerical score (index or upper confidence bound) for each ac tion, which reflects both the average empirical reward and the sampling uncertainty, and in each round to pick an action with the highest score. A closely related issue, endemic to all work on dynamic procurement (and dynamic pricing), is dis- cretization of the action space (in this case, the price space). Essentially, it is complicated to consider all possible prices or price vectors, and instead one often focuses on a small but representative subset of thereof. For example, one may focus on prices that are integer multiples of some a priori chosen ǫ ∈ (0, 1). While optimizing among the remaining prices is very simple in the most basic setting of dynamic procurement without budget constraints [37], it can be very difficult in m ore advanced settings [6, 5, 55]. Prior work on related, but technically different explore-exploit problems [38, 12, 56] suggests that it may be advantageous to choose the discretization adaptively, depending on the previous observations, so that the algorithm zooms in faster on the more promising regions of the action space. Understanding these issues is crucial to the design of algorithms for repeated decision making in crowd- sourcing systems. At the same time, models designed specific ally for the crowdsourcing domain often present new algorithmic challenges in explore-exploit learning (as is the case for most work on adaptive task assignment and dynamic procurement). Techniques designed to address these challenges may be appli- cable more broadly in other scenarios in which the exploration-exploitation tradeoff arises. (For example, dynamic procurement for crowdsourcing markets is one of the major motivating examples behind the general framework in Badanidiyuru et al. [6].) 5 Conclusions Crowdsourcing is a new application domain for online decision making algorithms, opening up a rich and exciting problem space in which the relevant problem formulations vary significantly along multiple model- ing “dimensions.” This richness presents several challeng es. Most notably, it is difficult for the community to converge on any particular collection of models, and as a result, it is difficult to compare results and techniques across papers. Additionally, any particular modeling choices have inherent limitations that are sometimes hard to see. It is not clear a priori which limitations will impact the practical performance of algorithms, making claims about robustness difficult to ach ieve. In this paper, we attempt to raise awareness of these issues. Towards this goal, we identify a multitude of possible modeling choices, and discuss several specific d irections in which progress can be made in the near future. We hope that this will spark discussion and aide the community as it moves forward. 13 Acknowledgements We are grateful to Ashwinkumar Badanidiyuru, Yiling Chen, Chien-Ju Ho, Robert Kleinberg, and Ariel Procaccia for enlightening conversations, pointers to relevant literature, and useful feedback on earlier drafts of this paper. We thank Yiling Chen, Winter Mason, and Duncan Watts for sharing their thoughts on the anchoring effect and other behavioral considerations that are often ignored. Additionally, Slivkins wishes to thank Ittai Abraham, Omar Alonso, Vasilis Kandylas, Rajesh Patel, Steven Shelford, and Hai Wu for many conversations regarding the practical aspects of crowdsourcing markets. References [1] Ittai Abraham, Omar Alonso, Vasilis Kandylas, and Aleksandrs Slivkins. Adaptive crowdsourcing algorithms for the bandit survey problem. In 26th Conf. on Learning Theory (COLT), 2013. [2] Moshe Babaioff, Michal Feldman, and Noam Nisan. Combinatorial agency. In 7th ACM Conf. on Electronic Commerce (EC), 2006. [3] Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg, and Aleksandrs Slivkins. Dynamic pricing with limited supply. In 13th ACM Conf. on Electronic Commerce (EC), 2012. [4] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Yaron Singer. Learning on a budget: posted price mecha- nisms for online procurement. In 13th ACM Conf. on Electronic Commerce (EC), pages 128 –145, 2012. [5] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Aleksandrs Slivkins. Bandits with knapsacks: Dynamic procurement for crowdsourcing. In The 3rd Workshop on Social Computing and User Generated Content, co- located with ACM EC 2013, 2013. [6] Ashwinkumar Badanidiyuru, Robert Kleinberg, and Aleksandrs Slivkins. Bandits with knapsacks. In 54th IEEE Symp. on Foundations of Computer Science (FOCS), 2013. [7] Dirk Bergemann and Juuso V alim aki. Bandit Problems. In Steven Durlauf and Larry Blume, editors, The New Palgrave Dictionary of Economics, 2nd ed. Macmillan Press, 2006. [8] Omar Besbes and Assaf Zeevi. Dynamic pricing without knowing the demand function: Risk bounds and near- optimal algorithms. Operations Research, 57:1407 –1420, 2009. [9] Omar Besbes and Assaf J. Zeevi. Blind network revenue management. Operations Research, 60(6):1537 –1550, 2012. [10] Allan Borodin and Ran El-Yaniv. Online computation and competitive analysis. Cambridge University Press, 1998. [11] S ´ebastien Bubeck and Nicolo Cesa-Bianchi. Regret Ana lysis of Stochastic and Nonstochastic Multi-armed Bandit Problems. Foundations and Trends in Machine Learning, 5(1):1 –122, 2012. [12] S ´ebastien Bubeck, R ´emi Munos, Gilles Stoltz, and Csa ba Szepesvari. Online Optimization in X-Armed Bandits. J. of Machine Learning Research (JMLR), 12:1587 –1627, 2011. [13] Niv Buchbinder and Joseph Naor. The design of competitive online algorithms via a primal-dual approach. Foundations and Trends in Theoretical Computer Science, 3(2-3):93 –263, 2009. [14] Nicol `o Cesa-Bianchi and G ´abor Lugosi. Prediction, learning, and games. Cambridge Univ. Press, 2006. [15] Shuchi Chawla, Jason D. Hartline, David L. Malec, and Balasubramanian Sivan. Multi-parameter mechanism design and sequential posted pricing. In ACM Symp. on Theory of Computing (STOC), pages 311 –320, 2010. 14 [16] Xi Chen, Qihang Lin, and Dengyong Zhou. Optimistic knowledge gradient for optimal budget allocation in crowdsourcing. In 30th Intl. Conf. on Machine Learning (ICML), 2013. [17] Vincent Conitzer and Nikesh Garera. Online learning algorithms for online principal-agent problems (and selling goods online). In 23rd Intl. Conf. on Machine Learning (ICML), 2006. [18] Koby Crammer, Michael Kearns, and Jennifer Wortman. Learning from data of variable quality. In 19th Advances in Neural Information Processing Systems (NIPS), 2005. [19] Koby Crammer, Michael Kearns, and Jennifer Wortman. Learning from multiple sources. Journal of Machine Learning Research, 9:1757 –1774, 2008. [20] Philip Dawid and Allan Skene. Maximum likelihood estimation of observer error-rates using the EM algorithm. Journal of the Royal Statistical Society, Series C (Applied Statistics), 28(1):20 –28, 1979. [21] Ofer Dekel and Ohad Shamir. Vox populi: Collecting high-quality labels from a crowd. Learning Theory (COLT), 2009. In 22nd Conf. on [22] Chrysanthos Dellarocas. Reputation mechanism design in online trading environments with pure moral hazard. Information Systems Research, 16(2):209 –230, 2005. [23] Nikhil Devanur, Kamal Jain, Balasubramanian Sivan, and Christopher Wilkens. Near optimal online algorithms and fast approximation algorithms for resource allocation problems. In 12th ACM Conf. on Electronic Commerce (EC), 2011. [24] Eric Friedman, Paul Resnick, and Rahul Sami. Manipulation-resistant reputation systems. In Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay Vazirani, editors, Algorithmic Game Theory. Cambridge University Press, 2007. [25] Arpita Ghosh and Patrick Hummel. Learning and incentives in user-generated content: Multi-armed bandits with endogenous arms. In 4th Innovations in Theoretical Computer Science Conference (ITCS), 2013. [26] John Gittins, Kevin Glazebrook, and Richard Weber. Multi-Armed Bandit Allocation Indices. John Wiley & Sons, 2011. [27] Chien-Ju Ho and Jennifer Wortman Vaughan. Online task assignment in crowdsourcing markets. In 26th AAAI Conference on Artificial Intelligence (AAAI) , 2012. [28] Chien-Ju Ho, Yu Zhang, Jennifer Wortman Vaughan, and Mihaela van der Schaar. Towards social norm design for crowdsourcing markets. In 4th Human Computation Workshop (HCOMP), 2012. [29] Chien-Ju Ho, Shahin Jabbari, and Jennifer Wortman Vaughan. Adaptive task assignment for crowdsourced classification. In 30th Intl. Conf. on Machine Learning (ICML), 2013. [30] Chien-Ju Ho, Aleksandrs Slivkins, and Jennifer Wortman Vaughan. Adaptive contract design for crowdsourcing, 2013. Working Paper. Preliminary version to appear in the NIPS ’13 Workshop on Crowdsourcing: Theory, Algorithms, and Applications. [31] Panagiotis G. Ipeirotis, Foster Provost, Victor S. Sheng, and Jing Wang. Repeated labeling using multiple noisy labelers. Data Mining and Knowledge Discovery, 2013. [32] Gurumurthy Kalyanaram and Russell S. Winer. Empirical generalizations from reference price research. Mar- keting Science, 14(3), 1995. [33] Michihiro Kandori. Social norms and community enforcement. The Review of Economic Studies, 59(1):63 –80, 1992. [34] David Karger, Sewoong Oh, and Devavrat Shah. Iterative learning for reliable crowdsourcing systems. In 25th Advances in Neural Information Processing Systems (NIPS), 2011. 15 [35] David Karger, Sewoong Oh, and Devavrat Shah. Budget-optimal task allocation for reliable crowdsourcing systems. To appear, 2013. [36] Aniket Kittur, Jeffrey V. Nickerson, Michael S. Bernstein, Elizabeth M. Gerber, Aaron Shaw, John Zimmerman, Matthew Lease, and John J. Horton. The future of crowd work. In 16th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), 2013. [37] Robert Kleinberg and Tom Leighton. The value of knowing a demand curve: Bounds on regret for online posted-price auctions. In 44th IEEE Symp. on Foundations of Computer Science (FOCS), pages 594 –605, 2003. [38] Robert Kleinberg, Aleksandrs Slivkins, and Eli Upfal. Multi-Armed Bandits in Metric Spaces. In 40th ACM Symp. on Theory of Computing (STOC), pages 681 –690, 2008. [39] Jean-Jacques Laffont and David Martimort. The Theory of Incentives: The Principal-Agent Model. Princeton University Press, 2002. [40] Walter S. Lasecki, Christopher D. Miller, Raja S. Kushalnagar, and Jeffrey P. Bigham. Legion scribe: real-time captioning by the non-experts. In Intl. Cross-Disciplinary Conf. on Web Accessibility (W4A), page 22, 2013. [41] Andrew Mao, Ariel D. Procaccia, and Yiling Chen. Better human computation through principled voting. In 27th AAAI Conference on Artificial Intelligence (AAAI) , 2013. [42] Winter Mason and Siddharth Suri. Conducting behavioral research on Amazon’s Mechanical Turk. Behavior Research Methods, 2012. To appear. [43] Winter Mason and Duncan J. Watts. Financial incentives and the ”performance of crowds”. Computation Workshop (HCOMP), 2009. In 1st Human [44] Sanjog Misra, Harikesh S. Nair, and Oystein Daljord. Homogenous contracts for heterogeneous agents: Aligning salesforce composition and compensation. Working Paper, 2012. [45] Javad Nasiry and Ioana Popescu. Dynamic pricing with loss averse consumers and peak-end anchoring. Opera- tions Research, 59(6):1361 –1368, 2011. [46] Jon Noronha, Eric Hysen, Haoqi Zhang, and Krzysztof Z. Gajos. Platemate: crowdsourcing nutritional analysis from food photographs. In 24th ACM Symp. on User Interface Software and Technology (UIST), pages 1 –12, 2011. [47] Thomas Pfeiffer, Xi Alice Gao, Yiling Chen, Andrew Mao, and David G. Rand. Adaptive polling for information aggregation. In 26th AAAI Conference on Artificial Intelligence (AAAI) , 2012. [48] Ioana Popescu and Yaozhong Wu. Dynamic pricing strategies with reference effects. Operations Research, 55 (3):413 –429, 2007. [49] Daniel S. Putler. Incorporating reference price effects into a theory of consumer choice. Marketing Science, 11 (3):287 –309, 1992. [50] Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. 43(12):45 –48, 2000. [51] Yuliy Sannikov. A continuous-time version of the principal-agent problem. In The Review of Economics Studies, 2008. [52] Yuliy Sannikov. Contracts: The theory of dynamic principal-agent relationships and the continuous-time ap- proach. In 10th World Congress of the Econometric Society, 2012. [53] Victor Sheng, Foster Provost, and Panagiotis Ipeirotis. Get another label? Improving data quality using multiple, noisy labelers. In KDD, 2008. 16 [54] Yaron Singer and Manas Mittal. Pricing mechanisms for crowdsourcing markets. In Intl. World Wide Web Conf. (WWW), 2013. [55] Adish Singla and Andreas Krause. Truthful incentives in crowdsourcing tasks using regret minimization mech- anisms. In 22nd Intl. World Wide Web Conf. (WWW), pages 1167 –1178, 2013. [56] Aleksandrs Slivkins. Contextual Bandits with Similarity Information. In 24th Conf. on Learning Theory (COLT), 2011. To appear in J. of Machine Learning Research (JMLR), 2013. [57] Richard H. Thaler. Mental accounting and consumer choice. Marketing Science, 27(1):15 –25, 2008. [58] Long Tran-Thanh, Sebastian Stein, Alex Rogers, and Nicholas R. Jennings. Efficient crowdsourcing of unknown experts using multi-armed bandits. In 20th European Conf. on Artificial Intelligence (ECAI) , pages 768 –773, 2012. [59] Amos Tversky and Daniel Kahneman. Judgment under uncertainty: Heuristics and biases. Science, 185(4157): 1124 –1131, 1974. [60] Amos Tversky and Daniel Kahneman. Loss aversion in riskless choice: A reference-dependent model. The Quarterly J. of Economics, 106(4):1039 –1061, 1991. [61] VizWiz. vizwiz.org: crowdsourcing to answer visual questions for the visually impaired. [62] Jing Wang, Panagiotis G. Ipeirotis, and Foster Provost. Quality-based pricing for crowdsourced workers. NYU- CBA Working Paper CBA-13-06, 2013. [63] Peter Welinder, Steve Branson, Serge Belongie, and Pietro Perona. The multidimensional wisdom of crowds. In 24th Advances in Neural Information Processing Systems (NIPS), pages 2424 –2432, 2010. [64] Noah Williams. On dynamic principal-agent problems in continuous time. Working Paper, 2009. [65] Ming Yin, Yiling Chen, and Yu-An Sun. The effects of performance-contingent financial incentives in online labor markets. In 27th AAAI Conference on Artificial Intelligence (AAAI) , 2013. [66] Omar Zaidan and Chris Callison-Burch. Crowdsourcing translation: Professional quality from non-professionals. In 49th Annual Meeting of the Assn. for Computational Linguistics: Human Language Technologies (ACL-HLT), pages 1220 –1229, 2011. [67] Haoqi Zhang, Edith Law, Rob Miller, Krzysztof Gajos, David C. Parkes, and Eric Horvitz. Human computation tasks with global constraints. In CHI, pages 217 –226, 2012. [68] Yu Zhang and Mihaela van der Schaar. Reputation-based incentive protocols in crowdsourcing applications. In 31st IEEE International Conference on Computer Communications (IEEE Infocom), 2012. 17
1204.3799
2
1204
2012-07-04T14:11:12
Biographical Social Networks on Wikipedia - A cross-cultural study of links that made history
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
It is arguable whether history is made by great men and women or vice versa, but undoubtably social connections shape history. Analysing Wikipedia, a global collective memory place, we aim to understand how social links are recorded across cultures. Starting with the set of biographies in the English Wikipedia we focus on the networks of links between these biographical articles on the 15 largest language Wikipedias. We detect the most central characters in these networks and point out culture-related peculiarities. Furthermore, we reveal remarkable similarities between distinct groups of language Wikipedias and highlight the shared knowledge about connections between persons across cultures.
cs.SI
cs
Biographical Social Networks on Wikipedia A cross-cultural study of links that made history Pablo Aragon David Laniado Andreas Kaltenbrunner Yana Volkovich Barcelona Media Foundation, Barcelona, Spain {name.surname}@barcelonamedia.org 2 1 0 2 l u J 4 ] I S . s c [ 2 v 9 9 7 3 . 4 0 2 1 : v i X r a ABSTRACT It is arguable whether history is made by great men and women or vice versa, but undoubtably social connections shape history. Analysing Wikipedia, a global collective memory place, we aim to understand how social links are recorded across cultures. Starting with the set of biogra- phies in the English Wikipedia we focus on the networks of links between these biographical articles on the 15 largest language Wikipedias. We detect the most central charac- ters in these networks and point out culture-related pecu- liarities. Furthermore, we reveal remarkable similarities be- tween distinct groups of language Wikipedias and highlight the shared knowledge about connections between persons across cultures. Categories and Subject Descriptors J.4 [Computer Applications]: Social and Behavioural Sciences—Sociology; G.2.2 [Mathematics of Computing]: Graph Theory—Network problems Keywords Wikipedia, social network analysis, cross language studies 1. INTRODUCTION Social network analysis, one of the most studied subjects in the last decade, has been applied in very different contexts ranging from online social networks [11], over networks of fictitious comic characters [1] to animal social networks [5]. Here we present a study about connections of a different form. We use neither self-reported nor observed relations nor interactions inferred from activity logs. We focus on the links between notable humans as they are recorded in col- lective memory. To extract these connections and build the corresponding networks we use different language versions of Wikipedia, which can be seen as global memory place [12]. We exploit direct links between biographic articles as ev- idence of relations between the corresponding persons, and . build biographical social networks for the 15 largest language versions of Wikipedia. We investigate these networks sepa- rately and analyse their similarity. We furthermore extract the most important persons according to several centrality metrics in these networks. This allows us to analyse and compare the different language communities over their per- ception and reporting of connections between notable per- sons. The visualisation of the shared links present in most of the different language networks highlights the connections commonly known across language and culture barriers. 2. RELATED WORK Social networks analysis on Wikipedia has mainly exploited editor interactions, either via generating co- authorship networks [8] or analysing social interactions on article and user talk-pages [9]. Additionally, co-authorship has been used to create networks of similar articles [4]. The link structure of Wikipedia articles has been studied extensively: common features have been found in the net- work topology of several language versions of Wikipedia [14], and rankings of the most central entries in the English Wi- kipedia have been presented [3]. The idea of restricting the network to articles representing entities of a given type has been followed in [2], introducing a framework for visualising links between philosophers in the English Wikipedia. Different language versions of Wikipedia have been com- pared to study cultural differences among their communi- ties [13]. While this has been done mostly by analysing the behaviour of the editors, here we propose to study differences and similarities as they emerge from the link structure of the artifacts created by different communities. 3. DATA EXTRACTION To obtain a list of articles about persons on the English Wikipedia, we relied on a dataset from DBpedia1. The dataset contains links to 296 511 existing English articles, which we parsed to identify the names of the corresponding articles in the other 14 language versions of Wikipedia with the largest number of articles at the moment we extracted the data (September 8 to 13, 2011). For each language version we generated a directed network where nodes represent persons with a biographical Wikipe- dia article and a node i links to node j if the article of the person i is linking to the article about person j. As many Wikipedia articles have alternative names which redirect to the same article, we had to track these redirects 1 http://downloads.dbpedia.org/3.7/en/persondata_en.nt.bz2 N K dmax Table 1: Properties of the language networks or- dered by network size: number of (not isolated) nodes N and edges K, average clustering coefficient (cid:104)C(cid:105), percentage of nodes in the giant component GC, average path-length between nodes (cid:104)d(cid:105), reciprocity r and maximal distance dmax between two nodes in the network. lang en de fr it es ja nl pt sv pl fi no ru zh ca (cid:104)C(cid:105) % GC 0.03 0.05 0.06 0.06 0.06 0.08 0.08 0.07 0.07 0.08 0.07 0.09 0.06 0.17 0.09 (cid:104)d(cid:105) 95% 6.53 94% 6.83 96% 6.11 95% 6.28 97% 6.29 96% 6.47 94% 7.91 94% 6.98 91% 8.27 85% 8.94 87% 7.80 83% 8.31 87% 9.10 91% 7.20 93% 7.14 928 339 260 889 283 453 190 867 169 302 109 081 76 651 85 295 60 745 50 050 44 941 49 303 34 436 44 739 42 321 198 190 62 402 51 811 35 756 34 828 26 155 24 496 23 705 23 085 22 438 18 594 18 423 16 403 11 715 11 027 r 0.17 0.14 0.15 0.14 0.16 0.20 0.18 0.18 0.20 0.16 0.17 0.22 0.10 0.20 0.17 43 33 36 42 36 26 37 45 46 43 30 48 35 32 32 Table 2: The top 25 persons in the English Wiki- pedia ranked by in-degree. Ranks for out-degree, betweenness and PageRank in parenthesis. person George W. Bush Barack Obama Bill Clinton Ronald Reagan Adolf Hitler Richard Nixon William Shakespeare John F. Kennedy Franklin D. Roosevelt Lyndon B. Johnson Jimmy Carter Elvis Presley Pope John Paul II Dwight D. Eisenhower Frank Sinatra George H. W. Bush Abraham Lincoln Bob Dylan Winston Churchill Harry S. Truman Joseph Stalin Michael Jackson Elizabeth II Jesus Hillary Rodham Clinton PageRank (1) 0.00209 (2) 0.00162 (4) 0.00156 (3) 0.00156 (5) 0.00149 (6) 0.00136 (9) 0.00113 (8) 0.00123 0.00131 (7) 0.00108 (11) 0.00113 (10) 0.00063 (24) 0.00083 (18) 0.00095 (14) 0.00056 (28) 0.00096 (13) 0.00089 (16) 0.00055 (30) 0.00092 (15) 0.00099 (12) 0.00089 (17) 0.00042 (51) 0.00074 (19) 0.00068 (20) 0.00063 (25) out-degree (107) 89 (710) 51 (205) 74 (103) 90 (26) 119 86 (127) 25 (4203) (53) 104 (237) 71 (50) 106 (158) 80 (142) 82 (444) 59 (564) 55 (47) 108 (118) 87 (593) 54 (11) 151 (136) 84 (145) 81 (265) 69 (237) 71 52 (665) 38 (1595) 87 (118) in- 2123 1677 1660 1652 1407 1299 1229 1208 1052 1000 953 948 941 891 882 878 846 835 748 743 723 663 653 572 554 btw. (1) (8) (4) (2) (3) (7) (63) (5) (15) (12) (9) (27) (11) (22) (18) (19) (40) (14) (10) (24) (43) (34) (6) (51) (32) Finally, we also analyse the in- and out-degree distribu- tions and observe heavy-tails, as found in many real-life net- works, for all language Wikipedias (data not shown). 4.2 Most central persons In this section we focus on centrality metrics for the above In Table 2 we present the defined biographical networks. top-ranked persons according to the degree centrality for the English Wikipedia. We also provide results for other centrality measures together with the corresponding rank- ings. Betweenness measures the fraction of shortest paths between other pairs of nodes passing through a given node, while PageRank gives a measure of the global importance of nodes, computed recursively putting a larger weight on incoming connections from central nodes. Figure 1: Distribution of the number of redirects per biographical article for the English Wikipedia. for every person and every language with a script provided by the Wikimedia Toolserver.2 The number of redirects per page follows a heavy tailed distribution as can be observed in Figure 1. The table embedded in the figure lists the 13 persons with the largest number of redirects in the English Wikipedia. The article about Muammar al-Gaddafi leads the ranking with 251 different ways of linking towards it, more than doubling the redirects of Osama bin Laden, the second ranked person. 4. RESULTS In this section we study global metrics calculated for the biographical networks of different languages. We also dis- cuss rankings based on various definitions of centrality. In particular, we present the most central (linked) persons in the different language Wikipedia. Finally, we compare the similarities between the different language networks. 4.1 Global network statistics A brief overview of the principal social network measures for the different language networks is given in Table 1. The largest network corresponds to the English Wikipedia with nearly 200, 000 nodes. The second largest, extracted from the German Wikipedia, is only about one-third as large. All language networks show very low clustering. The only outstanding network is the Chinese with a clustering coeffi- cient of 0.17, which indicates an important structural differ- ence of the link structure in this language version. By looking at the link reciprocities we find that it is quite rare that two persons are mutually connected. One of the possible causes of this observation may be the presence of parasocial interactions [6], i.e. one-sided interpersonal rela- tionships in which one part knows a great deal about the other, but the other does not. E.g., when a person is influ- enced by the works of somebody who died decades before. We see that all networks are well connected, as the per- centage of nodes in the giant component (GC)3 lies between 85% (Polish) and 96% (French and Japanese). When calculating the average path length between two persons in the GC we observe that the largest average dis- tances are found for the Polish and Russian networks. 2 http://toolserver.org/~dispenser/sources/rdcheck.py 3The GC corresponds here to the largest weakly connected component. Weakly connected means that there exists at least a path in one direction between any pair of nodes. 100101102100101102103104105# redirects# articles # redirects per articlePersons with most redirects:Muammar al−Gaddafi 251Osama bin Laden 117Barack Obama 114Jesus 109Elizabeth II 101Eminem 96Joseph Stalin 88Omar al−Bashir 87Genghis Khan 84Pyotr Ilyich Tchaikovsky 84Athelred the Unready 83George W. Bush 80Mary (mother of Jesus) 80 Table 3: Top 5 most central persons in the 15 analysed language versions of Wikipedia ranked by betweenness. lang en de fr it es ja nl pt sv pl fi no ru zh ca #1 George W. Bush Adolf Hitler Adolf Hitler Frank Sinatra Michael Jackson Adolf Hitler Elvis Presley Michael Jackson George W. Bush Elizabeth II Barack Obama Marilyn Monroe William Shakespeare #2 Ronald Reagan George W. Bush George W. Bush George W. Bush Fidel Castro Michael Jackson Adolf Hitler Richard Wagner Winston Churchill Pope John Paul II Adolf Hitler Adolf Hitler Napoleon II Chiang Kai-Shek William Shakespeare Adolf Hitler Che Guevara #3 Adolf Hitler Martin Luther King, Jr William Shakespeare Pope John Paul II William Shakespeare Ronald Reagan Bill Clinton Adolf Hitler Elizabeth II Margaret Thatcher Michael Jackson John F. Kennedy Kenneth Branagh Barack Obama Juan Carlos I #4 Bill Clinton Barack Obama Barack Obama Michael Jackson Che Guevara Yukio Mishima Joseph Stalin Ronald Reagan Michael Jackson George W. Bush George W. Bush Bob Dylan Elton John Deng Xiaoping #5 John F. Kennedy Frank Sinatra Jacques Chirac Elton John Adolf Hitler Barack Obama William Shakespeare David Bowie Adolf Hitler Ronald Reagan Benito Mussolini Bill Clinton Joseph Stalin Adolf Hitler Michael Schumacher Juan Manuel Fangio We find many American presidents, iconic American musi- cians, and European leaders during the WW2 period among the most linked. Interestingly, we observe that Pope John Paul II appears to be a more central figure than Jesus. Comparing the number of incoming and outgoing links, we observe that in-degrees are of an order of magnitude greater than out-degrees. We explain this phenomenon again by the presence of the parasocial relations. For betweenness and PageRank we do not find large differences in the rankings. The only exception is Shakespeare, whose low betweenness value can be caused by the low number of out-going links. Interestingly, Shakespeare’s page is one of the most central for several languages (see Table 3), but not for English. In Table 3 we show the most central characters in Wikipe- dia for the 15 analysed languages ranked by the betweenness centrality. We observe that most of the presented persons are known to be (or have been) highly influential in many aspects. Thus, in these lists we find political leaders, revo- lutionaries, famous musicians, writers and actors. We note that political figures such as Adolf Hitler, George W. Bush or Barack Obama dominate in almost all top rankings. In- terestingly, William Shakespeare and Michael Jackson are also among the central figures for several languages. For many languages we find, however, that the top ranked persons reflect country specific issues. Thus, for example, Pope John Paul II is only present in the top five list of the Italian and Polish Wikipedia, two countries which have a special tie with this figure. In the English Wikipedia the most central figures are former US presidents, while the Spanish-speaking Wikipedia community marks out Latin American revolutionaries. The Russian version surprisingly highlights William Shakespeare and also Kenneth Branagh, known for several film adaptations of Shakespeare’s plays. Only the Japanese Wikipedia rankes the author Mishima prominently, while two Chinese leaders, Chiang Kai-Shek and Deng Xiaopin, are in the top-5 in the Chinese version. When looking at these results, it should be taken into ac- count that there is an Anglo-Saxon bias in the dataset, as we relied on a list of notable persons extracted from the En- glish Wikipedia, and persons from other cultures not know internationally might be missing. In that sense the above list reflects centrality among persons with at least limited international notoriety. 4.3 Similarity between languages In this section we focus on similarities between the net- works emerging from the different language Wikipedias. We Table 4: Similarities between the biographical net- works of different language Wikipedias. - - - - - fr it ja nl no pl pt fi ca de en es - ru sv zh .05 .03 .12 .09 .07 .08 .07 .10 .08 .06 .10 .06 .09 .06 .11 .11 .07 .13 .12 .08 .09 .06 .06 .08 .04 .08 .03 .09 .03 .10 .08 .05 .05 .03 .03 .05 .02 .04 .02 .09 .13 .14 .10 .12 .07 .07 .14 .06 .09 .05 .06 .08 .09 .11 .10 .09 .10 .07 .13 .06 .15 .08 .09 .06 .06 .09 .04 .07 .03 .09 .10 .07 .07 .11 .05 .08 .04 .10 .08 .07 .09 .05 .09 .08 .10 .09 .13 .07 .12 .05 .08 .09 .05 .13 .06 .09 .08 .09 .05 .07 .11 .06 .06 .05 .06 ca de .05 en .03 .11 - es .12 .11 .09 fi .09 .07 .03 .09 fr .07 .13 .10 .13 .06 it .08 .12 .08 .14 .08 .15 - ja .07 .08 .05 .10 .09 .08 .09 nl no .08 .06 .03 .07 .10 .06 .07 .08 .10 pl pt .10 .08 .05 .14 .10 .09 .11 .09 .13 .09 .09 ru .06 .04 .02 .06 .07 .04 .05 .05 .07 .05 .08 .07 sv .09 .08 .04 .09 .13 .07 .08 .09 .12 .13 .09 .11 .06 zh .06 .03 .02 .05 .06 .03 .04 .08 .05 .06 .05 .06 .05 .06 .06 .06 .03 .07 .09 .06 .07 .07 .09 .08 .10 .09 .05 .12 .11 .09 .10 .10 - - - - - - - Figure 2: Languages similarity network: every lan- guage links to the two languages with the largest similarities according to Table 4. calculate the similarity for every pair of networks as their Jaccard coefficient, i.e. the ratio between the number of links present in both networks (their intersection) and the number of links existing in their union. Table 4 shows the obtained similarity results. For every language row we high- light the two languages with the largest similarities. The most similar language is also underlined. Figure 2 further illustrates these similarities by drawing a language similarity network. In this network a language A is connected to another language B if language B is one of the two most similar to A. Applying the Louvain method, we divide this graph into three clusters. In agreement with [10], we observe that most of the links can be explained by language-family relations (e.g Romance and Slavic lan- guages) and geographic or historical ties (e.g. Scandinavian group, or Russia and Finland). We also find a number of less obvious connections, e.g. Japanese to Spanish and Finnish connections which can be found in most of the analysed lan- guage Wikipedias. Knowledge about these social connec- tions trespasses cultural barriers and represents part of the shared global collective memory of our civilisation. Possible directions for future work include the applica- tion of the methodology to generate subnetworks of other kinds of article categories, and a specific study of links present in most networks but missing only in a few language Wikipedias. Finally, the gender gap among Wikipedia editors is a se- rious concern for the community, and has been related to the topics covered in the encyclopedia [7]. Our results point out a very small presence of females also among the most central persons in the encyclopedic content, suggesting the link between these two phenomena as an intriguing subject for future investigation. Acknowledgements This work was partially supported by the Spanish Centre for the Development of Industrial Technology under the CENIT pro- gram, project CEN-20101037, “Social Media”. Yana Volkovich acknowledges support from the Torres Quevedo Program from the Spanish Ministry of Science and Innovation, co-funded by the European Social Fund. 6. REFERENCES [1] R. Alberich, J. Miro-Julia, and F. Rossello. Marvel Universe looks almost like a real social network. cond-mat/0202174, 2002. [2] S. Athenikos and X. Lin. The WikiPhil Portal: visualizing meaningful philosophical connections. J. of the Chicago Colloq. on Digital Humanities and Comp. Sci., 1(1), 2009. [3] F. Bellomi and R. Bonato. Network analysis for Wikipedia. In Proc. of Wikimania, 2005. [4] R. Biuk-Aghai. Visualizing co-authorship networks in online Wikipedia. In Proc. of ISCIT’06, 2006. [5] P. I. Chiyo, C. J. Moss, and S. C. Alberts. The influence of life history milestones and association networks on crop-raiding behavior in male african elephants. PLoS ONE, 7(2):e31382, 2012. [6] D. Horton and R. Wohl. Mass communication and para-social interaction: Observations on intimacy at a distance. Psychiatry, 19(3):215–229, 1956. [7] D. Laniado, C. Castillo, A. Kaltenbrunner and M. Fuster-Morell. Emotions and dialogue in a large peer-production community: the case of Wikipedia. In Proc. of WikiSym, 2012. [8] D. Laniado and R. Tasso. Co-authorship 2.0: Patterns of collaboration in Wikipedia. In Proc. of Hypertext, 2011. [9] D. Laniado, R. Tasso, Y. Volkovich, and A. Kaltenbrunner. When the Wikipedians talk: Network and tree structure of Wikipedia discussion pages. In Proc. of ICWSM, 2011. [10] H. Liao and T. Petzold. Analysing geo-linguistic dynamics of the world wide web: The use of cartograms and network analysis to understand linguistic development in Wikipedia. Cultural Science, 3(2), 2011. [11] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proc. of IMC, 2007. [12] C. Pentzold. Fixing the floating gap: The online encyclopaedia Wikipedia as a global memory place. Memory Studies, 2(2):255–272, 2009. [13] U. Pfeil, P. Zaphiris, and C. Ang. Cultural differences in collaborative authoring of Wikipedia. JCMC, 12(1):88–113, 2006. [14] V. Zlati´c, M. Bozicevi´c, H. Stefanci´c, and M. Domazet. Wikipedias: Collaborative web-based encyclopedias as complex networks. Physical Review E, 74(1):016115, 2006. Figure 3: Biographical network of the connections in at least 13 of the 15 analysed language versions. Larger version available at http://goo.gl/Lc2Xl. to Dutch. In fact, Dutch seems to serve as a bridge between different language and culture groups. 4.4 Links present in most language networks Finally, Figure 3 depicts the network of connections which are present in at least 13 of the 15 language Wikipedias4. The network is relatively small, containing 1663 nodes and 1738 links, but allows to visualise the quintessence of knowl- edge about biographical connections present in most of the analysed language communities. The largest connected component in Figure 3 corresponds to a cluster of US Presidents which connects over Ronald Reagan to a cluster of British Premier Ministers. This group is related through Winston Churchill to a cluster of persons from WW2’s axis powers. The second largest component is compound of several clusters related to the music and entertainment business, and the third one of two clusters of male and female tennis players connected through Dinara and Marat Safin. Other large isolated clusters can be found around such diverse groups as Russian and Chinese political figures, French presidents, Israeli and Palestinian politicians, Formula One pilots, World Chess Champions or actresses. 5. CONCLUSIONS Our results show that biographical connections are record- ed differently in the distinct language versions of Wikipedia. Although the global social network measures are largely sim- ilar for all these networks, the most central persons unveil interesting peculiarities about the language communities. A study of similarity reveals that networks are more similar for geographically or linguistically closer communities. Nev- ertheless, there also exists a great number of biographical 4The choice of 13 is arbitrary and taken mainly for visual- ization reasons.
1802.05287
2
1802
2018-03-13T14:41:27
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
[ "cs.SI", "cs.CY" ]
Over the past few years, a number of new "fringe" communities, like 4chan or certain subreddits, have gained traction on the Web at a rapid pace. However, more often than not, little is known about how they evolve or what kind of activities they attract, despite recent research has shown that they influence how false information reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web's information ecosystem. In August 2016, a new social network called Gab was created as an alternative to Twitter. It positions itself as putting "people and free speech first'", welcoming users banned or suspended from other social networks. In this paper, we provide, to the best of our knowledge, the first characterization of Gab. We collect and analyze 22M posts produced by 336K users between August 2016 and January 2018, finding that Gab is predominantly used for the dissemination and discussion of news and world events, and that it attracts alt-right users, conspiracy theorists, and other trolls. We also measure the prevalence of hate speech on the platform, finding it to be much higher than Twitter, but lower than 4chan's Politically Incorrect board.
cs.SI
cs
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou(cid:63), Barry Bradlyn#, Emiliano De Cristofaro†, Haewoon Kwak+, Michael Sirivianos(cid:63), Gianluca Stringhini†, Jeremy Blackburn‡ (cid:63)Cyprus University of Technology, #Princeton Center for Theoretical Science,†University College London, +Qatar Computing Research Institute & Hamad Bin Khalifa University, ‡University of Alabama at Birmingham [email protected], [email protected], {e.decristofaro,g.stringhini}@ucl.ac.uk [email protected], [email protected], [email protected] 8 1 0 2 r a M 3 1 ] I S . s c [ 2 v 7 8 2 5 0 . 2 0 8 1 : v i X r a Abstract Over the past few years, a number of new "fringe" communi- ties, like 4chan or certain subreddits, have gained traction on the Web at a rapid pace. However, more often than not, little is known about how they evolve or what kind of activities they attract, despite recent research has shown that they influence how false information reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web's information ecosystem. In August 2016, a new social network called Gab was cre- ated as an alternative to Twitter. It positions itself as putting "people and free speech first", welcoming users banned or sus- pended from other social networks. In this paper, we provide, to the best of our knowledge, the first characterization of Gab. We collect and analyze 22M posts produced by 336K users be- tween August 2016 and January 2018, finding that Gab is pre- dominantly used for the dissemination and discussion of news and world events, and that it attracts alt-right users, conspiracy theorists, and other trolls. We also measure the prevalence of hate speech on the platform, finding it to be much higher than Twitter, but lower than 4chan's Politically Incorrect board. Introduction 1 The Web's information ecosystem is composed of multiple communities with varying influence [24]. As mainstream on- line social networks become less novel, users have begun to join smaller, more focused platforms. In particular, as the for- mer have begun to reject fringe communities identified with racist and aggressive behavior, a number of alt-right focused services have been created. Among these emerging commu- nities, the Gab social network has attracted the interest of a large number of users since its creation in 2016 [8], a few months before the US Presidential Election. Gab was created, ostensibly as a censorship-free platform, aiming to protect free speech above anything else. From the very beginning, site op- erators have welcomed users banned or suspended from plat- forms like Twitter for violating terms of service, often for abu- sive and/or hateful behavior. In fact, there is extensive anecdo- tal evidence that the platform has become the alt-right's new hub [23] and that it exhibits a high volume of hate speech [13] and racism [5]. As a result, in 2017, both Google and Ap- ple rejected Gab's mobile apps from their stores because of hate speech [13] and non-compliance to pornographic content guidelines [1]. In this paper, we provide, to the best of our knowledge, the first characterization of the Gab social network. We crawl the Gab platform and acquire 22M posts by 336K users over a 1.5 year period (August 2016 to January 2018). Overall, the main findings of our analysis include: 1. Gab attracts a wide variety of users, ranging from well- known alt-right personalities like Milo Yiannopoulos to conspiracy theorists like Alex Jones. We also find a num- ber of "troll" accounts that have migrated over from other platforms like 4chan, or that have been heavily inspired by them. 2. Gab is predominantly used for the dissemination and dis- cussion of world events, news, as well as conspiracy the- ories. Interestingly, we note that Gab reacts strongly to events related to white nationalism and Donald Trump. 3. Hate speech is extensively present on the platform, as we find that 5.4% of the posts include hate words. This is 2.4 times higher than on Twitter, but 2.2 times lower than on 4chan's Politically Incorrect board (/pol/) [9]. 4. There are several accounts making coordinated efforts to- wards recruiting millennials to the alt-right. In summary, our analysis highlights that Gab appears to be positioned at the border of mainstream social networks like Twitter and "fringe" Web communities like 4chan's /pol/. We find that, while Gab claims to be all about free speech, this seems to be merely a shield behind which its alt-right users hide. Paper Organization. In the next section, we review the re- lated work. Then, in Section 3, we provide an overview of the Gab platform, while in Section 4 we present our analysis on Gab's user base and the content that gets shared. Finally, the paper concludes in Section 5. 1 2 Related Work In this section, we review previous work on social network analysis and in particular on fringe communities. Kwak et al. [11] are among the first to study Twitter, aim- ing to understand its role on the Web. They show that Twitter is a powerful network that can be exploited to assess human behavior on the Web. However, the Web's information ecosys- tem does not naturally build on a single or a few Web commu- nities; with this motivation in mind, Zannettou et al. [24] study how mainstream and alternative news propagate across multi- ple Web communities, measuring the influence that each com- munity have on each other. Using a statistical model known as Hawkes Processes, they highlight that small "fringe" Web communities within Reddit and 4chan can have a substantial impact on large mainstream Web communities like Twitter. With the same multi-platform point of view, Chandrasekha- ran et al. [6] propose an approach, called Bag of Communi- ties, which aims to identify abusive content within a commu- nity. Using training data from nine communities within 4chan, Reddit, Voat, and Metafilter, they outperform approaches that focus only on in-community data. Other work also focuses on characterizing relatively small alt-right Web communities. Specifically, Hine et al. [9] study 4chan's Politically Incorrect board (/pol/), and show that it at- tracts a high volume of hate speech. They also find evidence of organized campaigns, called raids, that aim to disrupt the regu- lar operation of other Web communities on the Web; e.g., they show how 4chan users raid YouTube videos by posting large numbers of abusive comments in a relatively small period of time. Overall, our work is, to the best of our knowledge, the first to study the Gab social network, analyzing what kind of users it attracts, what are the main topics of discussions, and to what extent Gab users share hateful content. 3 Gab Gab is a new social network, launched in August 2016, that "champions free speech, individual liberty, and the free flow of information online.1" It combines social networking features that exist in popular social platforms like Reddit and Twitter. A user can broadcast 300-character messages, called "gabs," to their followers (akin to Twitter). From Reddit, Gab takes a modified voting system (which we discuss later). Gab allows the posting of pornographic and obscene content, as long as users label it as Not-Safe-For-Work (NSFW).2 Posts can be reposted, quoted, and used as replies to other gabs. Similar to Twitter, Gab supports hashtags, which allow indexing and querying for gabs, as well as mentions, which allow users to refer to other users in their gabs. Topics and Categories. Gab posts can be assigned to a spe- cific topic or category. Topics focus on a particular event or timely topic of discussion and can be created by Gab users themselves; all topics are publicly available and other users can post gabs related to topics. Categories on the other hand, are defined by Gab itself, with 15 categories defined at the time of this writing. Note that assigning a gab to a category and/or topic is optional, and Gab moderates topics, removing any that do not comply with the platform's guidelines. Voting system. Gab posts can get up- and down-voted; a fea- ture that determines the popularity of the content in the plat- form (akin to Reddit). Additionally, each user has its own score, which is the sum of up-votes minus the sum of down- votes that it received to all his posts (similar to Reddit's user karma score [3]). This user-level score determines the popu- larity of the user and is used in a way unique to Gab: a user must have a score of at least 250 points to be able to down-vote other users' content, and every time a user down-votes a post a point from his user-level score is deducted. In other words, a user's score is used as a form of currency expended to down- vote content. Moderation. Gab has a lax moderation policy that allows most things to be posted, with a few exceptions. Specifically, it only forbids posts that contain "illegal pornography" (legal pornography is permitted), posts that promote terrorist acts, threats to other users, and doxing other users' personal infor- mation [18].3 Monetization. Gab is ad-free and relies on direct user support. On October 4, 2016 Gab's CEO Andrew Torba announced that users were able to donate to Gab [19]. Later, Gab added "pro" accounts as well. "Pro" users pay a per-month fee granting additional features like live-stream broadcasts, account verifi- cation, extended character count (up to 3K characters per gab), special formatting in posts (e.g., italics, bold, etc.), as well as premium content creation. The latter allows users to create "premium" content that can only be seen by subscribers of the user, which are users that pay a monthly fee to the content cre- ator to be able to view his posts. The premium content model allows for crowdfunding particular Gab users, similar to the way that Twitch and Patreon work. Finally, Gab is in the pro- cess of raising money through an Initial Coin Offering (ICO) with the goal to offer a "censorship-proof" peer-to-peer social network that developers can build application on top [2]. Dataset. Using Gab's API, we crawl the social network using a snowball methodology. Specifically, we obtain data for the most popular users as returned by Gab's API and iteratively collect data from all their followers as well as their followings. We collect three types of information: 1) basic details about Gab accounts, including username, score, date of account cre- ation; 2) all the posts for each Gab user in our dataset; and 3) all the followers and followings of each user that allow us to build the following/followers network. Overall, we collect 22,112,812 posts from 336,752 users, between August 2016 and January 2018. 1http://gab.ai 2What constitutes NSFW material is not well defined. 3For more information on Gab's guidelines, guidelines. see https://gab.ai/about/ 2 PageRank Username John Rivers [omitted] [omitted] [omitted] Followers Scores Username Name Jared Wyand [omitted] Name PR score Milo Yiannopoulos m 0.013655 PrisonPlanet 0.012818 0.011762 Andrew Torba Ricky Vaughn 0.006549 Mike Cernovich 0.006143 0.005823 Stefan Molyneux Brittany Pettibone 0.005104 Jebs 0.004830 0.004218 [omitted] 0.003972 [omitted] Vox Day 0.003345 0.002984 [omitted] Alex Jones 0.002895 Jared Wyand 0.002824 0.002648 Ann Coulter Lift 0.002599 Survivor Medic 0.002599 0.002504 [omitted] Proud Deplorable 0.002400 Lauren Southern 0.002292 Table 1: Top 20 popular users on Gab according to the number of followers, their score, and their ranking based on PageRank in the follow- ers/followings network. We omit the "screen names" of certain accounts for ethical reasons. Username # a 45,060 Andrew Torba JohnRivers 45,059 Ricky Vaughn99 38,101 Ricky Vaughn Don 30,870 Don JaredWyand 29,081 TukkRivers 26,337 BrittPettibone 24,799 Brittany Pettibone USMC-Devildog 22,659 Tony Jackson causticbob 20,079 20,042 Constitutional Drunk USSANews truthwhisper 19,454 Truth Whisper 18,080 Andrew Anglin AndrewAnglin Kek Magician 17,613 Kek Magician shorty 16,975 SergeiDimitrovicIvanov 16,605 KoljaBonke 16,544 Kolja Bonke CuckShamer 16,382 16,124 PrisonPlanet voxday 15,036 Vox Day 14,827 W.O. Cassity wocassity PrisonPlanet a Ricky Vaughn99 Cernovich stefanmolyneux BrittPettibone DeadNotSleeping TexasYankee4 RightSmarts voxday d seaman RealAlexJones JaredWyand AnnCoulter lift SurvivorMed SalguodNos luther LaurenSouthern Party On Weimerica PrisonPlanet Name PrisonPlanet # 819,363 Milo Yiannopoulos m a 606,623 Andrew Torba PrisonPlanet 496,962 Cernovich 368,698 Mike Cernovich Ricky Vaughn99 281,798 Ricky Vaughn Sargon of Akkad Sargonofakkad100 253,781 [omitted] 244,025 d seaman stefanmolyneux 228,370 Stefan Molyneux BrittPettibone 228,316 Brittany Pettibone voxday 224,261 Vox Day RealAlexJones 206,516 Alex Jones 203,437 Lauren Southern LaurenSouthern realdonaldtrump 193,819 Donald J Trump DaveCullen 169,167 Dave Cullen e 169,091 Chuckcjohnson 160,246 Chuck C Johnson AndrewAnglin 155,021 Andrew Anglin Jared Wyand 154,829 JaredWyand pax 150,930 Pax Dickinson 144,875 Baked Alaska apple [omitted] Figure 1: Correlation of the rankings for each pair of rankings: (a) Followers - Score; (b) PageRank - Score; and (c) PageRank - Followers. (a) (b) (c) 4 Analysis In this section, we provide our analysis on the Gab platform. Specifically, we analyze Gab's user base and posts that get shared across several axes. 4.1 Ranking of users To get a better handle on the interests of Gab users, we first examine the most popular users using three metrics: 1) the number of followers; 2) user account score; and 3) user PageR- ank. These three metrics provide us a good overview of things in terms of "reach," appreciation of content production, and importance in terms of position within the social network. We report the top 20 users for each metric in Table 1. Although we believe that their existence in Table 1 is arguably indicative of their public figure status, for ethical reasons, we omit the "screen names" for accounts in cases where a potential link between the screen name and the user's real life names existed and it was unclear to us whether or not the user is a public figure. While Twitter has many celebrities in the most popular users [11], Gab seems to have what can at best be described as alt-right celebrities like Milo Yiannopoulos and Mike Cer- novich. Number of followers. The number of followers that each ac- count has can be regarded as a metric of impact on the plat- form, as a user with many followers can share its posts to a large number of other users. We observe a wide variety of dif- ferent users; 1) popular alt-right users like Milo Yiannopoulos, Mike Cernovich, Stefan Molyneux, and Brittany Pettibone; 2) Gab's founder Andrew Torba; and 3) popular conspiracy theorists like Alex Jones. Notably lacking are users we might consider as counter-points to the alt-right right, an indication of Gab's heavily right-skewed user-base. Score. The score of each account is a metric of content popu- larity, as it determines the number of up-votes and down-votes that they receive from other users. In other words, is the de- gree of appreciation from other users. By looking at the rank- ing using the score, we observe two new additional categories of users: 1) users purporting to be news outlets, likely pushing false or controversial information on the network like Prison- Planet and USSANews; and 2) troll users that seem to have mi- grated from or been inspired by other platforms (e.g., 4chan) like Kek Magician and CuckShamer. PageRank. We also compute PageRank on the follow- ers/followings network and we rank the users according to the obtained score. We use this metric as it quantifies the structural importance of nodes within a network according to its connec- 3 0100101102103104105Followers0100101102103104105Score0100101102103104105PageRank0100101102103104105Score0100101102103104105PageRank0100101102103104105Followers Word maga twitter trump conservative free love people life like man truth god world freedom right american want one christian time Bigram (%) 4.35% free speech 3.62% trump supporter 3.53% night area 3.47% area wanna 3.08% husband father 3.03% check link 2.76% freedom speech 2.70% hey guys 2.67% donald trump 2.49% man right 2.46% america great 2.45% link contracts 2.44% wanna check 2.29% make america 2.27% need man 2.25% guys need 2.23% president trump 2.20% guy sex 2.17% click link 2.14% link login (%) 1.24% 0.74% 0.49% 0.48% 0.45% 0.42% 0.41% 0.40% 0.40% 0.39% 0.39% 0.35% 0.34% 0.34% 0.34% 0.33% 0.32% 0.31% 0.30% 0.30% Table 2: Top 20 words and bigrams found in the descriptions of Gab users. Figure 2: Percentage of accounts created per month. tions. Here, we observe some interesting differences from the other two rankings. For example, the account with username "realdonaldtrump," an account reserved for Donald Trump, ap- pears in the top users mainly because of the extremely high number of users that follow this account, despite the fact that it has no posts or score. Comparison of rankings. To compare the three aforemen- tioned rankings, we plot the ranking of all the users for each pair of rankings in Fig. 1. We observe that the pair with the most agreement is PageRank-Followers (Fig. 1(c)), followed by the pair Followers-Score (Fig, 1(a)), while the pair with the least agreement is PageRank - Score (Fig 1(b). Over- all, for all pairs we find a varying degree of rank correlation. Specifically, we calculate the Spearman's correlation coeffi- cient for each pair of rankings; finding 0.53, 0.42, 0.26 for PageRank-Followers, Followers-Score, and PageRank-Score, respectively. While these correlations are not terribly strong, they are significant (p < 0.01) for the two general classes of users: those that play an important structural role in the net- work, perhaps encouraging the diffusion of information, and those that produce content the community finds valuable. 4 4.2 User account analysis User descriptions. To further assess the type of users that the platform attracts we analyze the description of each cre- ated account in our dataset. Note that by default Gab adds a quote from a famous person as the description of each ac- count and a user can later change it. Although not perfect, we look for any user description enclosed in quotes with a "–" followed by a name, and assume it is a default quote. Us- ing this heuristic, we find that only 20% of the users actively change their description from the default. Table 2 reports the top words and bigrams found in customized descriptions (we remove stop words for more meaningful results). Examining the list, it is apparent that Gab users are conservative Amer- icans, religious, and supporters of Donald Trump and "free speech." We also find some accounts that are likely bots and trying to deceive users with their descriptions; among the top bigrams there some that nudge users to click on URLs, pos- sibly malicious, with the promise that they will get sex. For example, we find many descriptions similar to the following: "Do you wanna get sex tonight? One step is left ! Click the link - < url >." It is also worth noting that our account (created for crawling the platform) was followed by 12 suspected bot accounts between December 2017 and January 2018 without making any interactions with the platform (i.e., our account has never made a post or followed any user). User account creation. We also look when users joined the Gab platform. Fig. 2 reports the percentage of accounts cre- ated for each month of our dataset. Interestingly, we observe that we have peaks for account creation on November 2016 and August 2017. These findings highlight the fact that Gab became popular during notable world and politics events like the 2016 US elections as well as the Charlottesville Unite the Right rally [22]. Finally, only a small percentage of Gab's users are either pro or verified, 0.75% and 0.5%, respectively, while 1.7% of the users have a private account (i.e., only their followers can see their gabs). Followers/Followings. Fig. 3 reports our analysis based on the number of followers and followings for each user. From Fig. 3(a) we observe that in general Gab users have a larger number of followers when compared with following users. In- terestingly, 43% of users are following zero other users, while only 4% of users have zero followers. I.e., although counter- intuitive, most users have more followers than users they fol- low. Figs. 3(b) and 3(c) show the number of followers and following in conjunction with the number of posts for each Gab user. We bin the data in log-scale bins and we report the mean and median value for each bin. We observe that in both cases, that there is a near linear relationship with the number of posts and followers/followings up until around 10 follow- ers/followings. After this point, we see this relationship di- verge, with a substantial number of users with huge numbers of posts, some over 77K. This demonstrates the extremely heavy tail in terms of content production on Gab, as is typical of most social medial platforms. Reciprocity. From the followers/followings network we find a low level of reciprocity: specifically, only 29.5% of the node Aug 16Sep 16Oct 16Nov 16Dec 16Jan 17Feb 17Mar 17Apr 17May 17Jun 17Jul 17Aug 17Sep 17Oct 17Nov 17Dec 17Jan 180246810121416% of accounts created (a) (b) (c) Figure 3: Followers and Following analysis (a) CDF of number of followers and following (b) number of followers and number of posts and (c) number of following and number of posts. pairs in the network are connected both ways, while the re- maining 71.5% are connected one way. When compared with the corresponding metric on Twitter [11], these results high- light that Gab has a larger degree of network reciprocity in- dicating that the community is more tightly-knit, which is ex- pected when considering that Gab mostly attracts users from the same ideology (i.e., alt-right community). 4.3 Posts Analysis Basic Statistics. First, we note that 63% of the posts in our dataset are original posts while 37% are reposts. Interestingly, only 0.14% of the posts are marked as NSFW. This is surpris- ing given the fact that one of the reasons that Apple rejected Gab's mobile app is due to the share of NSFW content [1]. From browsing the Gab platform, we also can anecdotally con- firm the existence of NSFW posts that are not marked as such, raising questions about how Gab moderates and enforces the use of NSFW tags by users. When looking a bit closer at their policies, Gab notes that they use a 1964 United States Supreme Court Ruling [21] on pornography that provides the famous "I'll known it when I see it" test. In any case, it would seem that Gab's social norms are relatively lenient with respect to what is considered NSFW. We also look into the languages of the posts, as returned by Gab's API. We find that Gab's API does not return a language code for 56% of posts. By looking at the dataset, we find that all posts before June 2016 do not have an associated language; possibly indicating that Gab added the language field after- wards. Nevertheless, we find that the most popular languages are English (40%), Deutsch (3.3%), and French (0.14%); pos- sibly shedding light to Gab's users locations which are mainly the US, the UK, and Germany. URLs. Next , we assess the use of URLs in Gab; overall we find 3.5M unique URLs from 81K domains. Table 3 re- ports the top 20 domains according to their percentage of in- clusion in all posts. We observe that the most popular domain is YouTube with almost 7% of all posts, followed by Twitter with 2%. Interestingly, we note the extensive use of alterna- tive news sources like Breitbart (1.4%), The Gateway Pundit (0.7%), and Infowars (0.5%), while mainstream news outlets like Fox News (0.4%) and Daily Mail (0.4%) are further be- low. Also, we note the use of image hosting services like Imgur (0.6%), sli.mg (0.6%), and kek.gg (0.7%) and URL shorteners (%) Domain (%) Domain 4.22% zerohedge.com 0.53% youtube.com 2.67% twimg.com 0.53% youtu.be 1.96% dailycaller.com 0.49% twitter.com 0.47% 1.44% t.co breitbart.com 0.46% bit.ly 0.82% ussanews.com thegatewaypundit.com 0.74% dailymail.co.uk 0.46% 0.69% tinyurl.com kek.gg 0.44% 0.68% wordpress.com 0.43% imgur.com 0.41% 0.61% foxnews.com sli.mg infowars.com 0.56% blogspot.com 0.32% Table 3: Top 20 domains in posts and their respective percentage over all posts. like bit.ly (0.8%) and tinyurl.com (0.4%). Finally, it is worth mentioning that The Daily Stormer, a well known neo-Nazi web community is five ranks ahead of the most popular main- stream news source, The Hill. Hashtags & Mentions As discussed in Section 3, Gab sup- ports the use of hashtags and mentions similar to Twitter. Ta- ble 4 reports the top 20 hashtags/mentions that we find in our dataset. We observe that the majority of the hashtags are used in posts about Trump, news, and politics. We note that among the top hashtags are "AltRight", indicating that Gab users are followers of the alt-right movement or they discuss topics re- lated to the alt-right; "Pizzagate", which denotes discussions around the notorious conspiracy theory [20]; and "BanIslam", which indicate that Gab users are sharing their islamophobic views. It is also worth noting the use of hashtags for the dis- semination of popular memes, like the Drain the Swamp meme that is popular among Trump's supporters [14]. When looking at the most popular users that get mentioned, we find popular users related to the Gab platform like Andrew Torba (Gab's CEO with username @a). We also note users that are popular with respect to mentions, but do not appear in Table 1's lists of popular users. For ex- ample, Amy is an account purporting to be Andrew Torba's mother. The user Stargirlx, who we note changed usernames three times during our collection period, appears to be an ac- count presenting itself as a millennial "GenZ" young woman. Interestingly, it seems that Amy and Stargirlx have been orga- nizing Gab "chats," which are private groups of users, for 18 to 29 year olds to discuss politics; possibly indicating efforts 5 0100101102103104105106# of followers/followings0.00.20.40.60.81.0CDFFollowersFollowings0100101102103104105# of followers0100101102103104105# of postsMeanMedian0100101102103104105# of followings0100101102103104105# of postsMeanMedian Hashtag MAGA GabFam Trump SpeakFreely News Gab DrainTheSwamp AltRight Pizzagate Politics PresidentTrump FakeNews BritFam 2A maga NewGabber CanFam BanIslam MSM 1A Mention (%) 6.06% a 4.22% TexasYankee4 3.01% Stargirlx 2.28% YouTube 2.00% support 0.88% Amy 0.71% RaviCrux 0.61% u 0.57% BlueGood 0.53% HorrorQueen 0.47% Sockalexis 0.41% Don 0.37% BrittPettibone 0.35% TukkRivers 0.32% CurryPanda 0.28% Gee 0.27% e 0.25% careyetta 0.22% PrisonPlanet 0.21% JoshC (%) 0.69% 0.31% 0.26% 0.24% 0.23% 0.22% 0.20% 0.19% 0.18% 0.17% 0.17% 0.17% 0.16% 0.15% 0.15% 0.15% 0.14% 0.14% 0.14% 0.12% Table 4: Top 20 hashtags and mentions found in Gab. We report their percentage over all posts. to recruit millennials to the alt-right community. Categories & Topics. As discussed in Section 3 gabs may be part of a topic or category. By analyzing the data, we find that this happens for 12% and 42% of the posts for top- ics and categories, respectively. Table 5 reports the percent- age of posts for each category as well as for the top 15 top- ics. For topics, we observe that the most popular are general "Ask Me Anything" (AMA) topics like Deutsch (2.29%, for German users), BritFam (0.73%, for British users), and Intro- duce Yourself (0.59%). Furthermore, other popular topics in- clude world events and news like International News (0.59%), Las Vegas shooting (0.27%), and conspiracy theories like Seth Rich's Murder (0.11%). When looking at the top categories we find that by far the most popular categories are News (15.91%) and Politics (10.30%). Other popular categories include AMA 4.46%), Humor (3.50%), and Technology (1.44%). These findings highlight that Gab is heavily used for the dis- semination and discussion of world events and news. There- fore, its role and influence on the Web's information ecosystem should be assessed in the near future. Also, this categorization of posts can be of great importance for the research community as it provides labeled ground truth about discussions around a particular topic and category. Hate speech assessment. As previously discussed, Gab was openly accused of allowing the dissemination of hate speech. In fact, Google removed Gab's mobile app from its Play Store because it violates their hate speech policy [13]. Due to this, we aim to assess the extent of hate speech in our dataset. Using the modified Hatebase [4] dictionary used by the authors of [9], we find that 5.4% of all Gab posts include a hate word. In com- parison, Gab has 2.4 times the rate of hate words when com- pared to Twitter, but less than halve the rate of hate words com- pared to 4chan's Politically Incorrect board (/pol/) [9]. These 6 (%) 2.29% News 0.73% Politics 0.59% AMA 0.19% Humor 0.17% Technology 0.16% Philosophy 0.16% Entertainment 0.13% Art 0.12% Faith Topic Deutsch BritFam Introduce Yourself International News DACA Las Vegas Terror Attack Hurricane Harvey Gab Polls London 2017 Meme Year in Review 0.12% Science Twitter Purge Seth Rich Memes Vegas Shooting Judge Roy Moore Table 5: Top 15 categories and topics found in the Gab dataset (%) 15.91% 10.30% 4.46% 3.50% 1.44% 1.06% 1.01% 0.72% 0.69% 0.56% 0.52% 0.39% 0.37% 0.31% 0.16% Category 0.12% Music 0.11% Sports 0.11% Photography 0.11% Finance 0.09% Cuisine findings indicate that Gab resides on the border of mainstream social networks like Twitter and fringe Web communities like 4chan's Politically Incorrect (/pol/) board. Temporal Analysis. Finally, we study the posting behavior of Gab users from a temporal point of view. Fig. 4 shows the dis- tribution of the Gab posts in our dataset according to each day of our dataset, as well as per hour of day and week (in UTC). We observe that the general trend is that the number of Gab's posts increase over time (Fig. 4(a)); this indicates an increase in Gab's popularity. Furthermore, we note that Gab users posts most of their gabs during the afternoon and late night (after 3 PM UTC) while they rarely post during the morning hours (Fig. 4(b)). Also, the aforementioned posting behavior follow a diurnal weekly pattern as we show in Fig. 4(c). To isolate significant days in the time series in Fig. 4(a), we perform a changepoint analysis using the Pruned Exact Lin- ear Time (PELT) method [10]. First, we use our knowledge of the weekly variation in average post numbers from Fig. 4(c) to subtract from our timeseries the mean number of posts for each day. This leaves us with a mean-zero timeseries of the de- viation of the number of posts per day from the daily average. We assume that this timeseries is drawn from a normal distri- bution, with mean and variance that can change at a discrete number of changepoints. We then use the PELT algorithm to maximize the log-likelihood function for the mean(s) and vari- ance(s) of this distribution, with a penalty for the number of changepoints. By ramping down the penalty function, we pro- duce a ranking of the changepoints. Examining current events around these changepoints pro- vides insight into they dynamics that drive Gab behavior. First, we note that there is a general increase in activity up to the Trump inauguration, at which point activity begins to decline. When looking later down the timeline, we see an increase in activity after the changepoint marked 1 in Fig. 4(a). Change- point 1 coincides with James Comey's firing from the FBI, and the relative acceleration of the Trump-Russian collusion probe [16]. The next changepoint (2) coincides with the so-called "March Against Sharia" [12] organized by the alt-right, with (a) Date (b) Hour of Day (c) Hour of Week Figure 4: Temporal analysis of the Gab posts (a) each day; (b) based on hour of day and (c) based on hour of week. the event marked 4 corresponding to Trump's "blame on both sides" response to violence at the Unite the Right Rally in Charlottesville [15]. Similarly, we see a meaningful response to Twitter's banning of abusive users [7] marked as change- point 5. Changepoint 3, occurring on July 12, 2017 is of particular interest, since it is the most extreme reduction in activity rec- ognized as a changepoint. From what we can tell, this is a reaction to Donald Trump Jr. releasing emails that seemingly evidenced his meeting with a Russian lawyer to receive com- promising intelligence on Hillary Clinton's campaign [17]. I.e., the disclosure of evidence of collusion with Russia cor- responded to the single largest drop in posting activity on Gab. 5 Conclusion In this work. we have provided the first characterization of a new social network called Gab. We analyzed 22M posts from 336K users, finding that Gab attracts the interest of users rang- ing from alt-right supporters and conspiracy theorists to trolls. We showed that Gab is extensively used for the discussion of news, world events, and politics-related topics, further moti- vating the need take it into account when studying information cascades on the Web. By looking at the posts for hate words, we also found that 5.4% of the posts include hate words. Fi- nally, using changepoint analysis, we highlighted how Gab re- acts very strongly to real-world events focused around white nationalism and support of Donald Trump. Acknowledgments. This project has received funding from the European Union's Horizon 2020 Research and Innovation program under the Marie Skłodowska-Curie ENCASE project (Grant Agreement No. 691025). The work reflects only the authors' views; the Agency and the Commission are not re- sponsible for any use that may be made of the information it contains. References [1] Apple's Double Standards Against Gab. https: //medium.com/@getongab/apples-double-standards- against-gab-1bffa2c09115, 2016. [2] A Censorship-Proof P2P Social Media Protocol. https: //www.startengine.com/gab-select, 2017. 7 [3] Reddit FAQ - Karma. https://www.reddit.com/wiki/faq, 2017. [4] Hatebase API. https://www.hatebase.org/, 2018. [5] T. Benson. Inside the "Twitter for racists": Gab – the site where Milo Yiannopoulos goes to troll now. https: //goo.gl/Yqv4Ue, 2016. [6] E. Chandrasekharan, M. Samory, A. Srinivasan, and E. Gilbert. The Bag of Communities: Identifying Abu- sive Behavior Online with Preexisting Internet Data. In CHI, 2017. [7] K. Donaldson and J. Brustein. Twitter Bans Some White Supremacists and Other Extremists. https://www.bloomberg.com/news/articles/2017-12- 19/twitter-bans-some-white-supremacists-and-other- extremists, 2017. [8] Gab. Gab site. https://gab.ai, 2017. [9] G. E. Hine, J. Onaolapo, E. D. Cristofaro, N. Kourtellis, I. Leontiadis, R. Samaras, G. Stringhini, and J. Black- burn. Kek, Cucks, and God Emperor Trump: A Measure- ment Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM, 2017. [10] R. Killick, P. Fearnhead, and I. A. Eckley. Optimal detection of changepoints with a linear computational Journal of the American Statistical Association, cost. 107(500):1590–1598, 2012. [11] H. Kwak, C. Lee, H. Park, and S. B. Moon. What is In WWW, Twitter, a social network or a news media? 2010. The 'March Against [12] C. Mathias. Protests Are lims. march-against-sharia-anti-muslim-act-for- america us 5939576ee4b0b13f2c67d50c, 2017. Sharia' Really Marches Against Mus- https://www.huffingtonpost.com/entry/ [13] R. Price. Google's app store has banned Gab, a social network popular with the far-right, for 'hate speech'. http://uk.businessinsider.com/google-app- store-gab-ban-hate-speech-2017-8, 2017. [14] A. Romano. The 2016 culture war, as illustrated by https://www.vox.com/culture/2016/12/ the alt-right. 30/13572256/2016-trump-culture-war-alt-right-meme, 2016. [15] M. Shear and M. Haberman. Trump Defends Initial 09/1612/1603/1706/1709/1712/170.000.050.100.150.200.250.300.350.40% of posts12345051015202.02.53.03.54.04.55.05.5% of posts204060801001201401600.30.40.50.60.70.8% of posts Remarks on Charlottesville; Again Blames 'Both Sides'. https://www.nytimes.com/2017/08/15/us/politics/trump- press-conference-charlottesville.html, 2017. [20] M. Wendling. The saga of 'Pizzagate': The fake story that shows how conspiracy theories spread. http://www. bbc.com/news/blogs-trending-38156985, 2016. [16] D. Smith. Trump fires FBI director Comey, ing questions over Russia investigation. //www.theguardian.com/us-news/2017/may/09/james- comey-fbi-fired-donald-trump, 2017. rais- https: [17] D. Smith and S. Siddiqui. 'I love it': Donald Trump Jr posts emails from Russia offering material on Clin- ton. https://www.theguardian.com/us-news/2017/jul/ 11/donald-trump-jr-email-chain-russia-hillary-clinton, 2017. [18] P. Snyder, P. Doerfler, C. Kanich, and D. McCoy. Fifteen minutes of unwanted fame: detecting and characterizing doxing. In IMC, 2017. [19] A. Torba. How You Can Help Support Gab. https://medium.com/@Torbahax/gab-donations- 9ca2a5c0557e, 2016. [21] Wikipedia. Jacobellis v. Ohio. https://en.wikipedia.org/ wiki/Jacobellis v. Ohio, 1964. [22] Wikipedia. Unite the Right rally. https://en.wikipedia. org/wiki/Unite the Right rally, 2017. [23] J. Wilson. Gab: alt-right's attracts users ternative https://www.theguardian.com/media/2016/nov/17/gab- alt-right-social-media-twitter, 2016. banned social media al- from Twitter. [24] S. Zannettou, T. Caulfield, E. D. Cristofaro, N. Kourtellis, I. Leontiadis, M. Sirivianos, G. Stringhini, and J. Black- burn. The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources. In IMC, 2017. 8
1903.06367
1
1903
2019-03-15T05:24:38
Fast influencers in complex networks
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Influential nodes in complex networks are typically defined as those nodes that maximize the asymptotic reach of a spreading process of interest. However, for practical applications such as viral marketing and online information spreading, one is often interested in maximizing the reach of the process in a short amount of time. The traditional definition of influencers in network-related studies from diverse research fields narrows down the focus to the late-time state of the spreading processes, leaving the following question unsolved: which nodes are able to initiate large-scale spreading processes, in a limited amount of time? Here, we find that there is a fundamental difference between the nodes -- which we call "fast influencers" -- that initiate the largest-reach processes in a short amount of time, and the traditional, "late-time" influencers. Stimulated by this observation, we provide an extensive benchmarking of centrality metrics with respect to their ability to identify both the fast and late-time influencers. We find that local network properties can be used to uncover the fast influencers. In particular, a parsimonious, local centrality metric (which we call social capital) achieves optimal or nearly-optimal performance in the fast influencer identification for all the analyzed empirical networks. Local metrics tend to be also competitive in the traditional, late-time influencer identification task.
cs.SI
cs
Fast influencers in complex networks Fang Zhou Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China Linyuan Lu Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China Alibaba Research Center for Complexity Sciences, Hangzhou Normal University, Hangzhou 311121, China Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu 610054, PR China URPP Social Networks, Universitat Zurich, Switzerland Manuel Sebastian Mariani 9 1 0 2 r a M 5 1 ] I S . s c [ 1 v 7 6 3 6 0 . 3 0 9 1 : v i X r a Abstract Influential nodes in complex networks are typically defined as those nodes that maximize the asymptotic reach of a spreading process of interest. However, for practical applications such as viral marketing and online information spreading, one is often interested in maximizing the reach of the process in a short amount of time. The traditional definition of influencers in network-related studies from diverse research fields narrows down the focus to the late-time state of the spreading processes, leaving the following question unsolved: which nodes are able to initiate large-scale spreading processes, in a limited amount of time? Here, we find that there is a fundamental difference between the nodes -- which we call "fast influencers" -- that initiate the largest-reach processes in a short amount of time, and the traditional, "late-time" influencers. Stimulated by this observation, we provide an extensive benchmarking of centrality metrics with respect to their ability to identify both the fast and late-time influencers. We find that local network properties can be used to uncover the fast influencers. In particular, a parsimonious, local centrality metric (which we call social capital) achieves optimal or nearly-optimal performance in the fast influencer identification for all the analyzed empirical networks. Local metrics tend to be also competitive in the traditional, late-time influencer identification task. 1. Introduction Diffusion processes on networks can describe phenomena as diverse as the spreading of infectious diseases [1], the life cycle of products and services [2], the spreading of behaviors [3], among others. A long-standing idea in social sciences and marketing research is that in a social network, a minority of individuals have the possibility to dispro- portionately impact on the diffusion of an innovation [4, 5]. While marketing researchers have investigated various categories and traits of such influential individuals -- including domain expertise [6, 7], wide market information [8], and opinion leadership [4] -- the physics and network science literature have mostly focused on the individuals' ability to reach a large number of individuals by benefiting from their favorable position in the network of contacts [9]. In this context, the "influencers" [10] (or "influentials" [5], or "influential spreaders" [11]) are typically defined as those nodes who, once they initiate a spreading process on a network of contacts, can reach and "infect" a Email addresses: [email protected] (Linyuan Lu), [email protected] (Manuel Sebastian Mariani) Preprint submitted to Communications in Nonlinear Science and Numerical Simulation March 18, 2019 large portion of the system. Following the seminal works by Kempe et al. [12] and Kitsak et al. [11], a large number of papers have attempted to identify the influencers based on network structural analysis and centrality metrics [9, 11, 13, 14, 15, 16, 17, 18, 19] (see [9] for a review). In this stream of works, the ground-truth influence of a given "seed" node (or equivalently, its spreading ability) is defined as the average number of nodes that are eventually reached by independent diffusion processes initiated by that seed node [9]. In the following, we refer to this property as node late-time influence, and we refer to nodes with large late-time influence as late-time influencers. Based on this framework, scholars evaluated the performance of network centrality metrics according to their ability to reproduce the ranking of the nodes by their late-time influence. The results have fostered the debate [9, 18, 20] on whether local centrality metrics [14, 15, 20, 21, 22, 23] (i.e., metrics that infer nodes' centrality based purely on local information) or global metrics [11, 16, 19, 24, 25] (i.e., centrality metrics that take into account the whole network structure) should be preferred for the influencer identification. Local metrics are faster to be computed and can provide optimal or nearly optimal performance [9, 15, 20], yet more computationally-expensive global metrics might provide a more accurate quantification of node influence at the critical point [16] and above [19]. However, the definition of node ground-truth influence adopted so far implicitly narrows down the problem's focus to the stationary state of the dynamics. On the other hand, for marketing applications, it is vital for companies to accumulate customers or adopters as rapidly as possible [26]. Besides, the early stage of spreading processes plays an essential role in the dissemination of low-credibility content in online social platforms [27]; therefore, to design effective prevention strategies, it becomes critical to gauge the nodes' ability to disseminate information in a small amount of time. Previous studies have addressed the impact of network topology and temporal effects on diffusion speed [28, 29], the design of local strategies specifically aimed at fast spreading [30], and the identification of nodes that tend to be infected earlier than the others [31]. However, they did not address the fundamental question whether strategies that are effective in maximizing the late-time impact of a process are also effective at early times, and they did not investigate whether well-performing centrality metrics are only competitive at specific timescales. To fill these gaps, we introduce here the time-dependent influence of a given "seed" node as the average number of nodes that have been infected during a finite number t of diffusion steps, by independent diffusion processes initiated by that seed node. We refer to the time-dependent influence after few steps of the dynamics as the early-time influence of the nodes, and to the nodes with large early-time influence as fast influencers. We find that the nodes' late-time and early-time influence are positively correlated, yet this correlation is far from perfect. The noisy relation between the two types of influence reveals that strategies that aim at maximizing the late-time impact of a spreading process (i.e., those typically considered in the literature) can be suboptimal for maximizing its early-time impact. The late-time influencers may indeed initiate large-scale processes that take a long time to diffuse, whereas nodes with a lower late-time influence might initiate faster processes. A previously unexplored question, therefore, emerges: how to best identify the fast influencers? We find that local network information can be used to accurately quantify the early-time influence of the nodes. In particular, a simple combination of node degree and neighbors' degrees is optimal or nearly optimal in quantifying the early-time influence of the nodes. Our extensive comparative analysis reveals that other local metrics (including LocalRank [21] and the Dynamics Sensitive Centrality [32]) can be similarly competitive at early times. On the other hand, global metrics (such as the k-core centrality [11] and the closeness centrality [33]) can be only competitive in the late-time influencer identification, yet for some datasets and dynamics parameter values, local metrics outperform global metrics also in the late-time influencer identification. 2 Our findings shed light on the fundamental difference between nodes' early-time and late-time influence. Impor- tantly, they suggest that compared to global metrics, local metrics for the influential nodes identification might be competitive for a broader range of dynamical processes. The rest of the paper is organized as follows: Section 2 introduces the traditional late-time influencer identification problem together with relevant centrality metrics and the datasets analyzed here; Section 3 presents the fundamental difference between fast and late-time influencers; Section 4 presents the results of an extensive benchmarking of centrality metrics with respect to their ability to single out fast and influential spreaders. Finally, Section 5 summarizes our main results and outlines open directions. 2. Theory and methods The goal of this Section is to introduce the traditional definition of influencers based on epidemic spreading processes (Section 2.1), the centrality metrics that have been studied to identify the influencers (Section 2.2), and the empirical networks analyzed in this paper (Section 2.3). 2.1. The traditional definition of influencers based on spreading models The problem of identifying influential nodes (hereafter, "influencers" [10]) in a network generally refers to the problem of identifying a small set of nodes, S ⊂ V (where V denotes the set of all nodes, and S (cid:28) V), that maximizes a certain target function, f (S). Such a function could be a function of the topology of the network ("structural influence maximization"), or a function that depends on the interplay between network topology and a given dynamical process on the network ("functional influence maximization") [9]. In this work, we consider the functional influence maximization problem, where the influencers are traditionally defined as the nodes that maximize the late-time reach of the dynamic process in exam. Given a network, the late-time influence of the nodes depends on the target dynamics under consideration. In line with a popular stream of physics literature [9, 11, 15, 16, 19, 20, 32], we focus here on the Susceptible-Infected- Recovered dynamics (SIR). The SIR dynamics on a given network starts from an initial configuration where some of the nodes (typically referred to as "seed nodes") are in the infected (I) state. At each time step, each infected node can infect each of its susceptible (S) neighbors with probability β. In addition, each infected node can recover with probability µ. The dynamics ends when all the nodes are in the recovered (R) state. For convenience, in the following, we fix µ = 1, and express the results in terms of the ratio λ/λc between the spreading rate λ = β/µ and its critical value λc. In line with previous studies [9], to compute λc, we use the analytic result obtained with a degree-based mean-field approximation [1]: λc = (cid:104)k(cid:105) /((cid:104)k2(cid:105) − (cid:104)k(cid:105)), where (cid:104)k(cid:105) and (cid:104)k2(cid:105) denote the average degree and the average squared degree, respectively. Importantly, only a portion of the nodes end up in the recovered state. We focus here on processes with one single seed node at time zero; clearly, the number of nodes in the recovered state depends on the chosen seed node. For each node i, its late-time influence qi(∞) is defined as the average asymptotic fraction of nodes in the recovered state for processes initiated with node i as the seed node. The influential spreaders (here, late-time influencers) are defined as the nodes with the largest influence q(∞). Accordingly, network centrality metrics are typically compared with respect to their ability to single out the high-q(∞) nodes [9]. 2.2. Centrality metrics Centrality metrics generally aim to identify the most "important" nodes in a network [34]. Their performance in the influencer identification task is traditionally evaluated according to their ability to identify the late-time 3 influencers defined in the previous Section [9]. We describe here the metrics analyzed in this paper. We denote as A the adjacency matrix of the undirected network: Aij = 1 if a link between node i and j exists. Degree. The degree of a node is defined as its total number of neighbors. In terms of the adjacency matrix, we have [35] ki = N(cid:88) Aij. (1) j=1 H-index. The H-index centrality was recently validated as an effective metric for the influencer identification [15]. To define the H-index, let us denote by ki,1,ki,2,ki,3,...,ki,ki the degrees of the neighbors of a given node i. Then, the H-index of node i is hi if and only if hi is the largest integer number such hi neighbors of node i have degree larger than or equal to hi. The construction of the H-index can be generalized to construct higher-order centrality metrics, which leads to an iterative procedure to construct the k-core centrality (see below) starting from degree [15]. LocalRank. The LocalRank score Li of node i is defined as [21] N(cid:88) N(cid:88) Li = Aji Alj Nl, (2) where Nl is the number of the nearest and the next nearest neighbors of node l. In practice, the LocalRank score takes into account local information up to distance four from the focal node. j=1 l=1 Dynamics Sensitive Centrality. The Dynamics Sensitive Centrality (DSC) [32] aims to estimate analytically the time-dependent influence of the nodes. Denoting as si(t) the estimated influence of node i at time t, by analytically estimating the fraction of newly infected nodes at each time step, one finds analytically that [32] s(t) = (β A + β A H + . . . + β A Ht)T e, (3) where H = β A + (1 − µ) I, I denotes the N × N identity matrix, and e denotes the vector whose N components are all equal to one. The metric presents the disadvantage that in order to be applied, one needs to know the values of β and µ, which is typically not the case in real applications. However, we found that its performance is not strongly dependent on the value of β; for this reason, we set µ = 1 and β = λc. k-core. In an undirected unweighted graph, the k-core score of the nodes is defined in terms of a network pruning process [11]. One starts by removing all nodes with a degree equal to one. After this step is completed, some nodes that had k > 1 may end up with a degree equal to one: these nodes are removed as well. One keeps removing the nodes that end up with k = 1 iteratively until no node with k = 1 is left in the network. All the nodes removed throughout this process are assigned a k-core score equal to one. One performs an analogous procedure for the nodes with k = 2, 3, . . ., thereby identifying all the nodes with a k-core score equal to 2, 3, . . .. The calculation ends when all the nodes have been assigned a k-core score. Eigenvector centrality. The vector of eigenvector-centrality scores is defined as the eigenvector of the adjacency matrix A associated with A's largest eigenvalue λmax [36]. In formulas, A x = λmax x (4) where λmax is the biggest eigenvalue of matrix A, and x is the corresponding eigenvector. 4 Dataset name N L λc URL Amazon Cond-mat Email-Enron Facebook arenas-email arenas-pgp Route views ca-AstroPh Human protein petster-hamster reactome Stelzl vidal Yeast 334863 27519 36692 63731 1133 10680 6474 18771 3023 2426 6229 1615 2783 2375 925872 116181 183831 817035 5451 24316 12572 198050 6149 16631 146160 3106 6007 11693 (cid:104)k(cid:105) 5.5 8.4 10.0 25.6 9.6 4.5 3.9 21.1 4.06 13.7 43.71 3.8 4.3 9.8 (cid:104)k2(cid:105) 63.7 188.1 1402 2256.5 179.8 85.9 640 1379 62.8 582.9 6708.3 65.6 68.1 336.9 0.094 0.047 0.0071 0.011 0.0564 0.0553 0.006 0.015 0.069 0.024 0.007 0.061 0.067 0.030 http://konect.uni-koblenz.de/networks/com-amazon http://networkscience.cn/index.php/data/ http://networkscience.cn/index.php/data/ http://networkscience.cn/index.php/data/ http://konect.uni-koblenz.de/networks/arenas-email http://konect.uni-koblenz.de/networks/arenas-pgp http://konect.uni-koblenz.de/networks/as20000102 http://konect.uni-koblenz.de/networks/ca-AstroPh http://konect.uni-koblenz.de/networks/maayan-vidal http://konect.uni-koblenz.de/networks/petster-hamster http://konect.uni-koblenz.de/networks/reactome http://networkrepository.com/maayan-Stelzl.php http://www.linkprediction.org/index.php/link/resource/data Table 1: Details of the analyzed empirical networks: number of nodes N ; number of links L; average degree (cid:104)k(cid:105); average square degree (cid:104)k2(cid:105); critical value λc of the SIR model parameters' ratio λ = β/µ; URL where the dataset can be downloaded. (cid:88) s(cid:54)=i(cid:54)=t N(cid:88) j=1 (cid:88) j∈Gi Betweenness. The betweenness centrality score Bi of node i is defined as the average ratio between the number ni st of shortest paths between two nodes s and t that pass through a focal node i, and the total number gst of shortest paths between node s and t [37]. In formulas, Bi = ni st gst . (5) Closeness. In a connected network, the closeness centrality score [33] of node i is defined as the reciprocal of its average distance from the other nodes in the network, where the distance is determined by the shortest-path length. In formulas, di = 1 N − 1 dij, (6) where dij is the length of the shortest paths that connect node i and j; the closeness centrality score of node i is defined as Ci = di −1. (7) If the network is disconnected, one first computes the average distance di of node i from the nodes that belong to the same network component Gi ⊂ G. In formulas, di = 1 Gi − 1 dij, (8) where Gi denotes the number of nodes that belong to Gi. Then, one computes the closeness centrality score of node i as [33] Gi − 1 (N − 1) .d−1 i . (9) 2.3. Empirical datasets Ci = We analyze here the same four networks that were analyzed in the review article [9], plus 10 smaller networks. We denote the four largest networks as Amazon, Cond-mat, Email-Enron, Facebook. Amazon [38] is the co-purchase network from the Amazon website. Its nodes represent products and the links between two nodes indicate that the two products have been frequently bought together. Cond-mat [39] is a collaboration network of scientists. Its nodes represent scientists and a link between two nodes means that the two scientists have co-authorized at least one paper. Email-Enron [40] is a communication network. Its nodes represent email address; there exists a link between two 5 Figure 1: A comparison between node late-time influence q(∞) and node time-dependent influence q(t), for the four largest empirical networks considered here and different values of the dynamics probability λ. While positively correlated, the Pearson's linear correlation r(q(∞), q(t)) between q(∞) and q(t) is substantially smaller than one at early times (intuitively, t < 10). The discrepancy between q(∞) and q(t) tends to increase as λ increases. addresses if the two addresses have exchanged at least one email. Facebook [41] is a friendship network from the Facebook social network. Its nodes represent users, and a link between two nodes means that the two users are friends. We refer to Table 1 for all the details about these four networks and the smaller networks. 3. The fundamental difference between fast and late-time influencers In Section 2.1, we have seen that the traditional definition of influencers relies on the asymptotic state of the spreading process in exam. To uncover the fundamental difference between fast and late-time influencers, we introduce the more general problem of finding the optimal influential spreaders at a given finite time t. We define the time- dependent influence qi(t) of node i at time t as the average fraction of nodes in the recovered state for processes initiated by node i, after t steps of the diffusion dynamics. Formally, we recover the traditional definition of (late-time) node influence [9] for1 t → ∞: q(∞) := limt→∞ q(t). 3.1. Correlation between early-time and late-time node influence Fig. 1 shows that while q(∞) and q(t) are positively correlated, the Pearson's linear correlation r(q(∞), q(t)) between q(∞) and q(t) is substantially smaller than one at early times (intuitively, t < 10). The discrepancy between q and q(t) increases as λ increases: smaller values of β correspond indeed to processes that take less time to reach the final state where there is no infected node left, which results in a better agreement between the early-time and the late-time influence of the nodes. For example, at time t = 5, in Amazon, the correlation r(q(5), q(∞)) is still relatively large for λ = λc [r(q(5), q(∞)) = 0.77], but it drops to 0.21 for λ = 10 λc. Generally, the larger λ, the weaker the correlation between node late-time and early-time influence. 1As the SIR dynamics halts when no infected nodes are left, in numerical simulations, it is sufficient to wait a finite, system-dependent and parameter-dependent computational time in order to measure q(∞). 6 Figure 2: The impact of hubs' social capital on their early-term influence, for the four main datasets analyzed here. The nodes are colored according to their ranking by influence; only the top-5% nodes by degree k are displayed. Differently from t = 2 (Panels A -- D) and t = ∞ (Panels J -- L), at t = 5 (Panels E -- H), the most influencer hubs are characterized by a larger social capital s: the dark-blue dots (top-50 spreaders) tend to accumulate to the right of the panels. By contrast, local clustering does not have a significant impact on node influence. Importantly, at a given finite time t, targeting the fast influencers (i.e., the nodes with the largest q(t) values) generally leads to a substantial gain in the reach of the process as compared to targeting the traditional, late-time influencers (i.e., the nodes with the largest q(∞) values). To illustrate this point, we define the relative gain RG(t) from targeting the time-dependent optimal influencers at time t as the difference between the average time-dependent influence Q(tt) of the top-0.5% nodes by q(t) and the average time-dependent influence Q(t∞) of the top 0.5 % nodes by q(∞), normalized by Q(t∞). In formulas, RG(t) := (Q(tt) − Q(t∞))/Q(t∞). Essentially, RG(t) quantifies how larger, at time t, are the outbreaks originated by the optimal influencers for time t as compared to the optimal late-time influencers. The relative gain is, by definition, larger than or equal to zero, and RG(t) → 0 as t → ∞. The observed values of RG(t) (see Fig. 3) indicate that the gains from targeting the optimal influencers for a given time are not marginal; for instance, at time t = 5 and for λ = 5 λc, we observed values of RG(t) as large as 4.41, 0.49, 0.03, and 0.83 in Amazon, Cond-mat, Email-Enron, and Facebook, respectively. Taken together, the results above demonstrate that when seeking to maximize the reach of a spreading process, one faces a trade-off: maximizing the long-term influence of the process (i.e., choosing the seed node with the largest q(∞)) does not provide the optimal influence maximization at a finite time. This property sets also time-dependent bounds to the performance of influencer identification metrics [9]: an ideal centrality metric that correlates perfectly with node late-time influence -- i.e., a metric with optimal performance according to the standard benchmarking of influencer identification methods [9] -- is only weakly correlated with node influence at early times. 3.2. Not all the hubs are fast influencers: the role of neighborhood structure After two steps of the dynamics, the degree of the nodes is the most relevant property to infer nodes' influence: indeed, we expect qi(2) = βki/N . The accurate correspondence is lost at longer times, when the local structure around the node of interest plays a non-negligible role, which results in a decreasing correlation between k and q(t) as a function of t (see Fig. 4). How to exploit network structure to quantify node influence at a time t > 2 such that 7 Figure 3: Relative gain RG(t) from targeting the top-0.5% nodes by q(t) as compared to targeting the top-0.5% nodes by q(∞), for the first 10 steps of the dynamics and the four largest networks analyzed here. By definition, the relative gain is always larger than or equal to zero (RG(t) → 0 for t → ∞). Importantly, at early times, we observe a relative gain that is substantially larger than one, which demonstrates that the processes initiated by the top-nodes by q(t) attain a substantially larger reach (improvement by 100%), at time t, than the processes initiated by the top-nodes by q(∞). the process has not yet reached its final state? In other words, which is the most accurate metric to estimate nodes' early-time influence? One would expect that at early times, it is sufficient to analyze local properties around the focal node. However, there are many structural properties that one could consider, and it is not clear a priori which is the most parsimonious way to accurately gauge node influence. Based on numerical simulations, previous studies [42, 43] have pointed out high local clustering as a detrimental property for the influence of a node. Analytically, one can estimate the expected influence of the nodes, which led to the Dynamics-Sensitive Centrality (DSC, see Methods) [32]; however, in principle, its computation requires a detailed knowledge of the parameters of the dynamics. On the other hand, here, we find that a parsimonious local property that determines node early-time influence is the sum of a node's degree and neighbors' degree: si = ki + (cid:88) j Aij kj. (10) We interpret this property as a centrality metric, which we refer to as social capital : according to it, a node is central if it has many connections (i.e., large degree), and if its contacts have many connections as well (i.e., large (cid:80) j Aij kj). Such a social capital function has been used in the context of strategic network formation model [44, 45], where it turns out that a social interaction dynamics where the agents seek to maximize their social capital s leads to highly-centralized network topologies [44]. The metric can be also interpreted as a special case of the Dynamics Sensitive Centrality [32] and of the Neighborhood-based centrality [23]. For t > 2, at early times, a temporal regime emerges where the time-dependent influence of the hubs can be accurately quantified by their social capital (see Fig. 2E-H for an illustration). The nodes with large social capital tend to achieve high early-time influence, regardless of their local clustering coefficient. At late times, the correspondence between node influence and social capital is either lost (see Fig. 2I,J,L) or, to some extent, maintained (see Fig. 2K). 8 Figure 4: Correlation between degree k and q(t) for the four largest networks analyzed here. The correlation tends to decrease with time. This set of observations suggests that social capital can be an effective method for the identification of fast influencers, a hypothesis that we validate below. 4. Fast and late-time influencer identification: benchmarking centrality metrics The goal of this Section is to benchmark the centrality metrics introduced in Section 2.2 with respect to their ability to single out the fast influencers (Section 4.1) and the late-time influencers (Section 4.2). Finally, we discuss the complementary nature of local and global centrality metrics (Section 4.3). 4.1. Identification of fast influencers In the following, we investigate the performance of different metrics for the vital nodes identification [9] at early times. We consider nine centrality metrics: degree, social capital (defined above), H-index, LocalRank, Dynamics Sensitive Centrality (DSC), k-core, eigenvector centrality, betweenness centrality, closeness centrality. We refer to the Methods section for all the definitions. To evaluate the metrics, we measure both the precision P0.5%(s, q(t)) of the ranking by the score s that they produce in identifying the top-0.5% nodes by influence q(t), and the Pearson's linear correlation coefficient r(s, q(t)) between their score s and node influence. In the following, we always normalize the observed values of correlations and precision by the correlation and precision values, respectively, achieved by the best-performing metric. In this Section, we focus on the identification of fast influencers, whereas Section 4.2 focuses on the identification of late-time influencers. Fig. 5 compares the correlation r(·, q(5)) between node influence at time 5 and node score achieved by the various centrality metrics, for the four largest analyzed networks. Social capital turns out to be always either the best performing metric or relatively close to the best. The DSC and the LocalRank centrality perform similarly well, yet they are marginally outperformed by the Social Capital centrality in Amazon. By contrast, the correlation values achieved by the other eight metrics are, at least once, smaller than half of the correlation achieved by the best-performing metric. Overall, local metrics substantially outperform global metrics -- the only exception is the 9 Figure 5: Metrics' ability to identify the fast influencers, as measured by the linear correlation between node influence q(5) after 5 steps of the dynamics and node score as determined by the nine centrality metrics considered here. The color scale ranges from dark red (zero correlation) to dark blue (correlation achieved by the best-performing metrics); the white color denotes half of the correlation achieved by the best-performing metric. For all the analyzed datasets and parameter values, the correlation achieved by Social Capital is always the largest one or close to the largest one. nearly-optimal performance of the eigenvector centrality in Email-Enron. Qualitatively similar results hold for the precision metric (see Appendix A). While Fig. 5 looked at a specific point in time (t = 5) for four empirical networks, two extensions of the analysis are essential. First, it is important to investigate the stability of the relative metrics' performance at early times. This aspect is the main topic of Section 4.3. Second, one can consider more datasets. We analyzed ten more networks, ending up with a total of 14 analyzed networks (the networks' details are reported in Table 1). We aggregated the performance of each metric over the 14 networks according to the following procedure. For each network D and metric m, we normalized the metric's correlation with node influence q(t), r(m, t;D), by the correlation rbest(t;D) achieved by the best-performing metric. Then, we averaged the metrics relative performance as D−1(cid:80)D r(m, t;D)/rbest(t;D), where D is the number of analyzed datasets. The results of this analysis (shown in Appendix B) are in qualitative agreement with our results in Fig. 5: at early times (t = 5), social capital, LocalRank and the DSC are, on average, the best performing metrics. 4.2. Identification of late-time influencers through centrality metrics At late times, the identification of the best-performing metric is strongly dataset-dependent and parameter- dependent. At the critical point, λ = λc, Social Capital, LocalRank the Dynamics Sensitive Centrality tend to be the best-performing metrics according to both precision (see Appendix A) and correlation (see Fig. 6). On the other hand, if λ is sufficiently large (e.g., λ = 5 λc), all metrics' precision sharply decreases after a sufficiently long time due to the fact that most nodes become infected, regardless of the seed node (see Appendix A). Even when this happens, it remains possible to discriminate the metrics' performance based on the correlation metric (see Fig. 6). The k-core's performance is maximal or nearly maximal for λ ≥ 5 λc; for both Cond-mat and Facebook, the closeness centrality performs optimally or nearly optimally for λ ≥ 5, which supports the competitiveness of distance-based centrality metrics for processes that are sufficiently far from the critical point [19]. Again, to obtain a broader understanding of the metrics' performance, one needs to consider more datasets. As a result of an analogous analysis to the one described in the last paragraph of Section 4.1, by analyzing 14 networks 10 Figure 6: Metrics' ability to identify the late-time influencers, as measured by the linear correlation between node late-time influence q(∞) and node score as determined by the nine centrality metrics considered here. The color scale ranges from dark red (zero correlation) to dark blue (correlation achieved by the best-performing metrics); the white color denotes half of the correlation achieved by the best- performing metric. k-core turns out to be competitive for a broad range of parameter values, yet it fails at the critical point λ = λc in Amazon. Despite its local nature, social capital is the only metric whose correlation did not fall below half of the best-performing correlation for any of the considered parameter values. in total, we find that at t → ∞, k-core and H-index are the most competitive metrics according to the average correlation (see Appendix B). The same does not hold for precision, where the metrics' performance is impaired by the fact that the late-time influence of most nodes approaches one. Again, closeness can only be competitive for sufficiently large values of λ. 4.3. The complementarity of local and global metrics In the previous results, we quantified the nodes' early-time influence through their influence at step t = 5, q(5). Yet, it is important to investigate the performance of the centrality metrics in the full (λ, t) plane. The results (shown in Figs. 7, C.11-C.12 in Appendix C) indicate the complementary nature of (well-performing) local and global metrics in quantifying node influence. While local metrics (degree, social capital, H-index, and LocalRank) achieve optimal or nearly optimal performance for small t and small λ, global metrics (k-core and closeness centrality) emerge as optimal or nearly optimal metrics in the parameter region that corresponds to large t and large λ. This scenario changes qualitatively for the precision metric. However, for the precision metric, the evaluation in the full parameter space is impaired by the fact that for some datasets, as node influence becomes close to one for most metrics, the precision of all the considered metrics is relatively low. This is evident in Figs. C.13-C.15 in Appendix C, where we use a black color to mark the parameter values where all the metrics achieve a precision value smaller than 10%. For the remaining parameter values (i.e., those where at least one metric is able to achieve a precision larger than 10%), local metrics (social capital, H-index, LocalRank) typically outperform global metrics (k-core, eigenvector, and closeness centrality). 5. Conclusions We have investigated the impact of time on the long-standing influence maximization problem, and performed an extensive benchmarking of centrality metrics based on their performance in the identification of both fast and late-time influencer nodes. Our results revealed that the early-time and late-time influence of a node can differ 11 Figure 7: Metrics' performance in the Cond-mat network as measured by their correlation with node influence at different times t and for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap (early time, processes close to the critical point), whereas global metrics like the k-core and closeness centrality tend to perform better in the upper-right corner of the heatmap (late time, processes sufficiently far from the critical point). A similar qualitative picture holds for other datasets (see Appendix C). substantially. Besides, a simple local metric -- which we referred to as social capital -- allows us to identify the fast influencers substantially better than global metrics, by using less information compared to existing local metrics (such as LocalRank [21] and Dynamics-Sensitive Centrality [32]). In the debate on the relative usefulness of local and global centralities [9, 20], our results indicate that local metrics generally outperform global metrics at early times and for processes with a small spreading rate, whereas global metrics may still outperform local metrics at late-times or for processes with a large spreading rate. Beyond epidemiological models, it remains open to investigate the fast influencer identification problem in complex contagion [12] and rumor spreading models [13, 46]. Nevertheless, the main message of our paper still holds: when assessing the performance of metrics for the influencer identification, nodes' early- and late-time influence can be only weakly correlated, which makes it critical to assess how the metrics' relative performance depends on the considered timescale. To conclude, our work investigated the essential role of time in the vital nodes identification problem. Our findings point out that given a complex network, the optimal late-time influencers might be suboptimal if we are interested maximizing the reach of a spreading process within a limited amount of time. An important future direction is the extension of these results to temporal networks [47], where metrics for node influence can be biased by temporal effects [34, 48], and memory effects have a fundamental impact on diffusion processes [29, 49] and epidemic spreading [47]. 12 Appendix A. Results for the precision metric Figure A.8: Metrics' ability to identify the fast influentials, as measured by the metrics' precision in identifying the top-0.5% nodes by short-time influence q(5). The color scale ranges from dark red (zero precision) to dark blue (precision achieved by the best-performing metrics); the white color denotes half of the precision achieved by the best-performing metric. All the metrics but Social Capital, LocalRank, and the DSC have at least one white or red box, which indicates that Social Capital is a parsimonious and effective method to identify the fast influentials. 13 Figure A.9: Metrics' ability to identify the late-time influentials, as measured by the metrics' precision in identifying the top-0.5% nodes by late-time influence q(∞). The color scale ranges from dark red (zero precision) to dark blue (precision achieved by the best-performing metrics); the white color denotes half of the precision achieved by the best-performing metric. We marked in black those parameter values for which no metric achieves a precision larger than 10%. k-core turns out to be competitive for a broad range of parameter values, yet it fails at the critical point λ = λc in Amazon. Despite its local nature, social capital is the only metric whose correlation did not fall below half of the best-performing correlation, for the considered parameter values. 14 Appendix B. Metrics' aggregate performance over 14 networks We follow the procedure described in the main text: For each dataset D and each metric m, we normalize the met- ric's correlation (with node influence) r(m;D) by the correlation rbest(D) achieved by the best-performing metric for that dataset. For each pair (λ, t), we obtain the average relative performance of the metric as D−1(cid:80) d∈D r(m;D)/rbest(D). We follow an analogous procedure for the metrics' precision. The results are shown and commented in Fig. B.10. Figure B.10: Average relative metrics' performance over all the datasets in Table 1. At early times (t = 5), social capital, LocalRank and the DSC emerge as the best performing metrics. At late times (t = ∞), k-core and H-index are the most competitive metrics according to correlation, whereas degree, Social Capital and H-index perform similarly well according to precision. The closeness centrality is only competitive for λ = 10 λc. 15 Appendix C. The complementarity of local and global metrics: Additional results Figure C.11: Metrics' performance in the Email-Enron network as measured by their correlation with node influence at different times t and for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap (early time, processes close to the critical point), whereas global metrics like the k-core and closeness centrality tend to perform better in the upper-right corner of the heatmap (late time, processes sufficiently far from the critical point). Figure C.12: Metrics' performance in the Facebook network as measured by their correlation with node influence at different times t and for different λ values. Local metrics like Social Capital and H-index tend to perform better in the lower-left corner of the heatmap (early time, processes close to the critical point), whereas global metrics like the k-core centrality tend to perform better in the upper-right corner of the heatmap (late time, processes sufficiently far from the critical point). 16 Figure C.13: Metrics' performance in the Cond-mat network as measured by their precision in identifying the top-0.5% nodes by influence at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics' precision is below 0.1. Figure C.14: Metrics' performance in the Email-Enron network as measured by their precision in identifying the top-0.5% nodes by influence at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics' precision is below 0.1. 17 Figure C.15: Metrics' performance in the Facebook network as measured by their precision in identifying the top-0.5% nodes by influence at different times t and for different λ values. The block color marks boxes that correspond to (λ, t) values where all the metrics' precision is below 0.1. 18 Acknowledgments We thank Flavio Iannelli for many enlightening discussions on the topic, and his feedback on an early version of the manuscript. This work has been supported by the National Natural Science Foundation of China (Grants Nos. 61673150, 11622538), the Science Strength Promotion Program of the UESTC, and the Zhejiang Provincial Natural Science Foundation of China (Grant no. LR16A050001). MSM acknowledges the University of Zurich for support through the URPP Social Networks. References [1] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, A. Vespignani, Epidemic processes in complex networks, Reviews of Modern Physics 87 (3) (2015) 925. [2] R. Peres, E. Muller, V. Mahajan, Innovation diffusion and new product growth models: A critical review and research directions, International Journal of Research in Marketing 27 (2) (2010) 91 -- 106. [3] D. Centola, The spread of behavior in an online social network experiment, Science 329 (5996) (2010) 1194 -- 1197. [4] E. Katz, P. F. Lazarsfeld, Personal influence: the part played by people in the flow of mass communications, Glencoe, IL: Free Press, (1955). [5] D. J. Watts, P. S. Dodds, Influentials, networks, and public opinion formation, Journal of Consumer Research 34 (4) (2007) 441 -- 458. [6] C. W. King, J. O. Summers, Overlap of opinion leadership across consumer product categories, Journal of Marketing Research (1970) 43 -- 50. [7] R. Tanase, C. J. Tessone, R. Algesheimer, Identification of influencers through the wisdom of crowds, PLOS ONE 13 (7) (2018) e0200109. [8] M. G. Nejad, D. L. Sherrell, E. Babakus, Influentials and influence mechanisms in new product diffusion: an integrative review, Journal of Marketing Theory and Practice 22 (2) (2014) 185 -- 208. [9] L. Lu, D. Chen, X.-L. Ren, Q.-M. Zhang, Y.-C. Zhang, T. Zhou, Vital nodes identification in complex networks, Physics Reports 650 (2016) 1 -- 63. [10] S. Pei, F. Morone, H. A. Makse, Theories for influencer identification in complex networks, in: Complex Spreading Phenomena in Social Systems, Springer (2018) 125 -- 148. [11] M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, H. A. Makse, Identification of influential spreaders in complex networks, Nature Physics 6 (11) (2010) 888 -- 893. [12] D. Kempe, J. Kleinberg, ´E. Tardos, Maximizing the spread of influence through a social network, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM (2003) 137 -- 146. [13] J. Borge-Holthoefer, Y. Moreno, Absence of influential spreaders in rumor dynamics, Physical Review E 85 (2) (2012) 026116. 19 [14] F. Morone, H. A. Makse, Influence maximization in complex networks through optimal percolation, Nature 524 (7563) (2015) 65. [15] L. Lu, T. Zhou, Q.-M. Zhang, H. E. Stanley, The h-index of a network node and its relation to degree and coreness, Nature Communications 7 (2016) 10168. [16] F. Radicchi, C. Castellano, Leveraging percolation theory to single out influential spreaders in networks, Physical Review E 93 (6) (2016) 062314. [17] F. Radicchi, C. Castellano, Fundamental difference between superblockers and superspreaders in networks, Phys- ical Review E 95 (1) (2017) 012318. [18] R. Pastor-Satorras, C. Castellano, Topological structure and the h index in complex networks, Physical Review E 95 (2) (2017) 022301. [19] F. Iannelli, M. S. Mariani, I. M. Sokolov, Influencers identification in complex networks through reaction-diffusion dynamics, Physical Review E 98 (6) (2018) 062302. [20] Y. Hu, S. Ji, Y. Jin, L. Feng, H. E. Stanley, S. Havlin, Local structure can identify and quantify influential global spreaders in large scale social networks, Proceedings of the National Academy of Sciences (2018) 201710547. [21] D. Chen, L. Lu, M.-S. Shang, Y.-C. Zhang, T. Zhou, Identifying influential nodes in complex networks, Physica A: Statistical Mechanics and its Applications 391 (4) (2012) 1777 -- 1787. [22] D.-B. Chen, R. Xiao, A. Zeng, Y.-C. Zhang, Path diversity improves the identification of influential spreaders, EPL (Europhysics Letters) 104 (6) (2014) 68006. [23] Y. Liu, M. Tang, T. Zhou, Y. Do, Identify influential spreaders in complex networks, the role of neighborhood, Physica A: Statistical Mechanics and its Applications 452 (2016) 289 -- 298. [24] G. F. De Arruda, A. L. Barbieri, P. M. Rodr´ıguez, F. A. Rodrigues, Y. Moreno, L. da Fontoura Costa, Role of centrality for the identification of influential spreaders in complex networks, Physical Review E 90 (3) (2014) 032812. [25] Z.-M. Ren, A. Zeng, D.-B. Chen, H. Liao, J.-G. Liu, Iterative resource allocation for ranking spreaders in complex networks, EPL (Europhysics Letters) 106 (4) (2014) 48005. [26] S. Helm, Viral marketing-establishing customer relationships by 'word-of-mouse', Electronic Markets 10 (3) (2000) 158 -- 161. [27] C. Shao, G. L. Ciampaglia, O. Varol, K.-C. Yang, A. Flammini, F. Menczer, The spread of low-credibility content by social bots, Nature Communications 9 (1) (2018) 4787. [28] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A.-L. Barab´asi, J. Saramaki, Small but slow world: How network topology and burstiness slow down spreading, Physical Review E 83 (2) (2011) 025102. [29] I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, F. Schweitzer, Causality-driven slow-down and speed-up of diffusion in non-markovian temporal networks, Nature Communications 5 (2014) 5024. 20 [30] T. Zhou, J.-G. Liu, W.-J. Bai, G. Chen, B.-H. Wang, Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity, Physical Review E 74 (5) (2006) 056109. [31] N. A. Christakis, J. H. Fowler, Social network sensors for early detection of contagious outbreaks, PLOS ONE 5 (9) (2010) e12948. [32] J.-G. Liu, J.-H. Lin, Q. Guo, T. Zhou, Locating influential nodes via dynamics-sensitive centrality, Scientific Reports 6 (2016). [33] L. C. Freeman, Centrality in social networks conceptual clarification, Social Networks 1 (3) (1978) 215 -- 239. [34] H. Liao, M. S. Mariani, M. Medo, Y.-C. Zhang, M.-Y. Zhou, Ranking in evolving complex networks, Physics Reports 689 (2017) 1 -- 54. [35] M. Newman, Networks, Oxford University Press, (2018). [36] P. Bonacich, P. Lloyd, Eigenvector-like measures of centrality for asymmetric relations, Social networks 23 (2001) 193 -- 194. [37] U. Brandes, A faster algorithm for betweenness centrality, Journal of Mathematical Sociology 25 (2001). [38] http://konect.uni-koblenz.de/networks/com-amazon, accessed: 2018-10-01. [39] http://networkscience.cn/index.php/data/, accessed: 2018-10-01. [40] http://networkscience.cn/index.php/data/, accessed: 2018-10-01. [41] http://konect.uni-koblenz.de/networks/facebook-wosn-links, accessed: 2018-10-01. [42] D.-B. Chen, H. Gao, L. Lu, T. Zhou, Identifying influential nodes in large-scale directed networks: the role of clustering, PloS one 8 (10) (2013) e77455. [43] R. Peres, The impact of network characteristics on the diffusion of innovations, Physica A: Statistical Mechanics and Its Applications 402 (2014) 330 -- 343. [44] M. Bardoscia, G. De Luca, G. Livan, M. Marsili, C. J. Tessone, The social climbing game, Journal of statistical physics 151 (3-4) (2013) 440 -- 457. [45] M. D. Konig, C. J. Tessone, Y. Zenou, Nestedness in networks: A theoretical model and some applications, Theoretical Economics 9 (3) (2014) 695 -- 752. [46] J. Borge-Holthoefer, S. Meloni, B. Gon¸calves, Y. Moreno, Emergence of influential spreaders in modified rumor models, Journal of Statistical Physics 151 (1-2) (2013) 383 -- 393. [47] P. Holme, Temporal network structures controlling disease spreading, Physical Review E 94 (2) (2016) 022305. [48] M. S. Mariani, M. Medo, Y.-C. Zhang, Ranking nodes in growing networks: When pagerank fails, Scientific Reports 5 (2015) 16181. [49] J. Xu, T. L. Wickramarathne, N. V. Chawla, Representing higher-order dependencies in networks, Science advances 2 (5) (2016) e1600028. 21
1611.01890
5
1611
2017-07-10T19:20:02
OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks
[ "cs.SI", "physics.soc-ph" ]
Urban scholars have studied street networks in various ways, but there are data availability and consistency limitations to the current urban planning/street network analysis literature. To address these challenges, this article presents OSMnx, a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable and sound from the perspectives of graph theory, transportation, and urban design. OSMnx contributes five significant capabilities for researchers and practitioners: first, the automated downloading of political boundaries and building footprints; second, the tailored and automated downloading and constructing of street network data from OpenStreetMap; third, the algorithmic correction of network topology; fourth, the ability to save street networks to disk as shapefiles, GraphML, or SVG files; and fifth, the ability to analyze street networks, including calculating routes, projecting and visualizing networks, and calculating metric and topological measures. These measures include those common in urban design and transportation studies, as well as advanced measures of the structure and topology of the network. Finally, this article presents a simple case study using OSMnx to construct and analyze street networks in Portland, Oregon.
cs.SI
cs
OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks Geoff Boeing Email: [email protected] Department of City and Regional Planning University of California, Berkeley May 2017 Abstract five significant capabilities Urban scholars have studied street networks in various ways, but there are data availability and consistency limitations to the current urban planning/street network analysis literature. To address these challenges, this article presents OSMnx, a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable and sound from the perspectives of graph theory, transportation, and urban design. OSMnx contributes for researchers and practitioners: first, the automated downloading of political boundaries and building footprints; second, the tailored and automated downloading from OpenStreetMap; third, the algorithmic correction of network topology; fourth, the ability to save street networks to disk as shapefiles, GraphML, or SVG files; and fifth, the ability to analyze street networks, including calculating routes, projecting and visualizing networks, and calculating metric and topological measures. These measures include those common in urban design and transportation studies, as well as advanced measures of the structure and topology of the network. Finally, this article presents a simple case study using OSMnx to construct and analyze street networks in Portland, Oregon. street network data and constructing of This is a preprint. Download the published article at: http://geoffboeing.com/publications/osmnx-complex- street-networks/ Cite as: Boeing, G. 2017. "OSMnx: New Methods for Acquiring, Constructing, Analyzing, and Visualizing Complex Street Networks." Computers, Environment and Urban Systems 65, 126-139. doi:10.1016/j.compenvurbsys.2017.05.004 BOEING 1. Introduction Urban scholars and planners have studied street networks in numerous ways. Some studies focus on the urban form (e.g., Southworth and Ben-Joseph 1997; Strano et al. 2013), others on transportation (e.g., Marshall and Garrick 2010; Parthasarathi et al. 2013), and others on the topology, complexity, and resilience of street networks (e.g., Jiang and Claramunt 2004; Porta et al. 2006). This article argues that current limitations of data availability, consistency, and technology have made researchers' work gratuitously difficult. In turn, this empirical literature often suffers from four shortcomings which this article examines: small sample sizes, excessive network simplification, difficult reproducibility, and the lack of consistent, easy-to-use research tools. These shortcomings are by no means fatal, but their presence limits the scalability, generalizability, and interpretability of empirical street network research. To address these challenges, this article presents OSMnx, a new tool that easily downloads and analyzes street networks for anywhere in the world. OSMnx contributes five primary capabilities for researchers and practitioners. First, it enables automated and on-demand downloading of political boundary geometries, building footprints, and elevations. Second, it can automate and customize the downloading of street networks from OpenStreetMap and construct them into multidigraphs. Third, it can correct and simplify network topology. Fourth, it can save/load street networks to/from disk in various file formats. Fifth and finally, OSMnx has built-in functions to analyze street networks, calculate routes, project and visualize networks, and quickly and consistently calculate various metric and topological measures. These measures include those common in urban design and transportation studies, as well as advanced measures of the structure and topology of the network. This article is organized as follows. First, it introduces the background of networks, street network analysis and representation, and the current landscape of tools for this type of research. Then it discusses shortcomings and current challenges, situated in the empirical literature. Next, it introduces OSMnx and its methodological contributions. Finally, it presents a simple illustrative case study using OSMnx to construct and analyze street networks in Portland, Oregon, before concluding with a discussion. 2. Background Street network analysis has been central to network science since its nascence: its mathematical foundation, graph theory, was born in the 18th century when Leonhard Euler presented his famous Seven Bridges of Königsberg problem. Here we briefly trace the fundamentals of modern street network research from graphs to networks to the present landscape of research toolkits, in order to identify current limitations. 2.1. Graphs and networks Network science is built upon the foundation of graph theory, a branch of discrete mathematics. A graph is an abstract representation of a set of elements and the connections between them (Trudeau 1994). The elements are interchangeably called vertices or nodes, and the connections between them are called links or edges. For consistency, this article uses the terms nodes and edges. The number of nodes in the graph (called the degree of the graph) is commonly represented as n and the number of edges as m. Two nodes are adjacent if an edge connects them, 2 BOEING two edges are adjacent if they share the same node, and a node and an edge are incident if the edge connects the node to another node. A node's degree is the number of edges incident to the node, and its neighbors are all those nodes to which the node is connected by edges. An undirected graph's edges point mutually in both directions, but a directed graph, or digraph, has directed edges (i.e., edge uv points from node u to node v, but there is not necessarily a reciprocal edge vu). A self-loop is an edge that connects a single node to itself. Graphs can also have parallel (i.e., multiple) edges between the same two nodes. Such graphs are called multigraphs, or multidigraphs if they are directed. An undirected graph is connected if each of its nodes can be reached from any other node. A digraph is weakly connected if the undirected representation of the graph is connected, and strongly connected if each of its nodes can be reached from any other node. A path is an ordered sequence of edges that connects some ordered sequence of nodes. Two paths are internally node- disjoint if they have no nodes in common, besides end points. A weighted graph's edges have a weight attribute to quantify some value, such as importance or impedance, between connected nodes. The distance between two nodes is the number of edges in the path between them, while the weighted distance is the sum of the weight attributes of the edges in the path. While a graph is an abstract mathematical representation of elements and their connections, a network may be thought of as a real-world graph. Networks inherit the terminology of graph theory. Familiar examples include social networks (where the nodes are humans and the edges are their interpersonal relationships) and the World Wide Web (where the nodes are web pages and the edges are hyperlinks that point from one to another). A complex network is one with a nontrivial topology (the configuration and structure of its nodes and edges) – that is, the topology is neither fully regular nor fully random. Most large real-world networks are complex (Newman 2010). Of particular interest to this study are complex spatial networks – that is, complex networks with nodes and/or edges embedded in space (O'Sullivan 2014). A street network is an example of a complex spatial network with both nodes and edges embedded in space, as are railways, power grids, and water and sewage networks (Barthélemy 2011). 2.2. Representation of street networks A spatial network is planar if it can be represented in two dimensions with its edges intersecting only at nodes. A street network, for instance, may be planar (particularly at certain small scales), but most street networks are non-planar due to grade-separated expressways, overpasses, bridges, and tunnels. Despite this, most quantitative studies of urban street networks represent them as planar (e.g., Buhl et al. 2006; Cardillo et al. 2006; Barthélemy and Flammini 2008; Masucci et al. 2009; Strano et al. 2013) for tractability because bridges and tunnels are reasonably uncommon (in certain places) – thus the networks are approximately planar. However, this over- simplification to planarity for tractability may be unnecessary and can cause analytical problems, as we discuss shortly. The street networks discussed so far are primal: the graphs represent intersections as nodes and street segments as edges. In contrast, a dual graph (namely, the edge-to-node dual graph, also called the line graph) inverts this topology: it represents a city's streets as nodes and intersections as edges (Porta et al. 2006). Such a representation may seem a bit odd but provides certain advantages in analyzing the network topology based on named streets (Crucitti et al. 2006). Dual graphs form the foundation of space syntax, a method of analyzing urban networks and 3 BOEING configuration via axial street lines and the depth from one edge to others (Hillier et al. 1976; cf. Ratti 2004). Jiang and Claramunt (2002) integrate an adapted space syntax – compensating for difficulties with axial lines – into computational GIS. Space syntax has formed the basis of various other adapted approaches to analytical urban design (e.g., Karimi 2012). This present article, however, focuses on primal graphs because they retain all the geographic, spatial, metric information essential to urban form and design that dual representations discard: all the geographic, experiential traits of the street (such as its length, shape, circuity, width, etc.) are lost in a dual graph. A primal graph, by contrast, can faithfully represent all the spatial characteristics of a street. Primal may be a better approach for analyzing spatial networks when geography matters, because the physical space underlying the network contains relevant information that cannot exist in the network's topology alone (Ratti 2004). 2.3. Street network analysis Street networks – considered here as primal, non-planar, weighted multidigraphs with self-loops – can be characterized and described by metric and topological measures. Extended definitions and algorithms can be found in, e.g., Newman (2010) and Barthélemy (2011). Metric structure can be measured in terms of length and area and represents common transportation/design variables (e.g., Cervero and Kockelman 1997; Ewing and Cervero 2010). Average street length, the mean edge length (in spatial units such as meters) in the undirected representation of the graph, serves as a linear proxy for block size and indicates how fine-grained or coarse-grained the network is. Node density is the number of nodes divided by the area covered by the network. Intersection density is the node density of the set of nodes with more than one street emanating from them (thus excluding dead-ends). The edge density is the sum of all edge lengths divided by the area, and the physical street density is the sum of all edges in the undirected representation of the graph divided by the area. These density measures all provide further indication of how fine-grained the network is. Finally, the average circuity divides the sum of all edge lengths by the sum of the great-circle distances between the nodes incident to each edge (cf. Giacomin and Levinson 2015). This is the average ratio between an edge length and the straight-line distance between the two nodes it links. The eccentricity of a node is the maximum of the shortest-path weighted distances between it and each other node in the network. This represents how far the node is from the node that is furthest from it. The diameter of a network is the maximum eccentricity of any node in the network and the radius of a network is the minimum eccentricity of any node in the network. The center of a network is the node or set of nodes whose eccentricity equals the radius and the periphery of a network is the node or set of nodes whose eccentricity equals the diameter. When weighted by length, these distances indicate network size and shape in units such as meters. Topological measures of street network structure indicate the configuration, connectedness, and robustness of the network – and how these characteristics are distributed. The average node degree, or mean number of edges incident to each node, quantifies how well the nodes are connected on average. Similarly, but more concretely, the average streets per node measures the mean number of physical streets (i.e., edges in the undirected representation of the graph) that emanate from each intersection and dead-end. This adapts the average node degree for physical form rather than directed circulation. The statistical and spatial distributions of number of streets 4 BOEING per intersection characterize the type, prevalence, and dispersion of intersection connectedness in the network. Connectivity measures the minimum number of nodes or edges that must be removed from a connected graph to disconnect it. This is a measure of resilience as complex networks with high connectivity provide more routing choices to agents and are more robust against failure. However, node and edge connectivity is less useful for approximately planar networks like street networks: most street networks will have connectivity of 1, because the presence of a single dead- end means the removal of just one node or edge can disconnect the network. More usefully, the average node connectivity of a network – the mean number of internally node-disjoint paths between each pair of nodes in the graph – represents the expected number of nodes that must be removed to disconnect a randomly selected pair of non-adjacent nodes (Beineke et al. 2002). As O'Sullivan (2014) discusses, network distances, degrees, and connectivity are significantly constrained by spatial embeddedness and approximate planarity. Other measures of connectedness – such as intersection density, node degree distribution, and centrality/clustering (discussed below) – may better capture the nature of a street network's connectedness than node or edge connectivity can. Networks with low connectedness may have multiple single points of failure, leaving the system particularly vulnerable to perturbation. This can be seen in urban design through permeability and choke points: if circulation is forced through single points of failure, traffic jams can ensue and circulation networks can fail. Connectedness has also been linked to street network pedestrian volume (Hajrashouliha and Yin 2015). Clustering measures also reveal topological structure and its distribution. The clustering coefficient of a node is the ratio of the number of edges between its neighbors to the maximum possible number of edges that could exist between these neighbors. The weighted clustering coefficient weights this ratio by edge length and the average clustering coefficient is the mean of the clustering coefficients of all the nodes in the network. These measure connectedness and complexity by how thoroughly the neighborhood of some node is linked together. Jiang and Claramunt (2004) extend this coefficient to neighborhoods within an arbitrary distance to make it more applicable to urban street networks. Centrality indicates the importance of nodes in a network. Betweenness centrality evaluates the number of shortest paths that pass through each node or edge (Barthélemy 2004). The maximum betweenness centrality in a network specifies the proportion of shortest paths that pass through the most important node/edge. This is an indicator of resilience: networks with a high maximum betweenness centrality are more prone to failure or inefficiency should this single choke point fail. The average betweenness centrality is the mean of all the betweenness centralities in the network (Barthélemy 2011). Barthélemy et al. (2013) use betweenness centrality to identify top- down interventions versus bottom-up self-organization and evolution of Paris's urban fabric. Closeness centrality represents, for each node, the reciprocal of the sum of the distance from this node to all others in the network: that is, nodes rank as more central if they are on average closer to all other nodes. Finally, PageRank – the algorithm Google uses to rank web pages – is a variant of network centrality, namely eigenvector centrality (Brin and Page 1998). PageRank ranks nodes based on the structure of incoming links and the rank of the source node, and may also be applied to street networks (Agryzkov et al. 2012; Chin and Wen 2015). 5 BOEING 2.4. Current tool landscape Several tools exist to study street networks. ESRI provides an ArcGIS Network Analyst extension, for which Sevtsuk and Mekonnen (2012) developed the Urban Network Analysis Toolkit plug-in. QGIS, an open-source alternative, also provides limited capabilities through built-in plug-ins. GIS tools generally provide very few network analysis capabilities, such as shortest path calculations. In contrast, network analysis software – such as Gephi, igraph, and graph-tool – provides minimal GIS functionality to study spatial networks. Pandana is a Python package that performs accessibility queries over a spatial network, but does not support other graph-theoretic network analyses (Foti 2014). NetworkX is a Python package for general network analysis, developed by researchers at Los Alamos National Laboratory. It is free, open-source, and able to analyze networks with millions of nodes and edges (Hagberg and Conway 2010). Street network data comes from many sources – including city, state, and national data repositories – and typically in shapefile format. Expensive proprietary data sources such as HERE NAVSTREETS and TomTom MultiNet also exist. In the US, the census bureau provides free TIGER/Line (Topologically Integrated Geographic Encoding and Referencing) shapefiles of geographic data such as cities, census tracts, roads, buildings, and certain natural features. However, TIGER/Line roads shapefiles suffer from inaccuracies (Frizelle et al. 2009), contain quite coarse-grained classifiers (e.g., classifying parking lots as alleys), and topologically depict bollarded intersections as through-streets, which problematizes routing. Furthermore, there is no central repository of worldwide street network data, which can be inconsistent, difficult, or impossible for researchers to obtain in many countries. OpenStreetMap – a collaborative mapping project that provides a free and publicly editable map of the world – has emerged in recent years as a major player both for mapping and for acquiring spatial data (Corcoran et al. 2013; Jokar Arsanjani 2015). Inspired by Wikipedia's mass- collaboration model, the project started in 2004 and has grown to over two million users today. Its data quality is generally quite high (Girres and Touya 2010; Haklay 2010; Barron et al. 2014) and although data coverage varies worldwide, it is generally good when compared to corresponding estimates from the CIA World Factbook (Maron 2015). In the US, OpenStreetMap imported the 2005 TIGER/Line roads in 2007 as a foundational data source (Zielstra et al. 2013). Since then, numerous corrections and improvements have been made. But more importantly, many additions have been made beyond what TIGER/Line captures, including pedestrian paths through parks, passageways between buildings, bike lanes and routes, and richer attribute data describing the characteristics of features, such as finer-grained codes for classifying arterial roads, collector streets, residential streets, alleys, parking lots, etc. There are several methods of acquiring street network data from OpenStreetMap. First, OpenStreetMap provides an API, called Overpass, which can be queried programmatically to retrieve any data in the database: streets and otherwise. However, its usage and syntax are notoriously challenging and several services have sprung up to simplify the process. Mapzen extracts chunks of OpenStreetMap data constrained to bounding boxes around 200 metropolitan areas worldwide. They also provide custom extracts, which can take up to an hour to run. Mapzen works well for simple bounding boxes around popular cities, but otherwise does not provide an easily scalable or customizable solution. Geofabrik similarly provides data extracts, generally at the national or sub-national scale, but provides shapefiles as a paid service. 6 BOEING Finally, GISF2E is a tool (compatible with ArcGIS and an outdated version of Python) that can convert shapefiles (such as Mapzen or Geofabrik extracts) into graph-theoretic network data sets (Karduni et al. 2016). Its creators provide processed shapefiles for several cities online but with some limitations. While GISF2E shapefiles' roads have a flag denoting one-way streets, it discards to and from nodes, thus making it unclear in which direction the one-way goes. It also can treat nodes inconsistently due to arbitrary break points between OpenStreetMap IDs or line digitization. OpenStreetMap IDs sometimes map 1-to-1 with a named street, but other times a named street might comprise multiple OpenStreetMap IDs. Further, some streets have arbitrary "nodes" in the middle of a segment because the OpenStreetMap ID is different on either side. 2.5. Research problem Due to the preceding limitations of street network data availability, consistency, and technology, the empirical literature often suffers from four shortcomings. First, the sample sizes in cross- sectional studies tend to be quite small due to clear challenges in acquiring large data sets. Most cross-sectional studies tend to analyze somewhere between 10 and 50 or so networks for tractability at the city or neighborhood scale (e.g., Buhl et al. 2006; Cardillo et al. 2006; Jiang 2007; Marshall and Garrick 2010; Strano et al. 2013; Giacomin and Levinson 2015). Acquiring and assembling large numbers of street networks consistently from data sources spread across various governmental entities can be extremely difficult and time-consuming. However, small sample sizes can limit the representativeness and reliability of findings. Second, studies usually simplify the representation of the street network to a planar or undirected graph for tractability (e.g., Buhl et al. 2006; Cardillo et al. 2006; Barthélemy and Flammini 2008; Masucci et al. 2009). Typically, researchers assemble street networks into some sort of graph- theoretic object from GIS data, for instance by splitting the centerlines of all the streets in a study area wherever they cross in two dimensions. These split lines become edges and the splitting points become nodes. However, this method presumes a planar graph: bridges and tunnels become splitting points (and thus nodes) even if the streets do not actually intersect in three dimensions. Unless the street network is truly planar, a planar simplification is thus a less-than- ideal representation that potentially yields inaccurate metrics, underestimates the lengths of edges, and overestimates the number of nodes. This may reasonably represent a street network in a European medieval city center, but poorly represents the street network in a city like Los Angeles with numerous grade-separated expressways, bridges, and tunnels in a truly non-planar network. Karduni et al. (2016) suggest the importance of using GIS attribute data to identify such non-planar features to create a correct topology. The third problem is replicability. The dozens of decisions that go into analysis – such as spatial extents, topological simplification and correction, definitions of nodes and edges, etc. – are often ad hoc or only partially reported, making reproducibility challenging. Some studies gloss over the precise details of how their street networks were constructed (frequently due to some combination of methodological complexity and journal word limits), yet numerous unreported decisions had to be made in the process. For example, various studies examine cities out to the urban periphery, but do not explain precisely how and where this periphery is defined (e.g., Strano et al. 2013). Some studies do not report if their networks are directed or undirected (e.g., Porta et al. 2006; Strano et al. 2013). Directedness may not matter for pedestrian studies but substantially impacts the interpretation of various network statistics when directedness does matter (e.g., for drivable networks). Further, what are edges in the street network? Drivable streets? Pedestrian paths? What is a node in the street network? Is it where at least two different 7 BOEING named streets come together? Does it denote any junction of routes? What about dead-ends? Different studies make different but perfectly valid decisions with these various questions (e.g., Frizelle et al. 2009; Marshall and Garrick 2010; Sevtsuk and Mekonnen 2012). Their definitions impact how we interpret various calculated features like degrees or intersection densities, and any research design decisions that go unreported can problematize replicability, interpretation, and generalizability. Fourth, as discussed, the current landscape of tools and methods offers no ideal technique that balances usability, customizability, reproducibility, and scalability in acquiring, constructing, and analyzing network data. Taken together, these limitations make street network researchers' work difficult and can circumscribe the conclusions that may be drawn from the effort. 3. OSMnx: Functionality and comparison to existing tools To address these challenges, this article presents a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable, and sound from the perspectives of graph theory, transportation, and urban design. OSMnx is a free, open-source Python package that downloads political/administrative boundary geometries, building footprints, and street networks from OpenStreetMap. It enables researchers to easily construct, project, visualize, and analyze non-planar complex street networks consistently by constructing a city's or neighborhood's walking, driving, or biking network with a single line of Python code – including node elevations and street grades. Python was chosen because the language is popular, easy for beginners, powerful, fast, free, and open-source. OSMnx is built on top of Python's NetworkX, matplotlib, and geopandas libraries for rich network analytic capabilities, beautiful and simple visualizations, and fast spatial queries with R-tree indexing. This section discusses OSMnx's primary features in order. 3.1. Acquire political boundaries and building footprints To acquire place boundary GIS data, researchers typically must locate and download shapefiles online. However, bulk or automated acquisition (such as that required to analyze hundreds or thousands of separate geographies) requires clicking through numerous web pages to download shapefiles one at a time. With OSMnx, one can download place geometries from OpenStreetMap for anywhere in the world with a single line of Python code, and project and visualize in one more line of code (Figure 1). To project, OSMnx calculates UTM zones algorithmically based on the centroid of the geometry. One can easily acquire geometries for multiple place types, such as neighborhoods, boroughs, counties, states, or nations – any place geometry available in OpenStreetMap. Or, one can pass multiple places in a single query to construct multiple features of cities, states, counties, nations, or any other geographic entities, and the results can be saved as shapefiles to a hard drive. Similarly, building footprints can be retrieved for anywhere that OpenStreetMap has such data. 3.2. Download and construct street networks The primary use of OSMnx is the easy downloading and construction of street networks. To acquire street network GIS data, one must typically track down TIGER/Line roads from the US census bureau – or individual data sets from other countries or cities, as TIGER/Line provides no street network data for geographies outside the US – then convert the data to graph-theoretic 8 BOEING objects. However, this becomes preventively burdensome for large numbers of separate street networks as it does not lend itself to bulk, automated analysis. Further, it ignores informal paths and pedestrian circulation that TIGER/Line lacks. In contrast, OSMnx handles all of these use cases. OSMnx downloads street network data and builds topologically-corrected street networks, projects and plots the networks, and saves them as SVGs, GraphML files, or shapefiles for later use. The street networks are primal, non-planar, weighted multidigraphs with self-loops and they preserve one-way directionality. One can download a street network by providing OSMnx any of the following queries (Figure 2):  bounding box  latitude-longitude point plus distance in meters (either a distance along the network or a distance in each cardinal direction from the point)  address plus distance in meters (either a distance along the network or a distance in each cardinal direction from the point)  polygon of the desired street network's boundaries  place name or list of place names One can also specify different network types to clarify what is an edge in the network:  drive: get drivable public streets (but not service roads)  drive_service: get drivable public streets including service roads  walk: get all streets and paths that pedestrians can use (this network type ignores one-way directionality by always connecting adjacent nodes with reciprocal directed edges)  bike: get all streets and paths that cyclists can use  all: download all (non-private) OpenStreetMap streets and paths  all_private: download all OpenStreetMap streets and paths, including private-access When passed a place name (as in Figure 3), OSMnx geocodes it using OpenStreetMap's Nominatim API and constructs a polygon from its boundary geometry. It then buffers this polygon by 500 meters and downloads the street network data within this buffer from OpenStreetMap's Overpass API. Next it constructs the street network from this data. For one- way streets, directed edges are added from the origin node to the destination node. For bidirectional streets, reciprocal directed edges are added in both directions between nodes. Then OSMnx corrects the topology (discussed below), calculates accurate degrees and node types, then truncates the network to the original, desired polygon. This ensures that intersections are not considered dead-ends simply because an incident edge connects to a node outside the desired polygon. Finally, node elevation data and street grades may be added to the network from the Google Maps Elevation API in one more line of code. Researchers can request a street network within a borough, county, state, or other geographic entity – or pass a list of places, such as several neighboring cities, to create a unified street network within the union of their geometries. In general, US roads GIS data is fairly easy to acquire, thanks to TIGER/Line shapefiles. OSMnx makes it easier by downloading it and turning it into a graph with a single line of code, and better by supplementing it with all the additional data (both attributes and non-road routes) from OpenStreetMap. With OSMnx, researchers can just as easily acquire street networks from anywhere in the world – including places in the Global South where such data might otherwise be inconsistent or difficult to acquire (Figure 4). 9 BOEING Figure 1. Administrative boundary vector geometries retrieved for A) the city of Berkeley, California and B) the nations of Zambia, Zimbabwe, and Botswana. Figure 2. Three graphs from the same street network at the same scale, created by address and network distance (left), bounding box (center), and neighborhood polygon (right). 10 BOEING Figure 3. The drivable street network for municipal Los Angeles, created by simply passing the query phrase "Los Angeles, CA, USA" into OSMnx. 11 BOEING Figure 4. OSMnx street networks automatically downloaded and visualized for A) Modena, Italy, B) Belgrade, Serbia, C) central Maputo, Mozambique, and D) central Tunis, Tunisia. 3.3. Correct and simplify network topology OSMnx performs topological correction and simplification automatically under the hood, but it is useful to inspect how it works. Simplification is essential for a correct topology because OpenStreetMap nodes are inconsistent: they comprise intersections, dead-ends, and all the points along a single street segment where the street curves (see also Neis et al. 2011 for a discussion of other topological errors). The latter are not nodes in the graph-theoretic sense, so we remove them algorithmically and consolidate each resulting set of sub-edges between "true" network nodes (i.e., intersections and dead-ends) into single unified edges. These unified edges between intersections retain the full spatial geometry of the consolidated sub-edges and their relevant attributes, such as the length of the street segment. 12 BOEING OSMnx provides different simplification modes that offer fine-grained control to define nodes rigorously and reproducibly. In strict simplification mode, a node is either: 1. where an edge dead-ends, or 2. the point from which an edge self-loops, or 3. the intersection of multiple streets where at least one of the streets continues through the intersection (i.e., if two streets dead-end at the same point, creating an elbow, the point is not considered a node, but rather just a turn in a path) In non-strict mode, the first two conditions remain the same, but the third is relaxed to allow nodes at the intersection of two streets, even if both streets dead-end there, as long as the streets have different OpenStreetMap IDs. A node is always retained at any point where a street changes from one-way to two-way. Figure 5. A) the original network, B) non-graph-theoretic nodes highlighted in red and true nodes in blue, C) strictly simplified network, with self-loops noted in magenta, D) non-strictly simplified network. Figure 5 illustrates the topological simplification process. When we first download and assemble the street network from OpenStreetMap, it appears as depicted in Figure 5a. Then OSMnx automatically simplifies this network to only retain the nodes that represent the junction of multiple routes. First, it identifies all non-intersection nodes (i.e., all those that simply form an expansion graph), as depicted in Figure 5b. Then it removes them, but faithfully maintains the spatial geometry and attributes of the street segment between the true intersection nodes. In 13 BOEING Figure 5c, all the non-intersection nodes have been removed, all the true nodes (dead-ends and junctions of multiple streets) remain in blue, and self-loop nodes are in magenta. In strict mode, OSMnx considers two-way intersections to be topologically identical to a single street that bends around a curve. Conversely, to retain these intersections when the incident edges have different OSM IDs, we use non-strict mode as depicted in Figure 5d. 3.4. Save street networks to disk OSMnx can save a street network to disk as a GraphML file (an open, standard format for serializing graphs) to work with later in software such as Gephi or NetworkX. It can also save the network as shapefiles of nodes and edges to work with in any GIS. When saving as shapefiles, the network is simplified to an undirected representation, but one-way directionality and origin/destination nodes are preserved as edge attributes for GIS routing applications. OSMnx can also save street networks as scalable vector graphics (SVG) files for design work in Adobe Illustrator (Figure 6). OSMnx can also load preexisting GraphML files, so it is not limited to acquiring network data exclusively from OpenStreetMap. Figure 6. Street network for metropolitan New York from OSMnx saved and loaded in QGIS as a shapefile (above) and in Adobe Illustrator as SVG (below). 14 BOEING 3.5. Analyze street networks OSMnx analyzes networks and calculates network statistics, including spatial metrics based on geographic area or weighted by distance (Table 1). With a single command, OSMnx calculates the individual nodes' average neighborhood degrees (weighted and unweighted), betweenness centralities, closeness centralities, degree centralities, clustering coefficients (weighted and unweighted), PageRanks, and the entire network's intersection count, intersection density, average betweenness centrality, average closeness centrality, average degree centrality, eccentricity, diameter, radius, center, periphery, node connectivity, average node connectivity, edge connectivity, average circuity, edge density, total edge length, average edge length, average degree, number of edges, number of nodes, node density, maximum and minimum PageRank values and corresponding nodes, the proportion of edges that self-loop, linear street density, total street length, average street length, number of street segments, average number of street segments per node, and the counts and proportions of node types (i.e., dead-ends, 3-way intersections, 4- way intersections, etc.). OSMnx can calculate and plot shortest-path routes between points or addresses, taking one-way streets into account (Figure 7). These shortest paths can be weighted by distance, travel time (assuming the availability of speed data), or any other impedance. For example, since OSMnx can automatically calculate street grades, shortest paths can minimize elevation change rather than trip distance. Moreover, the ability to calculate origin-destination distance matrices is built into NetworkX. OSMnx can also visualize street segments by length to provide a sense of where a city's longest and shortest blocks are distributed, or one-way versus two-way edges to provide a sense of where a city's one-way streets and divided roads are distributed. Researchers can quickly visualize the spatial distribution of dead-ends (or intersections of any type) in a city to get a sense of these points of network disconnectivity (Figure 8). Jacobs (1995) compared several cities' urban forms through figure-ground diagrams of one square mile of each's street network. We can re-create this automatically and computationally with OSMnx (Figure 9). These figure- ground diagrams are created completely with OSMnx and its network plotting function. To summarize, OSMnx allows researchers and planners to download spatial geometries and construct, project, visualize, and analyze complex street networks. It automates the collection and computational analysis of street networks for powerful and consistent research, transportation engineering, and urban design. The following section illustrates its functionality with a simple case study. Measure n m average node degree intersection count average streets per node counts of streets per node proportions of streets per node total edge length average edge length total street length average street length Definition number of nodes in network number of edges in network mean number of inbound and outbound edges incident to the nodes number of intersections in network mean number of physical streets that emanate from each node (intersections and dead-ends) a dictionary with keys = the number of streets emanating from the node, and values = the number of nodes with this number a dictionary, same as above, but represents a proportion of the total, rather than raw counts sum of edge lengths in network (meters) mean edge length in network (meters) sum of edge lengths in undirected representation of network mean edge length in undirected representation of network (meters) 15 BOEING number of edges in undirected representation of network n divided by area in square kilometers total edge length divided by area in square kilometers total street length divided by area in square kilometers total edge length divided by sum of great circle distances between the nodes incident to each edge proportion of edges that have a single incident node (i.e., the edge links nodes u and v, and u=v) mean degree of nodes in the neighborhood of each node mean degree of nodes in the neighborhood of each node, weighted by edge length mean of all weighted average neighborhood degrees in network average neighborhood degree mean average neighborhood degree mean of all average neighborhood degrees in network average weighted neighborhood degree mean average weighted neighborhood degree degree centrality average degree centrality clustering coefficient weighted clustering coefficient fraction of nodes that each node is connected to mean of all degree centralities in network extent to which node's neighborhood forms a complete graph extent to which node's neighborhood forms a complete graph, weighted by edge length mean of weighted clustering coefficients of all nodes in network count of street segments node density edge density street density average circuity self-loop proportion average weighted clustering coefficient PageRank maximum PageRank maximum PageRank node minimum PageRank minimum PageRank node node connectivity average node connectivity edge connectivity eccentricity diameter radius center periphery closeness centrality ranking of nodes based on structure of incoming edges highest PageRank value of any node in the graph node with the maximum PageRank lowest PageRank value of any node in the graph node with the minimum PageRank minimum number of nodes that must be removed to disconnect network expected number of nodes that must be removed to disconnect randomly selected pair of non-adjacent nodes minimum number of edges that must be removed to disconnect network for each node, the maximum distance from it to all other nodes, weighted by length maximum eccentricity of any node in network minimum eccentricity of any node in network set of all nodes whose eccentricity equals the radius set of all nodes whose eccentricity equals the diameter for each node, the reciprocal of the sum of the distance from the node to all other nodes in the graph, weighted by length mean of all the closeness centralities of all the nodes in network for each node, the fraction of all shortest paths that pass through the node mean of all the betweenness centralities of all the nodes in network average closeness centrality betweenness centrality average betweenness centrality Table 1. Descriptions of network measures automatically calculated by OSMnx. 16 BOEING Figure 7. OSMnx calculates the shortest network path (weighted by edge length) between two points in Los Angeles, accounting for one-way routes, and plots it. Figure 8. OSMnx visualizes the spatial distribution of dead-ends in Piedmont, California. 17 BOEING Figure 9. One square mile of each city, created and plotted automatically by OSMnx. 4. Case study: Portland, Oregon To demonstrate OSMnx, we analyze three neighborhoods in Portland, Oregon. First, we define three square bounding boxes of 0.5 km2 in the city's Downtown, Laurelhurst, and Northwest Heights neighborhoods. These study sites are small and do not conform to complete definitions of the local neighborhood boundaries, but are useful for visual comparison across sites at a small spatial scale (Snyder 1979). Next, OSMnx downloads the drivable, directed street networks for each, projects the networks to UTM (zone 10 calculated automatically), and plots them as seen in Figure 10. OSMnx calculates correct numbers of streets emanating from each node, even for peripheral intersections whose streets were cut off by the bounding box. In the network of Northwest Heights in Figure 10, some nodes appear to exist in the middle of a street segment, and thus should have been removed during simplification. However, these are actual intersections that OSMnx properly retained: they simply intersect a street that connects to a node outside the edge of the bounding box. 18 BOEING Figure 10. Three 0.5 km2 sections of the street network in Portland, Oregon. The different histories and designs of these street networks represent different historical eras, planning regimes, design paradigms, and topographies (Guzowski 1990; Grammenos and Pollard 2009; Works 2016). Several quantitative measures can describe these differences as well (Table 2). In terms of density metrics, Downtown has 164 intersections/km2, Laurelhurst has 110, and Northwest Heights has 28. Downtown has 21 linear km of physical street/km2, Laurelhurst has 16, and Northwest Heights has 5. In the Downtown network, the total street length equals the total edge length, because every edge is one-way. This differs in the other two networks because of the presence of two-way streets. As a proxy for block size, the average street segment length is 76 m in downtown, 92 m in Laurelhurst, and 117 m in Northwest Heights. These metrics quantify what we can see qualitatively by visually inspecting the street networks: Downtown's is fine-grained and dense, Laurelhurst's is moderate, and Northwest Heights' is coarse-grained and sparse. Area (km2) Avg of the avg neighborhood degree Avg of the avg weighted neighborhood degree Avg betweenness centrality Avg circuity Avg closeness centrality Avg clustering coefficient Avg weighted clustering coefficient Intersection count Avg degree centrality Diameter (m) Edge connectivity Edge density (km/km2) Avg edge length (m) Total edge length (km) Intersection density (per km2) Average node degree Laurelhurst 0.5 2.98 0.059 0.077 1.007 0.002 0.108 0.023 55 0.102 1021 1 29.55 97.4 14.80 109.8 5.53 NW Heights 0.5 2.75 0.030 0.137 1.090 0.002 <0.001 <0.001 14 0.219 898 1 10.71 116.6 5.36 28.0 4.38 Downtown 0.5 1.64 0.024 0.070 1.001 0.002 <0.001 <0.001 82 0.042 1278 1 21.32 76.3 10.68 163.7 3.42 19 BOEING m 152 n 55 1 Node connectivity 2.107 Avg node connectivity 2.496 Avg node connectivity (undirected) 109.8 Node density (per km2) 0.029 Max PageRank value 0.004 Min PageRank value 537.1 Radius (m) 0 Self-loop proportion 15.6 Street density (km/km2) 91.8 Average street segment length (m) 7.8 Total street length (km) 85 Street segment count Average streets per node 3.58 Table 2. Descriptive statistics for three street network sections in Portland, Oregon. 140 82 1 1.326 2.868 163.7 0.030 0.002 742.9 0 21.3 76.3 10.7 140 3.93 46 21 1 1.443 1.443 41.9 0.106 0.017 561.8 0 5.4 116.6 2.7 23 2.38 Topological measures can tell us more about complexity, connectedness, and resilience. On average, nodes in Downtown have 3.9 streets emanating from them, in Laurelhurst they have 3.6, and in Northwest Heights they have 2.4. This is seen in Figure 10 as most intersections downtown are 4-way, whereas Laurelhurst features a mix of mostly 3-way and 4-way intersections, and Northwest Heights has mostly 3-way intersections and dead-ends. In fact, one- third of its nodes are the latter. Unsurprisingly, as discussed earlier, the node and edge connectivity of each network is 1. More revealing is the average node connectivity. Recall that this represents the average number of nodes that must be removed to disconnect a randomly selected pair of non-adjacent nodes. In other words, this is how many non-overlapping paths exist on average between two randomly selected nodes. On average, 1.3 nodes must fail for two nodes to be disconnected in Downtown, 2.1 in Laurelhurst, and 1.4 in Northwest Heights (Table 2). These values may initially seem surprising: Downtown has the least resilient network despite its density and fine grain. However, this is explained by the fact that every edge in downtown is one-way, greatly circumscribing the number of paths between nodes. If we instead examine the undirected average node connectivity, it is 2.9 in Downtown, 2.5 in Laurelhurst, and 1.4 in Northwest Heights. Thus, were all edges in all three networks undirected, Downtown's average node connectivity would more than double and it would have the most robust network (by this measure). This finding suggests that there could be considerable complexity and resilience benefits in converting Downtown's streets from one-way to two-way – for the transportation modes that must obey directionality. Finally, the average betweenness centrality indicates that 7% of all shortest paths pass through an average node in Downtown, 8% in Laurelhurst, and 14% in Northwest Heights. The spatial distribution of betweenness centralities in these three networks shows the relative importance of each node (Figure 11). In Downtown, important nodes are concentrated at the center of the network due to its grid-like orthogonality. In Northwest Heights, the two most important nodes are critical chokepoints connecting one side of the network to the other. In fact, the most important node in Northwest Heights has 43% of shortest paths running through it. By contrast, the most important node in Downtown has only 15%. The street network in this section of 20 Northwest Heights is far more prone to disruption if its most important node fails (e.g., due to a traffic jam, flood, or earthquake) than Downtown is if its most important node fails. BOEING Figure 11. Three 0.5 km2 sections of the street network in Portland, Oregon. Nodes colored by betweenness centrality from lowest (dark) to highest (light). 5. Discussion Street network analysis currently suffers from challenges of usability, planarity, reproducibility, and sample sizes. This article presented a new open-source tool, OSMnx, to make the collection of data and creation and analysis of street networks easy, consistent, scalable, and automatable for any study site in the world. OSMnx contributes five capabilities for researchers and practitioners: downloading place boundaries and building footprints; downloading and constructing street networks from OpenStreetMap; correcting network topology; saving street networks to disk as ESRI shapefiles, GraphML, or SVG files; and analyzing street networks, including calculating routes, visualizing networks, and calculating metric and topological measures of the network. It addresses the usability and sample size challenges by enabling the easy acquisition and analysis of hundreds or thousands of street networks for anywhere in the world. This analysis natively blends graph-theoretic analysis with spatial analysis, and addresses the planarity challenge by using nonplanar directed graphs. Finally OSMnx enhances reproducibility by clearly defining spatial extents and topologies while serving as a free open source tool for anyone to re-run analyses. In the simple case study of Portland, Oregon, we saw how to assess the street network from both metric and topological perspectives using OSMnx. The quantitative analysis corresponded with the qualitative assessment of the networks' visualizations. In particular, we found these networks differed substantially in density, connectedness, centrality, and resilience. As it is limited by its sample size, this small case study primarily serves illustrative purposes. Nevertheless, it demonstrates how to nearly instantaneously acquire, analyze, and visualize networks in just two or three lines of code with OSMnx. The small spatial scale of the analysis provides a succinct opportunity for clear visualization of the phenomena as well as neighborhood-scale interpretation of street network measures and their implications. However, these network subsets demonstrate peripheral edge effects in that they only consider flows within the subset, ignoring the rest of the city. A recent project addresses these limitations by using OSMnx to analyze 27,000 street networks at various scales across the United States (Boeing 2017; see appendix). 21 BOEING While these data provide various features about the built environment, they cannot tell us about the quality of the streetscape or pedestrian environment. OpenStreetMap is increasingly addressing this with richer attribute data about street width, lanes, speed limits, sidewalk presence, and street trees, but a general limitation of OSMnx is that it is dependent on what data exists in OpenStreetMap. While coverage is very good across the United States and Europe, developing countries have less thorough, but still quite adequate, street network coverage – especially in cities. Moreover, any researcher can digitize and add streets, building footprints, or other spatial data to OpenStreetMap at any time to serve as a public data repository for their own study, as well as anyone else's. In turn, OSMnx makes the acquisition, construction, and analysis of urban street networks easy, consistent, and reproducible while opening up a new world of public data to researchers and practitioners. OSMnx is freely available on GitHub at https://github.com/gboeing/osmnx 6. References Agryzkov, T., Oliver, J. L., Tortosa, L., & Vicent, J. F. (2012). An algorithm for ranking the nodes of an urban network based on the concept of PageRank vector. Applied Mathematics and Computation, 219(4), 2186–2193. doi:10.1016/j.amc.2012.08.064 Barron, C., Neis, P., & Zipf, A. (2014). A Comprehensive Framework for Intrinsic OpenStreetMap Quality Analysis. Transactions in GIS, 18(6), 877–895. doi:10.1111/tgis.12073 Barthélemy, M. (2004). Betweenness centrality in large complex networks. The European Physical Journal B, 38(2), 163–168. doi:10.1140/epjb/e2004-00111-4 Barthélemy, M. (2011). Spatial networks. Physics Reports, 499(1–3), 1–101. doi:10.1016/j.physrep.2010.11.002 Barthélemy, M., Bordin, P., Berestycki, H., & Gribaudi, M. (2013). Self-organization versus top- down planning in the evolution of a city. Scientific Reports, 3. doi:10.1038/srep02153 Barthélemy, M., & Flammini, A. (2008). Modeling Urban Street Patterns. Physical Review Letters, 100(13). doi:10.1103/PhysRevLett.100.138702 Beineke, L. W., Oellermann, O. R., & Pippert, R. E. (2002). The Average Connectivity of a Graph. Discrete Mathematics, 252(1), 31–45. doi:10.1016/S0012-365X(01)00180-7 Boeing, G. (2017). A Multi-Scale Analysis of 27,000 Urban Street Networks. Manuscript submitted for publication. doi:10.2139/ssrn.2943038 Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1–7), 107–117. doi:10.1016/S0169- 7552(98)00110-X Buhl, J., Gautrais, J., Reeves, N., Solé, R. V., Valverde, S., Kuntz, P., & Theraulaz, G. (2006). Topological patterns in street networks of self-organized urban settlements. The European Physical Journal B, 49(4), 513–522. doi:10.1140/epjb/e2006-00085-1 Cardillo, A., Scellato, S., Latora, V., & Porta, S. (2006). Structural properties of planar graphs of urban street patterns. Physical Review E, 73(6). doi:10.1103/PhysRevE.73.066107 Cervero, R., & Kockelman, K. (1997). Travel Demand and the 3 Ds: Density, Diversity, and Design. Transportation Research Part D, 2(3), 199–219. doi:10.1016/S1361- 9209(97)00009-6 Chin, W.-C.-B., & Wen, T.-H. (2015). Geographically Modified PageRank Algorithms. PLoS ONE, 10(10), e0139509. doi:10.1371/journal.pone.0139509 22 BOEING Corcoran, P., Mooney, P., & Bertolotto, M. (2013). Analysing the growth of OpenStreetMap networks. Spatial Statistics, 3, 21–32. doi:10.1016/j.spasta.2013.01.002 Crucitti, P., Latora, V., & Porta, S. (2006). Centrality measures in spatial networks of urban streets. Physical Review E, 73(3), 036125. doi:10.1103/PhysRevE.73.036125 Ewing, R., & Cervero, R. (2010). Travel and the Built Environment: A Meta-Analysis. Journal of the American Planning Association, 76(3), 265–294. doi:10.1080/01944361003766766 Foti, F. (2014). Behavioral Framework for Measuring Walkability and its Impact on Home Values and Residential Location Choices (Dissertation). University of California, Berkeley, CA. Frizzelle, B., Evenson, K., Rodriguez, D., & Laraia, B. (2009). The importance of accurate road data for spatial applications in public health: customizing a road network. International Journal of Health Geographics, 8(24). doi:10.1186/1476-072X-8-24 Giacomin, D. J., & Levinson, D. M. (2015). Road network circuity in metropolitan areas. Environment and Planning B, 42(6), 1040–1053. doi:10.1068/b130131p Girres, J.-F., & Touya, G. (2010). Quality Assessment of the French OpenStreetMap Dataset. Transactions in GIS, 14(4), 435–459. doi:10.1111/j.1467-9671.2010.01203.x Grammenos, F., & Pollard, D. (2009, October 19). Beloved and Abandoned: A Platting Named Portland. Planetizen. Eugene, OR. Guzowski, K. J. (1990). Portland's Olmsted Vision (1897-1915) (Thesis). University of Oregon, Hagberg, A., & Conway, D. (2010). Hacking social networks using the Python programming language. Presented at the Sunbelt 2010, Riva del Garda, Italy. Hajrasouliha, A., & Yin, L. (2015). The impact of street network connectivity on pedestrian volume. Urban Studies, 52(13), 2483–2497. doi:10.1177/0042098014544763 Haklay, M. (2010). How Good is Volunteered Geographical Information? A Comparative Study of OpenStreetMap and Ordnance Survey Datasets. Environment and Planning B, 37(4), 682–703. doi:10.1068/b35097 Hillier, B., Leaman, A., Stansall, P., & Bedford, M. (1976). Space Syntax. Environment and Planning B, 3(2), 147–185. doi:10.1068/b030147 Jacobs, A. (1995). Great Streets. Cambridge, MA: MIT Press. Jiang, B. (2007). A Topological Pattern of Urban Street Networks: Universality and Peculiarity. Physica A, 384(2), 647–655. doi:10.1016/j.physa.2007.05.064 Jiang, B., & Claramunt, C. (2002). Integration of space syntax into GIS: new perspectives for urban morphology. Transactions in GIS, 6(3), 295–309. doi:10.1111/1467-9671.00112 Jiang, B., & Claramunt, C. (2004). Topological Analysis of Urban Street Networks. Environment and Planning B, 31(1), 151–162. doi:10.1068/b306 Jokar Arsanjani, J., Zipf, A., Mooney, P., & Helbich, M. (Eds.). (2015). OpenStreetMap in GIScience. Cham, Switzerland: Springer. Karduni, A., Kermanshah, A., & Derrible, S. (2016). A protocol to convert spatial polyline data to network formats and applications to world urban road networks. Scientific Data, 3, 160046. doi:10.1038/sdata.2016.46 Karimi, K. (2012). A configurational approach to analytical urban design: "Space syntax" methodology. Urban Design International, 17(4), 297–318. doi:10.1057/udi.2012.19 Maron, M. (2015, November 19). How complete is OpenStreetMap? Mapbox. Marshall, W., & Garrick, N. (2010). Street network types and road safety: A study of 24 California cities. Urban Design International, 15(3), 133–147. doi:10.1057/udi.2009.31 Masucci, A. P., Smith, D., Crooks, A., & Batty, M. (2009). Random planar graphs and the London street network. The European Physical Journal B, 71(2), 259–271. doi:10.1140/epjb/e2009- 00290-4 23 BOEING Neis, P., Zielstra, D., & Zipf, A. (2011). The Street Network Evolution of Crowdsourced Maps: OpenStreetMap in Germany 2007–2011. Future Internet, 4(1), 1–21. doi:10.3390/fi4010001 Newman, M. E. J. (2010). Networks: An Introduction. Oxford, England: Oxford University Press. O'Sullivan, D. (2014). Spatial Network Analysis. In M. M. Fischer & P. Nijkamp (Eds.), Handbook of Regional Science (pp. 1253–1273). Berlin: Springer. doi:10.1007/978-3-642- 23430-9_67 Parthasarathi, P., Levinson, D., & Hochmair, H. (2013). Network Structure and Travel Time Perception. PLoS ONE, 8(10), e77718. doi:10.1371/journal.pone.0077718 Porta, S., Crucitti, P., & Latora, V. (2006). The network analysis of urban streets: a primal approach. Environment and Planning B, 33(5), 705–725. doi:10.1068/b32045 Ratti, C. (2004). Space syntax: some inconsistencies. Environment and Planning B, 31(4), 487– 499. doi:10.1068/b3019 Sevtsuk, A., & Mekonnen, M. (2012). Urban network analysis. A new toolbox for ArcGIS. Revue Internationale de Géomatique, 22(2), 287–305. doi:10.3166/rig.22.287-305 Snyder, E. E. (1979). Portland Names and Neighborhoods: Their Historic Origins. Portland, OR: Southworth, M., & Ben-Joseph, E. (1997). Streets and the Shaping of Towns and Cities. New York, Strano, E., Viana, M., da Fontoura Costa, L., Cardillo, A., Porta, S., & Latora, V. (2013). Urban Street Networks, a Comparative Analysis of Ten European Cities. Environment and Planning B, 40(6), 1071–1086. doi:10.1068/b38216 Trudeau, R. J. (1994). Introduction to Graph Theory (2nd ed.). New York, NY: Dover Works, M. (2016). Laurelhurst. In The Oregon Encyclopedia. Portland, OR: The Oregon Zielstra, D., Hochmair, H. H., & Neis, P. (2013). Assessing the Effect of Data Imports on the Completeness of OpenStreetMap – A United States Case Study. Transactions in GIS, 17(3), 315–334. doi:10.1111/tgis.12037 Binford & Mort. NY: McGraw-Hill. Publications. Historical Society. 24 BOEING Appendix: Code and Data This appendix demonstrates some simple code examples for working with OSMnx and describes a large repository of street network data and measures created with it. OSMnx itself is freely available online at https://github.com/gboeing/osmnx 6.1. Code examples First we import OSMnx into the Python environment: import osmnx as ox Then we download, construct, correct, project, and plot the Los Angeles street network: G = ox.graph_from_place('Los Angeles, California', network_type='drive') ox.plot_graph(ox.project_graph(G)) If we want to get the walkable street network of Modena, Italy instead: G = ox.graph_from_place('Modena, Italy', network_type='walk') In the preceding examples, we use the graph_from_place function because OpenStreetMap has polygon boundaries for these places. However, it lacks polygon boundaries for some cities. In such cases, we can use the graph_from_address function to geocode the place name to a point, then get the network within some distance (in meters) of that point. If we want to get the street network of central Tunis: G = ox.graph_from_address('Medina, Tunis, Tunisia', distance=1000) We can similarly download networks by passing in shapefiles or latitude-longitude points. Once we have downloaded a network, we can calculate its measures: stats = ox.basic_stats(G) To download building footprints (wherever data is available): buildings = ox.buildings_from_place('Piedmont, California') 6.2. Data repository A recent study (Boeing 2017) used OSMnx to download and analyze 27,000 U.S. street networks at metropolitan, municipal, and neighborhood scales. This analysis comprises every U.S. city and town, census urbanized area, and Zillow-defined neighborhood. These street networks (shapefiles and GraphML files) and their measures have been shared in a public repository for other researchers to use at https://dataverse.harvard.edu/dataverse/osmnx-street-networks 25
1706.05406
2
1706
2017-08-02T14:44:17
Mining Social Media to Inform Peatland Fire and Haze Disaster Management
[ "cs.SI" ]
Peatland fires and haze events are disasters with national, regional and international implications. The phenomena lead to direct damage to local assets, as well as broader economic and environmental losses. Satellite imagery is still the main and often the only available source of information for disaster management. In this article, we test the potential of social media to assist disaster management. To this end, we compare insights from two datasets: fire hotspots detected via NASA satellite imagery and almost all GPS-stamped tweets from Sumatra Island, Indonesia, posted during 2014. Sumatra Island is chosen as it regularly experiences a significant number of haze events, which affect citizens in Indonesia as well as in nearby countries including Malaysia and Singapore. We analyse temporal correlations between the datasets and their geo-spatial interdependence. Furthermore, we show how Twitter data reveals changes in users' behavior during severe haze events. Overall, we demonstrate that social media is a valuable source of complementary and supplementary information for haze disaster management. Based on our methodology and findings, an analytics tool to improve peatland fire and haze disaster management by the Indonesian authorities is under development.
cs.SI
cs
The final publication is available at link.springer.com Springer Nature SharedIt: http://rdcu.be/udmt Mining Social Media to Inform Peatland Fire and Haze Disaster Management Mark Kibanov · Gerd Stumme · Imaduddin Amin · Jong Gun Lee Abstract Peatland fires and haze events are disasters with national, regional, and international implications. The phenomena lead to direct damage to local assets, as well as broader economic and environmental losses. Satellite imagery is still the main and often the only available source of information for disaster management. In this article, we test the potential of social media to assist disaster management. To this end, we compare insights from two datasets: fire hotspots detected via NASA satel- lite imagery and almost all GPS-stamped tweets from Sumatra Island, Indonesia, posted during 2014. Sumatra Island is chosen as it regularly experiences a significant number of haze events, which affect citizens in Indonesia as well as in nearby coun- tries including Malaysia and Singapore. We analyse temporal correlations between the datasets and their geo-spatial interdependence. Furthermore, we show how Twit- ter data reveals changes in users' behavior during severe haze events. Overall, we demonstrate that social media are a valuable source of complementary and supple- mentary information for haze disaster management. Based on our methodology and findings, an analytics tool to improve peatland fire and haze disaster management by the Indonesian authorities is under development. M. Kibanov, G. Stumme Knowledge & Data Engineering Group ITeG Research Center University of Kassel, Germany E-mail: kibanov, [email protected] I. Amin, J.G. Lee Pulse Lab Jakarta UN Global Pulse United Nations E-mail: imaduddin.amin, [email protected] 2 1 Introduction Mark Kibanov et al. Peatland fires and their associated haze events are slow onset but medium impact disasters. At times the fires occur when several environmental conditions meet, but most fires are man-made disasters resulting from – predominantly illegal – agricul- tural practices, e. g., conversion often forests and peatland into palm oil plantations through slash-and-burn techniques [17]. The impact of these activities span environ- mental (e. g., accelerated deforestation by up to 62% [23]) and economic losses, but the associated haze events also seriously affect local residents' health. When such fires, in particular peat fires, produce haze, wide areas can be affected within a rel- atively short period of time. If the haze severity level is low, the Government of In- donesia advises its citizens to reduce their outdoor activities. If the level is high, residents are asked to evacuate the affected area, because haze generated by peatland fires may lead to various health issues [1],[14]. Dense haze, including a case in In- donesia on October 20, 2015 as shown in the image below reduces the visibility to less than 100 meters (and in rare instances to less than 20-30 meters) and leads the closure of airports and schools. Haze is not only a national issue for Indonesia, but also an international issue, as it affects Singapore and Malaysia. "Riau extends haze emergency status'' (Source - Jakarta Post1) In order to respond to a fire or haze event, a disaster management authority needs fire hotspot information along with (static) baseline information, including an es- timate of the affected population and data on the available facilities. Fire hotspots (henceforth referred to as 'hotspot' or 'hotspots') are identified relatively efficiently from satellite imagery using a classification algorithm. Due to the limited resources available to public authorities, more efficient and effective approaches to disaster management are welcome, including through the generation of new information. In this article, we investigate the opportunities that social media offer for im- proved management of peatland fire and haze disasters. Specifically we analyse Twit- ter as the primary data source and use hotspot and air quality data to further interpret and verify the results of our analysis. Our objective is not the evaluation of informa- 1http://www.thejakartapost.com/news/2015/10/20/riau- extends-haze-emergency-status.html (accessed on Jan 12, 2016) Mining Social Media to Inform Peatland Fire and Haze Disaster Management 3 Fig. 1: The three islands in Indonesia (Sumatra, Kalimantan, and Papua) with the largest numbers of hotspots in 2014 tion offered by other channels, such as hotspots identified from satellite imagery, but the provision of 'complementary' situational information. We concentrate our analy- sis on peatland fires on Sumatra Island as the haze situation in this region is the most critical in terms of geographic coverage and severity – as explained in Figure 1, and, in doing so, analyse (almost) all geotagged tweets from Sumatra Island posted during 2014. We aim to explore two research themes concerning the utility of social media for haze disaster management. 1. How do peat fires/haze events and social media conversations about haze-related topics relate to each other? If such a (temporal and geo-spatial) relationship exists, how can it be described and quantified? 2. How do social media capture situational information on affected populations, such as mobility patterns, which can be useful in managing disaster response? The contribution of our work with regard to haze disaster response on Sumatra Island can be summarized as follows: 1. We find strong temporal and geo-spatial correlations between hotspots and haze- related conversations on Twitter. 2. We investigate the mobility patterns of haze-affected populations as captured in social media data and confirm that they reflect movement patterns during haze situations in the real-world. These insights can significantly contribute to the prioritisation of haze disaster re- sponse activities, conducted by national and local public authorities in Indonesia, by raising real-time awareness of the social impact of the phenomenon, as opposed to current practice which uses hotspot and population data in isolation. The rest of this article is structured as follows. In Section 2 we explain related work. Section 3 discusses the data we use for our analysis, covering both insights and limitations. Section 4 presents how different online conversations reflect real-world haze disasters. Section 5 shows what kind of information on population mobility can be developed from social media with respect to haze disasters. We close this article with a discussion on research issues in Section 6 and a conclusion in Section 7. 4 2 Related Work Mark Kibanov et al. We focus on two groups of related work – studies of how social media can be used to assist disaster management and research about data mining studies on forest fires. Social Media and Disasters: A vast body of research exists on social media and its potential reflection of real-world phenomena. We consider the literature that demon- strates how social media relate to different disasters. Carley et al. [12] discuss the usage of Twitter for disaster management in In- donesia. This work makes two important contributions relevant for the current arti- cle. First, the viability of using Twitter data for disaster management is demonstrated; second, the paper provides a baseline for Twitter use to support disaster management. The potential application of social media to disaster and crisis management is attracting the research community's attention either as a tool or as a source of data, e.g., for the creation of crisis maps. Oz and Bisgin [30] made a social-media based re- search about attribution of responsibility (e.g., how users assign political responsibil- ity) regarding Flint water crisis. Gao et al. [15] consider social-media-based crowd- sourced maps with data from external sources as a powerful tool in humanitarian assistance and disaster relief. Goolsby [16] describes how social media can be used as crisis management platform to create crisis maps for different agencies. Middle- ton et al. [28] propose a social media crisis-mapping platform, where real-time crisis maps are generated based on statistical analysis of tweet streams matched to areas at risk. Cresci et al. [13] propose a crisis mapping system that overcomes some limi- tations of other systems: they introduce an SVM-based damage detection approach, and describe a new geoparsing technique to perform a better geolocation of social media messages. Imran et al. [19] provide an overview of existing and proposed methods and sys- tems to retrieve information about emergencies from social media, such as Crisis- Tracker [33] and TweetTracker [26]. Furthermore, Imran et al. suggest a platform to collect human annotations in order to maintain automatic supervised classifiers for social media messages [20] and describe automatic methods for extracting brief, self-contained information items from social media, which are relevant to disaster re- sponse [21]. Abel et al. [7] propose the 'Twitcident', a system for filtering, searching and analyzing information about real-world incidents or crises. A number of systems are implemented and deployed for special kinds of disasters: Avvenuti et al. [9][10] describe the design, implementation and deployment of social media based system for detection and damage assessment of earthquakes in Italy. The system is able to detect outbraking seismic events with low occurrences of false positives. Cameron et al. [11] describe ESA-AWTM – a system deployed for trial by the Australian Gov- ernment. This tool formalises the usage of Twitter by the Crisis Coordination Center, replacing an ad-hoc fashion monitoring of social media. Following studies focus rather on algorithmical aspects of social media for dis- aster management, rather than on system architecture or implementation. Rogsta- dius [32] discusses different aspects of possibilities for enhanced disaster situational awareness using social media. Sakaki et al. [34] present how social media can be utilised as an early warning system with regard to earthquake events. Krstajic et Mining Social Media to Inform Peatland Fire and Haze Disaster Management 5 al. [24] show not only how natural disasters and man-made catastrophes can be de- tected using Twitter, but also how semantic aspects of such events can be represented. Schulz et al. [36] explore the possibilities of detection of small scale incidents using microblogs. Mandel et al. [27] made a demographic analysis of online sentiment dur- ing a hurricane, particularly focusing on the level of concern disaggregated by gender. Morstatter et al. [29] address the problem of finding (non-geotagged) tweets that orig- inate from a crisis region. Zhang and Vucetic [38] propose an improved method to identify disaster-related tweets using a semi-supervised approach with an unlabeled corpus of tweets. Disaster damage assessment is another important topic in context of disaster man- agement: Kryvasheyeu et al. [25] examine the online activity of different areas before, during and after Hurricane Sandy. They demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Forest Fires/Haze and Data Mining: The following works contribute to the forest fires issue, applying data mining methods to different aspects of this emergency. We do not address in detail the topic of forest fire detection using satellite imagery as this topic is not in focus of current work, but we note that usage of satellite imagery for forest fires detection is pretty well studied; e.g., Jaiswal et al. [22] describe how forest fire risk zones can be mapped using satellite imagery and geographic information systems. A number of studies present novel data mining methods for haze-related issues. Sakr et al. [35] presents a model to predict forest fires risks using data on previous weather conditions with the best results having been achieved using support vector machines and a Gaussian kernel function. Iliadis [18] introduce a decision support system for long-term forest fire risk estimation, based on fuzzy algebra. The system was applied in Greece but, according to authors, can be used on a global basis. Si- tanggang and Ismail [37] suggest a classification model for hotspot occurrences using a decision tree model C4.5 algorithm, which achieves an accuracy of 63%. The forest fire data from the Rokan Hilir district on Sumatra Island, Indonesia was used in that research. Prasetyo et al. [31] used Twitter and Foursquare data to analyze public percep- tions of haze in Singapore. In particular, their analysis showed that (1) social media users focus significantly on the haze problem and (2) the problem has a substantial emotional and behavioral impact. The UN presented the first feasibility study [5] for supporting peat fire and haze disaster management using social media. Overall, there are a lot of publications describing different aspects of social media as an assistance tool for disaster management at different scales. Some researchers applied data analysis and mining techniques to forest and peatland fires data. In this article, we concentrate on peatland fires in Indonesia. This disaster occurs periodically and has a huge impact on environment and lives of millions of people. In contrast to previous works, we consider the dataset of (almost) all geotagged tweets and all hotspots during one year on Sumatra Island. We created four rich taxonomies for identification of different topics related to haze and peatland fires. Furthermore, one of the main focuses of our work is to estimate whether social media can be 6 Mark Kibanov et al. used for estimation of users' behaviour w.r.t. Twitter and mobility. To the best of the authors' knowledge, those aspects were not covered in previous works. 3 Data Set We use two main datasets: twitter data from Sumatra Island and hotspots on Sumatra Island detected by National Aeronautics and Space Administration (NASA) satellites. In this section, we describe the data, its basic characteristics and its limitations. 3.1 Fire Hotspots and Twitter Data Fire Hotspots in Sumatra in 2014: We use hotspot information that is first identified by the NASA from imagery, captured by Terra and Aqua satellites[4], and further refined and augmented by GLOBAL FOREST WATCH2 [3]. Based on consultations with and recommendations by a domain expert from the UN Office for REDD+ Coordination in Indonesia (UNORCID)3, we filter hotspots classified as 'peatland hotspot' and 'high confidence-level' between two confidence levels (i.e., high and low) and use 7,892 hotspots for our analyses after the filtering process, among the 38,723 hotspots in Sumatra in 2014 discovered by GLOBAL FOREST WATCH, cf. Table 1. Table 1: Size of hotspot and Twitter datasets Area Sumatra Island Riau Province Fire Hotspot Peatfire Only 27,060 19,191 Peatfire & High Conf. 7,892 5,463 Twitter Tweet 29,528,786 3,509,849 All 38,723 21,563 (Almost) All GPS-stamped tweets posted in Sumatra during 2014: Indonesia has a large number of Twitter users, which stands at approximately 12 million in 2014 [2]. Originally we attempt to collect the entire GPS-stamped tweets posted within Suma- tra Island between January 1 and December 31, 2014 but for unexpected technical reasons, we failed to collect tweets during two time frames: – about half of all tweets posted during January 2014 – no tweets collected between April 16 and 30 2014 Overall, we analyse more than 29 million tweets with exact locational information, which includes longitude and latitude. The tweets are posted by 575,295 users, equiv- alent to 1% of the population of Sumatra Island. 2http://www.globalforestwatch.org 3UN REDD Programme is United Nations Collaboration for Reducing Emissions from Deforestation and Forest Degradation in Developing Countries Mining Social Media to Inform Peatland Fire and Haze Disaster Management 7 (a) (c) (b) (d) Fig. 2: Basic characteristics of hotspot and tweet datasets - (a) Monthly hotspots, by province, on Sumatra in 2014, (b) weekly hotspots on Sumatra in 2014, (c) daily hotspots on Sumatra island and in Riau province in March 2014, and (d) monthly tweets by province of Sumatra in 2014 (a) and (d) are best viewed in color) 3.2 Basic characteristics Background: Sumatra Island is an area heavily affected by peatland fire and haze events, as shown in Figure 1. The central and southern parts of the island experience more haze than other areas and in particular, Riau province is recognised as the most haze prone area, not only based on the total yearly hotspots, as shown in Figure 2(a), but also based on the number of haze situations reported in the media. Hotspots: Among other interesting observations, about 5,500 high confidence peat fire hotspots are detected in Riau Province during 2014, while the number of high confidence peat fire hotspots across Sumatra stands at 7,892 in 2014, which means almost 70% of high confidence peat fires take place on less than 19% of the island North Sumatra South Sumatra West Sumatra Riau Lampung Riau Islands Bangka−Belitung Jambi Bengkulu Aceh 800010000 6000 4000 2000 Number of Hotspots 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Months Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Weeks 200 0 10001200 800 Number of Hotspots 600 400 Sumatra Island (incl. Riau Province) Riau Province 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 Days 100200300400500600700 Number of Hotspots 0 North Sumatra South Sumatra West Sumatra Riau Lampung Riau Islands Bangka−Belitung Jambi Bengkulu Aceh 4000 Number of Tweets (in thousands) 2000 3000 1000 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Months 8 Mark Kibanov et al. area, namely Riau province. This leads us to a further investigation, namely of the effects of haze on the behaviors of people who live in Riau province, the results of which will be discussed in Section 5. It is worth mentioning that there are two main fire periods on Sumatra Island in 2014: between February and March, and between June and November as shown in Figures 2(a) and 2(b). In particular, Figure 2(b), the weekly hotspot dynamics shows a similar pattern to the monthly pattern provided in Figure 2(a). However, we can find it is similar to monthly dynamics, but there are some less severely affected weeks in June, July and October and strong irregularity in different scales. Moreover, when we have a close look at hotspots dynamic in March, the worst month in 2014 (c.f. Figure 2(c), we find that the hotspots almost disappeared after evacuation announcement but then emerged again after one week. Tweets: Comparing Figure 2(d) and Figure 2(a) highlight that the dynamics pattern from Twitter use in general is different from the patterns of hotspots. The usage of Twitter on Sumatra Island decreases towards the end of 2014, and the distribution of tweets among the different provinces remains stable during the year. 3.3 Data limitations This section briefly elaborates four limitations of social media data, the first two concern inherent limitations of social media and the other two concern the limitations of our data in particular. First, the digital divide may introduce a limitation, in that social media data connected to urban areas are considerably denser compared with rural areas and in that the cost of smart phones limits the participation of less affluent cohorts of society. Secondly, there may be some bias connected to the characteristics of users of social media in that we largely 'hear' the opinions of younger or more extrovert users. Thirdly, the number of unique users from our dataset (about 500,000 users) equates to approximately 1% of the entire population of Sumatra island; it thus may also limit our ability to abstract or generalise based on our findings. Fourthly, due to technical issues, our data are incomplete, specifically in January and April 2014. It is, however, worth noting that a key objective of this work is to test the potential of social media as a complementary data source which can be used to inform human- itarian efforts. The aim is not to produce statistics solely from social media but to sense in near real-time signals on the behaviors of affected populations, which could better inform decision-making and improve the targeting of humanitarian response. We expect that the missing data will not affect the validity of our analysis because the missing periods are predominantly outside of the observed haze seasons. 4 Temporal and spatial analysis In this section, we investigate the temporal and spatial characteristics of tweets related to haze and for that, prepare four different datasets by developing four taxonomies re- lated to haze to identify four different haze-related topics, i.e., haze-general, haze-hashtag, haze-impact, and haze-health. We extend a simple taxonomy used for a feasibility Mining Social Media to Inform Peatland Fire and Haze Disaster Management 9 Table 2: Four types of conversations related to peat fires and haze in 2014 on Sumatra Island and filtering rules for the identification of corresponding tweets - haze-general (43), haze-hashtags (5), haze-health (39), and haze-impact (39) Conversations about forest and peat fires and haze, detected primarily by the keywords - 9,707 tweets (e.g., "When the haze problem will be solved?"): ( (bencanabadaipolusiparahtebalkabut) && (asapkabut) ) OR ( (awasberbahayadaruratpekatlebat) && (asapkabut) ) OR ( kabut asaptitik apisumber apititik panaspolusi udarahaze ) OR ( forest fire ) OR ( (kerusakanpembalakanpembukaankebakaran penggundulanpenebangan) && (hutanladanglahangambut) ) Conversations which contain one of identified hashtags - 3,024 tweets general haze- (e.g., "Let's participate in #melawanasap movement."): ( #saveriau#prayforriau#melawanasap#prayforasap#hentikanasap ) Conversations about happenings in a negative way due to haze, such as flight delay or school closing - 6,994 tweets (e.g., "Day #3 off because of Haze."): ( (tutupbataldibatalkantertundadelaycancelditutup) && (penerbanganbandara) ) OR ( jarak pandang ) OR ( (sekolahkampuskuliah) && (tutupditutupliburdiliburkan) ) OR ( (ekonomidampakakibatmerugilumpuhresiko) && (asapkabut) ) Conversations with keywords indicating haze-related or derivable diseases - 46,241 tweets (e.g., Welcome to Pekanbaru; do not forget to wear mask!"): ( (infeksisesak) && (pernapasannapaspernafasan) ) OR ( (iritasiradang) && (matakulitenggorokanhidungparu) ) OR ( batukpusingmualispamaskerasmaasthmaparu-paru ) OR ( (asapkabut) && (kesehatansehatpernafasanhamilanak orang tua) ) OR ( mata && (pedihperihsakit) ) hashtag haze- impact haze- health haze- study [5] in this work in order to capture broader contexts related to haze crises. Over- all, we establish 126 filtering rules, combinations of Indonesian words and boolean operators as presented in Table 2, which identify 64,383 tweets posted by 33,127 users out of 29,528,786 tweets across four topics, while allowing for overlapping topics. For ease of understanding, even though we use both and OR in different places, both operators have one meaning, namely OR. For instance, the following rule will collect a tweet if its content contains both A and C or both B and C, [Rule] - "( A B ) && C ". 4.1 Temporal Dynamics of Tweet Topics and Hotspots Users, inherently, engage in more intensive discussions on haze not only offline but also online, when the haze situation deteriorates, which is quantitatively measured by the number of hotspots. In order to visualize any correlation between two quantities of haze-relevant con- versations and haze situations, we present the weekly numbers of tweets from four datasets as well as the number of hotspots on Sumatra island in Figure 3. Although our data are incomplete in January and April due to technical issues, as explained in the previous section, the figure shows that Twitter users respond to haze events on the ground by discussing on social media the four topics of interest. 10 Mark Kibanov et al. Table 3: Values of correlation coefficients between the weekly number of hotspots and the number of tweets on Sumatra Island and in Riau Province Area Sumatra Riau haze- haze- general hashtag haze- impact haze- health 0.89 0.89 0.71 0.72 0.83 0.85 0.79 0.91 To easily quantify such correlations, we calculate Pearson's correlation between tweet dynamics and hotspot dynamics in Sumatra and it reveals strong correlation co- efficient values as shown in Table 3. Among the four conversation topics, haze-general has the strongest coefficient. When we conduct the same calculation with tweets and hotspots in Riau, it also shows strong correlation coefficients but in this instance haze-health is strongest, which is understandable because Riau is one of the most haze-affected provinces in Sumatra island. The high values of correlation coefficients confirm that four identified conversa- tions are relevant for haze problems. This is a confirmation of relevancy of chosen taxonomies, Table 2. Fig. 3: Correlation between the weekly number of hotspots and the weekly con- versations about different topics on Sumatra Island In Figure 4, per topic we plot weekly tweet volume and hotspot volume in x and y axes, respectively, while all y axes are presented in a logarithm scale. As already shown in Figure 3 and Table 3, we find positive correlations from four subfigures but confirm an interesting phenomenon that people discuss the studied topics except haze-hashtag during haze-free periods. The conversations classified by haze-hashtag happened only during haze periods. This behaviour is explained by the observation that specific hashtags are commonly used in connection to a specific event. 4.2 Spatial Characteristics of Different Topical Conversations This section discusses the spatial relationships between hotspots and tweets. For in- stance, if one can identify hotspots (not areas) from social media, it would be useful for the prioritisation of disaster response and humanitarian action during haze disas- ters. It is still challenging to understand to which hotspot a user refers in a tweet for Mining Social Media to Inform Peatland Fire and Haze Disaster Management 11 (a) haze-general (b) haze-hashtag (c) haze-impact (d) haze-health Fig. 4: Number of detected hotspots per week vs. number of conversations (log- scaled) many reasons. We investigate spatial characteristics using a simple mapping process based on the distance between the position of a tweet and a hotspot. This still allows for interesting insights on spatial characteristics. We start with an analysis of the corresponding or nearest hotspot of each tweet. The users usually discuss haze and its derived problems such as impact, rather than hotspots themselves, as hotspots exist far away and are invisible. However, those hotspots are the origin of the problem. Since people who live closer to a hotspot will be affected by haze than ones who live farther, we use a simple model that consid- ers the distance from tweets to their nearest hotspot and analyse the corresponding or nearest hotspot of each tweet. Let us say that, given a hotspot h, its popularity popularity(h) denotes the number of tweets correspondent to h when the hotspot and tweets are identified and posted at the same day, respectively. ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 200 400 600 800 1000 1200 Number of Hotspots ● ● ● ● ● ● ● ● ● ● ● ●●● ●●● ● ● ●●● ●● ● ● ● ● ● ● 0 Number of Converstaions (log) 50 510 1000 200 at ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 200 400 600 800 1000 1200 Number of Hotspots ● ● ● ●● ●● 0 500 50 Number of Converstaions (log) at 5 1 ● ● ● ● ● ● ● ● ● ● ● ● ● ●● ● ● ● ●● ●● ● ● ● ● ● ● ● ● ● 200 400 600 800 1000 1200 Number of Hotspots ●●●● ● ● ● ● ● ● ●● ● ● ●● ● ● ● ● 0 500 100 50 Number of Converstaions (log) 200 at ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 200 400 Number of Hotspots 600 800 1000 1200 ● ● ● ● ● ● ● ●● ●●● ●●● ● ● ● ● ● ● ● ● ● ● ● ● 0 2500 Number of Converstaions (log) 1500 at 1000 500 12 Mark Kibanov et al. (a) haze-general (b) haze-hashtag (c) haze-impact (d) haze-health Fig. 5: Popularity distribution of hotspots considering different taxonomies Figure 5 shows the frequency of popularity(H') where H' is a set of hotspots satis- fying popularity(h) ≥ 1.The figure shows that (a) there are highly referenced hotspots from haze-general and haze-hashtag, such as 700-800 tweets per hotspot in some in- stances, while many other hotspots are referred to by only a small number of tweets from the two datasets, and (b) haze-impact and haze-health do not display as skewed distributions as the other two datasets but they still contain such characteristics. Such an analysis is useful for a disaster management, particularly by helping prioritise hotspots based on an understanding on which hotspots are more discussed by affected people. In the following, we ground our exploration in two sets of cascading research questions. 0 200 400 600 Popularity 800 1000 100150200250300 Frequency 50 0 0 200 400 600 Popularity 800 1000 80 60 40 Frequency 20 0 0 50 100 150 200 Popularity 150 100 Frequency 50 0 0 100 200 300 Popularity 400 500 40 20 0 100120140 80 60 Frequency Mining Social Media to Inform Peatland Fire and Haze Disaster Management 13 (a) haze-general / -hashtag (b) haze-impact / -health Fig. 6: Probability Density Functions of the distance from conversations of given types to the nearest relevant hotspots (1) What insights can be generated when we observe the locations of haze-related tweets? What is the likelihood of hotspots nearby when we observe such tweets by their known locations? For every tweet from the entire dataset, regardless of its haze-topic, we calculate the shortest distance between it and its corresponding (nearest) hotspot from the same day. We present its empirical probability density function of the whole distance val- ues with straight lines in Figure 6. This is a basis from which to determine whether another distance distribution from a haze-specific topic has similar or different char- acteristics. Then we conduct the same process for each of the four haze datasets, represented with dotted lines in the figure. The two distributions from haze-general and haze-hashtag are significantly dif- ferent from the ones from haze-impact and haze-health, while the latter two distribu- tions are relatively similar to the distance distribution from the entire data. Notable spikes are present in Figure 6(a) around x=100km. These imply that haze-hashtag and haze-general are likely posted with relatively close proximity, of up to 100km, to hotspots as local issues that attract the attention of populations living near hotspots, but haze-impact and haze-health are topics of relevance to many residents across Sumatra island. Also, a close look at the four subject-matter distributions, comparing them with the global distribution, highlights that haze-hashtag is the topic with the closest proximity to real world hotspots, followed by haze-general, haze-impact, and haze-health in a decreasing order, getting toward general topics. (2) What insights can be generated when we know the locations of hotspots? Could we guess what topics would be more likely to be discussed nearby? For this, on a given day, for every hotspot, we identify its corresponding tweet for haze-general, haze-hashtag, haze-impact, or haze-health by identifying the nearest All Tweets haze−general haze−hashtag 0 500 Distance (in km) 1000 1500 2x10-64x10-66x10-68x10-610-5 Probability 0 All Tweets haze−impact haze−health 0 500 Distance (in km) 1000 1500 2x10-64x10-66x10-68x10-610-5 Probability 0 14 Mark Kibanov et al. (a) haze-general (b) haze-hashtag (c) haze-impact (d) haze-health Fig. 7: Probability Density Functions of the distance from relevant hotspots to the nearest conversations of given types tweet. We present the distance distribution between each hotspot and corresponding tweet along with null models in Figure 7 presented in Probability Density Functions. Note that this differs from the previous section where we investigated, given a tweet, how far it is located to its nearest hotspot. As a null model for a haze-specific topic (for instance haze-general), for each date we randomly select a number of tweets, of the same magnitude as the size of the haze-specific topic compared to the total tweets posted at the same date. For instance, if n tweets from given category (e. g.,haze-general) and m hotspots were detected on a given day, we choose n random tweets T from the whole dataset and compute distances from the hotspots to the nearest tweets from T . The final null model for a topic is built from multiple random processes (1,000 times). Numbers of tweets of each category is different on different days, so each haze-specific topic may have its own null model. haze−general Null Model 1.5x10-5 1x10-5 5x10-6 Probability 0 0 200 600 400 Distance (in km) 800 1000 1200 haze−hashtag Null Model 8x10-6 6x10-6 4x10-6 Probability 2x10-6 0 0 500 1000 Distance (in km) 1500 haze−impact Null Model 0 200 400 600 800 Distance (in km) 10-5 2x10-64x10-66x10-68x10-6 Probability 0 haze−health Null Model 150 100 Distance (in km) 200 250 300 0 50 1.5x10-5 1x10-5 Probability 5x10-6 0 Mining Social Media to Inform Peatland Fire and Haze Disaster Management 15 Table 4: Parameters of probability distribution of the distance from hotspots to the nearest conversations of given types Average Real Null Data Model 109.2 77.1 161.6 159.3 104.8 121.4 61.7 59.5 Median Real Null Data Model 87.5 51.5 118.7 111.8 85.6 106.9 61.1 55.0 St.Dev. Real Null Data Model 88.4 81.5 144.7 111.8 88.3 90.9 32.7 34.9 haze-general haze-hashtag haze-impact haze-health As expected from the previous two figures, the four distributions from the four different topic datasets are dissimilar. In a general sense, for all haze-specific topics (possibly except haze-general), the real distribution and the distribution from its null model are generally similar to one another. This implies that the creation of a hotspot is not a trigger for haze-related discussions, regardless of its geographical location. A detailed look at the distributions, however, along with a reexamination of Table 4 showing mean, median and standard deviation values, reveals a set of insights, including (a) the increased likelihood of tweets on topics including haze-general and haze-impact closer to a hotspot compared to their null models and (b) the greater density of tweet locations on haze-hashtag of a given hotspot, compared to a null model. It is worth noting that the two research questions and their results we discuss in Section 4.2 are complement each other and useful in different aspects in disaster management. First, we showed that haze-general or haze-hashtag conversations can be indication of a nearby hotspot. Health and haze impact issues are discussed all over Sumatra Island, not necessary near hotspots. In the second question, we tried to identify relevant tweets near the hotspots. There are only few "popular" hotspots with many tweets near them. The reason may be that many hotspots are detected in rural areas. 5 Change of Mobility Analysis Peat fires and haze incidents have an impact on people's behaviour, especially their mobility patterns. Some residents move to haze-free areas, while others stay at home but limit their outdoor activities. In rare cases, the government advises an evacuation due to severe haze and the need to protect affected and vulnerable populations. In this section, we investigate mobility patterns, which is of practical importance as often this information but is not available in a (near) real-time fashion which would be preferable for disaster management. We tackle this by looking at the spatial-temporal information available from social media and investigate how patterns of mobility artuculated by social media can be quantified. For this, we analyse all the tweets with GPS information posted by users who spend most of their time in Riau Province, one of the most haze-affected regions, as explained by Figure 2(a). 16 5.1 Mobility in General Mark Kibanov et al. For this part of the study we first classify all weeks in 2014 into three categories based on the weekly number of hotspots in Sumatra as shown in Table 5, with the exception of weeks which see large population movements such as over new year, school holidays, and religious celebrations. Then we add a special week, W E, during which an evacuation was advised by a local government (the Week of March 13, 2014). This classification is easily extended to the level of users, W NH u , W HS u , and W E u , by only examining a week when the number of tweets during the week posted by User u > a threshold τ ∈ N. We use τ = 4, but when using different threshold values, we have similar results. u , W H Table 5: Four types of weeks by the number of weekly hotspots (#w.h.) in Sumatra W NH W H W SH W E Description no-haze haze severe-haze evacuation Condition #w.h.¡100 100¡#w.h.¡400 400¡#w.h. − Week 2, 18–24, 33–36, 43, 46–51 5, 6, 12, 37–42, 44, 45 7–10, 11, 13 11 Now we define four notations as presented in Table 6 with specific reference to all users C w, Sw, D(w1,w2), and RS(w1,w2). Table 6: Four notations to analyse mobility patterns Cw u D(w1,w2) u Sw u RS(w1,w2) u CENTROID (average latitude and average longitude) of all GPS-stamped tweets posted by User u in the Week w Euclidean DISTANCE between two centroids, Cw1 u and Cw2 u SPREAD, the average distance between Cw tweets posted by u in Week w RELATIVE SPREAD between two weeks calculated by Sw2 u / Sw1 u u and (1) Mobility Patterns by Situation (Analysing DISTANCE) During a slow onset disaster situation, an affected person can change her or his mo- bility pattern. The individual has two options to (significantly) increase her or his movements due to an evacuation or to (significantly) decrease her or his mobility by staying at home. In order to quantify changes in mobility, we calculate the distribu- tions of DISTANCE D(w1,w2) u and w2 ∈ {W N H , W H , W SH , W E} as shown in Figure 8. when w1 ∈ W NH u Mining Social Media to Inform Peatland Fire and Haze Disaster Management 17 (a) CDF (b) Histogram when Distance ≤ 10km (c) CCDF when Distance ≥ 100km Fig. 8: Distributions of the numbers of users classified by the distance between two centroid positions per situation Figure 8(a) shows the overall distriburion of D(w1,w2) using Cumulative Density Functions (CDFs) for three cases except w2 ∈ W E. Overall people tend to move further during a severe haze period, while mobility patterns during periods of (light) haze and no haze are very similar, as implied by the observation that the two distri- u 1000 WNH − No Haze WH − Haze WSH − Severe Haze WSH WNH 0.1 1 10 100 Distance (km, log scale) 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Cumulative Density Function (CDF) WNH − No Haze WH − Haze WSH − Severe Haze 0.2 0.3 0.40.5 1 Distance (km) 2 3 4 5 10 5% 4% 3% 2% 1% 0 0.1 Probability WE WSH WNH − No Haze WH − Haze WSH − Severe Haze WE − Severe Haze & Evacuation 100 200 300 400 500 WH WH 900 1,000 Distance between two centroid positions (km) 600 700 800 10% 1% 0.1% 0.01% Density Function (CCDF) Complimentary Cumulative 18 Mark Kibanov et al. butions, W N H and W H, are similar to each other while the distribution for W SH is stretched toward the x-axis in the positive direction. Considering smaller order mobility of up to 10km, shown in Figure 8(b), we see that during the haze free weeks (w2 ∈ W N H) residents make more short-distance movements than during the weeks with haze, w2 ∈ {W H , W SH}. From the tails of the distance distributions in Figure 8(c), an investigation of long distance movement patterns shows a tendency that some people significantly increase their mobility by hundreds of kilometers during evacuation periods and severe haze w2 ∈ {W SH , W E}, while there is no significant difference between the (light) haze and no haze periods, w2 ∈ {W N H , W H}. (2) Mobility Reduction by Situation (Analysing DISTANCE and RELATIVE SPREAD) Now we focus on the reduction of mobility. Examining a week from among haze- free weeks (say w1 ∈ W N H), we interpret that a user (say u) reduces her or his mobility in another week (say w2) when u's RELATIVE SPREAD is smaller than 1 or RS(w1,w2) < 1. In this article, we specifically say that u does reduce her or his mobility if RS(w1,w2) < 1/3 which means she or he reduced her or his SPREAD more than three times 4. u Fig. 9: Proportions of users who reduce mobility compared to no-haze weeks with respect to haze situation and the distance people moved away Additionally, the information on where people currently reside is important to understand movement patterns. For instance, during a period with severe haze, people 4We tried different threshold values (e. g., 1/5), but the results were similar. Share of Users who extremely reduce their mobility Users who moved not further than 50 km Users who moved between 50km and 500km Users who moved further than 500km No Haze Haze Severe Haze Evacuation 0.8 0.6 0.4 0.2 0.0 Mining Social Media to Inform Peatland Fire and Haze Disaster Management 19 who stay in an affected area may display a different pattern of mobility reduction when compared to people who have already evacuated from the area. Figure 9 summarises people's mobility behavior changes given two different weeks in different circumstances, classified by DISTANCE D(w1,w2) and our haze/non- haze scenarios. Of note, the baseline weeks remain as the haze-free week scenario (i.e., w1 ∈ W N H). In other words, we measure, for a given user, to what extent she reduces her mobility in a haze-free week, a haze week and a severe haze week, com- pared to a baseline haze-free week. For instance, the very first bar shows that about 20% of users, out of the users who move less than 50km in two haze-free weeks, reduce their mobility, although their mobility patterns are studied in two haze-free weeks. It means that overall about 20% of users exhibit their mobility patterns within a wide range of variation, even when they still remain in a city (e.g. within a 50km radius). This figure shows a couple of interesting points. First, considering people who do not move far from their previous location, the probability that they noticeably de- crease their mobility (i.e. by a factor of three) is higher during severe haze weeks and evacuation periods (about 25% and 27%, respectively) than during haze free and moderate haze weeks (about 21%). A similar result will be discussed in Sec- tion 5.2-(2). Second, people that move far away, similar to the above, also reduce their mobility in the haze and evacuation periods (about 51.4% and 50.6%, respec- tively) compared to the no haze or moderate haze periods (about 38-39%) but the proportion is much larger. The above may imply that although some people move far away (e.g., more than 500km), expecting fresh air, their movement patterns in their new location are decreased. One possible explanation is that moving to an new area naturally reduces mobility due to the unfamiliarity of the surroundings. 5.2 Mobility Patterns with Ground-truth Situational Data in Riau The importance of this section is based on a close interpretation of mobility-related information revealed from social media and real-world situations including air qual- ity, local context such as infrastructure-based connectivity, and people's custom be- haviors, to qualitatively assess the potential of social media as a complementary data source. With this purpose, we analyse mobility patterns, taking into account the ad- ministrative boundaries in Riau province, of a set of users (838 users) whose home locations are identified as Pekanbaru, the capital city of Riau province and the city with the largest populations in Riau province5 , as well as their tweets (109,096 GPS- stamped tweets). Riau consists of 12 cities and regencies, each of which is identified by a 4-digit post code; a regency or a city consists of sub-districts. For a detailed study, in this section, we limit the timespan to include February 26 and March 23, which is exactly when the information on air quality, officially published by the Indonesian National Board for Disaster Management [6], is available6. Based on the air quality informa- 5Indonesian Central Bureau of Statistics http://riau.bps.go.id/linkTabelStatis/view/id/210 6http://www.menlh.go.id/DATA/ispu riau.PDF 20 Mark Kibanov et al. Table 7: Air quality of different regencies in Pekanbaru between February 26 and March 23 March – – – – – – – – – – – – February – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Postal 23 Code 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 – – – 1401 – – – 1402 – – – 1403 – – 1404 – – B – B – B B B B B B B B B B B B R Y BL BL Y Y Y BL BL 1405 – – – – – – – – – – R Y Y B B Y G G – G BL G G BL 1406 1407 – – – – – – – – – – – 1408 B B R B B B R Y R Y B B B R B B B B Y BL BL BL BL G BL BL – B B B B B B B B B B B B B B B B BL BL BL Y Y – Y BL 1409 1410 – – 1471 Y Y Y Y Y Y Y Y Y Y R B R R B B B B Y BL BL G BL G G BL 1473 B Y B Y R B B B R B B B B R Y B B B G BL BL BL Y BL BL G – – – – – – – – – – B Y – 18 – – – – 20 – – – – 22 – – – – 17 – – – – 19 – – – – 21 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Fig. 10: Map of Riau province with postal codes tion, each day in each regency (identified by 4-digit post code) can be associated with one of the classes of air quality: {'G'reen, 'BL'ue, 'Y'ellow, 'R'ed, 'B'lack}, where 'G'reen means the best air quality, and 'B'lack signifies the worst air quality. Table 7 shows daily air quality in 12 different regencies between February 26 and March 23. Figure 10 shows the locations of those regencies. (1) Diversity of Users' Mobility First, we try to estimate the overall mobility of citizens of Pekanbaru, the capital of Riau Province. Table 8 consists of three parts. The header contains the information about air quality in Pekanbaru. The second part, Table 8[1], contains daily numbers of regencies that citizens of Pekanbaru visit. The third part, Table 8[2], shows how users move inside of different regencies – particularly, how many sud-districts were visited in each regency or city. Figure 10 shows the locations of the regencies in Riau Province. We use the number of cities and regencies visited by them as a measure of their movement diversity. Table 8[1] shows how many different cities and sub-districts in- Mining Social Media to Inform Peatland Fire and Haze Disaster Management 21 Table 8: Distribution of regencies and sub-districts, visited by Pekanbaru resi- dents between Feb 26 and Mar 23 (best viewed in color): [1] (a-b) Number of regencies and cities visited by Pekanbaru citizens out- side (a) and inside (b) Riau [2] Number of sub-districts visited by Pekanbaru residents in each regency Date February 26 27 28 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Air Quality (Pekanbaru) Y Y Y Y Y Y Y Y Y Y R B R R B B B B Y BL BL G BL G BL BL 4 1 3 7 8 5 3 2 3 2 3 5 4 1 3 1 1 0 1 1 1 1 2 6 5 4 2 2 2 1 2 4 2 March 4 0 4 6 2 4 5 2 3 2 0 2 3 0 3 3 0 3 5 1 4 [1] 2 1 1 1 3 2 1 1 3 1 2 2 1 1 1 1 1 1 1 1 1 2 4 4 3 3 3 (a+b) (a) (b) 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1471 1408 6 2 4 1 1 1 3 2 1 4 [2] 1 1 1 1 1 1 2 1 1 1 1 1 1 1 1 1 1 1 2 1 5 5 2 4 4 2 2 2 4 3 4 0 4 1 1 1 2 6 0 6 1 1 1 1 1 2 4 0 4 1 2 2 1 9 2 7 1 1 1 10 10 12 5 4 7 6 1 1 2 1 1 9 2 2 2 1 1 1 1 3 2 2 1 4 5 4 1 4 1 side and outside of Riau were visited by those users. The diversity of visited regencies is consistent most of the time, except during the period following an evacuation rec- ommendation by the local government. In that period users visit many more areas, possibly trying to escape the haze. This type of information, namely whether citizens listen to and act on evacuation advice, is not currently captured by the government in a real-time manner. (2) Mobility Behaviors of Pekanbaru Citizens Next, we demonstrate how social media enables us to recognise the behavioral patterns of users. We use air quality data and other information to try to interpret the identified patterns. This enables us find different insights in social media data. Table 8[2] shows the daily number of sub-districts that Pekanbaru residents visit, based on tweet locational information. For instance, no one who live in Pekanbaru tweets (or visits) in regency 1410 during the period of the study. - 'Moving to Areas with Cleaner Air': During the severe haze situation in Pekanbaru, from March 8 till March 15, users tend to visit regencies in the South (1401, 1402, 1403) and the West (1406, 1407). Southern and western regencies had better air quality than other regencies in Riau, according to information from the media. We also observe more activity in the regency 1408 although the air quality in 1408 is similarly bad to that of Pekanbaru. An investigation confirms that they were present only on the main road of Sumatra island in 1408 which connects to western regencies. - 'Avoiding Areas with Bad Air Quality': The citizens of Pekanbaru avoided visiting the regency 1405 until the air quality improved. Another example of how people avoid 22 Mark Kibanov et al. areas affected by haze are the regencies 1409 and 1473. These regencies were affected by haze during the recommended evacuation period, and users also avoid these areas during that period of time. Fig. 11: Number of users who visit one, two, three, or over four sub-districts per day in Pekanbaru - 'Limited Mobility in Pekanbaru': According to the Table 8[2], regency 1471 has not shown an outstanding dynamical change of the number of sub-districts, while a tendency is observed that people limited mobility before and during the severe haze period. For a closer look, we count the number of users who posted in one, two, three, and more than four sub-districts in regency 1471. In Figure 11, we find a tendency that the number of users who visit one sub-district per day increases and the number of users who visit two more sub-districts slightly decreases during the severe haze period, and especially after the evacuation order. 5.3 Additional Information related to Mobility Patterns In this section, we study mobility patterns by analyzing tweets posted by the users used in previous section, from two different angles, what (possibly) people say and what (possibly) people do. Concerning what people say, we collect and analyze the dynamics of tweets over time mentioning two words, 'home' (rumah) and 'evacua- tion' (evakuasi, ngungsi). Regarding what people do, we identify two lists of tweets posted (i) by Foursquare7 and (ii) using web browsers, instead of via a mobile appli- cation, which is part of the meta-information of a tweet, and present its dynamics in Figure 12. Again similar to the results discussed in Section 5, this does not aim to quantify the exact number of people who stay in or evacuate from affected areas but aims to understand whether this information could show any tendency or behaviour change. First, two thin lines, depicted in red, show what people say. There are peaks around March 13 when the government advised residents to evacuate. The two thicker 7http://foursquare.com 1 sub−district 2 sub−districts 3 sub−districts 4+ sub−districts Evacua&on Yellow R B R R B B B B Y BLUEG BL gggg G BLUE 500 400 300 200 100 0 2/26 3/8 3/13 3/17 3/23 Mining Social Media to Inform Peatland Fire and Haze Disaster Management 23 Fig. 12: Numbers of tweets that (a) mention 'home' or 'evacuation' or (b) are posted using web browsers or from FOURSQUARE lines, depicted in black, signify behaviour. The number of tweets posted by regular web browsers clearly increases around March 13, while the number of Foursquare check-in around the same period of time slightly decreases. We would be able to ref- erence this information to better understand haze-affected residents' behaviors and to complement existing and new types of information for disaster response, but this should be further validated and evaluated which we leave for future research. 6 Discussion - Applications, Challenges, and Collaborations We have mined and analysed social media to test its potential to address a real-world problem, namely the need to provide (near) real-time situational information on peat- land fire and haze disasters in Indonesia, as complementary information. Meanwhile we validated our approach and methods with secondary information, such as quanti- tative data, namely hotspot and air quality, contextual information, including typical evacuation behaviors led by geographical characteristics, and qualitative discussions, namely consultations with officials involved in humanitarian activities in Indonesia, despite limited access to disaster-related data due to the nature of haze disasters. In this chapter, we discuss applications and challenges, by examining other information needs in local and global contexts, briefly explaining a platform we are building for policy-makers based on the results of this analysis, and reviewing research challenges for the attention of the research community. (1) Information Needs Humanitarian action can be characterised by three stages, before , during and after an event, where the before stage involves disaster preparedness and the development of early warning systems, the during stage deals with humanitarian needs during a par- ticular disaster, and the after stage is related to disaster recovery [8]. Even though data and information exist and are commonly used throughout all states8 such as a population distribution as baseline information, different sets of data and information 8For instance, IASC Guidelines Common Operational Datasets (CODs) in Disaster Preparedness and Response (Visit - www.humanitarianresponse.info) "Home" "Evacuation" Web Browser Foursquare 300 250 200 150 100 50 0 0 1 3 5 7 9 11 13 15 17 19 21 23 24 Mark Kibanov et al. are required at each stage. Recently social media has been investigated in both an active mode as a tool for collective knowledge, for instance to map affected areas, assess damage and disseminate information quickly, and in a passive mode such as mining tweets in a humanitarian theatre, for instance to improve an early warning system and better understand supply and demand, as we mentioned in Section 2. Moreover, last year the United Nations adopted the Sendai Framework9, a non- binding agreement for Disaster Risk Reduction as the successor of the Hyogo Frame- work, to better prepare for different natural disasters by providing global guidelines. This framework encourages national disaster management authorities to prioritise na- tional policy agendas for understanding disaster risks and to strengthen disaster risk governance. But some countries, including some developing countries, are experi- encing difficulties in implementing aspects of the guidelines, due in part to missing information, some of which, our and other research suggests to extract or mine from new digital data sources including social media. (2) A system in progress Throughout this article we see that social media can provide useful information, such as a better understand of residents' behavioral changes over time. Section 4 addresses opportunities for before , during and after haze disasters, and Section 5 shows op- portunities for during and after haze disasters. We consulted with officials who have been involved in haze disasters who confirmed that this type of information will be useful for disaster management, but its utility requires further clarification and has to be improved upon taking into account inputs from local and national governments as well as UN agencies. Pulse Lab Jakarta is currently building a system to collect, ana- lyze and visualize relevant data and information including from social media, which was discussed in this article, not only for providing complementary and supplemen- tary information about haze and peatland fires, but also for assisting in the coordina- tion process between different public bodies, who maintain different datasets relevant to disaster response. (3) A common research agenda In this article, we presented the results of analysis connected to a specific disaster, namely haze on the scale witnessed in Indonesia, but from limited angles, for example conversations and mobility patterns, while analyzing GPS-stamped social media data. When we broaden the scope to other types of disasters and their associated research angles and new types of information, many more practical and theoretical research questions arise, but few have been addressed to date by the research community. Social media is a data source that many researchers have recently used for quantitative and qualitative studies of human beings and societies. Clearly, using social media in a passive mode is a task with many challenges, such as whether mined information is correct or not, but we see many opportunities to help (potentially) affected people and disaster management authorities across all three stages of humanitarian action. This article aims to share these findings with the research community but more importantly also aims to refresh this area among researchers and request a collaboration between 9http://www.unisdr.org/we/coordinate/sendai-framework Mining Social Media to Inform Peatland Fire and Haze Disaster Management 25 the research community and the humanitarian sector. UN Global Pulse wishes to foster a stronger link between domain specific challenges and research methods from other disciplines. 7 Summary and Future Work Haze and peatland fires remain a near annual disaster in Indonesia and South-East Asia. As the phenomenon affects millions of citizens in Indonesia and beyond, dis- aster management needs significant improvement. We propose to use social media (Twitter) for haze disaster management by extracting complementary and supple- mentary information. We showed how users of Twitter react to haze emergencies and found correlations between the public discourse on Twitter and peat fire hotspots. We also showed how it is possible to understand the changes in users' travel patterns dur- ing haze periods using social media. We demonstrated that, despite some limitations, social media data can be used to inform disaster management at different stages of an emergency. We aim to encourage additional work and research in this field. Con- cerning our own research agenda, we hope to extend our data sources and to offer data-driven solutions for the management of haze disasters. Acknowledgement We thank Johan Kieft from UN environment who provided insight about haze dis- asters in Indonesia and George Hodge from Pulse Lab Jakarta for his assistance. Furthermore, we acknowledge the use of FIRMS data and imagery from the Land, Atmosphere Near real-time Capability for EOS (LANCE) system operated by the NASA/GSFC/Earth Science Data and Information System (ESDIS) with funding pro- vided by NASA/HQ. References 1. Impact of Haze on Health, Singapore Government, Health Promotion Board. Retrieved September 15, 2015: http://hpb.gov.sg/hopportal/health-article/hpb051226. 2014–2019, of Twitter number 2. Indonesia: users emarketer. Retrieved January 30: http://www.statista.com/statistics/186337/number-of-mobile-broadband-subscriptions-worldwide- since-2005/. 3. NASA Active Fires, NASA FIRMS. Retrieved August 20, 2015: www.globalforestwatch.org. 4. NASA Fire Information for Resource Management System (FIRMS). Retrieved August 20, 2015: earthdata.nasa.gov/data/near-real-time-data/firms. 5. Feasibility Study: Supporting Forest and Peat Fire Management Using Social Media. Technical Re- port 10, UN Global Pulse, 2014. hadapi Bencana, 5, May 2014. 6. Karhutla riau - ini pembakaran bukan kebakaran. Gema BNPB Ketangguhan Bangsa Dalam Meng- 7. F. Abel, C. Hauff, G.-J. Houben, R. Stronkman, and K. Tao. Semantics + Filtering + Search = Twitci- dent. Exploring Information in Social Web Streams. In Proceedings of the 23rd ACM Conference on Hypertext and Social Media, HT '12, pages 285–294, New York, NY, USA, 2012. ACM. 8. S. Amin and M. Goldstein. Data Against Natural Disasters: Establishing Effective Systems for Relief, Recovery, and Reconstruction. The World Bank, 2008. 26 Mark Kibanov et al. 9. M. Avvenuti, S. Cresci, A. Marchetti, C. Meletti, and M. Tesconi. EARS (Earthquake Alert and Report System): A Real Time Decision Support System for Earthquake Crisis Management. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '14, pages 1749–1758, New York, NY, USA, 2014. ACM. 10. M. Avvenuti, S. Cresci, M. N. L. Polla, A. Marchetti, and M. Tesconi. Earthquake emergency man- In 2014 IEEE International Conference on Pervasive Computing and agement by social sensing. Communications Workshops (PERCOM Workshops), pages 587–592, Mar. 2014. 11. M. A. Cameron, R. Power, B. Robinson, and J. Yin. Emergency Situation Awareness from Twitter for Crisis Management. In Proceedings of the 21st International Conference on World Wide Web, WWW '12 Companion, pages 695–698, New York, NY, USA, 2012. ACM. 12. K. M. Carley, M. Malik, M. Kowalchuk, J. Pfeffer, and P. Landwehr. Twitter Usage in Indonesia. Technical report, Institute for Software Research, School of Computer Science, Carnegie Mellon Uni- versity, Pittsburgh, PA 15213, Dec. 2015. 13. S. Cresci, A. Cimino, F. DellOrletta, and M. Tesconi. Crisis Mapping During Natural Disasters via Text Analysis of Social Media Messages. In J. Wang, W. Cellary, D. Wang, H. Wang, S.-C. Chen, T. Li, and Y. Zhang, editors, Web Information Systems Engineering WISE 2015, number 9419 in Lecture Notes in Computer Science, pages 250–258. Springer International Publishing, Nov. 2015. DOI: 10.1007/978-3-319-26187-4 21. 14. E. Frankenberg, D. McKee, and D. Thomas. Health consequences of forest fires in Indonesia. De- mography, 42(1):109–129, Feb. 2005. 15. H. Gao, G. Barbier, and R. Goolsby. Harnessing the Crowdsourcing Power of Social Media for Disaster Relief. IEEE Intelligent Systems, 26(3):10–14, 2011. 16. R. Goolsby. Social Media As Crisis Platform: The Future of Community Maps/Crisis Maps. ACM Trans. Intell. Syst. Technol., 1(1):7:1–7:11, Oct. 2010. 17. P. Holmgren. Fire and haze in Riau: Looking beyond the hotspots. Retrieved September 15, 2015: http://www.eco-business.com/opinion/fire-and-haze-riau-looking-beyond-hotspots/. 18. L. S. Iliadis. A decision support system applying an integrated fuzzy model for long-term forest fire risk estimation. Environmental Modelling & Software, 20(5), May 2005. 19. M. Imran, C. Castillo, F. Diaz, and S. Vieweg. Processing Social Media Messages in Mass Emergency: A Survey. ACM Comput. Surv., 47(4):67:1–67:38, June 2015. 20. M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg. AIDR: Artificial Intelligence for Disaster Response. In Proceedings of the 23rd International Conference on World Wide Web, WWW '14 Companion, pages 159–162, Republic and Canton of Geneva, Switzerland, 2014. International World Wide Web Conferences Steering Committee. 21. M. Imran, S. Elbassuoni, C. Castillo, F. Daz, and P. Meier. Extracting information nuggets from disaster- Related messages in social media. In F. F. T. Comes and 10th International ISCRAM Con- ference on Information Systems for Crisis Response and Management, editors, ISCRAM 2013 Con- ference Proceedings 10th International Conference on Information Systems for Crisis Response and Management, pages 791–801, KIT, Baden-Baden, 2013. Karlsruher Institut fur Technologie. 22. R. K. Jaiswal, S. Mukherjee, K. D. Raju, and R. Saxena. Forest fire risk zone mapping from satellite imagery and GIS. International Journal of Applied Earth Observation and Geoinformation, 4(1):1– 10, Aug. 2002. 23. D.-H. Kim, J. O. Sexton, and J. R. Townshend. Accelerated deforestation in the humid tropics from the 1990s to the 2000s. Geophys. Res. Lett., 42(9):3495–3501, May 2015. 24. M. Krstaji´c, C. Rohrdantz, M. Hund, and A. Weiler. Getting There First: Real-Time Detection of Real-World Incidents on Twitter. The 2nd Workshop on Interactive Visual Text Analytics: Task- Driven Analysis of Social Media Content, 2012. 25. Y. Kryvasheyeu, H. Chen, N. Obradovich, E. Moro, P. Van Hentenryck, J. Fowler, and M. Cebrian. Rapid assessment of disaster damage using social media activity. Science Advances, 2(3):e1500779– e1500779, Mar. 2016. 26. S. Kumar, G. Barbier, M. A. Abbasi, and H. Liu. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM '11, Menlo Park, California, USA, 2011. AAAI Press. 27. B. Mandel, A. Culotta, J. Boulahanis, D. Stark, B. Lewis, and J. Rodrigue. A Demographic Analysis of Online Sentiment During Hurricane Irene. In Proceedings of the Second Workshop on Language in Social Media, LSM '12, pages 27–36, Stroudsburg, PA, USA, 2012. Association for Computational Linguistics. 28. S. E. Middleton, L. Middleton, and S. Modafferi. Real-Time Crisis Mapping of Natural Disasters Using Social Media. IEEE Intelligent Systems, 29(2):9–17, Mar. 2014. Mining Social Media to Inform Peatland Fire and Haze Disaster Management 27 29. F. Morstatter, N. Lubold, H. Pon-Barry, J. Pfeffer, and H. Liu. Finding Eyewitness Tweets During Crises. In Proceedings of the ACL 2014 Workshop on Language Technologies and Computational Social Science, pages 23–27, Baltimore, MD, USA, June 2014. Association for Computational Lin- guistics. 30. T. Oz and H. Bisgin. Attribution of Responsibility and Blame Regarding a Man-made Disaster: #FlintWaterCrisis. In Workshop Social Web for Disaster Management, Indianapolis, USA, Oct. 2016. 31. P. K. Prasetyo, M. Gao, E.-P. Lim, and C. N. Scollon. Social Sensing for Urban Crisis Management: In Social Informatics, number 8238 in Lecture Notes in Computer The Case of Singapore Haze. Science, pages 478–491. Springer International Publishing, 2013. 32. J. Rogstadius. Enhancing Disaster Situational Awareness Through Scalable Curation of Social Media. PhD thesis, Universidade da Madeira, Madeira, 2014. 33. J. Rogstadius, M. Vukovic, C. Teixeira, V. Kostakos, E. Karapanos, and J. Laredo. CrisisTracker: Crowdsourced social media curation for disaster awareness. IBM Journal of Research and Develop- ment, 57(5):4:1–4:13, Sept. 2013. 34. T. Sakaki, M. Okazaki, and Y. Matsuo. Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors. In Proceedings of the 19th International Conference on World Wide Web, WWW '10, pages 851–860, New York, NY, USA, 2010. International World Wide Web Conferences Steering Committee. 35. G. Sakr, I. Elhajj, G. Mitri, and U. Wejinya. Artificial intelligence for forest fire prediction. In 2010 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, AIM '10. Institute of Electrical & Electronics Engineers (IEEE), 2010. 36. A. Schulz, P. Ristoski, and H. Paulheim. I See a Car Crash: Real-Time Detection of Small Scale Incidents in Microblogs. In The Semantic Web: ESWC 2013 Satellite Events, number 7955 in Lecture Notes in Computer Science, pages 22–33. Springer Berlin Heidelberg, 2013. 37. I. S. Sitanggang and M. H. Ismail. Classification model for hotspot occurrences using a decision tree method. Geomatics, Natural Hazards and Risk, 2(2):111–121, June 2011. 38. S. Zhang and S. Vucetic. Semi-supervised Discovery of Informative Tweets During the Emerging Disasters. In Workshop Social Web for Disaster Management, Indianapolis, USA, Oct. 2016. 28 Appendix Mark Kibanov et al. Conversations about forest and peat fires and haze, detected primarily by the keywords - 9,707 tweets (e.g., "When the haze problem will be solved?"): ( (disasterstormpollutionseverethickfog) && (haze)∗) OR ( (dangeralertemergencystrongheavy) && (haze)∗) OR ( hazefire spotfire sourcehotspotair pollutionhaze†) OR ( forest fire†) OR ( (damageloggingkopenfire deforestationloggingk) && (forestfieldlandpeat) ) Conversations which contain one of identified hashtags - 3,024 tweets (e.g., "Let's participate in #melawanasap movement."): ( #saveriau#prayforriau#melawanasap#prayforasap#hentikanasap ) Conversations about happenings in a negative way due to haze, such as flight delay or school closing - 6,994 tweets (e.g., "Day #3 off because of haze."): ( (closecancelcacelleddelaydelay†cancel†closed) && (flightairport) ) OR ( visibility ) OR ( (schoolcollegeuniversity) && (closedcloseleaveleft) ) OR ( (economyimpacteffectlossdownrisk) && (haze)∗) Conversations with keywords indicating haze-related or derivable diseases - 46,241 tweets (e.g., Welcome to Pekanbaru; do not forget to wear mask!"): ( (infectionstertorous) && (respiratorybreathbreathing) ) OR ( (irritationinflammation) && (eyeskinthroatnoselungs‡) ) OR ( coughheadachesickari§maskasthmaasthma†lungs‡) OR ( (haze)∗&& (healthhealthybreathpregnantchild elderly) ) OR ( eye && (soreirritateacute)¶) general haze- hashtag haze- impact haze- health haze- Table 9: English translation of the filtering rules for the identification of corre- sponding tweets, see Table 2 ∗"Kabut asap" is translated as "haze". Both words "kabut" and "asap" are also often used to describe haze. However, if used not together, both words also may have further meanings. †These keywords were originally used in English. kBoth words "pembalakan" and "penebangan" are synonymous and mean "logging". ‡"Paru-paru" is translated as "lungs". Sometimes, the word "paru" is translated as "lungs" as well. The word "paru" is ambiguous unless it is put in context with further words, such as "infection". §ARI stands for Acute Respiratory Infection. We used the abbreviation ISPA (Infeksi Saluran Per- nafasan Akut) which is commonly used by Indonesian Twitter users. ¶All three terms "pedih", "perih", "sakit" describe the eye sore.
1810.01012
1
1810
2018-10-01T23:31:34
Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults
[ "cs.SI" ]
The recent surge in women reporting sexual assault and harassment (e.g., #metoo campaign) has highlighted a longstanding societal crisis. This injustice is partly due to a culture of discrediting women who report such crimes and also, rape myths (e.g., 'women lie about rape'). Social web can facilitate the further proliferation of deceptive beliefs and culture of rape myths through intentional messaging by malicious actors. This multidisciplinary study investigates Twitter posts related to sexual assaults and rape myths for characterizing the types of malicious intent, which leads to the beliefs on discrediting women and rape myths. Specifically, we first propose a novel malicious intent typology for social media using the guidance of social construction theory from policy literature that includes Accusational, Validational, or Sensational intent categories. We then present and evaluate a malicious intent classification model for a Twitter post using semantic features of the intent senses learned with the help of convolutional neural networks. Lastly, we analyze a Twitter dataset of four months using the intent classification model to study narrative contexts in which malicious intents are expressed and discuss their implications for gender violence policy design.
cs.SI
cs
2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI'18) Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults Rahul Pandey Hemant Purohit Bonnie Stabile Aubrey Grant George Mason University George Mason University George Mason University George Mason University Fairfax, VA, USA [email protected] Fairfax, VA, USA [email protected] Fairfax, VA, USA [email protected] Fairfax, VA, USA [email protected] 8 1 0 2 t c O 1 ] I S . s c [ 1 v 2 1 0 1 0 . 0 1 8 1 : v i X r a Abstract -- The recent surge in women reporting sexual assault and harassment (e.g., #metoo campaign) has highlighted a long- standing societal crisis. This injustice is partly due to a culture of discrediting women who report such crimes and also, rape myths (e.g., 'women lie about rape'). Social web can facilitate the further proliferation of deceptive beliefs and culture of rape myths through intentional messaging by malicious actors. This multidisciplinary study investigates Twitter posts related to sexual assaults and rape myths for characterizing the types of malicious intent, which leads to the beliefs on discrediting women and rape myths. Specifically, we first propose a novel malicious intent typology for social media using the guidance of social construction theory from policy literature that includes Accusational, Validational, or Sensational intent categories. We then present and evaluate a malicious intent classification model for a Twitter post using semantic features of the intent senses learned with the help of convolutional neural networks. Lastly, we analyze a Twitter dataset of four months using the intent classification model to study narrative contexts in which malicious intents are expressed and discuss their implications for gender violence policy design. Keywords-Intent Mining, Convolutional Neural Networks, Policy-affecting intent, Public Health Analytics, Rape Myths I. INTRODUCTION Rape and sexual assault are pervasive, long-standing, soci- etal problems. One out of every six American women, and one in every 33 men - or about 17% and 3% of the population, re- spectively - have been the victim of an attempted or completed rape in their lifetime [1]. Younger people are more likely to be victims of these crimes. In institutions of higher education (IHEs), 23.1% of female and 5.4% of male undergraduate students experience rape or sexual assault by use of physical force, violence, or incapacitation [2], yet an estimated 80% of incidents are not reported [3]. Rape or sexual assault are about half as likely to be reported to police as robbery (54%) and aggravated assault (58%), with the former being reported in only about a quarter of all cases (23%) [4]. Social stigma surrounding sexual crimes likely contributes to this low level of reporting. This in turn likely emboldens perpetrators, who act with the confidence of relative impunity given the low level of reporting, and even more remote likelihood of prosecution. Rape and sexual assault constitute injustices that impose both human and financial costs on individuals, and society as a whole, while also furthering gender inequality. It is the role of law and policy to address public problems such as the mitigation of these sexual assault crimes out of an obligation to lessen harms, protect the autonomy of citizens, and secure justice. Public attitudes such as those reflected in social media allow the better understanding of the nature of public beliefs and the associated intentions at large scale [5]. Thus, in principle, social media mining can inform policymakers to ultimately help in the policy formulation and revision of laws as well as improve the policy outcomes. This research investigates prominent intentional message themes on Twitter regarding sexual assault in order to understand the extent and help mitigate the effect of rape myths - especially the myth that 'women lie about rape', which is one of the most frequently endorsed rape myths [6]. Using the guidance of social construction theory, which explains how policy is influenced by perceptions of target populations [7], we propose a novel malicious intent typology and an automated classifier for categorizing Twitter messages into the relevant classes of Accusational (blaming someone or a group), Validational (endorsing a belief), and Sensational (creating uncertainty and fear). Table I shows examples of such intentional mes- sages. Addressing the problem of identifying such intentional messages related to sexual assault and rape on social media provides the intelligence to better understand and assess the context in which the public expresses deceptive beliefs. The specific contributions of this study are the following: 1) We propose a novel malicious intent typology and an intent classification method using distributional seman- tics for social media messages. Our evaluation against several baselines shows the effectiveness of our feature representation of intent senses learned from convolutional neural networks. 2) To our knowledge, this is the first large-scale multi- disciplinary study to explore policy-affecting malicious intent and their contexts in social media, using a novel application of social construction theory. We present a scalable alternative for collecting information to help policy analysts for gender inequality and complement the costly survey-driven methods. 3) We present novel insights on the context of malicious intents regarding sexual assault and rape myths in Twitter dataset collected over 4 months. We found that accusa- ANONYMIZED EXAMPLE OF MESSAGES WITH VARIED INTENT IN THE CONVERSATION ON TWITTER REGARDING SEXUAL ASSAULT. TABLE I Twitter Message M1. white women have lied about rape against black men for generations M2. Listening to #Dutton say women on #Nauru who have been raped are often lying makes me sick. Showing us once again his misogyny &amp; sexism M3. There is no New Clinton, never has been. Shes the same rape defending, racist, homophobic liar shes been for 70 yrs URL Policy-affecting Intent Accusational Validational Sensational tional intent messages are the most prevalent in social me- dia. Such messages reflect public beliefs that undermine the credibility of women who report rape and express more concern for accusers than the accused, with clear implications for policy debate, design, and outcomes. The rest of the paper is organized as follows. Section II provides a background on social construction theory and its novel application to understanding policy-relevant beliefs about sexual assaults including rape myths. Section III presents our approach for acquiring meaningful intent categories and classifying intentional messages. Section IV then describes the experimental setup with several baselines to classify inten- tional messages on Twitter and compare against the proposed model. Section V presents result analysis for categorization by intent typology as well as the topic modeling and psycholin- guistics analysis of the context of intentional messages before the discussion in Section VI and conclusion. II. BACKGROUND AND RELATED WORK This section presents related work on social construction theory, its use for identifying policy-affecting intent categories, and then finally, user intent modeling on social media. A. Social Construction, Rape Myths, and Policy The social construction theory of target populations explains "who benefits and loses from policy change," depending on whether they are seen positively in the public sphere [7]. Those who are viewed in a negative light are less likely to find policies shaped in their favor, while those who are positively socially constructed and powerful (known as the "advantaged") are more likely to be benefited by policy. Groups that are negatively socially constructed and weak (known as the "deviants") are more likely to be condemned in public discourse and disadvantaged by policy. Sexual assault policies primarily affect two populations: accusers (victims) and the accused (perpetrators). Policies that facilitate the reporting and punishment of sexual assault benefit accusers, but are seen by some as infringing on the rights of the accused. Some fear that promulgating such policies will result in an unreasonably high number of false reports of rape or sex- ual assault, while, quite to the contrary, evidence demonstrates that this has been a historically underreported crime. Criminal justice data indicate that the rate of false rape accusations is no more than false allegations of other criminal offenses [8], [9], [10], and place false allegations of rape at around just 5% [11]. Despite this low figure, public dialogue and policy discussions suggest that there is a belief that the incidence of false reports of rape is much higher. This false belief leads to policy outcomes that favor the rights and wellbeing of the accused over those of the accuser, and, paradoxically, may even contribute to the continued suppression of rape reporting. Negative characterizations of accusers are evident in social constructions of women perpetuated through social media, among other means. Feminist scholars have long argued that rape myths contribute to such characterizations by casting doubt on the very existence of rape, and that the widespread acceptance of rape myths has practical implications [12]. The Illinois Rape Myth Acceptance Scale, a tool used to measure rape myth acceptance [13] is divided into four categories or subscales: 1) She asked for it; 2) He didn't mean to; 3) It wasn't really rape; and, 4) She lied. Taken together, these myths characterize women negatively, as lacking credibility, at a minimum, or even as routinely and willfully practicing deceit. Such ideas are rooted in long-standing cultural norms; the origins of the myth that women lie about rape as vengeful retaliation towards men who reject their advances can be traced back to Greek and Judeo-Christian theology [9]. Table II summarizes the policy-relevant characterization of the key actors in rape and sexual assault context for our analysis. In short, accusers (mostly young women) have historically been widely characterized negatively as lying or promiscuous - "deviants" in the social construction framework. They have also traditionally been cast as "dependents," lacking political or economic power. The accused (mostly young men) are often seen in terms of their prowess as athletes or students, or their promise as breadwinners, and so are positively con- structed as "advantaged". Advantaged groups are least likely to experience burdens and Deviant groups are at the highest risk, since "punishment" of those in this latter group "yields substantial political payoffs" for policymakers and political actors, as does rewarding those in the former group [14], [15]. Therefore, groups characterized as Advantaged and Deviant are the most discussed in political dialogue, a pattern that we expect to see mirrored in social media, where the payoffs might be counted in spreading of a deceptive idea or belief. Social media can be said to both reflect and perpetuate prevailing social constructions through both informal online dialogue and intentional messaging by various stakeholders. It has been demonstrated that rape myth acceptance is associ- ated with negative attitudes about women [16], stronger anti- victim, pro-defendant judgments [17], and influencing "what is considered a 'legitimate rape' and who is considered a 'credible victim' [18]." Therefore, advancing understanding of SOCIAL CONSTRUCTION FRAMEWORK AND POLICY-RELEVANT CHARACTERIZATIONS OF ACTORS IN RAPE AND SEXUAL ASSAULT. TABLE II Social Construction Positive Advantaged Negative Contender Power Strong Weak Accused cast as athletes, breadwinners, men with potential [Policy benefits the Accused, burdens Accuser] Dependents Accusers seen as innocents, victims, not blameworthy, but lack political power; Accused seen as premeditating criminals [Policy may benefit Accusers or move towards holding Accused more accountable] Accusers have political power to influence policy, but may be cast negatively as promiscuous, feminist or abrasive [Policy may move toward accountability for Accused] Deviants Accusers cast as liars, "sluts" or vengeful women [Policy benefits the Accused, burdens Accusers with vocal support of politicians and public] social media's role in propagating (or combating) rape myths is expected to assist policymakers. Analyzing the context of malicious intent in propagating the rape myths, or otherwise deceptive beliefs to discredit women is the first essential step. We discuss some specific examples of policy that can precipitate and be influenced by social media dialogue on rape and sexual assault as follows. The federal guidance on Title IX issued by the Obama Administration and state level affirmative consent laws, are two classes of policy interventions designed to address the injustice of widespread campus sexual assault, its underreporting, and inadequate institutional response. The former, the U.S. Department of Education's Office for Civil Rights' (OCR) Dear Colleague Letter of 2011, articulated to all school districts, colleges, and universities that Title IX of the Education Amendments of 1972 would now consider "sexual harassment of students, which includes acts of sexual violence[as] a form of sex discrimination prohibited by Title IX" of the Civil Rights Act of 1964. Likewise, California's "Yes Means Yes" law, passed in 2014, New York's "Enough is Enough" law and Illinois' "Preventing Sexual Violence in Higher Education Act," passed in 2015, as well as Connecti- cut's "Yes Means Yes" law, passed in 2016, are another set of examples to include parallel provisions. Both the Obama Administration's Title IX guidance and state-level Affirmative Consent laws can be construed as benefiting victims and burdening the accused relative to their former positions. The social construction framework shown in Table II, which explains how powerful stereotypes influence policy outcomes, can aid in understanding the contexts of the forces at play. For instance, in the opposition to existing policies and showing beliefs for rape myths by sharing intentional messages. B. Modeling User Intent on Social Media User intent mining has been traditionally investigated in the domain of Information Retrieval and Web Search for better understanding of user query intent. The approach was to exploit historical user data from search logs and click sequence graphs for broad categories of navigational, informational, and transactional intent [19]. It has been a relatively new area of investigation in social media research [20], where recent works have investigated the intent classification problem for social media text in specific domains such as buying-selling intent for commercial products [21] and help seeking-offering intent during disasters [22] as well as in general, across different topics for recommendations such as travel and food [23]. Intent classification is a special type of text classification focused on action-oriented cues in the text, which differs from topic classification, which is focused on the subject matter and sentiment or emotion classification, which is focused on the current state of affairs [24], [25]. Therefore, the focus of feature representation and algorithms for learning have variations across these different types of problems. Intent expressed in social media messages can be observed in both implicit and explicit forms. Implicit intent refers to latent or hidden aim for the action behind the expressed cues, such as message M2 in Table I, where the author is trying to validate the presented fact for the purpose of convincing others. In contrast, explicit intent refers to a specific aim for the action expressed in the text, for instance, message M1 in Table I clearly expresses the belief to accuse a particular gender group. Thus, our study requires the modeling of both explicit and implicit intent forms from short-text messages of social media, in contrast to the prior work on explicit intent identification in general [23], [25]. Next, we describe our method to acquire relevant intent typology and then categorize messages for the intent types. III. APPROACH: POLICY-AFFECTING INTENT ANALYTICS This section first describes our dataset and then the solution of an intent typology, followed by our classification method. A. Dataset We collected Twitter posts using the keyword-based ('fil- ter/track') method of Twitter Streaming API for the period of four months - August 1 to December 1 2016 using Citi- zenHelper system [26]. and the seed keywords of 'rape' and 'sexual assault'. Our dataset contained a total of 5,434,784 tweets. For our study, we created a subset of data containing deception or myth related terms using the following lexicon, chosen based on the prior literature about rape myths and reporting on sexual assault [6], [27]: lie, lying, lied, liar, hoax, fake, false, fabricated, made up. The filtered subset contained 112,369 tweets (referred as 'myth dataset' in the paper for clarity), which we investigate for policy-affecting intent. B. Policy-affecting Intent Typology Using social construction theory and the constructed an- alytical framework as shown in Table II, we inferred the commonalities for potential malicious intent types across the four quadrants of policy-affecting characterization of actors. We list the prevalent intent types in the following. We also consulted two sexual assault policy subject-matter experts, who further independently reviewed and validated the policy- affecting intent types and the associated themes in the top 100 'retweet' messages (forwarded tweets) extracted from our myth dataset. The resulting specific intent categories are as follows: Accusational, Validational, Sensational, or None, where • "Accusational" messages express doubts about or under- mine accusers; express more concern for the accused than the accuser; and/or perpetuate the idea that women lie about rape. • "Validational" messages express belief in the accuser; and /or point out the injustice of the crime for an accuser or accused, and/or the inadequacy of the punishment. • "Sensational" messages focus more on politics or provo- cation than on the issue of rape or sexual assault; intent may be primarily to frighten, politicize or sensationalize with these terms, but not to affirm, accuse or meaningfully inform regarding rape or sexual assault. Messages categorized as Accusational are expected to both reflect and perpetuate the Advantaged status of the accused and the Deviant status of accusers. While Validational messages might contribute to changing the quadrant category of the accused or accusers. For instance, accusers from the position of Deviants to a quadrant where they might be more posi- tively socially constructed (as Dependents) or seen as having stronger political power (as Contenders). C. Intent Classification We used the three key intent types to define our task of automated intent categorization in the following. senses intentional in a text Intent classification is a complex problem due to the likelihood of various that complicate natural language interpretation. There are two key challenges for classifying intentional messages on the social media. First, the cues for indicating an intent category are sparsely present in a short-text message with the lack of sufficient contextual details. Thus, feature extraction to efficient capture intent representation becomes challenging due to the surrounding noise, resulting in poor learning of the useful regularities and patterns. Second, a specific intent can be expressed in a variety of textual forms (e.g., consider message M2 in Table I for the Validational class illustration that could be written in different ways). Collecting such varied examples of intent expressions within each category to create a large training sample for efficient machine learning is a daunting challenge. Our proposed approach addresses these challenges of inferring intent from the short-text by observing an analogy in the domain of computer vision, where an image is constituted of multiple sparse cues that give the image an overall meaning and context. Computer vision research has exploited a distributed semantic representation of the cues and applying deep learning methods for efficient performance in image processing tasks, such as Convolutional Neural Network (CNN). We, therefore, adapt the distributed semantic representation via word embedding for our feature representation of sparse intent cues in the short-text messages. However, for small dataset the CNN based learning approach is not efficient and generally, the deep learning approaches require large amount of training data for the requirement of optimizing a large number of parameters. Thus, we resolve to rather leverage the fully connected layer in the CNN architecture as an efficient feature representation in the traditional logistic regression classification model. We will discuss details and comparison with several baseline models in the following subsection after data annotation. 1) Data Annotation: We randomly sampled 2500 unique messages from the myth dataset for annotation of intent categories. We asked for minimum three annotators to label each message with the four intent classes: Accusational, Validational, Sensational, or None. We provided instructions to label with five examples of each class. For the resulting annotated messages, we used the confidence score greater than 67% for finalizing the label of a message as per the annotation quality metric of Figure Eight crowdsourcing platform1. We concluded with the final labeled dataset of 1163 messages. The resulting label distribution of the classes is: Accusational: 530 (46%), Validational: 161 (14%), Sensational: 347 (30%), and Other: 125 (10%). The annotation results suggest an imbalance distribution of the policy-affecting intent messages, consistent with the real world machine learning tasks. Next, we describe an automated multiclass intent classification approach to categorize the larger myth dataset for our analysis. 2) Feature Extraction and Learning Algorithm: Prior re- search on intent classification on social media has used a variety of human-created rules as features [28], [22] as well as automatically extracted features such as bag-of-words, n- grams, and Part-of-Speech tags [21]. Instead of exploiting human-created rules as features due to the cost of creating an exhaustive list of rules to capture different intent expressions, we resolve to automatically generating the higher abstract- 1https://success.figure-eight.com/hc/en-us/articles/201855939-How-to- Calculate-a-Confidence-Score Fig. 1. Summary of the proposed intent classification model that uses distributed semantics features as the last layer of CNN architecture. level features. We compare the classic Bag-of-Words model for features against the distributional semantics based model of word embedding for features, of the message text. In particular, we use the publicly available pretrained word2vec vectors for creating distributional semantic representation of each word in a message text. The pre-trained word vectors were generated by neural language models trained over 100 billion words of Google News data [29]. Prior to that, we used standard text cleaning for removing special characters, and only kept the words with minimum frequency of 3 (based on multiple trials.) We considered two different learning algorithms for our experiments. First, using a generalized linear model of logistic regression and second, using deep neural network model of CNN with softmax as classifier. The reason for exploring in-depth various feature-model combinations and the two algorithmic approaches is twofold. First, our dataset is small enough to train a model for efficient semantic representation by itself; hence, a pure deep learning based softmax classifier could not classify efficiently. Second, we have sparse cues for indicating intent that could limit the efficiency of feature representation by only the traditional Bag-of-Words or rule- based feature representation with linear models. Our resultant approach is to use the deep neural network model as the feature extractor with a traditional classifier. Specifically, the proposed model includes CNN codes (with adapted word2vec embedding) as features for a logistic regres- sion classifier. We used a three step process as follows. First, we trained a CNN model, where we adapted the pretrained word2vec embedding to our event dataset for initialization, likewise [30] (implementation details in baseline B3). Then, we used the fully connected layer output as the fixed feature set of CNN codes, which were used to train a logistic regression classifier. Figure 1 summarizes our proposed approach. Fig. 2. Comparison of stratified 10-fold CV results for different feature representation and machine learning models for policy-affecting intent classi- fication. Our method 'word2vec-adapted-Logistic' performs the best. IV. EXPERIMENTAL SETUP We evaluate the performance of our multiclass classification model using the standard metrics of accuracy and micro F- score with the stratified 10-fold cross validation (CV). Accu- racy computes the percentage of the total number of correctly predicted messages, while micro F-score computes per class the value of weighted average of the precision (number of relevant messages among the predicted messages) and recall (sensitivity) [31]. We implement using python gensim library. We created the following baseline schemes: • [B1] BoW Features + Linear Model. We generated tf- idf features for each message and trained with logistic re- gression model. We considered unigram words and then, applied Lovins stemming algorithm to get the stem words, and took maximum 1000 words as default parameters. • [B2] word2vec Average Features + Linear Model. We computed the average word vectors of all the words in a message by using the pretrained Google's word2vec embeddings. Using the average vectors as features, we trained a logistic regression model. • [B3] Random Initialized Embedding + CNN (Soft- max). We followed the approach of Kim [30] for de- signing a CNN model for text classification. It consists of embedding of shape vocabulary size (735) x dimen- sion (300) followed by 3 parallel convolutional-maxpool paired layer with convolution filter sizes as 3, 4 and 5 respectively. They are linked to a fully connected layer of size 384. Then, a dropout layer with 50% dropout for regularization is connected and at last, softmax layer for classification probability. We added l2-loss for non- linearity and cross-entropy as loss function, which is reduced by Adam Optimizer [30]. Training was done with higher learning rate (0.005) initially for faster reduction of loss, and then, we slowly decreased the learning rate up to 0.0001 to get the minimum loss. • [B4] word2vec Initialized Embedding + CNN (Soft- max). We used the same architecture as above but initial- ized the embedding layers with Google's word2vec and then trained in the same way. • [B5] CNN (Randomly Initialized) Codes + Linear Model. In this scenario, we used a two step process. First, we trained the CNN model same as the above experiments with our training data. Then, we used the fully connected layer output as the fixed feature vectors of CNN Codes. Finally, we used these CNN codes for training logistic regression classifier. Figure 2 shows the stratified 10-fold cross validation results. V. RESULT ANALYSIS In this section, we first discuss the automated classification performance and intent prediction on the myth dataset using the proposed classifier. We then present an analysis and policy implication of the topical contexts of messages in the myth dataset categorized by the predicted intent classes. A. Classifier Performance and Prediction Results Figure 2 shows the better performance of our proposed classifier in comparison to all the baselines, by leveraging the semantic representation based on CNN codes initialized with word2vec and trained on the generalized linear model of logistic regression. The external knowledge in word2vec of representing varied contexts for the words helps in addressing the challenge of sparsity in efficiently learning intent represen- tations from a small training set. Modeling intent from social media text is a challenging task in general, such as maximum F-score of 58% for classifying general intent types (e.g., travel, food, commercial goods, event) on Twitter [23]. Albeit, our results show better performance of the proposed method for the domain-specific intent inference task. In particular, our approach achieved micro F-score for the policy-affecting intent classes up to 97.3% for Accusational, 96.9% for Validational and 97.8% for Sensational as well as both accuracy and macro F-score as 96.9%. A potential reason for the best performance in learning Accusational intent category is likely the explicit nature of intent expression when accusing a target. On the contrary, we note the inferior performance for the Validational class in contrast to other classes potentially due to the highly implicit nature of Validational intent expression as described earlier for the example M2 in Table I. We also intentionally Fig. 3. Distribution of predicted messages across the intent categories. did not balance the training dataset for learning to capture the real data distribution, as we apply the classifier for predicting categorical messages in the myth dataset next. For our analysis, we consider only the unique messages for prediction task input (i.e. removing duplicates using Leven- shtein string similarity ≥ 0.8, such as retweets or opinions on news headlines shared as tweets). The resulting non- duplicate message set comprised of 31,129 tweets and the intent category distribution of the predicted myth dataset is shown in Figure 3. We observed the prevalence of Accusational intent mes- sages in the myth-related dataset. Examples of such predicted messages include the following, where feminists are being accused: "still a mra favourite tweet to feminists , just hoping that we will fire back w stats on false rape reporting url" It indicates the utility of social media as a source to collect information on public beliefs regarding sexual assault policy related actors - accusers and accused as well as stakeholders. Furthermore, nearly one third of the messages are categorized as Sensational indicating the role of social media as a channel to propagate agendas while mixing the context with any actor in the social construction framework, such as the following predicted message tries to create a narrative with political motives. "bill clinton who is been impeached, disbarred, accused of rape, other sexual misconduct, lying under oath is about tell" Next, we analyze the topical context of how the public expresses intent in the categorized messages and the associated policy implications. B. Topical Context Analysis We conducted a topic modeling analysis of the predicted intent category sets. Topic modeling provides a mechanism to discover latent themes based on semantic associations be- tween words by creating clusters that represent abstract topics. Although it requires parameter tuning to generate human- interpretable topics. A popular approach for topic modeling is to employ Latent Dirichlet Allocation (LDA) algorithm proposed by [32]. After standard text preprocessing steps of stop word removal and lemmatization, we trained the LDA model with default parameters using the topic modeling implementation in MALLET toolkit [33]. We experimented for different number of topics and found 5 topics suitable for our analysis with distinct themes. Table III shows the comparative TOPICAL CLUSTER OF WORDS EXTRACTED FROM MESSAGES ACROSS DIFFERENT POLICY-RELEVANT INTENT CATEGORIES. TABLE III TOPIC 1 TOPIC 2 TOPIC 3 Acccusational rape url raped lie false women lying case men girls time white made black rapes saint accused money rapist shit man asaram police hoax victims found year allegation stone forced fined number fact revenge females delhi free media lot rolling lied bapu filed assault allegations real accuser stop guilty report lives hate charge feminists lies attention assaulted derrick trial support Sensational url lie fake sexual lied steal made charges accused criminal trial called court taxes raping muslim defended abuse white real rapes year kill donald corrupt cheat vote hoax muslims pedophile proven laughed benghazi war hate calls ass world shit Validational fake victims accused victim reported girl case fuck proven called white claim culture life making falsely understand reason stories rapists liar claims stop thing police report accusation innocent raping evidence low guilty actual charges feel talking woman hard lies assume rape lying liar trump hillary raped women bill clinton assault victim false victims case murder racist media lying women assault lied girls true ppl child bad problem year makes wrong good things call hate world calling man support time assaults analysis of the top three identified topical clusters (due to space limitation). We observe that messages with Accusational intent about rape and sexual assault myths have the context of intent about specific target groups across gender ('men' and 'women'), race ('white'), religion ('asaram' is a religious leader), and occupations ('police') as evident. In contrast, messages with Sensational intent focus on the trending news topics related to politics and current affairs, which is plausible with our theory that the prime purpose of such user intent is to create the alternative narrative for a target (e.g., a political actor 'donald') in connection with the context of rape and sexual assault. We can observe a different theme for the Validational intent messages, where the context is focused on verifying or validating the facts and stories on existing or alleged crimes against women (e.g., 'reported', 'claim', and 'proven' in the Validational column). C. Psycholinguistic Analysis We investigate the different psychological patterns in the context of expressing specific intent. For this purpose, we use the popular psychometric analysis software Linguistic Inquiry Word Count (LIWC) [34]. LIWC counts words in psychologically meaningful categories for a given text. For this analysis, we randomly sampled 2000 messages from each of the predicted intent category set and ran through LIWC. We found three key observations in the LIWC measures. First, Accusational and Validational intent messages use causal writing style, which can be associated with their objective of convincing others about different myths and claims of a rational approach. Second, Validational intent messages express greater certainty in the context of communication, partly attributed to the observation in the topical context analysis where we found that the context of such messages in often about the facts or stories from the past. Third, Sensational intent messages use greater expression of power and negative emotion than any of the other categories. It can be understood in the context of creating sensation by bullying and showing strong subjectivity towards a target or topic. These observations provide guidance towards the design of potential features to improve identification of policy-affecting intent messages as well as their topical context in future studies. VI. DISCUSSION This study presented novel insights on the contexts of using social networks as a means to reflect or perpetuate rape and sexual assault related myths. We investigated a novel adaption of the framework of social construction theory that helped identify policy-relevant actors in the conversations about rape and sexual assault on social media. Using the guidance of the social construction framework, we discovered three types of policy-affecting intent categories and proposed a novel intent categorization scheme for social media. This approach provides a scalable alternative for collecting information that can assist the policy analysts on gender violence and can complement the existing costly, survey-driven methods. We demonstrated a novel design of intent classifier for short-text by using a rich feature representation based on the adaptation of pretrained word2vec embedding, which helped overcome the challenge of efficiently capturing the sparse cues of intent indicators in text messages with large labeled data. Finally, we analyzed a four month data set to identify the themes in which intent is expressed regarding myths about rape and sexual assault. We observed that Accusational intent messages are the most prevalent in social media, with a contextual focus on public beliefs. They target the credibility of women and highlight the 'advantaged' status of male accusers that has a clear influence on social construction and policy development. This research study has, however, some limitations that provide a direction for future work. We have only used English language tweets for a fixed time duration and thus, did not account for the time-based comparison of different gender myths events across multiple languages. It is partly due to the challenge of modeling intent in another language, where the semantics of how intents are expressed could require a different approach to develop an efficient feature representa- tion for learning. Also, since the data collection was done based on keyword-based approach, in future one can study the presence of malicious intent types in the dataset collected through random samples of tweet stream for a particular location. Given the complexity of modeling policy-affecting intent, we also plan to investigate novel neural language models while incorporating perceptual and cognitive features associated with specific intent types, as identified in the LIWC analysis. Finally, the presented analysis approach using the so- cial construction framework can be extended for studying rape and sexual assault related myths on another social networking platform. Also, a future study could compare the prevalence of specific policy-affecting intent categories and their context across the different social networking platforms. VII. CONCLUSIONS In this paper, we presented the first quantitative analysis of policy-affecting intent expressed on social media regarding rape and sexual assault by a novel application of social construction theory. We showed that by using a social con- struction framework, meaningful categories of malicious intent associated with public beliefs can be identified, with key policy design implications. We demonstrated a novel CNN-based policy-affecting malicious intent classifier with micro F-score up to 97% for an intent class, by representing and learning the semantics of sparse intent cues in the short-text Twitter messages via external knowledge of word2vec embeddings. When compared with traditional methods based on bag-of- words representation, the deep learning based CNN approach with pre-trained word vector representations generated more optimal features for efficient learning. The identified intent- related messages were used to discover the contexts using topic modeling analysis, where we found that the public uses social media regarding rape and sexual assault extensively for Accusational and Sensational intent themes with a focus on targeted groups. Such targets include race and occupation that aim to undermine the credibility of women and highlight the Advantaged status of male accused. This analysis presents a direction for the use of social media analytics for assisting the information needs of policy analysts for the design, develop- ment, and analysis of rape and sexual assault related policies. Reproducibility. Data is available upon request for research. VIII. ACKNOWLEDGEMENT Authors thank WI'18 reviewers for valuable feedback and also, U.S. National Science Foundation for grant IIS-1657379. REFERENCES [1] RAINN, Victims of Sexual Violence Statistics., 2017b. [Online]. Available: https://www.rainn.org/statistics/victims-sexual-violence [2] D. Cantor, B. Fisher, S. H. Chibnall, R. Townsend, H. Lee, G. Thomas, C. Bruce, and I. Westat, "Report on the aau campus climate survey on sexual assault and sexual misconduct," 2015. [3] N. R. Council, Estimating Rape and of Sexual Assault, C. Kruttschnitt, W. D. Kalsbeek, and C. C. House, The National Academies Press, 2014. [Online]. Available: https://www.nap.edu/catalog/18605/ estimating-the-incidence-of-rape-and-sexual-assault Eds. Washington, DC: Incidence the [4] B. of Justice Statistics., Criminal Victimization, 2016., 2017. [Online]. Available: https://www.bjs.gov/content/pub/pdf/cv16 sum.pdf [5] H. Purohit, T. Banerjee, A. Hampton, V. L. Shalin, N. Bhandutia, and A. Sheth, "Gender-based violence in 140 characters or fewer: A# bigdata case study of twitter," First Monday, vol. 21, no. 1, 2016. [6] R. Franiuk, J. L. Seefelt, S. L. Cepress, and J. A. Vandello, "Prevalence and effects of rape myths in print journalism: The kobe bryant case," Violence Against Women, vol. 14, no. 3, pp. 287 -- 309, 2008. [7] A. L. Schneider, H. Ingram, and P. Deleon, "Democratic policy design: Social construction of target populations," Theories of the policy process, vol. 3, pp. 105 -- 149, 2014. [8] P. N. Rumney, "False allegations of rape," The Cambridge Law Journal, vol. 65, no. 1, pp. 128 -- 158, 2006. [9] K. M. Edwards, J. A. Turchik, C. M. Dardis, N. Reynolds, and C. A. Gidycz, "Rape myths: History, individual and institutional-level presence, and implications for change," Sex Roles, vol. 65, no. 11-12, pp. 761 -- 773, 2011. [10] C. Gunby, A. Carline, and C. Beynon, "Regretting it after? focus group perspectives on alcohol consumption, nonconsensual sex and false allegations of rape," Social & Legal Studies, vol. 22, no. 1, pp. 87 -- 106, 2013. [11] C. E. Ferguson and J. M. Malouff, "Assessing police classifications of sexual assault reports: A meta-analysis of false reporting rates," Archives of sexual behavior, vol. 45, no. 5, pp. 1185 -- 1193, 2016. [12] M. R. Burt and R. S. Albin, "Rape myths, rape definitions, and probability of conviction," Journal of Applied Social Psychology, vol. 11, no. 3, pp. 212 -- 230, 1981. [13] S. McMahon and G. L. Farmer, "An updated measure for assessing subtle rape myths," Social Work Research, vol. 35(2), pp. 71 -- 81, 2011. [14] A. L. Schneider and H. M. Ingram, Policy design for democracy. University Press of Kansas, 1997. [15] B. Stabile, "Reproductive policy and the social construction of mother- hood," Politics & Life Sciences, vol. 35, no. 2, pp. 18 -- 29, 2016. [16] S. N. Baugher, J. D. Elhai, J. R. Monroe, and M. J. Gray, "Rape myth acceptance, sexual trauma history, and posttraumatic stress disorder," Journal of interpersonal violence, vol. 25, no. 11, pp. 2036 -- 2053, 2010. [17] P. Sussenbach, F. Eyssel, J. Rees, and G. Bohner, "Looking for blame: rape myth acceptance and attention to victim and perpetrator," Journal of interpersonal violence, vol. 32, no. 15, pp. 2323 -- 2344, 2017. [18] S. Brownmiller, Against our will: Men, women and rape. Open Road Media, 2013. [19] B. J. Jansen, D. L. Booth, and A. Spink, "Determining the informational, intent of web queries," Information navigational, and transactional Processing & Management, vol. 44, no. 3, pp. 1251 -- 1266, 2008. [20] H. Purohit and R. Pandey, Intent Mining for the Good, Bad, and Ugly Use of Social Web: Concepts, Methods, and Challenges. Cham: Springer International Publishing, 2019, pp. 3 -- 18. [Online]. Available: https://doi.org/10.1007/978-3-319-94105-9 1 [21] B. Hollerit, M. Kroll, and M. Strohmaier, "Towards linking buyers and sellers: detecting commercial intent on twitter," in WWW. ACM, 2013, pp. 629 -- 632. [22] H. Purohit, G. Dong, V. Shalin, K. Thirunarayan, and A. Sheth, "Intent classification of short-text on social media," in Proceedings of IEEE SocialCom, 2015, pp. 222 -- 228. [23] J. Wang, G. Cong, W. X. Zhao, and X. Li, "Mining user intents in twitter: A semi-supervised approach to inferring intent categories for tweets." in AAAI, 2015, pp. 318 -- 324. [24] M. Kroll and M. Strohmaier, "Analyzing human intentions in natural language text," in K-CAP. ACM, 2009, pp. 197 -- 198. [25] Z. Chen, B. Liu, M. Hsu, M. Castellanos, and R. Ghosh, "Identifying intention posts in discussion forums," in NAACL, 2013, pp. 1041 -- 1050. [26] P. Karuna, M. Rana, and H. Purohit, "Citizenhelper: A streaming analyt- ics system to mine citizen and web data for humanitarian organizations." in ICWSM, 2017, pp. 729 -- 730. [27] M. M. Aiken, "False allegation: A concept in the context of rape," Journal of psychosocial nursing and mental health services, vol. 31, no. 11, pp. 15 -- 20, 1993. [28] C. S. Carlos and M. Yalamanchi, "Intention analysis for sales, marketing and customer service," Proc. of COLING 2012: Demo, pp. 33 -- 40, 2012. [29] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their composi- tionality," in NIPS, 2013, pp. 3111 -- 3119. [30] Y. Kim, "Convolutional neural networks for sentence classification," in EMNLP, 2014, pp. 1746 -- 1751. [31] M. Hall, I. Witten, and E. Frank, "Data mining: Practical machine learning tools and techniques," Kaufmann, Burlington, 2011. [32] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," JMLR, vol. 3, no. Jan, pp. 993 -- 1022, 2003. [33] A. K. McCallum, "Mallet: A machine learning for language toolkit," 2002. [34] J. W. Pennebaker, R. L. Boyd, K. Jordan, and K. Blackburn, "The development and psychometric properties of liwc2015," Tech. Rep., 2015.
1104.3219
1
1104
2011-04-16T08:55:24
On Social-Temporal Group Query with Acquaintance Constraint
[ "cs.SI" ]
Three essential criteria are important for activity planning, including: (1) finding a group of attendees familiar with the initiator, (2) ensuring each attendee in the group to have tight social relations with most of the members in the group, and (3) selecting an activity period available for all attendees. Therefore, this paper proposes Social-Temporal Group Query to find the activity time and attendees with the minimum total social distance to the initiator. Moreover, this query incorporates an acquaintance constraint to avoid finding a group with mutually unfamiliar attendees. Efficient processing of the social-temporal group query is very challenging. We show that the problem is NP-hard via a proof and formulate the problem with Integer Programming. We then propose two efficient algorithms, SGSelect and STGSelect, which include effective pruning techniques and employ the idea of pivot time slots to substantially reduce the running time, for finding the optimal solutions. Experimental results indicate that the proposed algorithms are much more efficient and scalable. In the comparison of solution quality, we show that STGSelect outperforms the algorithm that represents manual coordination by the initiator.
cs.SI
cs
On Social-Temporal Group Query with Acquaintance Constraint Yi-Ling Chen De-Nian Yang Academia Sinica National Taiwan Univ. [email protected] [email protected] Wang-Chien Lee The Penn State Univ. [email protected] Ming-Syan Chen National Taiwan Univ. [email protected] ABSTRACT Three essential criteria are important for activity planning, includ- ing: (1) finding a group of attendees familiar with the initiator, (2) ensuring each attendee in the group to have tight social rela- tions with most of the members in the group, and (3) selecting an activity period available for all attendees. Therefore, this paper proposes Social-Temporal Group Query to find the activity time and attendees with the minimum total social distance to the initia- tor. Moreover, this query incorporates an acquaintance constraint to avoid finding a group with mutually unfamiliar attendees. Efficient processing of the social-temporal group query is very challenging. We show that the problem is NP-hard via a proof and formulate the problem with Integer Programming. We then propose two ef- ficient algorithms, SGSelect and STGSelect, which include effec- tive pruning techniques and employ the idea of pivot time slots to substantially reduce the running time, for finding the optimal so- lutions. Experimental results indicate that the proposed algorithms are much more efficient and scalable. In the comparison of solu- tion quality, we show that STGSelect outperforms the algorithm that represents manual coordination by the initiator. 1. INTRODUCTION Three essential criteria are important for activity initiation, in- cluding: (1) finding a group of attendees familiar with the initiator, (2) ensuring each attendee in the group to have tight social relations with most of the members in the group, and (3) selecting an activ- ity period available for all attendees. For example, if a person has a given number of complimentary tickets for a movie and would like to invite some friends, she usually prefers choosing a set of mutually close friends and the time that all of them are available. Nowadays, most activities are still initiated manually via phone, e- mail, messenger, etc. However, a growing number of systems are able to gather and make available some information required for activity initiation. For example, social networking websites, such as Facebook [2] and LinkedIn [5], provide the social relations and contact information, and web collaboration tools, such as Google Calendar [3], allow people to share their available time to friends and co-workers. Even with the availability of the above informa- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Articles from this volume were invited to present their results at The 37th International Conference on Very Large Data Bases, August 29th - September 3rd 2011, Seattle, Washington. Proceedings of the VLDB Endowment, Vol. 4, No. 6 Copyright 2011 VLDB Endowment 2150-8097/11/03... $ 10.00. tion, nevertheless, an activity initiator still needs to manually de- cide the suitable time and desirable attendees for activity planning, which can be very tedious and time-consuming. Thus, it is desir- able to provide an efficient activity planning service that automati- cally suggests the attendees and time for an activity. To support the aforementioned service, we formulate a new query problem, named Social-Temporal Group Query (STGQ), which con- siders the available time of candidate attendees and their social re- lationship. Given an activity initiator, we assume that friends on her social network (i.e., her friends together with friends of friends) are candidate attendees. We also assume that the available time slots of the candidate attendees have been made available for the sys- tem in charge of query processing (e.g., via web collaboration tools with the corresponding privacy setting1 ), and the social relation- ship between friends is quantitatively captured as social distance [10, 12, 13], which measures the closeness between friends. An STGQ comes with the following parameters, (1) the activity size, denoted by p, to specify the number of expected attendees, (2) the length of time for the activity, denoted by m, (3) a social radius constraint, denoted by a number s, to specify the scope of can- didate attendees, and (4) an acquaintance constraint, denoted by a number k , to govern the social relationship between attendees. The primary goal is to find a set of activity attendees and a suit- able time which match the specified number of attendees in (1) and the activity length in (2) respectively, such that the total so- cial distance between the initiator and all invited attendees is min- imized. Additionally, the social radius constraint in (3) specifies that all the candidate attendees are located no more than s edges away from the initiator on her social network, while the acquain- tance constraint in (4) requires that each attendee can have at most k other unacquainted attendees.2 As such, by controlling s and k based on desired social atmosphere, suitable attendees and time are returned. Example 1 in the Appendix A shows an illustrative exam- ple. Note that, in situations where the time of the planned activity is pre-determined (e.g., complimentary tickets for a concert or a sport event in a specified day), the aforementioned STGQ can be simpli- fied as a Social Group Query (SGQ) (i.e., without considering the temporal constraint). In this paper, we first examine the processing 1To process STGQ, it is not necessary for a user to share the sched- ule to friends. However, we assume that any friend can initiate an STGQ, and the query processing system can look up the available time of the user, just like the friend making a call to ask the avail- able time. Different privacy policies or different schedules can be set for different friends, just like answering different available time, or even not answering, for various friends. The above privacy and schedule setting is beyond the scope of this paper. 2Note that the social radius constraint is specified in terms of num- ber of edges, rather than the social distance, so the users can easily specify the constraint. 397 strategies for SGQ and then take further steps to extend our study on the more complex STGQ. For SGQ, a simple approach is to consider every possible p at- tendees and find the total social distance. This approach needs to evaluate C f −1 p−1 candidate groups, where f is the number of can- didate attendees. In the current social network [8], the average number of friends for a user is around 100. Therefore, if an ini- tiator would like to invite 10 attendees out of her 100 friends, the number of candidate groups is in the order of 1013 . Note that the above scenario considers only the friends of the user as candidate attendees, and the number of candidate groups will significantly increase if the friends of each friend are also included. To sequen- tially choose the attendees at each iteration, giving priority to close friends based on their social distances to the activity initiator may lead to a smaller total social distance in the beginning, but does not always end up with a solution that satisfies the acquaintance con- straint, especially for an activity with a small k . On the other hand, giving priority to a set of people who know each other to address the acquaintance constraint does not guarantee to find the solution with the minimum total social distance. Therefore, to select each attendee, the challenge comes from the dilemma of (1) reducing the total social distance at each iteration and (2) ensuring that the solution eventually follows all constraints of this problem. Based on the above observations, in this paper, we first prove that SGQ is NP-hard and then propose an algorithm, called SGSe- lect, to find the optimal solution. We design three strategies, access ordering, distance pruning, and acquaintance pruning, to effectively prune the search space and reduce the processing time. During the selection of each attendee, we address both the social distance and connectivity of the attendee, together with the characteristics of the social network for other attendees that have not been considered, in order to find the optimal solution. Moreover, to consider the tempo- ral dimension, we formulate STGQ as an optimization problem and derive an Integer Programming optimization model, which can be modified to support SGQ as well. Processing STGQ is significantly more challenging than processing SGQ because there may exist nu- merous time periods with different candidate groups. To solve the problem, a simple approach is to sequentially explore the temporal dimension and consider every possible activity period with m time slots. This approach then chooses the corresponding optimal SGQ attendees for each activity period, and identifies the period with the smallest total social distance. However, this approach requires solving numerous SGQ problems and thereby is computationally intensive. In contrast, in this paper, we propose an algorithm, called STGSelect, to solve the problem. In addition to the strategies for SGSelect, we first identify pivot time slots, which are the time slots only required to be explored in the temporal dimension to reduce the running time. Moreover, we propose the availability pruning strategy for Algorithm STGSelect, and the strategy is able to lever- age the correlation of the available time slots among candidate at- tendees, to avoid exploring an activity period eventually with fewer than p available attendees. The contributions of this paper are summarized as follows. • We formulate two new and useful queries for an activity ini- tiator, namely, SGQ and STGQ, to obtain the optimal set of attendees and a suitable activity time. SGQ can be used to plan for various types of activities by specifying the social radius constraint s and the acquaintance constraint k , while STGQ also takes into account the temporal constraint. We prove that these two problems are NP-hard. • We design Algorithm SGSelect and STGSelect to find the optimal solutions to SGQ and STGQ, respectively. We de- rive an Integer Programming optimization model for STGQ, which can also support SGQ. Moreover, we devise various strategies, including access ordering, distance pruning, ac- quaintance pruning, pivot time slots, and availability prun- ing, to prune unnecessary search space and obtain the op- timal solution in smaller time. Our research result can be adopted in social networking websites and web collaboration tools as a value-added service. The rest of this paper is summarized as follows. In Section 2, we introduce the related works. Section 3 formulates SGQ and ex- plains the details of Algorithm SGSelect. Section 4 extends our study on SGQ to the more complex STGQ. The details of Algo- rithm STGSelect are also included. We present the experimental results in Section 5 and conclude this paper in Section 6. 2. RELATED WORKS There is a tremendous need for activity planning. Even though some web applications, e.g., Meetup [6], have been developed to support activity coordination, these applications still require users to manually assign the activity time and participants. For example, using Meetup [6] or the Events function in Facebook [1], an activ- ity initiator can specify an activity time and manually select some friends to send invitations to. In response, these friends inform the activity initiator whether they are able to attend or not. Obviously, the above-described manual activity coordination process is tedious and time-consuming. In contrast, the proposed STGQ, complemen- tary to the above web applications, is able to automatically find a group of close friends to get together at a suitable activity time. There are some related works on group formation (e.g., [10]), team formation (e.g., [14, 15]), and community search (e.g., [20]), but they focus on different scenarios and objectives. In addition, none of the above works consider the temporal dimension, i.e., schedules of attendees, to find a suitable activity time. Specifically, the work [10] uses real data to analyze the long-term evolution of the group formation in global social networks. On the contrary, we concern the social neighborhood of the activity initiator (i.e., her egocentric social network), since our goal is to find an opti- mal group of mutual acquaintances for the initiator. The studies on team formation [14, 15] find a group of experts covering all re- quired skills, and minimize the communications cost between these experts. In contrast, we aim to find a group of friends satisfying so- cial constraints and having common available time slots. The work [20] considers an unweighted social graph and studies the commu- nity search problem. The problem is to find a compact commu- nity that contains particular members, with the objective such as minimizing the total degree in the community. However, we con- sider a weighted social graph and minimize the total social distance within the group. Moreover, our problem includes an acquaintance constraint to ensure that each attendee can have at most k other attendees unacquainted. This constraint is important because it al- lows us to adapt to the nature activity. In addition, the work [20] only provides an upper bound on the community size, instead of the exact number. Thus, users thereby may obtain a solution with an undesirably small number of attendees. By minimizing the total social distance among the attendees, we are actually forming a cohesive subgroup in the social network. In the field of social network analysis, researches on finding various kinds of cohesive subgroups such as clique, n-club [17], and k-plex [19] have been conducted. However, most previous studies focus on finding all maximal cohesive subgroups or the maximum cohe- 398 sive subgroups, but the total social distance is not considered. For example, finding the maximum k-plexes is discussed in [11, 16, 18], and enumeration of all maximal k-plexes is discussed in [21]. Instead of finding these extreme cases, we allow the activity initia- tor to specify an arbitrary group size. Note that the maximal sub- groups or the maximum subgroups in the egocentric network of the initiator may not qualify the specified size. Hence, these existing works are not applicable to the SGQ problem. Besides, to the best of our knowledge, none of previous works on cohesive subgroups have considered the schedule of group members. Therefore, the STGQ problem is not addressed previously. 3. SOCIAL GROUP QUERY In this section, we present the fundamental problem, namely So- cial Group Query (SGQ), which focuses on finding the optimal group of attendees satisfying the social radius constraint and the acquaintance constraint. In the following, we first present the prob- lem formulation and research challenges in Section 3.1, and then prove that SGQ is NP-hard. Afterward, we propose an algorithm that can effectively prune unnecessary search space to obtain the optimal solution in Section 3.2. 3.1 Problem Definition Given an activity initiator q and her social graph G = (V , E ), where each vertex v is a candidate attendee, and the distance on each edge eu,v connecting vertices u and v represents their social closeness. A social group query SGQ(p, s, k), where p is an ac- social distance between q and every vertex v in F , i.e., (cid:80) tivity size, s is a social radius constraint, and k is an acquaintance constraint, finds a set F of p vertices from G to minimize the total v∈F dv,q , where dv,q is the length of the minimum-distance path between v and q with at most s edges, such that each vertex in F is allowed to share no edge with at most k other vertices in F . The initiator can specify different s for different kinds of activi- ties. For example, the initiator can ensure that all invited attendees are directly acquainted with her by specifying s = 1. On the other hand, for a party, the initiator can specify a larger s such that some friends of friends can also be invited to the party. Moreover, the initiator can vary k for different kinds of activities, e.g., a small k for a gathering where all the attendees know each other very well, while a larger k for a more diverse event. Note that the size of so- lution space, i.e., the number of candidate groups, rapidly grows when p and s increase. On the other hand, k serves as a filter to determine whether each candidate group satisfies the acquaintance constraint. Indeed, processing SGQ is an NP-hard problem (see Appendix B.1 for a formal proof). Fortunately, while the problem is very challenging, it is still tractable when the size of s and p are reasonable. In Section 3.2, we design an efficient query processing algorithm by pruning unqualified candidate groups. TH EOR EM 1. SGQ is NP-hard. PROO F. We prove the theorem in Appendix B.1. 3.2 Algorithm Design In this section, we propose a novel algorithm, namely SGSelect, to solve SGQ efficiently. Our idea is to first derive a feasible graph GF = (VF , EF ) from G based on our observation on the social radius constraint, such that there exists a path with at most s edges from q to each vertex in GF . Starting from q , we iteratively explore GF to derive the optimal solution. At each iteration, we keep track of the set of vertices that satisfy the acquaintance constraint as the intermediate solution obtained so far (denoted as VS ). Initially, we set VS = {q}, and let VA denote the set of remaining vertices in VF , i.e., VA = VF − VS . We select a vertex in VA and examine whether it is feasible (i.e., following the acquaintance constraint) to move this vertex to VS at each iteration, until VS has p vertices and the process stops. The selection of a vertex from VA at each iteration is critical to the performance of query processing. It is essential to avoid choosing a vertex v that may significantly increase the total social distance or lead to violation of the acquaintance constraint. Based on our analysis on various properties and constraints in SGQ, we observe that the access order of nodes in constructing candidate groups is a key factor to the overall performance. It is important to take a priority to consider nodes that are very likely to be included in the final answer group, i.e., the optimal solution, which may fa- cilitate effective early pruning of unqualified solutions. Addition- ally, social radius and acquaintance constraints can be exploited to facilitate efficient pruning of vertices which would not lead to the eventual answer. We summarize our ideas as follows. Access ordering. To guide an efficient exploration of the so- lution space, we access vertices in VA following an order that in- corporates (1) the increment of the total social distance and (2) the feasibility for the acquaintance constraint. Accordingly, we define the notion of interior unfamiliarity and exterior expansibility of VS to test the feasibility of examined vertices to the acquaintance con- straint during the vertex selection. Distance pruning. To avoid exploring vertices in VA that do not lead to a better solution in terms of total social distance, Algo- rithm SGSelect keeps track of the best feasible solution obtained so far and leverages its total social distance to prune unnecessary examinations of certain search space. Acquaintance pruning. We explore the properties of the ac- quaintance constraint to facilitate search space pruning. Specifi- cally, we define the notion of inner degree of the vertices in VA and derive its lower bound, such that a feasible solution can be derived from vertices in VS and VA . The lower bound is designed to de- tect the stop condition when there exists no feasible solution after including any vertex in VA . To find the optimal solution, Algorithm SGSelect may incur an exponential time in query processing because SGQ is NP-hard. In the worst case, all candidate groups may need to be considered. However, by employing the above pruning strategies, the average running time of Algorithm SGSelect can be effectively reduced, as to be shown in Section 5. In the following, we present the details of the proposed algorithm. 3.2.1 Radius Graph Extraction Obviously, the social radius constraint can effectively prune un- necessary candidates in the social network of the activity initiator. Thus, Algorithm SGSelect first extracts the vertices that satisfy the social radius constraint. A simple approach to ensure that the so- cial radius constraint holds is to find the minimum-edge path (i.e., the shortest path with the minimum number of edges) between q and every other vertex, and then remove those vertices that have their minimum-edge paths longer than s edges. Nevertheless, the minimum-distance path with at most s edges and the minimum- edge path can be different. As a result, the total distance of the minimum-edge path may not be the minimum distance. Moreover, the minimum-distance path may consist of more than s edges which does not satisfy the social radius constraint. To address the above problem, we define the notion of i-edge minimum distance, which represents the total distance of the minimum-distance path with no more than i edges as follows. 399 (cid:8)di−1 (cid:9), where Definition 1. The i-edge minimum distance between the vertex v,q , di−1 v and the vertex q is di v,q = minu∈Nv u,q + cu,v Nv is the set of neighboring vertices of v . Based on dynamic programming, Algorithm SGSelect computes the i-edge minimum distance between the vertex v and the vertex v,q in terms of di−1 q by iteratively deriving di u,q of each neighboring vertex u, for 1 ≤ i ≤ s. Initially, we set d0 v,q as ∞ for every ver- tex v , v (cid:54)= q . We set d0 q,q as 0 and derive d1 v,q for every vertex v v,q for v if there exists a in Nq . At the next iteration, we update d2 neighbor u of v such that d1 u,q + cu,v is smaller than d1 v,q . This case indicates that there is an alternate path from v to q via a neighbor u, and the path has a smaller total distance. Our algorithm repeats the above iterations with at most s times for each vertex. There- v,q < ∞ is extracted in our algorithm to fore, each vertex v with ds construct a feasible graph GF = (VF , EF ). In the graph, the total distance of the minimum-distance path with at most s edges (i.e., v,q ) is adopted as the social distance between v and q (i.e., dv,q ). ds In other words, we can ensure that every vertex in VF satisfies the social radius constraint. Therefore, we consider GF in evaluating the SGQ for the rest of this paper. 3.2.2 Access Ordering After constructing the feasible graph GF , Algorithm SGSelect iteratively explores GF to find the optimal solution. Initially, the intermediate solution set VS includes only q , and the remaining vertex set VA is VF − {q}. At each iteration afterward, we select and move a vertex from VA to VS in order to expand the interme- diate solution in VS . Therefore, VS represents a feasible solution when VS = p, and the vertices in VS satisfy the acquaintance constraint. Next, our algorithm improves the feasible solution by backtracking the above exploration procedure to previous iterations and choosing an alternative vertex in VA to expand VS . A branch- and-bound tree is maintained to record the exploration history for backtracking. This process continues until VS has p vertices. To reduce the running time and search space, the selection of a vertex at each iteration is critical. Naturally, we would like to in- clude a vertex that minimizes the increment of the total social dis- tance. Nevertheless, the connectivity of the selected vertex imposes additional requirements for satisfying the acquaintance constraint. Thus, we introduce the notion of interior unfamiliarity and exte- rior expansibility with respect to the intermediate solution set VS to exploit the acquaintance constraint in query processing. Definition 2. The interior unfamiliarity of VS is U (VS ) = maxv∈VS VS − {v} − Nv , where Nv is the set of neighboring vertices of v in GF . The set VS − {v} − Nv refers to the set of non-neighboring vertices of v in VS . As shown later, the interior unfamiliarity of possible intermedi- ate solution sets are taken into account in deciding which vertex is to be included in the process of generating the candidate groups. It is preferable to first include a well-connected vertex that results in the intermediate solution set with low interior unfamiliarity since it may make selections of other vertices in the later iterations easier. Next, we define the exterior expansibility of an intermediate solu- tion set VS , denoted by A(VS ), as the maximum number of vertices that VS can be expanded from. Definition 3. The exterior expansibility of VS is A(VS ) = minv∈VS {VA ∩ Nv + (k − VS − {v} − Nv )} , where the first set (i.e., VA ∩ Nv ) contains the neighboring vertices of v in VA and the second set (i.e., VS − {v} − Nv ) contains the non-neighboring vertices of v in VS . Since the number of existing non-neighboring vertices of v in VS is VS − {v} − Nv , we can select at most k − VS − {v} − Nv extra non-neighboring vertices of v from VA to expand VS ; other- wise, vertex v would have more than k non-neighboring vertices in VS and violate the acquaintance constraint. Therefore, for a ver- tex v in VS , there are at most VA ∩ Nv neighboring vertices and k − VS − {v} − Nv non-neighboring vertices to be selected from VA in order to expand VS . When selecting a vertex v to expand VS , we consider both the increment of the total social distance caused by v and the connec- tivity of vertices in the new intermediate solution set containing v , which is captured by U (VS ∪ {v}) and A(VS ∪ {v}). Specifically, Algorithm SGSelect chooses the vertex v with the minimum social distance to q that satisfies the following two conditions for interior unfamiliarity and exterior expansibility, respectively. Interior Unfamiliarity Condition. The first condition consid- ers the interior unfamiliarity. Note that a small value of interior un- familiarity indicates that every vertex v ∈ VS has plenty of neigh- boring vertices in VS , i.e., the current intermediate solution set VS (cid:104) VS ∪{v} (cid:105)θ is likely to be expanded into feasible solutions satisfying the ac- quaintance constraint. Based on this observation, we employ the in- terior unfamiliarity condition, i.e., U (VS ∪ {v}) ≤ k , p where θ ≥ 0 and VS ∪{v} is the proportion of attendees that have p been considered, to ensure that the value of interior unfamiliarity remains small when a vertex v is selected. Note that the right- hand-side (RHS) of the inequality reaches its maximum, i.e., k , when θ is fixed as 0. With θ = 0, it is flexible to find a vertex v with a small social distance. However, if a vertex v resulting in U (VS ∪ {v}) = k is selected, the vertex with k non-neighboring vertices in the set VS ∪ {v} is required to connect to all the vertices chosen from VA at later iterations. Thus, the feasibility of select- ing other qualified vertices in later iterations is thereby decreased. In contrast, a larger θ allows SGSelect to choose a vertex from VA that connects to more vertices in VS to ensure the feasibility at later iterations. Note that the RHS of the condition increases when VS includes more vertices. On the other hand, the algorithm reduces θ if there exists no vertex in VA that can satisfy the above condition. When θ decreases to 0 and the above condition still does not hold for all vertices, i.e., U (VS ∪ {v}) > k , Algorithm SGSelect re- moves every v from VA , because adding v to VS does not generate a feasible solution. Exterior Expansibility Condition. Now we discuss the sec- ond condition based on the exterior expansibility, which represents the maximum number of vertices in VA that can be considered for expanding the intermediate solution set VS , and this value must be no smaller than the number of attendees required to be added later, i.e., p − VS . Therefore, SGSelect chooses the vertex v from VA that can satisfy the exterior expansibility condition, i.e., A (VS ∪ {v}) ≥ (p − VS ∪ {v}). If the inequality does not hold, the new intermediate solution set obtained by adding v is not ex- pansible, as shown by the following lemma. L EMMA 1. Given that A (VS ) < (p − VS ), there must exist at least one vertex v in VS such that v cannot follow the acquain- tance constraint for every possible selection of vertices from VA . PROO F. If A (VS ) < (p − VS ), then we can find at least one vertex v in VS such that VA ∩ Nv + (k − VS − {v} − Nv ) < (p − VS ). In other words, (k − VS − {v} − Nv ) < (p − VS ) − VA ∩ Nv . As mentioned above, VS − {v} − Nv is the num- ber of non-neighboring vertices for v , and k − VS − {v} − Nv thereby represents the ”quota” for v to choose non-neighbor ver- 400 tices from VA . For any possible selection (cid:98)VA ⊆ VA , let (cid:98)λA de- note the number of neighbor vertex of v in (cid:98)VA . Since (cid:98)λA ≤ VA ∩ Nv , (p − VS ) − VA ∩ Nv ≤ (p − VS ) − (cid:98)λA . There- (p − VS ) − (cid:98)λA , and v does not have enough quota to support (cid:98)VA fore, if A (VS ) < (p − VS ), then (k − VS − {v} − Nv ) < for satisfying the acquaintance constraint. The lemma follows. 3.2.3 Distance and Acquaintance Pruning In the following, we further exploit two pruning strategies to re- duce the search space. Our algorithm aims to obtain a feasible so- lution early since the total social distance of this solution can be used for pruning unnecessary candidates. At each iteration, the fol- lowing distance pruning strategy avoids exploring the vertices in the remaining vertex set VA if they do not lead to a solution with a smaller total social distance. tex from VA to VS if D − (cid:80) L EMMA 2. The distance pruning strategy stops selecting a ver- dv,q < (p − VS ) minv∈VA dv,q , v∈VS where D is the total social distance of the best feasible solution ob- tained so far. The distance pruning strategy can prune the search space with no better solution. PROO F. If the above condition holds, it is impossible to find an improved solution by exploring VA , since the total social dis- tance of any new solution must exceed D when we select p − VS vertices from VA . Algorithm SGSelect considers minv∈VA dv,q in distance pruning to avoid sorting the distances of all vertices in VA , which requires additional computation and may not be scalable for a large social network. Please note that as the best obtained so- lution improves at later iterations, we are able to derive a smaller upper bound in the LHS, and thus prune a larger search space with distance pruning. The lemma follows. In addition to pruning the search space that does not lead to a smaller total social distance, we also propose an acquaintance prun- ing strategy that considers the feasibility of selecting vertices from VA , and stops exploring VA if there exists no solution that can sat- isfy the acquaintance constraint. Earlier in this section, the inte- rior unfamiliarity and the exterior expansibility consider the con- nectivity between the vertices in only VS , and the connectivity be- tween the vertices in VS and VA , respectively. Here the acquain- (and thus the corresponding VS is pruned) if (cid:80) tance pruning strategy focuses on the edges between the vertices in VA . Note that all vertices in VA are excluded from expansion VA ∩ Nv < v∈VA (p − VS )(p − VS − k) holds. The LHS of the above inequal- ity is the total inner degree of all vertices in VA , where the inner degree of a vertex in VA considers only the edges connecting to other vertices in VA . The RHS is the lower bound on the total inner degree on any set of vertices extracted from VA to expand VS into a solution satisfying the acquaintance constraint. Specif- ically, our algorithm needs to select p − VS vertices from VA , and hence the inner degree of any selected vertex cannot be smaller than p − VS − k ; otherwise, the vertex must be unacquainted with the inequality with (cid:80) more than k vertices and violate the acquaintance constraint. The above strategy can be improved by replacing the LHS of VA ∩ Nv , where MA denotes the set v∈MA of p − VS vertices in VA with the largest inner degrees. There- (cid:80) VA ∩ Nv ≤ (cid:80) fore, with MA , our algorithm is able to stop the search earlier, and prune off more infeasible solutions because MA ⊆ VA , and VA ∩ Nv . However, to obtain v∈MA v∈VA other value between (cid:80) VA ∩ Nv and (cid:80) MA , sorting the vertices in VA according to their inner degrees re- quires additional computation. Therefore, our algorithm finds an- VA ∩ Nv , v∈MA v∈VA and the value can be obtained easily. Specifically, the acquaintance pruning is specified as follows. a vertex from VA to VS if (cid:80) L EMMA 3. The acquaintance pruning strategy stops selecting VA ∩ Nv − (VA − p + VS ) v∈VA minv∈VA VA ∩ Nv < (p − VS ) (p − VS − k), and the ac- PROO F. To avoid the sorting in (cid:80) quaintance pruning strategy can prune the search space with no feasible solution. VA ∩Nv , we consider Nv , and the LHS is an upper bound on (cid:80) v∈MA only the vertex with the minimum inner degree minv∈VA VA ∩ VA ∩ Nv . The v∈MA reason is that VA − p + VS is the number of vertices not ex- tracted from VA , and the second term of the LHS thereby repre- sents a lower bound on the total inner degree of the vertices not extracted from VA . Therefore, the LHS is an upper bound on the VA ∩ Nv ≤ (cid:80) ing strategy, since (cid:80) total inner degree of the vertices extracted from VA . This up- (VA − p + VS ) minv∈VA VA ∩ Nv ≤ (cid:80) per bound can be employed to improve the acquaintance prun- VA ∩ Nv − v∈VA v∈MA VA ∩ Nv . The v∈VA lemma follows. In the following, we prove that our algorithm with the above strategies finds the optimal solution. TH EOR EM 2. SGSelect obtains the optimal solution to SGQ. PROO F. We prove the theorem in Appendix B.2. Please refer to Example 2 in Appendix A for illustration of Al- gorithm SGSelect, and the pseudo code of SGSelect is provided in Appendix C. 4. SOCIAL-TEMPORAL GROUP QUERY In the following, we extend SGQ to STGQ by exploring the tem- poral dimension and formulate the problem in Section 4.1. STGQ is more complex than SGQ because there may exist numerous activ- ity periods with different candidate groups. An intuitive approach is to first find the SGQ solution for each individual activity pe- riod and then select the one with the minimum total social distance. However, this approach is computationally expensive. To address this issue, in Section 4.2, we identify pivot time slots, the only time slots required to be explored in the temporal dimension, to facilitate efficient STGQ processing. Moreover, we propose the availability pruning strategy to leverage the correlation in the available time slots among candidate attendees to avoid exploring an unsuitable activity period. 4.1 Problem Definition STGQ generalizes SGQ by considering the available time of each candidate attendee via the availability constraint, which en- sures that all selected attendees are available in a period of m time slots. Given an activity initiator q and her social graph G = (V , E ), where each vertex v is a candidate attendee, and the distance on each edge eu,v connecting vertices u and v represents their so- cial closeness. A social-temporal group query ST GQ(p, s, k , m), where p is an activity size, s is a social radius constraint, k is an distance between q and every vertex in F , i.e., (cid:80) acquaintance constraint, and m is an activity length, finds a time slot t and a set F of p vertices from G to minimize the total social u∈F du,q , where du,q is the length of the minimum-distance path between u and q with at most s edges, such that each vertex u in F is allowed to share no edge with at most k other vertices in F , and u is available from time slot t to t + m − 1. 401 STGQ is also an NP-hard problem because STGQ can be re- duced to SGQ if every candidate attendee is available in all time slots. In Section 4.2, we design an efficient query processing al- gorithm STGSelect by leveraging the idea of pivot time slots to effectively reduce the number of time slots to be processed. Addi- tionally, we derive the Integer Programming formulation of STGQ (see Appendix D), which is included in Section 5 for comparison. 4.2 Algorithm Design An intuitive approach to evaluate STGQ is to consider the so- cial dimension and the temporal dimension separately, by sequen- tially exploring each time slot t and the candidate attendees who are available from t to t + m − 1 (i.e., m consecutive time slots). However, the running time significantly grows when the number of time slots increases. Therefore, we devise Algorithm STGSelect, which explores the following features in the temporal dimension to reduce search space and running time. Pivot time slot. We consider only a limited number of slots, namely, the pivot time slots, to find the solution. STGSelect returns optimal solutions even though only parts of the slots are considered. Access ordering. In addition to interior unfamiliarity and ex- terior expansibility discussed earlier, we further consider the solu- tion quality and the feasibility based on the availability constraint. Algorithm STGSelect constructs the VS with vertices which have more available time slots in common to find an initial feasible so- lution and then chooses the vertices in VA with smaller social dis- tances to improve the solution. Availability pruning. In addition to the distance and acquain- tance pruning discussed in Section 3.2, we propose the availability pruning strategy to stop the algorithm when selecting any vertex from VA never leads to a solution with m available time slots. To find the optimal solution, STGSelect is expected to have an exponential-time complexity because STGQ is NP-hard. In the worst case, all candidate groups in all time slots may need to be considered. However, as shown in Section 5, the average running time of the proposed algorithm with the above strategies can be ef- fectively reduced, especially for a large m. In the following, we describe the details of Algorithm STGSelect, paying special atten- tion on the temporal dimension. Instead of considering the interval from t to t + m − 1 for each time slot t, our algorithm leverages the pivot time slots defined as follows to reduce running time. L EMMA 4. A time slot is a pivot time slot if the ID of the slot is im, where i is a positive integer. Any feasible solution to STGQ must include exactly one pivot time slot. PROO F. If a solution does not span over a pivot time slot, the solution must have fewer than m slots because there are m − 1 time slots between any two consecutive pivot time slots. If a solution contains more than one pivot time slot, the solution includes more than m slots, and the above two cases are not feasible. Moreover, there must exist an integer i∗ such that the optimal solution resides in an interval starting from slot (i∗ − 1)m + 1 to (i∗ + 1)m − 1, corresponding to pivot time slot i∗m. If the optimal solution is not located in the above interval, the optimal solution must include at least two pivot time slots and thereby is infeasible, or the optimal solution must reside in the corresponding interval for pivot time slot (i∗ − 1)m or (i∗ + 1)m. The lemma follows. For each pivot time slot im, Algorithm STGSelect extends SGS- elect by considering the temporal information when selecting a ver- tex from VA to VS . Specifically, let TS denote the set of consecutive time slots available for all vertices in VS , and TS must contain slot im. In other words, TS will be a feasible solution to the STGQ when VS includes p vertices satisfying the acquaintance constraint, and TS ≥ m. At each iteration, for each vertex in VA , Algorithm STGSelect considers the social distance to q during the selection to reduce the objective value. However, we also consider the tempo- ral availability of the vertex to avoid choosing a vertex that leads to a small increment of the total social distance but ends up with redundant examination of solutions eventually disqualified by the availability constraint. In other words, in addition to interior unfa- miliarity and exterior expansibility as described in Section 3.2, we define the notion of temporal extensibility as follows. Definition 5. The temporal extensibility of VS is X (VS ) = TS − m. A larger temporal extensibility ensures that many vertices in VA with good quality in the temporal dimension can be selected by our algorithm afterward. Temporal Extensibility Condition. To consider both the so- (cid:104) p−VS ∪{u} (cid:105)φ lution quality and feasibility in the temporal dimension, Algorithm STGSelect chooses the vertex u with the minimum social distance to q , and u must satisfy X (VS ∪ {u}) ≥ (m − 1) , p where φ ≥ 1 and p−VS ∪{u} is the proportion of attendees that p have not been considered. The RHS grows when φ decreases, and the above condition enforces that the result VS ∪ {u} must be more temporal extensible, i.e., more available time slots are shared by all vertices in the result, and hence more vertices in VA are eligible to be selected at later iterations. In the extreme case, if φ = 1, the above condition requires that the result contains almost 2m − 1 available time slots when VS = {q}, because the RHS is close to m − 1. In contrast, as φ grows, our algorithm is able to choose a vertex with a smaller social distance because more vertices can satisfy the above condition. Please note that φ is increased by the algorithm if there exists no vertex in VA that can satisfy the above condition, and the RHS approaches 0 in this case. For the case that leads to X (VS ∪ {u}) < 0, we remove u from VA because adding u to VS results in unqualified solutions that are infeasible in the temporal dimension. In addition to distance pruning and acquaintance pruning that consider the social dimension, we propose availability pruning in the temporal dimension. The strategy enables our algorithm to stop exploring VA if there exists no solution that can satisfy the avail- ability constraint. The above temporal extensibility considers the available time slots for vertices in VS . In contrast, availability prun- ing reduces the search space according to the available time slots of vertices in VA . Specifically, for each pivot time slot im, let t+ A − and t A denote the time slots closest to im, such that all vertices in VA are not available in the two time slots, where t+ A > im and − A < im, respectively. Therefore, we are able to stop considering t − A ≤ m. In this case, the solution is infeasible since A − t VA when t+ − A − 1 contains fewer than m A + 1 to t+ the interval starting from t time slots. This strategy can be further improved by considering the number of vertices that are not available for each time slot, and the availability pruning strategy is formally specified as follows. Definition 4. Every vertex v in the feasible graph Gim F = (V im F , F ) for pivot time slot im has at least m consecutive available E im time slots in the interval from slot (i − 1)m + 1 to (i + 1)m − 1. Moreover, there exists a path from q to v with at most s edges. L EMMA 5. The availability pruning strategy stops selecting a − A (VA − p + VS + 1) − t A (VA − vertex from VA to VS if t+ − p + VS + 1) ≤ m, where t+ A (n) and t A (n) denote the time slots closest to im, such that at least n vertices in VA are not available, 402 − and t+ A (n) < im, respectively. Moreover, the A (n) > im and t availability pruning strategy can prune the search space with no feasible solution. PROO F. If the above condition holds, there are at most p − VS − 1 vertices of VA available in each of the above two slots, and we can never find a feasible solution because Algorithm STGSelect is required to choose p− VS vertices from VA for a common avail- able interval with at least m time slots. The lemma follows. TH EOR EM 3. STGSelect obtains the optimal solution to STGQ. PROO F. We prove the theorem in Appendix B.3. Please refer to Example 3 in Appendix A for illustration of Al- gorithm STGSelect, and the pseudo code of STGSelect is provided in Appendix C. 5. EXPERIMENTAL RESULTS In this section, we evaluate the performance and analyze the so- lution quality of the proposed algorithms. We perform a series of sensitivity tests to study the impact of query parameters with both real and synthetic datasets. In the following, Section 5.1 describes the experiment setup. Section 5.2 then presents the experimental results on performance and solution quality. 5.1 Experiment Setup We invite 194 people from various communities, e.g., schools, government, business, and industry to join our experiment, and Google Calendar [3] is utilized to collect the schedules from them. The social distance of each edge is derived according to the inter- action between the two corresponding people [10, 12, 13], such as the frequency of meeting, phone calls, and mails. Moreover, a synthetic dataset with 12800 people is generated from a coauthor- ship network [7], while the schedule of each person in each day is randomly assigned from the above 194-people real dataset. The proposed algorithms are implemented in an IBM 3650 server with two Quadcore Intel X5450 3.00 GHz CPUs and 8 GB RAM. To evaluate the solution quality, we compare STGSelect with PCArrange, which is an algorithm imitating the behavior of man- ual coordination via phone calls, where the initiator q sequentially invites close friends first and then finds out the common available time slots. Note that PCArrange does not include the acquaintance constraint, but we can obtain a parameter kh from each result, such that every attendee has at most kh other attendees unacquainted. In other words, kh is the observed k for each activity in PCAr- range. In addition to STGSelect, we compare PCArrange with an algorithm STGArrange, which is designed to utilize STGSelect for finding the smallest k that can achieve the total social distance no more than the one in PCArrange. In other words, starting from k = 0, STGArrange incrementally increases k in STGSelect to find the first solution no worse than the one in PCArrange, in order to evaluate k . 5.2 Analysis of Experimental Results For SGQ, we compare Algorithm SGSelect with two other ap- proaches: the baseline algorithm for SGQ, i.e., considering all pos- sible candidate groups, and the Integer Programming model for SGQ in Appendix D with CPLEX [4], which is an integer pro- gramming optimizer that can support parallel computation. We first compare the running time of Algorithm SGSelect and the baseline algorithm for SGQ with different numbers of attendees, i.e., p, in Figure 1(a). Due to the space constraint, we only include the ex- perimental results with k = 2 and s = 1, and the trends for other parameter settings, such as s = 2, are identical. The results indi- cate that Algorithm SGSelect outperforms the baseline algorithm for SGQ, and the difference between them becomes more signifi- cant as p grows. This is because the baseline algorithm for SGQ considers numerous candidate groups, and the processing effort of each candidate group increases with p, while Algorithm SGSelect effectively prunes the solution space with the proposed access or- dering, distance pruning, and acquaintance pruning strategies. In- teger programming requires more time than the baseline algorithm for SGQ because it is a general-purpose optimizer. However, the running time grows slower because it can support parallel compu- tation to fully utilize the 8-core processing power in IBM 3650. In contrast, both SGSelect and the baseline algorithm are single- thread algorithms, and the results show that SGSelect is much faster than integer programming for finding the optimal solutions. Figure 1(b) shows the results with different social radius con- straints, i.e., s. The reason that Algorithm SGSelect is able to effec- tively reduce the running time is that it first derives a much smaller feasible graph GF by exploiting the social radius constraint and then prunes unnecessary branches. Besides the social radius con- straint, we also compare the running time of these two approaches under different acquaintance constraints, i.e., k . As shown in Fig- ure 1(c), different k only slightly change the running time. This is because the value of k does not directly affect the number of candidate groups required to be considered. In addition, the result shows that Algorithm SGSelect outperforms the baseline algorithm by near two orders under every value of k . We also compare the al- gorithms with different network sizes as shown in Figure 1(d), and we can see that the running time of Algorithm SGSelect is still much smaller than the time of the baseline algorithm. To evaluate the performance on STGQ, we compare our algo- rithm STGSelect with the baseline algorithm for STGQ, i.e., se- quentially considering each time slot and solving the correspond- ing SGQ problem. In Figure 1(e), we report the running time of these two algorithms under different activity lengths, i.e., m. The results show that Algorithm STGSelect significantly outperforms the baseline algorithm, especially when m increases. In contrast, Figure 1(f) presents the running time of Algorithm STGSelect and the baseline algorithm with different lengths of schedules provided by users. More time slots need to be considered in a longer sched- ule. As shown in these two figures, Algorithm STGSelect yields much less running time, and the difference increases as m or the schedule length increases. The reason is that with the idea of pivot time slots, Algorithm STGSelect can concurrently consider m can- didate activity periods spanning the same pivot time slot, while the baseline algorithm considers these candidate periods separately. Figure 1(g) and Figure 1(h) compare k and the total social dis- tance obtained by STGArrange and PCArrange with different p. For each p, a smaller k corresponds to a better solution since each attendee is acquainted with more people in the group. Similarly, a smaller total social distance represents better solution quality since the attendees are more familiar with the activity initiator. These two figures indicate that the quality of the solutions obtained by STGAr- range outperforms the ones obtained by PCArrange. In other words, STGArrange is able to find a solution with a much smaller k , while the total social distance is also smaller than the one in PCArrange. 6. CONCLUSION To the best of our knowledge, there is no real system and ex- isting work in the literature that addresses the issues of automatic activity planning based on social and temporal relationship of an initiator and activity attendees. In this paper, we define two new 403 (a) Comparison of running time with different p. (b) Comparison of running time with different s. (c) Comparison of running time with different k . (d) Comparison of running time with different network sizes. (e) Comparison of running time with different m. (f) Comparison of running time with different schedule lengths. (g) Relation of p and k . (h) Relation of p and the total social distance. Figure 1: Experimental results of SGQ and STGQ. and useful queries, namely, SGQ and STGQ, to obtain the optimal set of attendees and a suitable activity time. We devise two algo- rithms, namely, SGSelect and STGSelect, to find the optimal solu- tions to SGQ and STGQ, respectively. We show that the problem is NP-hard and propose an Integer Programming model for STGQ, which can also support SGQ. Various strategies, including access ordering, distance pruning, acquaintance pruning, pivot time slots, and availability pruning are explored to prune unnecessary search space and obtain the optimal solution efficiently. Experimental re- sults indicate that the proposed algorithm significantly outperforms the algorithm that represents manual coordination by the initiator. Our research result can be adopted in social networking websites and web collaboration tools as a value-added service, and we are now implementing the proposed algorithms in Facebook. 7. ACKNOWLEDGEMENTS This paper was supported in part by National Science Council of Taiwan under Contract NSC99-2219-E-001-001. 8. REFERENCES [1] The Events function of the Facebook website. http://www.facebook.com/?sk=events. [2] The Facebook website. http://www.facebook.com/. [3] The Google Calendar website. http://www.google.com/calendar/. [4] IBM ILOG CPLEX Optimizer. http: //www-01.ibm.com/software/integration/ optimization/cplex-optimizer/. [5] The LinkedIn website. http://www.linkedin.com/. [6] The Meetup website. http://www.meetup.com/. [7] Network Data. http: //www-personal.umich.edu/mejn/netdata/. [8] The statistics from Facebook website. http://www. facebook.com/press/info.php?statistics. [9] The Yahoo Movie website. http://movies.yahoo.com/. [10] L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD, pages 44–54, 2006. [11] B. Balasundaram, S. Butenko, and I. V. Hicks. Clique relaxations in social network analysis: The maximum k-plex problem. Operations Research, 2009. [12] J. Chen, W. Geyer, C. Dugan, M. J. Muller, and I. Guy. Make new friends, but keep the old: recommending people on social networking sites. In CHI, pages 201–210, 2009. [13] I. Guy, M. Jacovi, E. Shahar, N. Meshulam, V. Soroka, and S. Farrell. Harvesting with sonar: the value of aggregating social network information. In CHI, pages 1017–1026, 2008. [14] T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In KDD, pages 467–476, 2009. [15] C.-T. Li and M.-K. Shan. Team formation for generalized tasks in expertise social networks. In SocialCom/PASSAT, pages 9–16, 2010. [16] B. McClosky and I. V. Hicks. Combinatorial algorithms for max k-plex. Journal of Combinatorial Optimization. To appear. [17] R. Mokken. Cliques, clubs and clans. Quality and Quantity, 13:161–173, 1979. [18] H. Moser, R. Niedermeier, and M. Sorge. Algorithms and experiments for clique relaxations-finding maximum s-plexes. In SEA, pages 233–244, 2009. [19] S. B. Seidman and B. Foster. A graph-theoretic generalization of the clique concept. Journal of Mathematical Sociology 6, pages 139–154, 1978. [20] M. Sozio and A. Gionis. The community-search problem and how to plan a successful cocktail party. In KDD, pages 939–948, 2010. [21] B. Wu and X. Pei. A parallel algorithm for enumerating all the maximal k-plexes. In PAKDD Workshops, pages 476–483, 2007. 404 1.E+041.E+051.E+061.E+071.E+081.E+091.E+1034567891011Execution Time (ns)pSGSelectBaselineIP(k=2, s=1)1.E+051.E+061.E+071.E+081.E+091.E+101.E+11135Execution Time (ns)sSGSelectBaseline(p=4, k=2)1.E+051.E+061.E+071.E+08123456Execution Time (ns)kSGSelectBaseline(p=5, s=2)1.E+051.E+061.E+071.E+08194800320012800Execution Time (ns)Network Size SGSelectBaselineIP(p=5, k=3, s=1)050010001500200024681012141618202224Execution Time (ms)m (0.5 hour)STGSelectBaseline0200400600800100012001234567Execution Time (ms)Schedule Length (day)STGSelectBaseline1357934567891011kpSTGArrangePCArrange05010015034567891011DistancepSTGArrangePCArrange APPENDIX A. ILLUSTRATING EXAMPLES EXAM PL E 1. Consider a toy example, as illustrated in Figure 2, where Casey Affleck would like to invite some friends to dis- cuss a new movie in which he is going to play. Figure 2(a) shows a possible social network of Casey Affleck, constructed based on the cooperation relationship extracted from Yahoo! Movies [9]. Assume that Casey Affleck is trying to find three mutually ac- quainted friends. Issuing an SGQ with p = 4 and s = 1, which returns {George Clooney, Robert De Niro, Casey Affleck, Michelle Monaghan}, does not work since the three close friends of Casey Affleck are not acquainted to each other (as shown in Figure 2(a)). Instead, by issuing an SGQ with p = 4, s = 1, and k = 0, a better list of invitees {George Clooney, Brad Pitt, Julia Roberts, Casey Affleck}, where everyone knows each other very well, is obtained. To answer this query, all directly connected friends of Casey Af- fleck, together with Casey Affleck himself, i.e., {George Clooney, Robert De Niro, Brad Pitt, Julia Roberts, Casey Affleck, Michelle Monaghan}, are candidates. Thus, an intuitive approach to answer this SGQ is to first enumerate ten (i.e., C 6−1 4−1 = 10) possible four- person candidate groups including Casey Affleck himself. Figure 2(b) illustrates the enumeration process of candidate groups, in ac- cordance with the increasing order of user IDs. Note that the num- bers 64 and 65 indicate the total social distances of qualified can- didate groups. These ten non-duplicate candidate groups constitute the whole solution space, from which we eliminate the ones dis- qualified by the acquaintance constraint. Finally, we obtain the final answer {George Clooney, Brad Pitt, Julia Roberts, Casey Affleck}, i.e., the group with the smallest total social distance among quali- fied candidate groups. Note that the initiator may also loosen the social constraints (i.e., s > 1 and k > 0) to consider more candidates. Assume that Casey Affleck issues another SGQ, inviting five friends taking the six-seat chartered plane to visit the refugee children in Haiti with him. Now Casey Affleck issues an SGQ with p = 6, s = 2 and k = 2, and the number of candidates is enlarged to eight (and the number of candidate groups is enlarged to C 8−1 6−1 = 21) since the friends of his friends can also be considered. The optimal result for this SGQ is {Angelina Jolie, George Clooney, Robert De Niro, Brad Pitt, Julia Roberts, Casey Affleck}, and we can see that this is a tight group satisfying the social constraints in the sample social network. However, Casey Affleck finds out that these six attendees have no available time in common when he expects the length of activity time as 3, i.e., three consecutive time slots. Figure 2(c) shows the schedule of candidates, with their available time slots marked by circles. Therefore, he turns to issue an STGQ with p = 6, s = 2, k = 2 and m = 3. An intuitive approach to find the answer is to issue an SGQ independently for each activity period of length 3. In this example, the time interval [ts1 , ts6 ] can be divided into four candidate activity periods, [ts1 , ts3 ], [ts2 , ts4 ], [ts3 , ts5 ] and [ts4 , ts6 ]. For each activity period, the candidate attendees need to be available for all the time slots in this activity period in order to be considered. After issuing four SGQs, the obtained result is {Angelina Jolie, George Clooney, Robert De Niro, Brad Pitt, Matt Damon, Casey Affleck} for both of [ts2 , ts4 ] and [ts3 , ts5 ]. Therefore, the intu- itive approach returns the group {Angelina Jolie, George Clooney, Robert De Niro, Brad Pitt, Matt Damon, Casey Affleck} and the activity period [ts2 , ts4 ] (or [ts3 , ts5 ]) as the optimal solution. 2 Figure 2: An illustrative example for SGQ and STGQ. (a) The sample social network, (b) the dendrogram of candidate group enumeration and (c) schedules of candidate attendees. EXAM PL E 2. In this illustrating example for SGSelect, we re- visit the social network in Figure 2(a) and assume that v7 is the ini- tiator issuing an SGQ with p = 4, s = 1, and k = 1. All candidate vi ,v7 < ∞ are extracted and placed in Figure attendees vi with d1 3(a), with their social distances to v7 listed in Figure 3(b).3 In the beginning, VS = {v7 } and VA = {v2 , v3 , v4 , v6 , v8 }. We first consider selecting v2 (i.e., the vertex with the smallest social dis- tance) from VA to expand VS . Afterward, we have A(VS ∪{v2 }) = 34 and (p − VS ∪ {v2 }) = 4 − 2 = 2, which means that the ex- (cid:105)θ (cid:104) VS ∪{v2 } terior expansibility condition holds if we select v2 . In addition, we = 1 × ( 2 find U (VS ∪ {v2 }) = 05 and k 4 )2 = 1 p 4 (assume θ = 2), which means the interior unfamiliarity condition also holds, and hence v2 is selected. Now we have VS = {v2 , v7 } and VA = {v3 , v4 , v6 , v8 }, and the next vertex to be considered is v3 according to the social distance. The exterior expansibility condition holds when v3 is selected, since A(VS ∪ {v3 }) = 1 ≥ (cid:104) VS ∪{v3 } (cid:105)θ (p − VS ∪ {v3 }) = 1; however, it violates the interior unfamil- iarity condition, since U (VS ∪ {v3 }) = 1 > k = p 1 × ( 3 16 . We do not reduce the θ here because there are still 4 )2 = 9 more vertices in VA , and we put v3 in parenthesis and temporarily skip it. The current VA is {(v3 ), v4 , v6 , v8 }, and the next vertex to be considered is v6 . We select v6 since both of the exterior expan- sibility condition and the interior unfamiliarity condition hold, and then we have VS = {v2 , v6 , v7 } and VA = {v3 , v4 , v8 }. Again, selecting v3 violates the interior unfamiliarity condition, and we temporarily skip v3 . When selecting v8 , we find out that it violates 3Some small modifications are made for better illustration. 4To find A(VS ∪ {v2 }), we derive VA ∩ Nv7 + (k − VS − {v7 } − Nv7 ) = 4 + (1 − 0) = 5 and VA ∩ Nv2 + (k − VS − {v2 } − Nv2 ) = 2 + (1 − 0) = 3, and then choose the smaller one. Therefore, we have A(VS ∪ {v2 }) = 3. 5To calculate U (VS ∪ {v2 }), we first need to consider the value of VS − {v7 } − Nv7 and VS − {v2 } − Nv2 , and then choose Since VS − {v7 } − Nv7 = ∅ = 0 and the larger one. VS − {v2 } − Nv2 = ∅ = 0, we have U (VS ∪ {v2 }) = 0. 405 (a)(b) ts1 ts2 ts3 ts4 ts5 ts6 v1 O O O O v2 O O O O O v3 O O O O O v4 O O O O O O v5 O O O O v6 O O O v7 O O O O O v8 O O O O O (c){v7}{v7,v2}{v7,v3}{v7,v4}{v7,v2,v3}{v7,v2,v4}{v7,v2,v6}{v7,v3,v4}{v7,v3,v6}{v7,v4,v6}{v7,v2,v3,v4}{v7,v2,v3,v6}{v7,v2,v3,v8}{v7,v2,v4,v6}=64{v7,v2,v4,v8}{v7,v2,v6,v8}{v7,v3,v4,v6}=65{v7,v3,v4,v8}{v7,v3,v6,v8}{v7,v4,v6,v8}28141839261920171927121082423Matt Damon (V5)Julia Roberts (V6)George Clooney (V2)Robert De Niro (V3)Angelina Jolie (V1)Brad Pitt (V4)Casey Affleck (V7)Michelle Monaghan (V8)30 (cid:104) p−VS ∪{v2 } (cid:105)φ selecting a vertex to ensure the feasibility in the temporal dimen- sion. Since (m − 1) = 2 × ( 2 2 (assume 4 )2 = 1 p φ = 2) and X (VS ∪ {v2 }) = 27 , the temporal extensibility condi- tion also holds, and hence we can select v2 from VA to VS . Now we have VS = {v2 , v7 } and VA = {v3 , v4 , v6 , v8 }. The later ver- tex selection ordering is identical to Example 2 since there is no violation on the temporal constraint, and we also obtain the first feasible solution {v2 , v4 , v6 , v7 } (total social distance = 64) avail- able in the activity period [ts2 , ts4 ]. Until we select v3 in the state VS = {v2 , v4 , v7 } and VA = {(v3 )}, we find out that the tem- poral extensibility condition does not hold when selecting v3 , and then we increase φ since there is no other vertex in VA that we can choose. However, since X (VS ∪ {v3 }) = 2 − 3 = −1, the tempo- ral extensibility condition does not hold even when the RHS of the inequality approaches 0. Therefore, we can remove v3 and back- track to the state VS = {v7 } and VA = {v3 , v4 , v6 , v8 }. As shown in Example 2, the later branches violate the social constraints and hence lead to no feasible group. Therefore, {v2 , v4 , v6 , v7 } is the only feasible group available in activity periods extended from the pivot time slot ts3 . Next, we start processing the second pivot time slot, i.e., ts6 . Different from ts3 , we have VS = {v7 } and VA = {v2 , v3 , v6 , v8 } in the beginning. Since v4 is not available in the pivot time slot, we can directly remove it without further consideration. We then obtain VS = {v2 , v7 } and VA = {v3 , v6 , v8 } because selecting v2 violates no constraint. Note that the LHS of the availability pruning − A (VA − p + VS + 1) = A (VA − p + VS + 1) − t condition is t+ − − A (3 − 4 + 2 + 1) − t A (3 − 4 + 2 + 1) = t+ A (2) − t t+ A (2). Since there are 2 vertices, i.e., v3 and v8 , in VA not available in ts4 , − A (2) = 4. Besides, there are 2 vertices, i.e., v3 and v8 , in VA t not available in ts7 , t+ A (2) = 7. Therefore, the availability pruning − A (2)− t A (2) = 7− 4 ≤ m, and we can stop condition holds since t+ selecting vertices from VA to VS . Then we backtrack one step to the state VS = {v7 } and VA = {v3 , v6 , v8 }. We can skip this final branch since the acquaintance pruning condition holds. Therefore, there exists no feasible group available in activity periods extended from ts6 . Finally, we return the group {v2 , v4 , v6 , v7 } and the time period [ts2 , ts4 ] as the optimal result. 2 B. PROOFS B.1 Proof of Theorem 1 In the following, we prove that SGQ is NP-hard with the reduc- tion from problem k-plex, which is NP-hard [11]. A k-plex with c vertices is a subgraph in a graph G = (V , E ), such that every vertex in the subgraph can share no edge with at most k − 1 other vertices in the subgraph. Problem k-plex with parameters c and k is to decide if G has a k-plex with c vertices. We prove that SGQ is NP-hard with the reduction from problem k-plex. Specifically, we construct a weighted graph G(V , E ) by letting V as {q} ∪ V and letting E as E . We then add c edges into E to make q connect to all the other vertices. The distance of every edge is 1. In the following, we prove that there exists a feasible group F with c + 1 attendees in G for SGQ with s = 1 and k = k − 1, if and only if there exists a k-plex with c vertices in G. We first prove the sufficient condition. If we remove q from F , every vertex in F still shares no edge with at most k − 1 other vertices, since q connects to all the other vertices. In other words, 7Ts = {ts1 , ts2 , ts3 , ts4 , ts5 } since v2 and v7 are available in them. Hence Ts = 5 and X (VS ∪ {v2 }) = 5 − 3 = 2. Figure 3: Another illustrative example for SGQ and STGQ. (a) The sample social network, (b) the social distances of candidate attendees and (c) the schedules of candidate attendees. the exterior expansibility condition and then remove v8 from VA . Therefore, we choose v4 instead and obtain the first feasible solu- tion {v2 , v4 , v6 , v7 } (total social distance = 64). Note that if we set a small θ and allow v3 to be selected earlier, it leads to the gen- eration of an infeasible candidate group {v2 , v3 , v6 , v7 }, instead of the first feasible solution. If we can obtain the first feasible solu- tion early, we are able to leverage the distance pruning strategy. Now we backtrack one step to the state VS = {v2 , v6 , v7 } and VA = {(v3 )}, and we reduce θ since there is no other vertex in (cid:105)θ (cid:104) VS ∪{v3 } VA . However, selecting v3 still violates the interior unfamiliarity condition when we reduce θ to 0, since U (VS ∪ {v3 }) = 2 and = 1 × ( 4 4 )0 = 1. Therefore, we can remove v3 k p and backtrack to the state VS = {v2 , v7 } and VA = {(v3 ), v4 , v8 }. In this branch, we first remove v8 due to the violation of the exte- rior expansibility condition, and later we select v4 and v3 to obtain the second feasible solution {v2 , v3 , v4 , v7 } (total social distance (cid:104) VS ∪{v3 } (cid:105)θ = 62). Note that when reducing θ to 0 here, the interior unfamiliar- ity condition holds and we can select v3 , since U (VS ∪ {v3 }) = 1 = 1 × ( 4 and k 4 )0 = 1. Now we further backtrack p to the state VS = {v7 } and VA = {v3 , v4 , v6 , v8 }6 and select v3 . However, since 62 − 18 < (4 − 2) × 23, the distance prun- ing strategy then stops selecting a vertex from VA . Later, we find out that there is no need to explore the last state VS = {v7 } and VA = {v4 , v6 , v8 }, since (1 + 1 + 0) − (3 − 4 + 1) × 0 < (4 − 1) × (4 − 1 − 1) and hence the acquaintance pruning strategy stops selecting a vertex from VA . Therefore, we return the optimal solution {v2 , v3 , v4 , v7 } with the total social distance as 62. 2 EXAM PL E 3. In this illustrating example for STGSelect, we extend the SGQ in Example 2 by considering the length of ac- tivity time as 3 (i.e., m = 3). When processing an STGQ, the schedules of candidate attendees provided in Figure 3(c) should be considered as well. Since m = 3, ts3 and ts6 are selected to be pivot time slots. For the first pivot time slot ts3 , VS = {v7 } and VA = {v2 , v3 , v4 , v6 , v8 } in the beginning. As obtained in Example 2, both of the exterior expansibility condition and the in- terior unfamiliarity condition hold when selecting v2 . Note that STGSelect also evaluates the temporal extensibility condition when 6There is no parenthesis for v3 , because we leave the branch of VS = {v2 , v7 }. 406 (a)(b)(vi) (di,7) v2 17 v3 18 v4 27 v6 23 v8 25 ts1 ts2 ts3 ts4 ts5 ts6 ts7 v2 O O O O O O O v3 O O O O v4 O O O O O O v6 O O O O O O v7 O O O O O O v8 O O O O (c)v2v4v6v314181923172927v82520v7 5: 6: 7: 8: 9: 10: 11: 12: Algorithm 2 ExpandSG Function: ExpandSG(inVS , inVA , inT D) 1: VS = inVS , VA = inVA , T D = inT D ; 2: while VS + VA ≥ p do if there is any unvisited vertex in VA then 3: Select an unvisited vertex u with the minimum social dis- 4: tance to q and mark u as visited; else if θ > 0 then Reduce θ and mark remaining vertices in VA as unvisited; else BREAK; if u satisfies the exterior expansibility condition then if u satisfies the interior unfamiliarity condition then VS = VS + {u}, VA = VA − {u}, T D = T D + du,q ; if the distance pruning condition holds for T D or the acquaintance pruning condition holds for VA then BREAK; else if VS < p then ExpandSG(VS , VA , T D); else D = T D , F = VS ; BREAK; else if θ = 0 then VA = VA − {u}; else VA = VA − {u}; 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: Algorithm 3 STGSelect Require: Graph G(V , E ), activity size p, social radius constraint with size s, acquaintance constraint with size k , and activity length m Ensure: Optimal group F and activity period P u,q = ∞ for u (cid:54)= q ; 1: d0 q,q = 0, d0 2: for i = 1 to s do q,q = 0; 3: di for all vertex u (cid:54)= q in V do 4: u,q = di−1 5: u,q ; di for all vertex v in Nu do 6: if di−1 u,q then 7: v,q + cu,v < di u,q = di−1 8: v,q + cu,v ; di w,q < ∞ and form the set 9: Extract all vertices w in V with ds VF ; 10: Select a pivot time slot every m time slots, i.e., select time slots with ID as im, where i is a positive integer; 11: while there is any unprocessed pivot time slot im and q is available in im do VS = {q}, VA = VF − {q} − {vertices not available in im}, T D = ∞, D = ∞, F = ∅, T P = [(i − 1)m + 1, (i + 1)m − 1], P = ∅; 13: ExpandST G(VS , VA , T D , T P, im); Remove pivot time slot im; 14: 15: if D (cid:54)= ∞ then 16: Output F and P ; 17: else 18: Output “Failure”; 12: F − {q} with c vertices corresponds to a k-plex with size c in G. We then prove the necessary condition. If there exists a k-plex with size c in G, F with q and the c vertices must all satisfy the social radius constraint with s as 1, since all the c vertices connect to q in G. Moreover, since each vertex in the k-plex shares no edge with at most k − 1 other vertices, F with q and the c vertices must satisfy the acquaintance constraint. The theorem follows. B.2 Proof of Theorem 2 In radius graph extraction, each of the removed vertices has no path with at most s edges connecting to q , and no feasible solu- tion thereby contains these vertices. Algorithm SGSelect includes three strategies: access ordering, distance pruning, and acquain- tance pruning. For each VS , the interior unfamiliarity condition only decides the order of selecting a vertex from VA , while Lemma 1 shows that the exterior expansibility does not consider the ver- tex violating the acquaintance constraint. After we choose a ver- tex u from VA , Lemma 2 shows that the distance pruning speci- fies a lower bound on the total social distance that is derived from VA . Therefore, the distance pruning will prune off only the solu- tion with a larger total social distance. Moreover, Lemma 3 shows that the acquaintance pruning specifies the lower bound on the total inner degree on any set of vertices extracted from VA in any fea- sible solution. If we choose the required number of vertices with the largest inner degrees from VA and the result cannot exceed the above lower bound, the connectivity is too small for VA to obtain a feasible solution. The theorem follows. B.3 Proof of Theorem 3 Each pivot time slot is separated from a neighbor pivot time slot with m − 1 time slots. Therefore, Lemma 4 shows that any feasible solution must include exactly one pivot time slot. In addition, the proposed algorithm considers the interval with 2m−1 slots for each pivot time slot, and we derive the best solution by extending Algo- rithm SGSelect with the temporal extensibility. Moreover, Lemma 5 shows that the availability pruning discards VA only when there exists no feasible solution satisfying the availability constraint by incorporating any vertex from VA . The solution obtained by Al- gorithm STGSelect is optimal because the algorithm chooses the pivot time slot and the corresponding group with the smallest total social distance at the end of the algorithm. The theorem follows. C. PSEUDO CODES Algorithm 1 SGSelect Require: Graph G(V , E ), activity size p, social radius constraint with size s, and acquaintance constraint with size k Ensure: Optimal group F u,q = ∞ for u (cid:54)= q ; 1: d0 q,q = 0, d0 2: for i = 1 to s do q,q = 0; 3: di for all vertex u (cid:54)= q in V do 4: u,q = di−1 5: u,q ; di for all vertex v in Nu do 6: if di−1 u,q then 7: v,q + cu,v < di u,q = di−1 8: v,q + cu,v ; di w,q < ∞ and form the set 9: Extract all vertices w in V with ds VF ; 10: VS = {q}, VA = VF − {q}, T D = ∞, D = ∞, F = ∅; 11: ExpandSG(VS , VA , T D); 12: if D (cid:54)= ∞ then 13: Output F ; 14: else 15: Output “Failure”; 407 Algorithm 4 ExpandSTG Function: ExpandST G(inVS , inVA , inT D , inT P , inIM ) 1: VS = inVS , VA = inVA , T D = inT D , T P = inT P , im = imIM ; 2: while VS + VA ≥ p do if there is any unvisited vertex in VA then 3: 4: Select an unvisited vertex u with the minimum social dis- tance to q and mark u as visited; else if θ > 0 then Reduce θ and mark remaining vertices in VA as unvis- ited; else if φ < a predetermined threshold t then Increase φ and mark remaining vertices in VA as unvis- ited; if φ ≥ t then set the RHS of the temporal extensibility condition as 0; 10: 11: 5: 6: 7: 8: 9: else BREAK; if u satisfies the exterior expansibility condition then if u satisfies the interior unfamiliarity condition then if u satisfies the temporal extensibility condition then VS = VS + {u}, VA = VA − {u}, T D = T D + du,q ; Update T P using the available time slots of u; if the distance pruning condition holds for T D or the acquaintance pruning condition holds for VA or the availability pruning condition holds for VA then BREAK; else if VS < p then ExpandST G(VS , VA , T D , T P, im); else D = T D , F = VS , P = T P ; BREAK; else if φ ≥ t then VA = VA − {u}; else if θ = 0 then VA = VA − {u}; else VA = VA − {u}; 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: D. INTEGER PROGRAMMING FORMULA- TION OF STGQ In the following, we model STGQ as an Integer Programming problem, where the formulation can support SGQ by removing the constraints for the temporal dimension. The derived model, to- gether with any Integer Programming commercial solver, such as CPLEX [4], can obtain the optimal solution. We first define a number of decision variables in the formula- tion. Let δu denote the social distance from q to u, δu ≥ 0. Let binary variable φu denote whether vertex u is in F . Let binary vari- able πu,i,j denote if ei,j is located in the shortest-path from q to u, where i is ascendant to j in the path. Let binary variable τt denote if the activity starts in slot t. The problem is to minimize the total (cid:88) social distance from q to all vertices in F , i.e., u∈F min δu . 408 δu , min (6) (7) (8) (9) (1) (2) (3) (4) (5) However, because F needs to be decided in the problem, too, the above function becomes non-linear thus cannot act as the objective function for STGQ. To address the above problem, we propose an (cid:88) alternative linear objective function, i.e., u∈V which considers set V instead of F . Therefore, to obtain the correct objective value, we need to design a constraint that ensures that (cid:80) δu = 0 for every u not in F . Specifically, the proposed formulation includes the following constraints. (cid:80) u∈V φu = p. (cid:80) φq = 1. φv ≥ (p − 1)φu − k , ∀u ∈ V . (cid:80) v∈Nu πu,q,i = φu , ∀u ∈ V , u (cid:54)= q . (cid:80) πu,i,j − (cid:80) i∈Nq πu,i,u = φu , ∀u ∈ V , u (cid:54)= q . i∈Nu (cid:80) πu,j,i = 0, i∈Nj i∈Nj ∀u, j ∈ V , u (cid:54)= q , j (cid:54)= q , and j (cid:54)= u. (cid:80) ei,j ∈E ci,j πu,i,j = δu , ∀u ∈ V . (cid:80) ei,j ∈E πu,i,j ≤ s, ∀u ∈ V , u (cid:54)= q . 1≤t≤T −m+1 τt = 1, ∀u ∈ V , u (cid:54)= q . ∀u ∈ V , 1 ≤ t ≤ T − m + 1, and t ≤ (cid:98)t ≤ t + m − 1. φu ≤ 1 − τt + au,(cid:98)t , (10) Constraint (1) guarantees that exactly p vertices are selected in solution set F , and vertex q must be one of them as stated in con- straint (2), to ensure that an activity with size p, including the ini- tiator, can be obtained. Constraint (3) specifies the acquaintance constraint and guarantees that every vertex u in F , i.e., φu = 1, can have no social link with at most k vertices. In other words, at least p − 1 − k neighbors of u must belong to F , where 1 corre- sponds to u itself. If u is not in F , φu = 0, we let constraint (3) become non-enforcing because this constraint does not restrict the value of φv for each neighbor v of u. For each vertex u, constraints (4) − (8) find a path from q to u and the corresponding distance, if u is chosen in F , i.e., φu = 1. Specifically, if φu is 1, constraints (4) and (5) select an incident edge for q and u to be included in the path, respectively. In this case, for every other vertex j , constraint (6) ensures that either j is to the total distance in the path, i.e., (cid:80) not in the path, or j has one ascendant and one descendant neigh- bor vertices in the path. Constraint (7) then derives δu according ei,j ∈E ci,j πu,i,j , and the objective function of the formulation enforces that the path must be the shortest one. If φu is 0, constraints (4) and (5) do not create the path for u, and the distance δu appearing in the objective func- tion is thereby 0 according to constraint (7). Constraint (8) states the social radius constraint and ensures that the path cannot include more than s edges. The last two constraints find the time slot in which the activity begins, and the proposed formulation can support SGQ by discard- ing the two constraints. Constraint (9) specifies that the activity must begin in no later than slot T −m+ 1, where T is the largest ID of a time slot; otherwise, the activity must span fewer than m slots. The last constraint prohibits a candidate attendee u from joining the activity if u is not available in the corresponding period. Specifi- cally, if the activity starts at t and spans the slots from t to t+m− 1, i.e., τt = 1, φu must be 0 if u is not available, i.e., au,(cid:98)t is 0, for any slot (cid:98)t in the period. If au,(cid:98)t = 1, u is allowed, but not enforced, to join the activity. In contrast, if the activity does not start from t, i.e., τt = 0, we let this constraint become a non-enforcing one because φu is not restricted in this case.
1906.12331
2
1906
2019-12-10T16:20:18
Modeling Food Popularity Dependencies using Social Media data
[ "cs.SI", "cs.LG", "stat.AP", "stat.ML" ]
The rise in popularity of major social media platforms have enabled people to share photos and textual information about their daily life. One of the popular topics about which information is shared is food. Since a lot of media about food are attributed to particular locations and restaurants, information like spatio-temporal popularity of various cuisines can be analyzed. Tracking the popularity of food types and retail locations across space and time can also be useful for business owners and restaurant investors. In this work, we present an approach using off-the shelf machine learning techniques to identify trends and popularity of cuisine types in an area using geo-tagged data from social media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to get hot spots across the location and model the dependencies among food cuisines popularity using Bayesian Networks. We consider the Manhattan borough of New York City as the location for our analyses but the approach can be used for any area with social media data and information about retail businesses.
cs.SI
cs
MODELING FOOD POPULARITY DEPENDENCIES USING SOCIAL MEDIA DATA 9 1 0 2 c e D 0 1 ] I S . s c [ 2 v 1 3 3 2 1 . 6 0 9 1 : v i X r a Devashish Khulbe & Manu Pathak Center for Urban Science + Progress New York University New York, NY 10003 {dk3596, mp4515}@nyu.edu December 11, 2019 ABSTRACT The rise in popularity of major social media platforms have enabled people to share photos and tex- tual information about their daily life. One of the popular topics about which information is shared is food. Since a lot of media about food are attributed to particular locations and restaurants, infor- mation like spatio-temporal popularity of various cuisines can be analysed. Tracking the popularity of food types and retail locations across space and time can also be useful for business owners and restaurant investors. In this work, we present an approach using off-the shelf machine learning tech- niques to identify trends and popularity of cuisine types in an area using geo-tagged data from social media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to get hot spots across the location and model the dependencies among food cuisines popularity using Bayesian Networks. We consider the Manhattan borough of New York City as the location for our analyses but the approach can be used for any area with social media data and information about retail businesses. Keywords Web Mining · Geographic Information Systems · Business popularity 1 Introduction In the past decade, numerous social media platforms like Instagram, Facebook and Twitter have seen a surge in popularity among users [1] and generates vast amount of data in the form of photos, videos and text. Out of the many topics and categories that can be attributed to this data, one of the top ones is regarding food. A majority of posts on social media platforms about food are attributed to many retail businesses and restaurants. We argue that data referenced to defined locations can inform about the activity and potential hot spots regarding a particular food type or cuisine. Analyzing the time and number of posts about these locations can give insights about popularity among the online populace. Additionally, it can give an idea about what cuisines are popular in which area if we further dive deeper into analyzing the content of the food related media being posted. With the influx of information regarding food online, business owners can identify emerging areas of cuisine popularity and accordingly plan their future decisions to maximize their profits. Also, restaurant investors can direct their resources in a much more informed and dynamic way instead on relying on traditional census data based approaches for deciding to invest in a new location or business. 1.1 Related work Data about social media platforms like Instagram and Twitter have been analyzed, indicating that posts about food forms major percentage of all media. Literature has also emphasized the potential impact of 'Instagram Branding' [2] for the success of a business. Another research harvests data from social media platforms to identify momentary social hot spots based on sudden or gradual increase in online activity by users [3], emphasizing our hypothesis that online activity can inform about the physical activity for an area. Regarding analysis of users' posts about restaurants, there have been some work on sentiment analysis [5] of content indicating that there is a scope of identification of areas with decreasing popularity along with emerging areas in our work. Furthermore, social media images have also been used as data for prediction of human characteristics and sentiment. Also, deep learning frameworks like Keras and PyTorch have been used to detect food cuisines from images with significant accuracy. DECEMBER 11, 2019 2 Data 2.1 Yelp Yelp API allows to extract information like name, average rating, cuisine type for restaurants in a location. We extract a total of 1000 operating (as of May 2019) restaurants for Manhattan. According to Yelp, the restaurants are randomly sampled out of the total number of restaurants. We then convert the name of each restaurant into corresponding hashtags, attributed for which we extract data from the social media. For instance, if a restaurant has name "Sample Name", the corresponding hashtag would be "#SampleName". The rationale behind converting to hashtags is that social media users often write the hashtag name along their posts. This enable us to extract data regarding a particular topic, which in this case are food types. The documentation for Yelp API may be found at https://www.yelp.com/developers/documentation/v3 2.2 Social media images Most recent images were collected corresponding to each location's (restaurant) hashtag from social media (mainly Instagram). A limit of 300 was put for each location's maximum media extraction. These were the most recent images posted by users corresponding to each hashtag. We anticipate that collecting 300 images would cover at least a 15 days worth of media for each restaurant. It was noticed that the posts extracted were dated to more than a year ago for some locations. We discarded these posts from our data and considered media for the last one year (since May 2018). Furthermore, the locations for which no media was found were also removed from the data set. 2.3 Google Images The images for different cuisines and food types were taken from Google. This was required to fine tune a food classification model which we deployed for identifying different food types in social media data and also for removing non-food images from it. A total of 100 images were taken for each food type in a cuisine. This allowed for transfer learning for the classification model based on the images. The 8 food types we looked here are: 2.3.1 Food categories Ramen Hot Wings • • Sushi Nachos • • Waffles Bagels • • Burgers Pizza • • 3 Methods & Results 3.1 Image food classification model To classify the social media images into food classes, we used a pre-trained deep learning model and used transfer learning with our Google images. The prediction model was a deep learning network (convolution neural net) trained using Keras. Transfer learning methodology was used on a pre-trained ResNet-50 model [6] without the top layers. Training was switched off for the pre-trained layers since the base layers represent simple features applicable to most computer vision classification models. The base model was followed by blocks of fully connected layers and dropout layers for which training was switched on. The fully connected layers were sized based on the length of the feature vector returned by the base model. An Stochastic Gradient Descent (SGD) optimizer was used along with categorical cross entropy loss function. The model was trained for 200 epochs with a batch size of 32 per epoch. There were 800 total images for 8 types of food classes which were divided as 80:20 for training and validation. The test set were 200 manually annotated images from the social media data. The final accuracy of the model on the entire data set was 90% with good performance across all 8 food classes. 2 The non-food images posted by users were thus discarded from the data set, which then resulted into a total of around 85,000 images. Furthermore, to adjust for time, we divided each day based on time as follows: DECEMBER 11, 2019 3.1.1 Time slots • 5am-12noon : Breakfast • 12noon-6pm : Lunch • 6pm-2am : Dinner 3.2 Kernel Density Estimation We used the Kernel Density Estimation (KDE) model using standard Gaussian kernel to get hot spots and interpola- tions for each 8 cuisines, optimizing for the bandwidth. The KDE function is defined as fh(x) = 1 n N X i=1 Kh(x − xi) = 1 nh N X i=1 K( x − xi h ) (1) where (x1, x2, . . . , xn) be a univariate independent and identically distributed sample drawn from some distribution with an unknown density f, K is the kernel function and h > 0 is the bandwidth. The Gaussian kernel function is defined as: K(u) = 1 √2π e− u2 2 (2) Assuming that time of the day may be a confounder for number of posts and popularity of some food, we decided to do the analyses separately for three different times of the day. The optimized bandwidth for the three slots is shown in Table 1. The KDE analysis gives an idea about the hot-spots in the location for different food types, adjusted for time. Table 1: Optimized bandwidth parameters Time Slot 5am-12noon 12noon-6pm 6pm-2am KDE Bandwidth (in meters) 134 151 169 Hot spots Lower East side, Chinatown Lower East side Hell's Kitchen, East Village 3.3 Bayesian Network Modeling To model the dependencies among the popularity of food cuisines, we construct a Bayesian Network with BIC scoring method using the Greedy Hill Climbing approach for faster computations. Note that we only use our social media data (number of posts) to learn the structure of the network. Training and making predictions on the same data could be an area of further research. Essentially, the approach learned a Directed Acyclic Graph (DAG) G(V, E) by modelling dependencies based on the number of posts of different food types in the last one year. To account for time of day, we also divided the data into three time slots as mentioned in section 3.1.1 and learned separate DAG structures for each slot. Structure learning based on Maximum Likelihood Estimation and Hill Climb approach The search is started from either an empty, full, or possibly random network. Then given a Bayesian Network (BN) structure, the parameters of local probability distributions (pdfs) are estimated. In this case, these are the maximum-likelihood estimation of the probability entries from the data set, which for multinomial local pdfs consists of counting the number of tuples that fall into each table entry of each multinomial probability table in the BN. The algorithm's main loop consists of attempting every possible single-edge addition, removal, or reversal, making the network that increases the score the most the current candidate, and iterating. The process stops when there is no single-edge change that increases the score. The BIC score for DAG G and data set D is defined as: BIC(G, D) = logPr(Dp, G) − d 2 logN (3) 3 DECEMBER 11, 2019 The term p is the set of maximum-likelihood estimates of the parameters p of the BN, d is the number of dimensions of multivariate Gaussian and N is the number of points in data.[7] The learned graph structure G(V, E) for the three time slots are shown: G5am-12noon: (Burgers→ Nachos), (Burgers→ Pizza), (Burgers → Bagels), (Burgers → Ramen), (Burgers → Sushi), (Burgers → Hot Wings), (Burgers → Waffles) G12noon-6pm: (Ramen → Nachos), (Ramen → Pizza), (Ramen → Bagels), (Ramen → Burgers), (Ramen →Sushi), (Ramen → Hot Wings), (Ramen → Waffles) G6pm-2am: (Burgers → Nachos), (Nachos → Hot Wings), (Hot Wings → Ramen), (Ramen → Pizza), (Ramen → Sushi), (Pizza → Bagel), (Pizza → Waffles) where each parent-child relationship is shown as (Parent → Child) 4 Discussion The Bayes Network structures for the three defined time slots models the dependencies among the 8 food types. Con- sidering the number of posts as a proxy for popularity, we can infer some relationships among these food types in different locations. At the same time, it cannot be concluded that the resulted structures are the true causal dependen- cies for our data as we have not included variables like demographics and income which might be confounders in our analyses. That said, we aim to learn the Bayes Network structures at much more dynamically (update every month) than the change of other possible variable like demographics and median income, the change of which takes place in a time frame of years. Thus, we can assume that these confounding variables would not have much impact on the learn- ing from our dynamically updated geo-tagged posts data. We adjust for time in this work by doing separate analyses for three time slots in a day. One can argue that most people are active on social media during the evening hours and thus there would be more number of posts during that time slot, making the data biased. We believe this is one of the limitations in our data and controlling for it could be an area of future work. Furthermore, the KDE gives the locations of hot spots which are indicative of the trending areas in our considered location. The results demonstrate that areas like Midtown and East Village are among the popular areas in food. The optimized bandwidth parameter is indicative of the radius within which nearby restaurants are influencing the popularity of an area. Through KDE, we also expect to know when a new area is emerging as a food hub or is becoming popular among people. Apart from KDE, we can also check spatial autocorrelation to see the spatial dependencies among the food types through measures like Moran's I and Anselin Local Moran's I in further work. 5 Conclusion In this work, we postulate that popularity of businesses and food types in a location can be analyzed using the social media activity of users. We then present ways using machine learning techniques to identify the popular locations and model the dependencies (of popularity) among different food types in Manhattan, New York. The key areas of future work regarding this work include incorporation of other covariates like demographics and median income. Also, finding a proper metric to validate the results and predictions from these methods could be important to test our hypothesis. We measured the activity of users through social media images but also talked about including other media such as text. In addition to texts, information like business check-ins can also be used to expand this work and get comprehensive results. We believe that our approach can be important to business owners and investors who can make decisions based on the dynamically changing online behavior and opinions of users. This would be improvement from the current practice of looking at just the demographics data. Considering the short life cycle of restaurants, especially in New York City, we believe that incorporating new techniques and dynamic data is important and should be widely adopted in this industry. References [1] Dave Chaffey. Global social media research summary 2019 https://www.smartinsights.com/social-media- marketing/social-media-strategy/new-global-social-media-research/ [2] Ginsberg, K. (2015) "Instabranding: Shaping the Personalities of the Top Food Brands on Instagram." Elon Journal of Undergraduate Research in Communications, 6(1). Retrieved from http://www.inquiriesjournal.com/a?id=1131 4 DECEMBER 11, 2019 [3] Anthony Stefanidis, Andrew Crooks, https://doi.org/10.1007/s10708-011-9438-2 Jacek Radzikowski GeoJournal (2013) 78: 319. [4] Jeanine D. Guidry, Marcus Messner, Yan Jin, Vivian Medina-Messner, (2015) "An analysis of Instagram images about the 10 largest fast food companies", Corporate Communications: An International Journal, Vol. 20 Issue: 3, pp.344-359, https://doi.org/10.1108/CCIJ-04-2014-0027 [5] WANG, Y.; WANG, S.; TANG, J.; LIU, H.; LI, B. Unsupervised Sentiment Analysis for Social Me- dia Images. International Joint Conference on Artificial Intelligence, North America, jun. 2015. Available at: <https://www.aaai.org/ocs/index.php/IJCAI/IJCAI15/paper/view/11158/10993> [6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770 -- 778, 2016. [7] https://www.cs.cmu.edu/ dmarg/Papers/PhD-Thesis-Margaritis.pdf [8] Instagram Scraper: https://github.com/rarcega/instagram-scraper [9] Montserrat Fuentes Adrian E. Raftery. Model Evaluation and Spatial Interpolation by Bayesian Combination of Observations with Outputs from Numerical Models. https://doi.org/10.1111/j.0006-341X.2005.030821.x 5
1712.09960
1
1712
2017-12-28T18:10:16
Social Bayesian Learning in the Wisdom of the Crowd
[ "cs.SI", "physics.soc-ph" ]
Being able to correctly aggregate the beliefs of many people into a single belief is a problem fundamental to many important social, economic and political processes such as policy making, market pricing and voting. Although there exist many models and mechanisms for aggregation, there is a lack of methods and literature regarding the aggregation of opinions when influence and learning between individuals exist. This is in part because there are not many models of how people update their belief when exposed to the beliefs of others, and so it is hard to quantify the dependencies between people's mental models which is essential to minimizing redundancies in the aggregation. In this paper, we explore many models of how users influence and learn from each other, and we benchmark our models against the well-known DeGroot model. Our main contributions are: 1) we collect a new dataset of unprecedented size and detail to be posted online; 2) we develop a new Social Bayesian model of how people update their mental models, 3) we compare of our model to other well-known social learning models. Specifically, we show that our new Social Bayesian model is superior to the other models tested.
cs.SI
cs
Social Bayesian Learning in the Wisdom of the Crowd Dhaval Adjodah, Yan Leng, Shi Kai Chong, Peter Krat, Alex Pentland February 28, 2017 1 Introduction Being able to correctly aggregate the beliefs of many people into a single belief is a problem fundamental to many important social, economic and political processes such as policy making, market pricing and voting. Although there exist many models and mechanisms for aggregation, there is a lack of methods and literature regarding the aggregation of opinions when inuence and learning between individuals exist. This is in part because there are not many models of how people update their belief when exposed to the beliefs of others, and so it is hard to quantify the dependencies between people's mental models which is essential to minimizing redundancies in the aggregation. In this paper, we explore many models of how users inuence and learn from each other, and we benchmark our models against the well-known DeGroot model [1]. Our main contributions are: 1) we collect a new dataset of unprecedented size and detail to be posted online; 2) we develop a new Social Bayesian model of how people update their mental models, 3) we compare of our model to other well-known social learning models. Specically, we show that our new Social Bayesian model is superior to the other models tested. 2 Literature Review There is evidence showing that individuals do not always give their best guess when answering a question, but instead sample from an internal distribution [8, 5], which ex- plains why asking the same question multiple times improves guesses. The problem of aggregation then becomes an exercise of combining people's individual distributions into a group distribution. Although there is an extensive literature on how to combine distri- butions [6, 3, 7], there is limited work on how to combine such distributions when there is inuence and learning between individuals. This is an important distinction because if people have correlated beliefs, the aggregation over distributions should incorporate the decrease in entropy that occurs from having shared beliefs compared to the ideal (and often assumed) case when people have independent beliefs. We build on the work of [2, 4] to model the individual cognitive process of individuals as they update their beliefs after being exposed to social information. These individual distributions could then be used to calculate inter-individual correlations in beliefs, which can then be used to aggregate with correlation. In this paper, we focus on how to estimate people's individual belief distribution. 1 3 Data Over the span of 6 months, we ran 7 sequential and independent Wisdom of the Crowd (WoC) rounds of 2037 students (from several online classes) making 17420 price predic- tions of real nancial assets (e.g. the S&P 500) over a period for 3 weeks each round. We collaborated with the crowdsourced stock rating website Vetr.com and designed the prediction process as follows: students go to our page and make a (pre-social) prediction of an instrument's price, then they are showed a histogram of their peer's predictions after which they make another (post-social) prediction. They have to provide condence ratings and answers to surveys relating to their past experience in nance. Because the students are from a class, we also have their demographics, grades, and discussion fo- rum data. Interestingly, we also have two rounds of prediction that happened during extraordinary market environments: the Brexit vote and Trump's election. 4 Analysis & Results Our new Social Bayesian model is based on the fact that we know each student's pre- social and post-social predictions, and the exact histogram (of their peers' predictions) they are exposed to. This model updates individual belief about the price of an asset using social information as follows: P (postSI, prior) = P (SI, priorpost)P (post) P (SI, prior) = P (SIpost)P (priorpost)P (post) P (SI, prior) P (postSI)P (SI) P (postprior)P (prior) P (post) = P (post) P (post) P (SI, prior) = P (postSI)P (SI)P (postprior)P (prior) P (post)P (SI, prior) = κ P (postSI)P (postprior) P (post) where κ is a constant, κ = P (SI)P (prior) P (prior,SI) , because all terms in κ are constant and known given prior and SI. post is the post-social prediction, prior is the pre-social prediction and SI is the mean of the social information. We only use Bayes theorem in this derivation. The only assumption we make (between the rst and second step) is that SI and prior are conditionally independent on post. Because there are potential exogenous and indirect dependencies, we test the t of our model under this assumption. We do so by numerically calculating the joint distributions: we rst construct distributions from point estimates (each person's predictions) and we then discretize the distributions into several bins. We then calculate the Mean Absolute Error of how our model's post- social prediction compares to the individual's actual post-social prediction. As we can see in Table 1, our Social Bayesian model outperforms the DeGroot model baseline. Additionally, we test our models against another class of models we built which are loosely Naive Bayesian [9] (because the likelihood is assumed to be the social information seen by a user) using 1) the mean or mode of the posterior distribution for the post-social 2 Table 1: Model Comparison (all values are percentages) Mean Absolute Error over Rounds 1 2 Normal Approx. 2.79 6.03 Em_Mean_Norm 3.37 7.31 Em_Mean_Uni 3.94 7.39 Em_Mode_Norm 3.38 7.40 3.30 Em_Mode_Uni 6.62 2.51 DeGroot 5.27 2.05 Prob. Learning 5.23 Social Bayesian 1.52 5.13 54.2 10.5 Improvement 3 2.21 2.63 2.87 2.61 2.49 1.94 1.97 1.92 2.0 4 5 6 7 1.42 1.79 1.79 1.79 1.60 1.24 1.21 0.63 2.10 2.75 2.61 3.51 2.41 3.49 2.62 3.48 2.51 3.37 1.86 2.29 1.69 2.32 0.82 0.86 87.7 58.9 122.3 147.1 2.73 3.48 3.04 3.48 2.89 2.62 2.47 1.28 prediction, 2) either an assumed normal or an empirical distribution for the likelihood (social histogram), and 3) either a normal or uniform distribution for the prior. Finally, we also try a simple probabilistic learning model where P (post) = P (SI ∩ prior) = P (SI) ∗ P (prior). As we can see in Figure 1, our newly developed Social Bayesian learning model clearly outperforms all the empirical models used in the literature in all rounds. We improve 54.2%, 10.5%, 2.0%, 87.7%, 58.9%, 122.3% and 147.1% over the best base models. The improvement is calculated using improv = errorbaseline−errornew . This indicates that our Social Bayesian model is a better approximation to how people update their belief when exposed to the beliefs of others. 1−errorbaseline Because we now also have an accurate representation of people's belief (as op- posed to the usual single point-estimates in WoC contexts), we could also estimate the correlations between each user's belief distribution using, for example, the Kull- backLeibler divergence. Using such mea- sures of dependence, one could improve the WoC through a variety of means because one could now nd users with beliefs that are too similar to each other (e.g. to re- duce redudancy), or to nd outliers who have very dierent beliefs (e.g. to remove inacurrate predictors). Thus, our Social Bayesian formuation not only outperforms other models from literature, but it also allows us to construct a representation that can be used to calcu- late useful inter-individual correlations for improved aggregation. Figure 1: Mean Absolute Error for Social Bayesian model vs. next best model 3 References [1] Morris H DeGroot. Reaching a consensus. Journal of the American Statistical Asso- ciation, 69(345):118121, 1974. [2] Franz Dietrich. Bayesian group belief. Social Choice and Welfare, 35(4):595626, 2010. [3] Christian Genest and James V Zidek. Combining probability distributions: A critique and an annotated bibliography. Statistical Science, pages 114135, 1986. [4] Thomas L Griths, Charles Kemp, and Joshua B Tenenbaum. Bayesian models of cognition. 2008. [5] Stefan M Herzog and Ralph Hertwig. The wisdom of many in one mind: Improving individual judgments with dialectical bootstrapping. Psychological Science, 20(2):231 237, 2009. [6] M. N. Jouini and R. T. Clemen. Copula Models for Aggregating Expert Opinions. Operations Research, 44(February 2015):444457, 1996. [7] Michael P.Wellman Pennock, D. Graphical representations of consensus belief. Pro- ceedings of the Fifteenth Conference on Uncertainty in Articial Intelligence,Morgan Kaufmann, San Francisco, pages 531540, 1999. [8] Edward Vul and Harold Pashler. Measuring the crowd within probabilistic represen- tations within individuals. Psychological Science, 19(7):645647, 2008. [9] Harry Zhang. The optimality of naive bayes. AA, 1(2):3, 2004. 4
1510.02995
1
1510
2015-10-11T01:37:53
Characterization of behavioral patterns exploiting description of geographical areas
[ "cs.SI", "cs.CY" ]
The enormous amount of recently available mobile phone data is providing unprecedented direct measurements of human behavior. Early recognition and prediction of behavioral patterns are of great importance in many societal applications like urban planning, transportation optimization, and health-care. Understanding the relationships between human behaviors and location's context is an emerging interest for understanding human-environmental dynamics. Growing availability of Web 2.0, i.e. the increasing amount of websites with mainly user created content and social platforms opens up an opportunity to study such location's contexts. This paper investigates relationships existing between human behavior and location context, by analyzing log mobile phone data records. First an advanced approach to categorize areas in a city based on the presence and distribution of categories of human activity (e.g., eating, working, and shopping) found across the areas, is proposed. The proposed classification is then evaluated through its comparison with the patterns of temporal variation of mobile phone activity and applying machine learning techniques to predict a timeline type of communication activity in a given location based on the knowledge of the obtained category vs. land-use type of the locations areas. The proposed classification turns out to be more consistent with the temporal variation of human communication activity, being a better predictor for those compared to the official land use classification.
cs.SI
cs
Characterization of behavioral patterns exploiting description of geographical areas Zolzaya Dashdorj1 and Stanislav Sobolevsky2 1University of Trento (Via Sommarive, 9 Povo, TN, Italy), and SKIL LAB - Telecom Italia, and DKM - Fondazione Bruno Kessler, and SICT - Mongolian University of Science and Technology (Bayanzurkh district 22th khoroo, UB, Mongolia) [email protected] 2Massachusetts Institute of Technology (MIT 77 Massachusetts Avenue Cambridge, MA, USA) and New York University (1 MetroTech Center, Brooklyn, NY) [email protected] Abstract The enormous amount of recently available mobile phone data is providing un- precedented direct measurements of human behavior. Early recognition and pre- diction of behavioral patterns are of great importance in many societal applications like urban planning, transportation optimization, and health-care. Understanding the relationships between human behaviors and location's context is an emerging interest for understanding human-environmental dynamics. Growing availability of Web 2.0, i.e. the increasing amount of websites with mainly user created con- tent and social platforms opens up an opportunity to study such location's con- texts. This paper investigates relationships existing between human behavior and location context, by analyzing log mobile phone data records. First an advanced approach to categorize areas in a city based on the presence and distribution of categories of human activity (e.g., eating, working, and shopping) found across the areas, is proposed. The proposed classification is then evaluated through its comparison with the patterns of temporal variation of mobile phone activity and applying machine learning techniques to predict a timeline type of communica- tion activity in a given location based on the knowledge of the obtained category vs. land-use type of the locations areas. The proposed classification turns out to 1 be more consistent with the temporal variation of human communication activity, being a better predictor for those compared to the official land use classification. Index terms -- land-use, cell phone data records, big data, human activity recogni- tion, human behavior, knowledge management, geo-spatial data, clustering algorithms, supervised learning algorithms 1 Introduction Recent extensive penetration of digital technologies into everyday life have enabled creation and collection of vast amounts of data related to different types of human ac- tivity. When available for research purposes this creates an unprecedented opportunity for understanding human society directly from it's digital traces. There is an impres- sive amount of papers leveraging such data for studying human behavior, including mobile phone records [5, 16, 29, 30, 31], vehicle GPS traces [22, 37], social media posts [20, 21, 25] and bank card transactions [38, 39]. With the growing mobile phone data records, environment modeling can be designed and simulated for understand- ing human dynamics and correlations between human behaviors and environments. Environment modeling is important for a number of applications such as navigation systems, emergency responses, and urban planning. Researchers noticed that type of the area defined through official land-use is strongly related with the timeline of human activity [13, 24, 28, 33, 48]. But those sources of literature do not provide extensive analyses on categorical profile of the geographical areas. This limits the understanding of the dependency of human behaviors from geographical areas. Our analysis confirms this relation, however we show that land-use by itself might be not enough, while cat- egorical profile of the area defined based on OSM provides a better prediction for the activity timeline. For example, even within the same land-use category, timelines of activity still vary depending on the categorical profile. In this paper, different from these works, we start from clustering the entire city based on area profiles, that are a set of human activities associated with a geographical location, showing that those activities have different area types in terms of the timelines of mobile phone commu- nication activity. Further we show that even the areas of the same land-use, which is formally defined by land-use management organizations, might have different clusters based on points of interest (POIs). But those clustered areas are still different in terms of the timelines. This will contribute to other works showing that not only the land-use matters for human activity. This paper uses mobile phone data records to determine the relationship between human behaviors and geographic area context [9]. We present a series of experimental results by comparing the clustering algorithms aiming at an- swering the following questions: 1). To what extent can geographical types explain 2 human behaviors in a city, 2). What is the relationship between human behaviors and geographical area profiles? We demonstrate our approach to predict area profiles based on the timelines of mobile phone communication activities or vice versa: to predict the timelines from area profiles. We validate our approach using a real dataset of mobile phone and geographic data of Milan, Italy. Our area clustering techniques improve the overall accuracy of the baseline to 64.89%. Our result shows that land-uses in city planning are not necessarily well defined that an area type is better defined with one type of human activity. But growing and development of city structures enable various types of activities that are present in one geographical area. So this type of analy- sis and its application is important for determining robust land-uses for city planning. Also the hidden patterns and unknown correlations can be observed comparing the mobile phone timelines in relevant areas. The result of this work is potentially useful to improve the classifications of human behaviors for better understanding of human dynamics in real-life social phenomena and to provide a decision support for stake- holders in areas, such as urban city, transport planning, tourism and events analysis, emergency response, health improvement, community understanding, and economic indicators. The paper is structured as follows Section 3 introduces the data sources we use in this research and the data-processing performed. The methodology is described in Section 4. We present and discuss the experimental results in Section 5. Finally, we summarize the discussions in Section 6. 2 Related Works Human behavior is influenced by many contextual factors and their change, for in- stance, snow fall, hurricane, and festival concerts. There are number of research activ- ities that shed new light on the influence of such contextual factors on social relation- ships and how mobile phone data can be used to investigate the influence of context factors on social dynamics. Researchers [2, 4, 15, 28] use an additional information about context factors like social events, geographical location, weather condition, etc in order to study the relationship between human behaviors and such context factors. This is always as successful as the quality of the context factors. The combination of some meteorological variables, such as air temperature, solar radiation, relative humidity, can effect people's comfort conditions in outdoor urban spaces [43], poor or extreme weather conditions influence peoples physical activity [45]. Q. Wang et al. [49] exhib- ited high resilience, human mobility data obtained in steady states can possibly predict the perturbation state. The results demonstrate that human movement trajectories ex- perienced significant perturbations during hurricanes during/after the Hurricane Sandy in 2012. Sagl et al. [35] introduced an approach to provide additional insights in some 3 interactions between people and weather. Weather can be seen as a higher-level phe- nomenon, a conglomerate that comprises several meteorological variables including air temperature, rainfall, air pressure, relative humidity, solar radiation, wind direction and speed, etc. The approach has been significantly extended to a more advanced context- aware analysis in [36]. Phithakkitnukoon et al. [28] used POIs to enrich geographical areas. The areas are connected to a main activity (one of the four types of activities investigated) considering the category of POIs located within it. To determine groups, that have similar activity patterns, each mobile user's trajectory is labeled with human activities using Bayes Theorem in each time-slot of a day for extracting daily activity patterns of the users. The study shows that daily activity patterns are strongly corre- lated to a certain type of geographic area that shares a common characteristic context. Similar to this research idea, social networks [48] have been taken into account to dis- cover activity patterns of individuals. Noulas et al. [24] proposed an approach for modelling and characterization of geographic areas based on a number of user check- ins and a set of eights type of general (human) activity categories in Foursquare. A Cosine similarity metric is used to measure the similarity of geographical areas. A Spectral Clustering algorithm together with K-Means clustering is applied to identify an area type. The area profiles enables us to understand groups of individuals who have similar activity patterns. Soto and Frias-Martinez et al. [42] studied mobile phone data records to characterize geographical areas with well defined human activities, by using the Fuzzy C-Means clustering algorithm. The result indicated that five different land- uses can be identified and their representation was validated with their geographical localization by the domain experts. Frias-Martinez et al. [13] also studied geolocated tweets to characterize urban landscapes using a complimentary source of land-use and landmark information. The authors focused on determining the land-uses in a specific urban area based on tweeting patterns, and identification of POIs in areas with high tweeting activity. Differently, Yuang et al. [50] proposed to classify urban areas based on their mobility patterns by measuring the similarity between time-series using the Dynamic Time Warping (DTW) algoritm. Some areas focus on understanding urban dynamics including dense area detection and their evolution over time [23, 46]. More- over, [14, 32, 41] analyzed mobile phone data to characterize urban systems. More spatial clustering approaches ( Han & Kamber [19]) could group similar spatial objects into classes, such as k-means, k-medoids, and Self Organizing Map. They have been also used for performing effective and efficient clustering. In this research, we use spectral clustering with eigengap heuristic followed by k-means clustering. Calabrese et al. [33] and also [18, 27] used eigengap heuristic for clustering urban land-uses. In many works [3, 26, 32, 34, 40, 44] the authors analyzed mobile phone data activity timelines to interpret land-use type. T. Pei et al. [26] analyzed the correlation between 4 urban land-use information and mobile phone data. The author constructed a vector of aggregated mobile phone data to characterize land-use types composed of two aspects: the normalized hourly call volume and the total call volume. A semi-supervised fuzzy c-means clustering approach is then applied to infer the land-use types. The method is validated using mobile phone data collected in Singapore. land-use is determined with a detection rate of 58.03%. An analysis of the land-use classification results shows that the detection rate decreases as the heterogeneity of land-use increases, and increases as the density of cell phone towers increases. F. Girardin et al. [17] analyzed aggregate mobile phone data records in New York City to explore the capacity to quantify the evolution of the attractiveness of urban space and the impact of a public event on the distribution of visitors and on the evolution of the attractiveness of the points of interest in proximity. 3 Collecting and Pre-Processing the data We use two types of datasources for this experiment; 1) POIs from available geo- graphical maps, Openstreetmap 2) Mobile phone network data (sms, internet, call, etc) generated by the largest operator company in Italy. The mobile phone traffic data is provided in a spatial grid, the rectangular grid of 100 x 100 square of dimension 235 m x 235 m. We use the grid as our default configuration for collecting human activity distribution and mobile network traffic activity distribution. 3.1 Point of Interests extracted from Openstreetmap In [6, 7, 8, 11], one of the key elements in the contextual description of geographical regions is the point of interest (POI) (e.g. restaurants, ATMs, and bus stops) that pop- ulates an area. A POI is a good proxy for predicting the content of human activities in each area that was well evaluated in [10]. Employing a model proposed in [10], a set of human activities likely to be performed in a given geographical area, can be identi- fied in terms of POI distribution. This allows us to create area profiles of geographical locations in order to provide semantic (high level) descriptions to mobile phone data records in Milan. For example, a person looking for food if the phone call is located close to a restaurant. We exploit the given spatial grid to enrich the locations with POIs from open and free geographic information, Openstreetmap (OSM)1. We collected in total 552,133 POIs that refined into 158,797 activity relevant POIs. To have a suf- ficient number and diversity of POIs in each location, we consider the nearby areas for estimating the likelihood of human activities. The nearby areas are the intersected 1http://www.openstreetmap.org 5 locations within the aggregation radius of the centroid point at each location. The ag- gregation radius is configured differently in each location, which satisfies the need for the total number of POIs in such intersected locations to be above the threshold h, see Figure 1(b) and 1(a) where each location at least h=50 POIs in the intersected loca- tions. Across locations, the min, median, and max number of POIs are 50, 53, and 202. (a) The location size (aggregation radius * 2) distribution (b) Human activity relevant POI distribution con- sidering aggregation radius Figure 1: The distributions of POIs and human activities across locations In order to build area profiles of each location, a n x m dimensional matrix An,m is defined for each location n ∈ {1, .., 10000}. Each element An,m contains the weight of activity categories m in location n where the m ∈ {eating, educational, entertain- ment, health, outdoor, residential, shopping, sporting, traveling, working}, with the total number of 10 measurements of human activities per each location. The weight of each category of activities are estimated by the HRBModel which allows us to generate a certain weight for human activities that is proportional to the weight of relevant POIs located in each location. The weight of POIs in a given location, is estimated by the following equation of tf − idf (f, l) = {l∈L:f∈l}, where f is a given POI; f ∈ F , F ={building, hospital, supermarket,...} and l is a given location; l ∈ L, L={location1, location2, location3,...}, N (f, l) is the occurrence of POI f and {N (w, l) : w ∈ l} is the maximum occurrence its appearance in location l and argmax of all the POIs in location l, L is the number of all locations, {l ∈ L : f ∈ l} is the number of locations where POI f appears. {N (w,l):w∈l} ∗ log N (f,l) L argmax w w The activity distribution in Milan area is shown in Figure 2. The sporting, working, eating and transportation types of activities are mainly performed in the city. 6 Figure 2: The activity distribution in Milan 3.2 Mobile phone network traffic In this work, we used a dataset from "BigDataChallenge"2 organized by Telecom Italia. The dataset is the result of a computation over the Call Detail Records (CDRs) gener- ated by the Telecom Italia cellular network within Milan. The dataset covers 1 month with 180 million mobile network events in November, 2014 as November is a normal month without any particular events organized in Milan. The CDRs log the user activ- ity for billing purposes and network management. There are many types of CDRs, for the generation of this dataset we considered those related to the following activities: square id (the id of the square that is part of the Milan GRID which contains spatially aggregated urban areas), time interval (an aggregate time), received SMS (a CDR is generated each time a user receives an SMS), sent SMS (a CDR is generated each time a user sends an SMS), incoming Calls (a CDR is generated each time a user receives a call), outgoing Calls (a CDR is generated each time a user issues a call), internet (a CDR is generate each time, a user starts an internet connection, or a user ends an internet connection). By aggregating the aforementioned records, this dataset was created that provides mobile phone communication activities across locations. The call, sms and internet connection activity logs are collected in each square of the spatial grid for Milan urban area. The activity measurements are obtained by temporally aggregating CDRs in time- slots of ten minutes. But the temporal variations make the comparison of human behav- iors more difficult. The standard approach to account for temporal variations in human behavior is to divide time into coarse grained time-slots. In Farrahi and Gatica-Perez et al. [12], the following eight coarse-grained time-slots are introduced: [00-7:00 am., 2http://www.telecomitalia.com/tit/it/bigdatachallenge.html 7 7:00-9:00 am., 9:00-11:00 am., 11:00 am.-2:00 pm., 2:00-5:00 pm., 5:00-7:00 pm., 7:00-9:00 pm., and 9:00 pm.-00 am.]. Here, we aggregate the mobile phone network data in such coarse-grained time-slots to extract the pattern of 1 month network traffic volume in each location. For each location, we then aggregated the total number of call (outgoing and incoming call without considering a country code), and sms (incoming and outgoing), internet activity for each of those eight time-slots. Such time-slot based timelines can give us actual patterns of mobile network traffic activity. Then the dataset reduced to 2.4 million CDR each of which consists of the fol- lowings: square id, day of month, time-slot, and total number of mobile network traffic activity. We build a n x p x d dimensional matrix Tn,p,d to collect a mobile phone traffic activity timeline, where n is the number of locations in [1,10000], p is the time-slot divisions of the day [1,8] and d is the day in [1,31]. To identify time- line patterns among those locations, we performed a normalization for the timelines based on z-score which transforms the timeline into the output vector with mean µ=0 while standard deviation σ is negative if it is below the mean or positive if it is above the mean. The normalized timelines by day are visualized in Figure 3 which show a stable communication activity within the month. For this transformation, we used , i ∈ n, j ∈ p, k ∈ d, where µi is the average value of the mobile T (cid:48) i,j,k = phone activity traffic in location i, σi is the standard deviation of the mobile phone activity traffic in location i. Ti,j,k − µi σi Figure 3: The timelines for each time-slot of day normalized by z-score in each location (weekday-blue, saturday-red, sunday-pink) 4 The Approach We present our methodology for identifying the relation between geographical loca- tions and human behaviors. Our methodology is divided into two phases: 1) clustering approaches for inferring categorical area types in terms of geographical area profiles 2) 8 classification approaches for validating the observed area types by mobile phone data records. Clustering techniques are mostly unsupervised methods that can be used to organize data into groups based on similarities among the individual data items. We use the spectral clustering algorithm which makes use of the spectrum (eigenvalues) of the similarity matrix of the data to perform dimensionality reduction before clustering in fewer dimensions. The similarity matrix is provided as an input and consists of a quantitative assessment of the relative similarity of each pair of points in the dataset. We define a vector space model that contains a set of vectors corresponding to areas. Relevance between areas is a similarity comparison of the deviation of angles between each area vector. The similarity between the areas is calculated by the cosine similarity metric by estimating the deviation of angles among area vectors. For example, the sim- ilarity between area l1 and l2 would be cos θl1,l2 = l1·l2 (cid:107)l2(cid:107)(cid:107)l1(cid:107) where li denotes the area or the features associated to the areas. We denote each area li with a set of correspond- ing features associated with a weight measure j. Having the estimation of similarity between the areas, we can now create a similarity graph described as the weight ma- trix W generated by the cosine similarity metrics and the diagonal degree matrix D is utilized by the spectral clustering algorithm which is the one of the most popular modern clustering methods and performs better than traditional clustering algorithms. We create the adjacency matrix A of the similarity graph and graph Laplacian LA, LA = D− A (given by normalized graph Laplacian LAn = D−1/2LAD−1/2). Based on eigengap heuristic [47], we identify the number of clusters by k-nearest neighbor to observe in our dataset as k = argmaxi(λi+1 − λi) where λi ∈ {l1, l2, l3, .., ln} denotes the eigenvalues of ln in the ascending order. Finally, we easily detect the ef- fective clusters (area profiles) S1, S2, S3, ..., Sk from the first k eigenvectors identified by the k-means algorithms. We investigate the relation between geographical locations and human behaviors based on categorical area types. To do that, we use supervised learning algorithms to predict area profile of a given area if we train a classification model with training data, which are the timelines labeled with area types. In supervised learning, each obser- vation has a corresponding response or label. Classification models learn to predict a discrete class given new predictor data. We use several of classifiers for learning and prediction. We prepare a test set for testing classification models by k-fold cross validation method. 5 Experiments and Results In this section, we demonstrate the identification of the relationships between locations and human behaviors in terms of two types of features in each location: 1) location 9 contexts: categories of human activity estimated through types of available POI 2) mobile communication activity timeline: mobile communication activity in time-series of coarse grained time-slots. In other words, the extent to which human behaviors depend on geographical area types. To identify and quantify these dependencies, we perform two types of validations: 1) observed area type we defined vs human behavior 2) land-use type defined formally vs human behavior by estimating the correlations and prediction algorithms. Figure 4: Observed area types of the geographical area of Milan based on the area profiles, k=6, where S1 is red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua, and S6 is magenta/fuchsia 5.1 Observed area type vs human behavior (cid:80)n (cid:80)n i=1 xi+(cid:80)n i=1 yi i=1 yi We first check the two datasets can be clustered or randomly distributed using Hop- kins statistic, H = . The distance between element pi and its nearest neighbor in dataset D is xi = minv∈D {dist(pi, v)} and the distance between element qi and its nearest neighbor in D − qi is yi = minv∈D,v(cid:54)=qi {dist(qi, v)}. The Hopkins statistic for the location context dataset is 0.02 and the mobile communication timeline is 0.04 that indicates that the datasets are highly clustered and regularly distributed. So we then analyze the correlations of location context and mobile phone communication timeline in order to understand if humans are attracted to location contexts through the area types (i.e., shopping, woking, and studying). To validate such relationship, we start with the geographical area clustering based on the location context by semi- supervised learning algorithms. We perform spectral clustering on the locations based on their similarity of human activity distribution An,m. Each location of the grid has a distribution of activity categories with relative frequency of their appearance. The 10 spectral clustering with k-nearest neighbor (k = 10 based on cosine similarity metrics) approach allows us to classify geographical areas L based on such multi-dimensional features, An,m. We then observed significantly different six types of areas, that are geo-located in Figure 4. The average values of the activity categories for those area types are presented in Figure 5. Figure 5: The average values of the activity categories in categorical area types ob- served The figure shows that categorical area type S4 contains high percentage values for residential, and eating activities. The center of the city including a residential zone were clustered into one area type. The area type S3 contains high percentage value on working activity. This classification can be refined if we increase the number of area types observations. For each area type, we are now able to extract and observe timelines Tn,p,d from mobile phone data records in order to determine the correlation between the timelines and the area profiles for those area types. Figure 6: The density distribution of area types observed in Milan 11 Figure 7: The average timeline of mobile phone data by area types (k=6), where S1 is red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua, and S6 is magenta/fuchsia The density of the clusters are almost uniform distributed except cluster S4 and S5, see Figure 6. This unbalanced datasets for clusters could contribute to an acceptable global accuracy, but also to a (hidden) poor prediction for instances in minority classes. In this context, alternative metrics, such as per class accuracy will be considered. We estimate the accuracy per class using the two techniques (canonical correlation coeffi- cients vs learning techniques). Figure 7 shows the actual volume of the mobile network traffic activities by the area types. Figure 8: Canonical correlation between the two feature matrices for locations We illustrated the correlation between the area profiles An,m and timelines Tn,p,d 12 based on the canonical correlation [1] (see Figure 8). The canonical correlation in- vestigates the relationships between two sets of vectors by maximizing the correlation in linear combination. In order words, canonical correlation finds the optimal coordi- nate system for correlation analysis and the eigenvectors defines the coordinate system. While the overall maximum correlation coefficient (j=1) is 65% between the two vec- tors, the correlation coefficient by area types is high between 72% and 98%. For exam- ple, the correlation in area type S5 is stronger than other area types, in which working type of activities are more distributed. The maximum correlation in S2 containing high percentage of sporting activity is 82.38%. We also compared the distance between the two vectors (mean) of area types to investigate the similarity of the relevant area profiles can have the similar human be- haviors. We observed linear correlation with a coefficient of r = 0.61 This result shows that as the distance between the area profiles is increased, the timeline difference in- creases, and human behaviors are strongly correlated to geographical area profiles. In second, we profiles the communication timelines with the cluster labels observed in each location that will be used to estimate the correlation by supervised learning algorithms. The prediction accuracy of timeline types in a given location could be an evaluation of the dataset. To that end, we train several predictive models (i.e., Bayesian algorithms, Decision Trees, Probabilistic Discriminative models and Kernel machines.) to measure the prediction accuracy by k-fold cross validation method (k=10), which is used to estimate how accurately a predictive model will perform. We need to prepare training and test data. The training data are the timelines labeled by area types through the location. This allows us to determine if timelines are clustered as geographical area profiles. The experimental results on our data are shown in Table 1. This classification of the predictive models is aimed at choosing a statistical predictive algorithm to fit in our analysis. Among the considered techniques, the Random Forest and the Nearest Neighbor al- gorithms are resulted in the lowest error with high accuracy, in other words, if we take the area profile of the nearest-neighbor (the most common area profile of k-nearest- neighbors), that would give the right timeline type. The confusion matrix of the Ran- dom Forest classifier, and the precision, recall are estimated in the following Table 2. The receiver operating characteristic curve for visualizing the performance of the classifiers is described in Figure 9. This result shows that the area type S5 is the well classified and compact by showing a strong correlation between the area activity cate- gories and area timeline. The area types S1, S2, S3 and S4, S6 can be still refined in terms of the area activity categories. 13 Table 1: Results for the predictive models with the use of area types observed by spectral clustering algorithm Algorithm Random classifier Linear Discriminant Quadratic Discriminant Naive Bayes(kernel density) K-NN (k=5, euclidean dist) K-NN (k=10, euclidean dist) Decision Tree Random Forest Multi-class SVM Cross Validation Overall ACC 0.83 0.5404 0.4649 0.6748 0.3822 0.4068 0.4806 0.3513 0.4997 16.7% 45.01% 52.90% 20.38% 61.73% 59.26% 52.58% 64.89% 49.47% Table 2: Confusion matrix and precision, recall and f-measure in each area type defined for predicting timeline based on location context about categorical human activity by Random Forest classifier Area type defined S1 S2 S3 S4 S5 S6 S2 S6 S3 S4 S1 4.47% 8.91% 0.20% 1.80% 0.10% 8.58% 0.70% 1.77% 1.77% 0.43% 10.15% 1.70% 2.34% 0.53% 1.13% 0.03% 0.23% 1.37% 2.40% 1.27% 1.67% S5 0.07% 1.57% 0.47% 1.30% 1.27% 1.23% 19.63% 0.33% 1.54% 6.54% 0.07% 0.53% 2.74% 0.07% 11.08% F-measure. Recall. Prec. 52.35% 57.30% 54.71% 66.41% 76.26% 70.99% 61.29% 60.32% 60.80% 76.96% 63.64% 69.67% 74.52% 74.81% 74.67% 57.64% 66.00% 61.54% Figure 9: Receiver operating characteristic to multi-class by Random Forest classifier 5.2 Land-use type vs human behavior After we observed strong prediction accuracy of timelines based on categorical area types, we analyze the relation between the timelines and land-use types which are for- 14 mally defined by land-use management organizations. While many works try to predict activity based on land-use, we perform a comparative study of the two approaches. We identify that even the area of the same land-use might have different area types in terms of area profiles and those are still different in terms of human activity timelines quantified through mobile phone records, which validates significance of activity-based classification vs official land-use. We predict the timeline type of a given area based on the land-use type using the Random Forest and the Nearest Neighbor classifiers. We used the land-use types from the OSM3 for this prediction task (see the distribution of land-use types of Milan in Figure 10(a)). The prediction accuracy of the Random Forest classifier is 53.47%. This shows that predicting power of categorical types is higher compared to land-use types. (a) The distribution of land-use classification in Milan (b) The distribution of categorical activity clusters within commercial land-use area Figure 10 We also match the area types we observed with the land-use types given officially. The result shows that even within the same land-use type, the timelines corresponding to different clusters are still different. For example, 58% of the commercial land- uses matched with the area type S3 which followed by S1, S6 and S2, S3, S4, S5, shown in Figure 10(b). The corresponding timelines to the different clusters within the commercial land-use type are illustrated in Figure 11. The timelines in the same area type observed, also in the same land-use officially defined, can be still refined, but the timeline pattern refinement will require more em- phasis on the appropriate features, for example, timelines for weekday or weekend. The area profiles are semantically different concepts in terms of human activities performed in geographical areas. Further, it will allow us to identify a standard or exceptional type of mobile network activities in relevant areas, as well as to enable the identification of unknown correlations, or hidden patterns about anomalous behaviors. 3http://wiki.openstreetmap.org/wiki/Key:landuse 15 Figure 11: The timelines belong to different clusters within the commercial land-use: S1 is red, S2 is lime, S3 is blue, S4 is yellow, S5 is cyan/aqua, and S6 is magenta/- fuchsia 6 Conclusion and Future works In this paper, we proposed an approach that characterizes and classifies geographical areas based on their anticipated (through POI distribution) human activity categorical types, such as working or shopping oriented areas. We concentrated on the analysis of the relationship between such spatial context of the area and observed human ac- tivity. Our approach compares the similarity between area activity categorical profiles and human activity timeline categories estimated through cell phone data records. We found an overall correlation of 61% and canonical correlation of 65% between con- textual and timeline-based classifications. We observed six types of areas according to the area activity categories where we compared their human activity timelines with their area activity categories and the correlation (canonical) coefficient is between 72% and 98%. For example, the area type S5 related to working activity has a strong cor- relation of 98% which followed by the area types, S2 related to sporting activity and S3 related to the human activities in the center of the city . The supervised learning approach validates possibility of using an area categorical profile in order to predict to some extent the network activity timeline (i.e., call, sms, and internet). For example, the Random Forest approach performs well with the accuracy of 64.89%. So human behaviors' temporal variation is characterized similarly in relevant areas, which are identified based on the categories of human activity performed in those locations. Fur- thermore we found that the prediction accuracy based on the official land-use types is only 53.47%. So the official land-use types by themselves are not enough to explain the observed impact of area context on human activity timelines, also because even within 16 the same land-use type, different activity categorical types still demonstrate different activity timelines. Further, the semantic description of area profiles associated to mo- bile phone data enables the investigation of interesting behavioral patterns, unknown correlations, and hidden behaviors in relevant areas. We expect the approach to be fur- ther applicable to other ubiquitous data sources, like geo-localized tweets, foursquare data, bank card transactions or the geo-temporal logs of any other service. 7 Acknowledgments The authors would like to thank the Semantic Innovation Knowledge Lab - Telecom Italia for publicly sharing the mobile phone data records which were provided for Big Data Challenge organized in 2013, Italy. We also would like to thank MIT SENSEable City Lab Consortium partially for supporting the research. References [1] Canonical correlation analysis. In Applied Multivariate Statistical Analysis, pages 321 -- 330. Springer Berlin Heidelberg, 2007. [2] J. P. Bagrow, D. Wang, and A.-L. Barab´asi. Collective response of human popu- lations to large-scale emergencies. CoRR, abs/1106.0560, 2011. [3] R. A. Becker, R. Cceres, K. Hanson, J. M. Loh, S. Urbanek, A. Varshavsky, and C. Volinsky. A tale of one city: Using cellular network data for urban planning. [4] F. Calabrese, P. F. C., G. Di Lorenzo, L. Liu, and C. Ratti. The geography of In the Proc. of the 8th taste: analyzing cell-phone mobility and social events. international conference on Pervasive Computing, (Pervasive'10), pages 22 -- 37, Berlin, Heidelberg, 2010. Springer-Verlag. [5] F. Calabrese and C. Ratti. Real time rome. Networks and Communication studies, 20(3-4):247 -- 258, 2006. [6] Z. Dashdorj and L. Serafini. Semantic enrichment of mobile phone data records using linked open data. In the Proc. of the 12th Intl. Conf. Semantic Web Confer- ence Poster and Demonstrations Track, 2013. [7] Z. Dashdorj and L. Serafini. Semantic interpretation of mobile phone records exploiting background knowledge. In the Proc. of the 12th Intl. Conf. Semantic Web Conference Doctoral Consortium, 2013. 17 [8] Z. Dashdorj, L. Serafini, F. Antonelli, and R. Larcher. Semantic enrichment of mobile phone data records. In MUM, page 35, 2013. [9] Z. Dashdorj and S. Sobolevsky. Impact of the spatial context on human commu- nication activity. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM Inter- national Symposium on Wearable Computers, UbiComp '15, pages 1615 -- 1622, New York, NY, USA, 2015. ACM. [10] Z. Dashdorj, S. Sobolevsky, L. Serafini, F. Antonelli, and C. Ratti. Semantic enrichment of mobile phone data records using background knowledge. arXiv preprint arXiv:1504.05895, 2015. [11] Z. Dashdorj, S. Sobolevsky, L. Serafini, and C. Ratti. Human activity recognition from spatial data sources. In Proceedings of the Third ACM SIGSPATIAL Inter- national Workshop on Mobile Geographic Information Systems, MobiGIS '14, pages 18 -- 25, New York, NY, USA, 2014. ACM. [12] K. Farrahi and D. Gatica-Perez. What did you do today? discovering daily rou- tines from large-scale mobile data. In ACM International Conference on Multi- media (ACMMM), 0 2008. IDIAP-RR 08-49. [13] V. Fr´ıas-Mart´ınez, V. Soto, H. Hohwald, and E. Fr´ıas-Mart´ınez. Characterizing In SocialCom/PASSAT, pages 239 -- urban landscapes using geolocated tweets. 248, 2012. [14] T. Fujisaka, R. Lee, and K. Sumiya. Exploring urban characteristics using move- ment history of mass mobile microbloggers. In Proceedings of the Eleventh Work- shop on Mobile Computing Systems &#38; Applications, HotMobile '10, pages 13 -- 18, New York, NY, USA, 2010. ACM. [15] B. Furletti, L. Gabrielli, C. Renso, and S. Rinzivillo. Identifying users profiles In Proceedings of the ACM SIGKDD International from mobile calls habits. Workshop on Urban Computing, UrbComp '12, pages 17 -- 24, New York, NY, USA, 2012. ACM. [16] F. Girardin, F. Calabrese, F. D. Fiore, C. Ratti, and J. Blat. Digital footprinting: Uncovering tourists with user-generated content. Pervasive Computing, IEEE, 7(4):36 -- 43, 2008. [17] F. Girardin, A. Vaccari, R. Gerber, and A. Biderman. Quantifying urban attrac- tiveness from the distribution and density of digital footprints. Journal of Spatial Data Infrastructure Research. 18 [18] S. Grauwin, S. Sobolevsky, S. Moritz, I. G´odor, and C. Ratti. Towards a com- parative science of cities: using mobile traffic records in New york, London and Hong Kong. CoRR, abs/1406.4400, 2014. [19] J. Han, M. Kamber, and A. K. H. Tung. Spatial Clustering Methods in Data Mining: A Survey. Taylor and Francis, 2001. [20] B. Hawelka, I. Sitko, E. Beinat, S. Sobolevsky, P. Kazakopoulos, and C. Ratti. Geo-located twitter as proxy for global mobility pattern. Cartography and Geo- graphic Information Science, pages 1 -- 12, 2014. [21] A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding mi- In Proceedings of the 9th WebKDD and croblogging usage and communities. 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages 56 -- 65. ACM, 2007. [22] C. Kang, S. Sobolevsky, Y. Liu, and C. Ratti. Exploring human movements in singapore: a comparative analysis based on mobile phone and taxicab usages. In Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Com- puting, page 1. ACM, 2013. [23] J. Ni and C. V. Ravishankar. Pointwise-dense region queries in spatio-temporal databases. In R. Chirkova, A. Dogac, M. T. zsu, and T. K. Sellis, editors, ICDE, pages 1066 -- 1075. IEEE, 2007. [24] A. Noulas, S. Scellato, C. Mascolo, and M. Pontil. Exploiting semantic annota- tions for clustering geographic areas and users in location-based social networks. In The Social Mobile Web, 2011. [25] S. Paldino, I. Bojic, S. Sobolevsky, C. Ratti, and M. C. Gonz´alez. Urban magnetism through the lens of geo-tagged photography. arXiv preprint arXiv: 1503.05502, 2015. [26] T. Pei, S. Sobolevsky, C. Ratti, S.-L. Shaw, T. Li, and C. Zhou. A new insight into land use classification based on aggregated mobile phone data. International Journal of Geographical Information Science, 28(9):1988 -- 2007, 2014. [27] T. Pei, S. Sobolevsky, C. Ratti, S.-L. Shaw, and C. Zhou. A new insight into land use classification based on aggregated mobile phone data. CoRR, abs/1310.6129, 2013. [28] S. Phithakkitnukoon, T. Horanont, G. Di Lorenzo, R. Shibasaki, and C. Ratti. Activity-aware map: identifying human daily activity pattern using mobile phone 19 data. In the Proc. of the 1st Intl. Conf. Human Behavior Understanding, pages 14 -- 25, 2010. [29] D. Quercia, N. Lathia, F. Calabrese, G. Di Lorenzo, and J. Crowcroft. Recom- mending social events from mobile phone location data. In Data Mining (ICDM), 2010 IEEE 10th International Conference on, pages 971 -- 976, 2010. [30] C. Ratti, S. Sobolevsky, F. Calabrese, C. Andris, J. Reades, M. Martino, R. Clax- ton, and S. H. Strogatz. Redrawing the map of great britain from a network of human interactions. PLoS One, 5(12):e14248, 2010. [31] C. Ratti, S. Williams, D. Frenchman, and R. Pulselli. Mobile landscapes: Using location data from cell phones for urban analysis. Environment and planning B, 33(5):727, 2006. [32] C. Ratti, S. Williams, D. Frenchman, and R. M. Pulselli. Mobile Landscapes: using location data from cell phones for urban analysis. ENVIRONMENT AND PLANNING B PLANNING AND DESIGN, 33(5):727, 2006. [33] J. Reades, F. Calabrese, and C. Ratti. Eigenplaces: analysing cities using the space time structure of the mobile phone network. Environment and Planning B: Planning and Design, 36(5):824 -- 836, 2009. [34] J. Reades, F. Calabrese, A. Sevtsuk, and C. Ratti. Cellular Census: Explorations in Urban Data Collection. IEEE Pervasive Computing, 6(3):30 -- 38, 2007. [35] G. Sagl, E. Beinat, B. Resch, and T. Blaschke. Integrated geo-sensing: A case study on the relationships between weather and mobile phone usage in northern italy. In IEEE International Conference on Spatial Data Mining and Geograph- ical Knowledge Services, ICSDM 2011, Fuzhou, China, June 29 - July 1, 2011, pages 208 -- 213, 2011. [36] G. Sagl, T. Blaschke, E. Beinat, and B. Resch. Ubiquitous geo-sensing for context-aware analysis: Exploring relationships between environmental and hu- man dynamics. Sensors, 12(7):9800 -- 9822, 2012. [37] P. Santi, G. Resta, M. Szell, S. Sobolevsky, S. Strogatz, and C. Ratti. Taxi pooling in New York City: a network-based approach to social sharing problems. arXiv preprint arXiv:1310.2963, 2013. [38] S. Sobolevsky, I. Sitko, R. T. D. Combes, B. Hawelka, J. M. Arias, and C. Ratti. Money on the move: Big data of bank card transactions as the new proxy for 20 human mobility patterns and regional delineation. the case of residents and for- eign visitors in spain. In Big Data (BigData Congress), 2014 IEEE International Congress on, pages 136 -- 143. IEEE, 2014. [39] S. Sobolevsky, I. Sitko, S. Grauwin, R. T. d. Combes, B. Hawelka, J. M. Arias, and C. Ratti. Mining urban performance: Scale-independent classi- arXiv preprint fication of cities based on individual economic transactions. arXiv:1405.4301, 2014. [40] S. Sobolevsky, M. Szell, R. Campari, T. Couronn, Z. Smoreda, and C. Ratti. Delineating geographical regions with networks of human interactions in an ex- tensive set of countries. PLoS ONE, 8(12):e81707, 12 2013. [41] V. Soto and E. Fr´ıas-Mart´ınez. Robust land use characterization of urban land- scapes using cell phone data, June 2011. The First Workshop on Pervasive Urban Applications (PURBA). [42] V. Soto and E. Fras-martnez. Robust land use characterization of urban land- scapes using cell phone data, 2011. [43] T. Stathopoulos, H. Wu, and J. Zacharias. Outdoor human comfort in an urban climate. Building and Environment, 39(3):297 -- 305, 2004. [44] J. Sun, J. Yuan, Y. Wang, H. Si, and X. Shan. Exploring spacetime structure of human mobility in urban space. Physica A: Statistical Mechanics and its Appli- cations, 390(5):929 -- 942, 2011. [45] P. Tucker and J. Gilliland. The effect of season and weather on physical activity: A systematic review. Public Health, 121(12):909 -- 922, 2007. [46] M. R. Vieira, V. Frias-Martinez, N. Oliver, and E. Frias-Martinez. Characterizing dense urban areas from mobile phone-call data: Discovery and social dynam- ics. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM '10, pages 241 -- 248, Washington, DC, USA, 2010. IEEE Computer Society. [47] U. von Luxburg. A tutorial on spectral clustering. CoRR, abs/0711.0189, 2007. [48] S. Wakamiya, R. Lee, and K. Sumiya. Urban area characterization based on se- In Proceedings of the 4th international mantics of crowd activities in twitter. conference on GeoSpatial semantics, GeoS'11, pages 108 -- 123, Berlin, Heidel- berg, 2011. Springer-Verlag. 21 [49] Q. Wang and J. E. Taylor. Quantifying human mobility perturbation and resilience in hurricane sandy. PLoS ONE, 9(11):e112608, 11 2014. [50] Y. Yuan and M. Raubal. Extracting dynamic urban mobility patterns from mobile phone data. In N. Xiao, M.-P. Kwan, M. F. Goodchild, and S. Shekhar, editors, GIScience, volume 7478 of Lecture Notes in Computer Science, pages 354 -- 367. Springer, 2012. 22
1705.04485
2
1705
2018-02-25T08:17:33
Mining Communication Data in a Music Community: A Preliminary Analysis
[ "cs.SI" ]
Comments play an important role within online creative communities because they make it possible to foster the production and improvement of authors' artifacts. We investigate how comment-based communication help shape members' behavior within online creative communities. In this paper, we report the results of a preliminary study aimed at mining the communication network of a music community for collaborative songwriting, where users collaborate online by first uploading new songs and then by adding new tracks and providing feedback in forms of comments.
cs.SI
cs
Mining Communication Data in a Music Community: A Preliminary Analysis Fabio Calefato (0000-0003-2654-1588), Giuseppe Iaffaldano (0000-0002-0432- 7735), Filippo Lanubile (0000-0003-3373-7589), Antonio Lategano, and Nicole Novielli (0000-0003-1160-2608) University of Bari, Dip. Informatica, Bari, Italy [email protected] Abstract. Comments play an important role within online creative communities because they make it possible to foster the production and improvement of au- thors' artifacts. We investigate how comment-based communication help shape members' behavior within online creative communities. In this paper, we report the results of a preliminary study aimed at mining the communication network of a music community for collaborative songwriting, where users collaborate online by first uploading new songs and then by adding new tracks and providing feed- back in forms of comments. Keywords: Computer-mediated communication · Online creative communities  Social networks · SNA 1 Introduction Online creative communities are virtual groups whose members volunteer to collabo- rate over the Internet to produce music, movies, games, and other cultural products [6]. Active feedback actions, such as commenting, are fundamental to the success of crea- tive communities [5]. Comments encourage members to produce new artifacts or pro- vide advice for improving existing content. Over time, comments also help build trust between the authors of posts and commenters, facilitate the formation of groups of users who share content and provide support [2] [3]. There has been a considerable amount of studies on social behavior in online com- munities of software developers. For example, Xu et al. [8] consider two developers socially related if they participate in the same project. Instead, Bird et al. [1] consider developers related if there is evidence of email communication – an arguably more direct evidence of an existing social link. Although social networks of software developers have been comprehensively stud- ied from different perspectives, how communication help shape members' behavior within online artistic communities is relatively unexplored in previous research. Ac- cordingly, we conducted an empirical study to investigate communication in a music community where users collaborate online by first uploading new songs and then by adding new tracks (e.g., sing over them, play another instrument, add audio effects), as an extension of previous creative work. As the music community includes both authors, who write songs, and music lovers, who play songs and give feedback to authors through comments, we are interested in understanding how the communication activity relates to (i) the songwriting activity and (ii) the establishment of links between authors and commenters in the underlying social network. Accordingly, we define the following research questions: RQ1 - What are the properties of the community communication network? RQ2 - Do authors and non-authors play different roles in the community communi- cation network? RQ3 – Is there a relationship between the communication and the songwriting ac- tivity? We address these research questions using a combination of social network analysis, correlation analysis, and descriptive statistics of the activity traces left by community members. The remainder of this paper is organized as follows. In Section 2, we portray the music community and build the underlying communication network. The results of the analysis are reported in Section 3. Finally, we draw conclusions and outline future work directions in Section 4. 2 Communication within the Community Songtree 1 is a social platform for the collaborative creation and sharing of music founded in 2015. It relies on a growing community of over 100,000 music enthusiasts and musicians who contributed more than 37,000 songs. The platform is available both on the web and as a mobile app. Musicians create their songs through an incremental, collaborative process that starts with the sharing of a new song, which represents the root of a song tree to be built collaboratively. Both the author of a new song as well as other musicians in the community may contribute to collaborative creation by overdub- bing, that is, recording new tracks over a baseline song, e.g., by playing new instru- ments or adding voice, thus originating a new branch of the song tree (see Fig. 1). In Songtree, we can distinguish two member profiles, namely authors and non-au- thors. Authors contribute to the community by writing and sharing songs, either new ones or overdubs. Every song in Songtree may originate a thread of discussions com- posed of comments contributed by community members. Non-authors are users who do not share any song but nonetheless enjoy listening to music. Non-authors may be 'lurkers,' who do not leave any sign of appreciation, or 'active'. The latter, in turn, are divided into 'mute' who contribute to the community activities only by providing non- 1 http://songtr.ee Fig. 1. An example of a song tree with root and derived songs/nodes. written signals (e.g. liking, reposting), and 'commenters' who contribute by giving a written feedback on others' songs (see Fig. 2). Since the focus of the study is on the communication activity, we build a communi- cation network based on the commenting activity of users, whether authors or just com- menters. To understand the nature of comments on a song, we performed a preliminary, qual- itative investigation based on a sample of comments from the Songtree database. More specifically, we extracted and manually analyzed the content of the discussion origi- nated by 50 commented songs, randomly extracted from the dataset (described next). We observed that in 92% of the cases comments were appreciations for the song; in 6% of the comments we found a message directed to another commenter; the remaining 2% were other types of comments. Based on this evidence, we can assume that comments in Songtree are usually employed to provide feedback to the author of the song and, therefore, we can represent communication within the community as a feedback net- work. Thus, we built the feedback network as a directed weighted graph where a link from node B to A represents the action of user B commenting on one or more songs authored by user A. We focus on two social network analysis measures, that is, in-degree and out-de- gree, which are indicators of the importance of an individual in a network [7]. The number of incoming edges (in-degree) is a function of the number of different users an Fig. 2. A conceptual model of the Songtree community. author has received comments from, while the number of outcoming edges (out-degree) is the number of different authors a user has provided comments to. We built the dataset used for the current study from the entire SQL dump of Songtree up to December 2016. We queried the database to extract some statistics concerning the registered users and their songwriting and commenting activities. A breakdown of the extracted data is reported in Table 1. We retained in the final dataset only those songs with at least one comment (6,214 out of 20,531). Furthermore, comment threads related to a song often include replies from the same author expressing gratitude towards other commenters. As such, self- comments were removed from our final dataset, obtaining 18,154 out of 28,827 com- ments. We also excluded from the final dataset those authors who commented only on their own songs, totaling 1,051 (out of 5,520) authors who received comments from other members, and 562 authors who commented on others' songs. Finally, the data extracted from the final dataset were exported into TSV (Tab Sep- arated Value), a compatible format for the Gephi2 tool, used for network graph building and social network analysis. Fig. 3 shows the feedback network diagram of Songtree in which the node size is proportional to the in-degree while the edge width is proportional to the number of received comments. 2 https://gephi.org Concept Instances Association Instances Song New Song Overdub User Author Non-author Lurker Active Mute Commenter 37,300 16,769 20,531 111,276 5,520 105,756 102,470 3,286 2,496 790 Comment Repost Like Bookmark Play 28,827 817 38,787 4,714 566,103 Table 1. Data extracted from the Songtree dump. Fig. 3. Feedback network diagram (nodes=6,310, edges=4,366). 3 Results In this section, we report the results of our empirical analysis, grouped by research question. 3.1 Properties of the Feedback Network Results in Fig. 4 a-b show different types of users' behavior, according to a typical power-law distribution. For the sake of completeness, we also report the distribution of comments made and received by users in the network (see Fig. 4 c-d, respectively). As common for online communities [4], the majority of community members send only a few comments while there is a small group of members very active in commenting other people's songs. Similarly, the great majority of members only receive a few com- ments, while there is a small group of members who receive more than 500 comments. This evidence suggests that the in-degree of a member is an indication of higher status in the community, i.e., authors of popular songs receive more comments on the artifact they share. a) c) b) d) Fig. 4. Communication behavior in the Songtree community. Charts represent the distribution of a) out-degree, b) in-degree, c) comments sent, and d) comments received. Next, we examine the relationship between the number of comments sent by an au- thor (i.e., a member that has posted at least one song) and her related in-degree. Con- sidering those authors who both commented and received at least one comment (n=405), we observe a moderate positive association between the two metrics, as de- picted in Fig. 5 and further confirmed by the Spearman's rank coefficient equal to 0.6. This evidence suggests that the commenting activity may contribute to increasing the visibility of an author's artifacts in the network. Fig. 5. How in-degree grows with number of comments sent by an author 3.2 Roles Played by Authors and Non-Authors in the Feedback Network First, we analyzed whether there are differences in the commenting behavior of au- thors and non-authors (see Table 2). Looking at the table, we observe that a higher percentage of non-authors (94.3%) do not provide any comment. To assess the extent of such percentages, we performed a chi-square test of independence, which reveals a relationship between authorship and commenting activity (χ2= 3,890.3, p < 2.2e-16). Frequency Percent No One or more comments comments Tot. Authors Non-authors Tot. 4,958 4.5% 104,966 94.3% 109,924 98.8% 562 0.5% 790 0.7% 1,352 1.2% 5,520 5.0% 105,756 95.0% 111,276 100.0% Table 2. Commenting activity: authors vs. non-authors. We refine our analysis by comparing the commenting behavior of authors against active users, thus excluding lurkers who may only be registered for curiosity without ever returning a visit. From Table 3, we note that a higher percentage of authors (56.3%) do not provide any comment compared to active users (28.3%). Also in this case, the chi-square test of independence revealed a significant relationship between the catego- ries in Table 3 (χ2= 304.48, p < 2.2e-16), indicating that active users are more inclined to leave comments than authors. Frequency Percent Authors Active Tot. No One or more comments comments Tot. 4,958 56.3% 2,496 28.3% 7,454 84.6% 562 6.4% 790 9.0% 1,352 15.4% 5,520 62.7% 3,286 37.3% 8,806 100.0% Table 3. Commenting activity: authors vs. active users. 3.3 Relationship Between Communication and Songwriting Activities Since we analyze here the relationship between the commenting and songwriting activ- ities, we run a correlation analysis restricted to authors only. We observe a weak Spearman's rank correlation (r=0.36, n=5,520) between the number of comments sent by a Songtree user and number of songs recorded (Fig. 6). Similar correlation values are observed if we distinguish between new songs (r=0.33, n=4,756) and overdubs (r=0.43, n=1,405), as shown respectively in Fig. 7 a and Fig. 7 b. Fig. 6. Correlation between authors' commenting activity and songwriting activity. a) b) Fig. 7. Correlation between a) authors' commenting activity and new-song writing activity; b) authors' commenting activity and overdubbing activity. 4 Conclusions and Future Work In this paper, we described a preliminary study aimed at mining the communication activity of a music community for collaborative songwriting. We found that the in-degree and out-degree measures of the feedback network ex- hibit typical long-tailed, power-law distribution, meaning that a few members account for the bulk of the comments sent and received. We also observed a moderate relation- ship between the number of comments sent by an author and the number of different people who commented to her songs (i.e., in-degree), meaning that comments may pos- itively contribute to the visibility of author's creations. Besides, we analyzed the rela- tion between communication and songwriting activity and found that active users, thus excluding lurkers, are more inclined to provide feedback than authors. Considering the variety of genres and people in the community, we intend to repli- cate this analysis to study the relations among the different sub-communities built around music genres (e.g., rock, hip-hop, classical). Besides, we will further investigate the songwriting activity, specifically how collaborations take form and which are the factors that increment the attractiveness of a song. Acknowledgements.We thank Songtree for contributing their data. This work has been partially supported by the project EmoQuest, funded by MIUR under the SIR program. References 1. 2. 3. 4. 5. 6. 7. 8. Bird C, Gourley A, Devanbu P, Gertz M, Swaminathan A (2006) Mining Email Social Networks. In: Proc. 2006 Int. Work. Min. Softw. Repos. ACM, New York, NY, USA, pp 137–143 Blau PM (1964) Exchange and power in social life. Transaction Publishers Burke M, Settles B (2011) Plugged in to the Community: Social Motivators in Online Goal-setting Groups. In: Proc. 5th Int. Conf. Communities Technol. ACM, New York, NY, USA, pp 1–10 Newman MEJ (2003) The Structure and Function of Complex Networks. SIAM Rev 45:167–256. doi: 10.1137/S003614450342480 Schultheiss D, Blieske A, Solf A, Staeudtner S (2013) How to Encourage the Crowd? A Study About User Typologies and Motivations on Crowdsourcing Platforms. In: Proc. 2013 IEEE/ACM 6th Int. Conf. Util. Cloud Comput. IEEE Computer Society, Washington, DC, USA, pp 506–509 Settles B, Dow S (2013) Let's Get Together: The Formation and Success of Online Creative Collaborations. In: Proc. SIGCHI Conf. Hum. Factors Comput. Syst. ACM, New York, NY, USA, pp 2009–2018 Wasserman S, Faust K (1994) Social Network Analysis: Methods and Applications. Sociology The Journal Of The British Sociol. Assoc. 8:xxxi, 825. Xu J, Gao Y, Christley S, Madey G (2005) A Topological Analysis of the Open Souce Software Development Community. In: Proc. 38th Annu. Hawaii Int. Conf. Syst. Sci.
1201.1717
3
1201
2013-09-14T02:35:20
On the Hyperbolicity of Small-World and Tree-Like Random Graphs
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
Hyperbolicity is a property of a graph that may be viewed as being a "soft" version of a tree, and recent empirical and theoretical work has suggested that many graphs arising in Internet and related data applications have hyperbolic properties. We consider Gromov's notion of \delta-hyperbolicity, and establish several results for small-world and tree-like random graph models. First, we study the hyperbolicity of Kleinberg small-world random graphs and show that the hyperbolicity of these random graphs is not significantly improved comparing to graph diameter even when it greatly improves decentralized navigation. Next we study a class of tree-like graphs called ringed trees that have constant hyperbolicity. We show that adding random links among the leaves similar to the small-world graph constructions may easily destroy the hyperbolicity of the graphs, except for a class of random edges added using an exponentially decaying probability function based on the ring distance among the leaves. Our study provides one of the first significant analytical results on the hyperbolicity of a rich class of random graphs, which shed light on the relationship between hyperbolicity and navigability of random graphs, as well as on the sensitivity of hyperbolic {\delta} to noises in random graphs.
cs.SI
cs
On the Hyperbolicity of Small-World and Tree-Like Random Graphs∗ Wei Chen Microsoft Research Asia [email protected] Guangda Hu Princeton University [email protected] Wenjie Fang Ecole Normale Sup´erieure de Paris [email protected] Michael W. Mahoney Stanford University [email protected] Abstract Hyperbolicity is a property of a graph that may be viewed as being a "soft" version of a tree, and recent empirical and theoretical work has suggested that many graphs arising in Internet and related data applications have hyperbolic properties. Here, we consider Gromov's notion of δ-hyperbolicity, and we establish several positive and negative results for small-world and tree-like random graph models. First, we study the hyperbolicity of the class of Kleinberg small-world random graphs KSW (n, d, γ), where n is the number of vertices in the graph, d is the dimension of the underlying base grid B, and γ is the small-world parameter such that each node u in the graph connects to another node v in the graph with probability proportional to 1/dB(u, v)γ with dB(u, v) being the grid distance from u to v in the base grid B. We show that when γ = d, the parameter value allowing efficient decentralized routing in Kleinberg's small-world network, with probability 1 − o(1) the hyperbolic δ is Ω((log n) 1.5(d+1)+ε ) for any ε > 0 independent of n. Comparing to the diameter of Θ(log n) in this case, it indicates that hyperbolicity is not significantly improved comparing to graph diameter even when the long-range connections greatly improves decentralized navigation. We also show that for other values of γ the hyperbolic δ is either at the same level or very close to the graph diameter, indicating poor hyperbolicity in these graphs as well. Next we study a class of tree-like graphs called ringed trees that have constant hyperbolicity. We show that adding random links among the leaves in a manner similar to the small-world graph constructions may easily destroy the hyperbolicity of the graphs, except for a class of random edges added using an exponentially decaying probability function based on the ring distance among the leaves. Our study provides one of the first significant analytical results on the hyperbolicity of a rich class of random graphs, which shed light on the relationship between hyperbolicity and navigability of random graphs, as well as on the sensitivity of hyperbolic δ to noises in random graphs. 1 Keywords: Complex networks, graph hyperbolicity, small-world networks, decentralized navigation 1 Introduction Hyperbolicity, a property of metric spaces that generalizes the idea of Riemannian manifolds with negative curvature, has received considerable attention in both mathematics and computer science. When applied to ∗This is the version to appear in the journal of Internet Mathematics. 1 graphs, one may think of hyperbolicity as characterizing a "soft" version of a tree -- trees have hyperbolicity zero, and graphs that "look like" trees in terms of their metric structure have "small" hyperbolicity. Since trees are an important class of graphs and since tree-like graphs arise in numerous applications, the idea of hyperbolicity has received attention in a range of applications. For example, it has found usefulness in the visualization of the Internet, the Web, and other large graphs [29, 30, 35, 34, 45]; it has been applied to questions of compact routing, navigation, and decentralized search in Internet graphs and small-world social networks [13, 10, 25, 1, 26, 5, 40]; and it has been applied to a range of other problems such as distance estimation, network security, sensor networks, and traffic flow and congestion minimization [2, 17, 18, 19, 36, 12]. The hyperbolicity of graphs is typically measured by Gromov's hyperbolic δ [15, 7] (see Section 2). The hyperbolic δ of a graph measures the "tree-likeness" of the graph in terms of the graph distance metric. It can range from 0 up to the half of the graph diameter, with trees having δ = 0, in contrast of "circle graphs" and "grid graphs" having large δ equal to roughly half of their diameters. In this paper, we study the δ-hyperbolicity of families of random graphs that intuitively have some sort of tree-like or hierarchical structure. Our motivation comes from two angles. First, although there are a number of empirical studies on the hyperbolicity of real-world and random graphs [2, 17, 32, 31, 36, 12], there are essentially no systematic analytical study on the hyperbolicity of popular random graphs. Thus, our work is intended to fill this gap. Second, a number of algorithmic studies show that good graph hyperbolicity leads to efficient distance labeling and routing schemes [8, 13, 11, 9, 27, 10], and the routing infrastructure of the Internet is also empirically shown to be hyperbolic [2]. Thus, it is interesting to further investigate if efficient routing capability implies good graph hyperbolicity. To achieve our goal, we first provide fine-grained characterization of δ-hyperbolicity of graph families relative to the graph diameter: A family of random graphs is (a) constantly hyperbolic if their hyperbolic δ's are constant, regardless of the size or diameter of the graphs; (b) logarithmically (or polylogarithmically) hyperbolic if their hyperbolic δ's are in the order of logarithm (or polylogarithm) of the graph diameters; (c) weakly hyperbolic if their hyperbolic δ's grow asymptotically slower than the graph diameters; and (d) not hyperbolic if their hyperbolic δ's are at the same order as the graph diameters. We study two families of random graphs. The first family is Kleinberg's grid-based small-world ran- dom graphs [22], which build random long-range edges among pairs of nodes with probability inverse proportional to the γ-th power of the grid distance of the pairs. Kleinberg shows that when γ equals to the grid dimension d, the number of hops for decentralized routing can be improved from Θ(n) in the grid to O(polylog(n)), where n is the number of vertices in the graph. Contrary to the improvement in decentralized routing, we show that when γ = d, with high probability the small-world graph is not poly- logarithmically hyperbolic. We further show that when 0 ≤ γ < d, the random small-world graphs is not hyperbolic and when γ > 3 and d = 1, the random graphs is not polylogarithmically hyperbolic. Although there still exists a gap between hyperbolic δ and graph diameter at the sweetspot of γ = d, our results already indicate that long-range edges that enable efficient navigation do not significantly improve the hyperbolicity of the graphs. The second family of graphs is random ringed trees. A ringed tree is a binary tree with nodes in each level of the tree connected by a ring (Figure 1(d)). Ringed trees can be viewed as an idealized version of hierarchical structure with local peer connections, such as the Internet autonomous system (AS) topology. We show that ringed tree is quasi-isometric to the Poincar´e disk, the well known hyperbolic space repre- sentation, and thus it is constantly hyperbolic. We then study how random additions of long-range links on the leaves of a ringed tree affect the hyperbolicity of random ringed trees. Note that due to the tree base structure, random ringed trees allow efficient routing within O(log n) steps using tree branches. Our results 2 show that if the random long-range edges between leaves are added according to a probability function that decreases exponentially fast with the ring distance between leaves, then the resulting random graph is loga- rithmically hyperbolic, but if the probability function decreases only as a power-law with ring distance, or based on another tree distance measure similar to [23], the resulting random graph is not hyperbolic. Fur- thermore, if we use binary trees instead of ringed trees as base graphs, none of the above augmentations is hyperbolic. Taken together, our results indicate that δ-hyperbolicity of graphs is quite sensitive to both base graph structures and probabilities of long-range connections. To summarize, we provide one of the first significant analytical results on the hyperbolicity properties of important families of random graphs. Our results demonstrate that efficient routing performance does not necessarily mean good graph hyperbolicity (such as logarithmic hyperbolicity). 1.1 Related work There has been a lot of work on search and decentralized search subsequent to Kleinberg's original work [22, 23], much of which has been summarized in the review [24]. In a parallel with this, there has been empirical and theoretical work on hyperbolicity of real-world complex networks as well as simple ran- dom graph models. On the empirical side, [2] showed that measurements of the Internet are negatively curved; [17, 18, 19, 32, 31] provided empirical evidence that randomized scale-free and Internet graphs are more hyperbolic than other types of random graph models; [36] measured the average δ and related curvature to congestion; and [12] measured treewidth and hyperbolicity properties of the Internet. On the theoretical side, one has [41, 19, 4, 37, 44, 42], among which [37, 44, 42] study Gromov hyperbolicity of random graphs and are most relevant to our work. In [37], Narayan et al. study δ-hyperbolicity of sparse Erdos-R´enyi random graphs G(n, p) where n is the number of vertices in the graph and p is the probability of any pair of nodes has an edge, with p = c/n for some constant c > 1. They prove that with positive prob- ability these graphs are not δ-hyperbolic for any positive constant δ (i.e. not constantly hyperbolic in our definition). In [44], Tucci shows that random d-regular graphs are almost surely not constantly hyperbolic. In [42], Shang shows that with non-zero probability the Newman-Watts small-world model [38] is not con- stantly hyperbolic. These studies only investigate constant hyperbolicity on random graphs, while our study moves beyond constant hyperbolicity and show whether certain random graph classes are logarithmically hyperbolic, or not hyperbolic at all, comparing with the graph diameters. Moreover, the one dimensional Newman-Watts small-world model studied in [42] is a special case of the Kleinberg small-world model we studied in this paper (with dimension d = 1 and small-world parameter γ = 0). As given by Theorem 1 (2), we show that with probability 1 − o(1) the hyperbolic δ of these random graphs is Ω(log n), where n is the number of vertices in the graph. Therefore, our result is stronger than the result in [42] for this particular case. More generally, we see two approaches connecting hyperbolicity with efficient routing in graphs. One approach study efficient computation of graph properties, such as diameters, centers, approximating trees, and packings and coverings for low hyperbolic-δ graphs and metric spaces [9, 8, 13, 10, 11]. In large part, the reason for this interest is that there are often direct consequences for navigation and routing in these graphs [13, 10, 25, 1]. While these results are of interest for general low hyperbolic-δ graphs, they can be less interesting when applied to small-world and other low-diameter random models of complex networks. To take one example, [9] provides a simple construction of a distance approximating tree for δ-hyperbolic graphs on n vertices; but the O(log n) additive-error guarantee is clearly less interesting for models in which the diameter of the graph is O(log n). Unfortunately, this O(log n) arises for a very natural reason in the analysis, and it is nontrivial to improve it for popular tree-like complex network models. Another approach taken by several recent papers is to build random graphs from hyperbolic metric 3 spaces and then shows that such random graphs lead to several common properties of small-world complex networks, including good navigability properties [5, 40, 27, 28]. While assuming a low hyperbolicity metric space to build random graphs in these studies makes intuitive sense, it is difficult to prove nontrivial results on the Gromov's δ of these random graphs even for simple random graph models that are intuitively tree-like. Understanding the relationship between these two approaches was one of the original motivations of our research. In particular, the difficulties in the above two approaches lead us to study hyperbolicity of small-world and tree-like random graphs. Finally, ideas related to hyperbolicity have been applied in numerous other networks applications, e.g., to problems such as distance estimation, network security, sensor networks, and traffic flow and congestion minimization [43, 20, 21, 18, 36, 3], as well as large-scale data visualization [34]. The latter applications typically take important advantage of the idea that data are often hierarchical or tree-like and that there is "more room" in hyperbolic spaces of dimension 2 than Euclidean spaces of any finite dimension. Paper organization. In Section 2 we provide basic concepts and terminologies on hyperbolic spaces and graphs that are needed in this paper. In Sections 3 and 4 we study the hyperbolicity of small-world random graphs and ringed tree based random graphs. For ease of reading, in each of Sections 3 and 4 we first sum- marize our technical results together with their implications (Sections 3.1 and 4.1), then provide the outline of the analyses (Sections 3.2 and 4.2), followed by the detailed technical proofs (Sections 3.3 and 4.3), and finally discuss extensions of our results to other related models (Sections 3.4 and 4.4). We discuss open problems and future directions related to our study in Section 5. 2 Preliminaries on hyperbolic spaces and graphs Here, we provide basic concepts concerning hyperbolic spaces and graphs used in this paper; for more comprehensive coverage on hyperbolic spaces, see, e.g., [7]. 2.1 Gromov's δ-hyperbolicity In [15], Gromov defined a notion of hyperbolic metric space; and he then defined hyperbolic groups to be finitely generated groups with a Cayley graph that is hyperbolic. There are several equivalent definitions (up to a multiplicative constant) of Gromov's hyperbolic metric space [6]. In this paper, we will mainly use the following. Definition 1 (Gromov's four-point condition). In a metric space (X, d), given u, v, w, x with d(u, v) + d(w, x) ≥ d(u, x) + d(w, v) ≥ d(u, w) + d(v, x) in X, we note δ(u, v, w, x) = (d(u, v) + d(w, x) − d(u, x) − d(w, v))/2. (X, d) is called δ-hyperbolic for some non-negative real number δ if for any four points u, v, w, x ∈ X, δ(u, v, w, x) ≤ δ. Let δ(X, d) be the smallest possible value of such δ, which can also be defined as δ(X, d) = supu,v,w,x∈X δ(u, v, w, x). Given an undirected, unweighted and connected graph G = (V, E), one can view it as a metric space (V, dG), where dG(u, v) denotes the (geodesic) graph distance between two vertices u and v. Then, one can apply the above four point condition to define its δ-hyperbolicity, which we denote δ = δ(G) = δ(V, dG) (and which we sometimes refer to simply as the hyperbolicity or the δ of the graph). Trees are 0-hyperbolic; and 0-hyperbolic graphs are exactly clique trees (or called block graphs), which can be viewed as cliques connected in a tree fashion [16]. Thus, it is often helpful to view graphs with a low hyperbolic δ as "thick- ened" trees, or in other words, as tree-like when viewed at large size scales. 4 If we let D(G) denote the diameter of the graph G, then, by the triangle inequality, we have δ(G) ≤ D(G)/2. We will use the asymptotic difference between the hyperbolicity δ(G) and the diameter D(G) to characterize the hyperbolicity of the graph G. Definition 2 (Hyperbolicity of a graph). For a family of graphs G with diameter D(G), G ∈ G going to infinity as the size of G grows to infinity, we say that graph family G is constantly (resp. logarithmically, polylogarithmically, or weakly) hyperbolic, if δ(G) = O(1) (resp. O(log D(G)), O((log D(G))c) for some constant c > 0, or o(D(G))) when D(G) goes to infinity; and G is not hyperbolic if δ(G) = Θ(D(G)), where G ∈ G. The above definition provides more fine-grained characterization of hyperbolicity of graph families than one typically sees in the literature, which only discusses whether or not a graph family is constantly hyperbolic. This definition does not address the hyperbolicity of graph families where the diameter stays bounded while the size of the graph goes unbounded. For these graph families, one may probably need tight analysis on the constant factor between the hyperbolic δ and the graph diameter, and it is out of the scope of this paper. 2.2 Rips condition Rips condition [15, 7] is a technically equivalent condition to the Gromov's four point condition up to a constant factor. We use the Rips condition when analyzing the δ-hyperbolicity of ringed trees. In a metric space (X, d), we define a geodesic segment [u, v] between two points u, v to be the image of a function ρ : [0, d(u, v)] → [u, v] satisfying ρ(0) = u, ρ(d(u, v)) = v, d(ρ(s), ρ(t)) = s − t for any s, t ∈ [0, d(u, v)]. We say that a metric space is geodesic if every pair of its points has a geodesic segment, not necessarily unique. In a geodesic metric space (X, d), given u, v, w in X, we denote ∆(u, v, w) = [u, v]∪[v, w]∪[w, u] a geodesic triangle. [u, v], [v, w], [w, u] are called sides of ∆(u, v, w). We should note that, in general, geodesic segments and geodesic triangles are not unique up to their endpoints. In a metric space, it is sometimes convenient to consider distances between point sets in the following way. We say that a set S is within distance d to another set T if S is contained in the ball B(T, d) of all points within distance d to some point in T . We say that S and T are within distance d to each other if S is within distance d to T and vice versa. Definition 3 (Rips condition). A geodesic triangle ∆(u, v, w) in a geodesic metric space (X, d) is called δ-slim for some non-negative real number δ if any point on a side is within distance δ to the union of the other two sides. (X, d) is called Rips δ-hyperbolic if every geodesic triangle in (X, d) is δ-slim. We denote δRips(X, d) the smallest possible value of such δ (could be infinity). It is known (see, e.g., [14, 7, 9]) that δ(X, d) and δRips(X, d) differ only within a multiplicative constant. In particular, δ(X, d) ≤ 8δRips(X, d) and δRips(X, d) ≤ 4δ(X, d). Since we are only concerned with asymptotic growth of δ(X, d), Rips condition can be used in place of the Gromov's four point condition. For an undirected unweighted graph G = (V, E), we can also treat it as a geodesic metric space with every edge interpreted as a segment of length 1, and thus use the Rips condition to define its hyperbolicity, which we denote as δRips(G). Note that in the case of unweighted graph, when considering the distance between two geodesics on the graph, we only consider the distance among the vertices, since other points on the edges can add at most 2 to the distance between vertices. 2.3 Poincar´e disk The Poincar´e disk (see Figure 1(a) for an illustration) is a well-studied hyperbolic metric space. Although in this paper we touch upon it only briefly when we study ringed-tree graphs, it is useful to convey intuition 5 (a) Poincar´e disk (b) Tessellation of Poincar´e disk (c) Binary tree (d) Ringed tree Figure 1: Poincar´e disk, its tessellation, a binary tree, and a ringed tree. about hyperbolicity and tree-like behavior. Definition 4. Let D = B(0, 1) be a open disk on the complex plane with origin 0 and radius 1, with the following distance function: (cid:18) 2(cid:107)u − v(cid:107)2 (1 − (cid:107)u(cid:107)2)(1 − (cid:107)v(cid:107)2) (cid:19) . d(u, v) = arccosh 1 + (D, d) is a metric space. We call it the Poincar´e disk. Visually, a (hyperbolic) line in the Poincar´e disk is the segment of a circle in the disk that is perpendicular to the circular boundary of the disk, and thus all lines bend inward towards the origin. The hyperbolic distance between two points in the disk of fixed distance in the complex plane increase exponentially fast when they moves towards the boundary of the disk, meaning that there is much more "space" towards the boundary than around the origin. This can be seen from a tessellation of the Poincar´e disk, as shown in Figure 1(b). 2.4 Quasi-isometry Quasi-isometry, defined as follows, is a concept used to capture the large-scale similarity between two metric spaces. Definition 5 (Quasi-isometry). For two metric spaces (X, dX ), (Y, dY ), we say that f : X → Y is a (λ, )-quasi-isometric embedding from X to Y if for any u, v ∈ X, dX (u, v) −  ≤ dY (f (u), f (v)) ≤ λdX (u, v) + . 1 λ Furthermore, if the  neighborhood of f (Y ) covers X, then we say that f is a (λ, )-quasi-isometry. More- over, we say that X, Y are quasi-isometric if such a (λ, )-quasi-isometry exists for some constants λ and . If two metric spaces are quasi-isometric with some constant, then they have the same "large-scale" behavior. For example, the d-dimensional grid Zd and the d-dimensional Euclidean space Rd are quasi-isometric, √ √ d/2)-quasi-isometric embedding (x, y) (cid:55)→ (x, y). As a second example, consider an realized by the ( infinite ringed-tree: start with a binary tree (illustrated in Figure 1(c)) and then connect all vertices at a given tree level into a ring. This is defined more formally in Section 4, but an example is illustrated in Figure 1(d). d, 6 As we prove in Section 4, the infinite ringed tree is quasi-isometric to the Poincar´e disk -- thus it may be equivalently viewed as a "softened" binary tree or as a "coarsened" Poincar´e disk. Quasi-isometric embeddings have the important property of preserving hyperbolicity, up to a constant factor, as given by the following proposition. Proposition 1 (Theorem 1.9, Chapter III.H of [7]). Let X and X(cid:48) be two metric spaces and let f : X(cid:48) → X be a (λ, )-quasi-isometric embedding. If X is δ-hyperbolic, then X(cid:48) is δ(cid:48)-hyperbolic, where δ(cid:48) is a function of δ, λ, and . 3 δ-hyperbolicity of grid-based small-world graphs In this section, we consider the δ-hyperbolicity of graphs constructed according to the small-world graph model as formulated by Kleinberg [22], in which long-range edges are added on top of a base grid, which is a discretization of a low-dimensional Euclidean space. The model starts with n vertices forming a d-dimensional base grid (with wrap-around). More precisely, given positive integers n and d such that n1/d is also an integer, let B = (V, E) be the base grid, with V = {(x1, x2, . . . , xd) xi ∈ {0, 1, . . . , n1/d − 1}, i ∈ [d]}, E = {((x1, x2, . . . , xd), (y1, y2, . . . , yd)) ∃j ∈ [d], yj = xj + 1 mod n1/d or yj = xj − 1 mod n1/d,∀i (cid:54)= j, yi = xi}. Let dB denote the graph distance metric on the base grid B. We then build a random graph G on top of B, such that G contains all vertices and all edges (referred to as grid edges) of B, and for each node u ∈ V , it has one long-range edge (undirected) connected to some node v ∈ V , with probability proportional to 1/dB(u, v)γ, where γ ≥ 0 is a parameter. We refer to the probability space of these random graphs as KSW (n, d, γ); and we let δ(KSW (n, d, γ)) denote the random variable of the hyperbolic δ of a randomly picked graph G in KSW (n, d, γ). Recall that Kleinberg showed that the small-world graphs with γ = d allow efficient decentralized routing (with O(log2 n) routing hops in expectation), whereas graphs with γ (cid:54)= d do not allow any efficient decentralized routing (with Ω(nc) routing hops for some constant c) [22]; and note that the base grid B has large hyperbolic δ, i.e., δ(B) = Θ(n1/d) = Θ(D(B)). Intuitively, the structural reason for the efficient routing performance at γ = d is that long-range edges are added "hierarchically" such that each node's long-range edges are nearly uniformly distributed over all "distance scales". 3.1 Results and their implications The following theorem summarizes our main technical results on the hyperbolicity of small-world graphs for different combinations of d and γ. Theorem 1. With probability 1 − o(1) (when n goes to infinity), we have 1. δ(KSW (n, d, γ)) = Ω((log n) 2. δ(KSW (n, d, γ)) = Ω(log n) when d ≥ 1 and 0 ≤ γ < d; and 1 1.5(d+1)+ε ) when d ≥ 1 and γ = d, for any ε > 0 independent of n; 3. δ(KSW (n, d, γ)) = Ω(n γ−2 γ−1−) when d = 1 and γ > 3, for any  > 0 independent of n. This theorem, together with the results of [22] on the navigability of small-world graphs, have several implications. The first result shows that when γ = d, with high probability the hyperbolic δ of the small- world graphs is at least c(log n) 1.5(d+1) for some constant c. We know that the diameter is Θ(log n) in expectation when γ = d [33]. Thus the small-world graphs at the sweetspot for efficient routing is not 1 7 polylogarithmically hyperbolic, i.e., δ is not O(logc log n)-hyperbolic for any constant c > 0. However, there is still a gap between our lower bound the upper bound provided by the diameter, and thus it is still open whether small-world graphs are weakly hyperbolic or not hyperbolic. Overall, though, our result indicates no drastic improvement on the hyperbolicity (relative to the improvement of the diameter) for small-world graphs at the sweetspot (where a dramatic improvement was obtained for the efficiency of decentralized routing). The second result shows that when γ < d, then δ = Ω(log n). The diameter of the graph in this case is Θ(log n) [33]; thus, we see that when γ < d the hyperbolic δ is asymptotically the same as the diameter, i.e., although δ decreases as edges are added, small-world graphs in this range are not hyperbolic. The third result concerns the case γ > d, in which case the random graph degenerates towards the base grid (in the sense that most of all of the long-range edges are very local), which itself is not hyperbolic. For the general γ, we show that for the case of d = 1 the hyperbolic δ is lower bounded by a (low-degree) polynomial of n; this also implies that the graphs in this range are not polylogarithmically hyperbolic. Note that our polynomial exponent γ−2 γ−1 −  matches the diameter lower bound proven in [39]. 3.2 Outline of the proof of Theorem 1 In this subsection, we provide a summary of the proof of Theorem 1. In our analysis, we use two different techniques, one for the first two results in Theorem 1, and the other for the last result; in addition, for the first two results, we further divide the analysis into the two cases d ≥ 2 and d = 1. When d ≥ 2 and 0 ≤ γ ≤ d, the main idea of the proof is to pick a square grid of size (cid:96)0 (it does not matter in which dimension the square is picked from). We know that when only grid distance is considered, the four corners of the square grid have the Gromov δ value equal to (cid:96)0. We will show that, as long as (cid:96)0 is 1.5(d+1)+ε ) when γ = d and O(log n) when 0 ≤ γ < d), the probability not very large (to be exact, O((log n) that any pair of vertices on this square grid have a shortest path shorter than their grid distance after adding long-range edges is close to zero (as n tends to infinity). Therefore, with high probability, the four corners selected have Gromov δ as desired in the lower bound results. 1 To prove this result, we study the probability that any pair of vertices u and v at grid distance (cid:96) are connected with a path that contains at least one long-range edge and has length at most (cid:96). We upper bound such (cid:96)'s so that this probability is close to zero. To do so, we first classify such paths into a number of categories, based on the pattern of paths connecting u and v: how it alternates between grid edges and long-range edges, and the direction on each dimension of the grid edges and long-range edges (i.e., whether it is the same direction as from u to v in this dimension, or the opposite direction, or no move in this dimension). We then bound the probability of existing a path in each category and finally bound all such paths in aggregate. The most difficult part of the analysis is the bounding of the probability of existing a path in each category. For the case of d = 1 and 0 ≤ γ ≤ d, the general idea is similar to the above. The difference is that we do not have a base square to start with. Instead, we find a base ring of length Θ((cid:96)0) using one long-range edges e0, where (cid:96)0 is fixed to be the same as the case of d ≥ 2. We show that with high probability, (a) such an edge e0 exists, and (b) the distance of any two vertices on the ring is simply their ring distance. This is enough to show the lower bound on the hyperbolic δ. For the case of γ > 3 and d = 1, a different technique is used to prove the lower bound on hyperbolic δ. We first show that, in this case, with high probability all long-range edges only connect two vertices with ring distance at most some (cid:96)0 = o( n). Next, on the one dimensional ring, we first find two vertices A and B at the two opposite ends on the ring. Then we argue that there must be a path P + AB that only goes √ 8 through the clockwise side of ring from A to B, while another path P− AB that only goes through the counter- clockwise side of the ring from A to B, and importantly, the shorter length of these two paths are at most AB and P− O((cid:96)0) longer than the distance between A and B. We then pick the middle point C and D of P + AB, respectively, and argue that the δ value of the four points A, B, C, and D give the desired lower bound. 3.3 Detailed proof of Theorem 1 3.3.1 The case of d ≥ 2 and 0 ≤ γ ≤ d For this case, let n(cid:48) = n1/d be the number of vertices on one side of the grid. For convenience, our main analysis for this case uses n(cid:48) instead of n. Lemmas for calculation. We first provide a couple of lemmas used in our probability calculation. Lemma 1. There exists a constant c1, such that for any k, m ∈ Z+, we have (cid:88) y1+···+yk =m y1,...,yk∈Z+ 1 y1y2 ··· yk ≤ (c1 ln m)k−1 m , where the left side is considered to be 0 for k > m; and for k = m = 1, the right side 00 is considered to be 1. (cid:88) Proof. For k = 1, it is trivial. For k = 2, we have (cid:98)m/2(cid:99) · (cid:100)m/2(cid:101) + ··· + ≤ 2 1 1 y1y2 (cid:18) y1+y2=m y1,y2∈Z+ (cid:19) (cid:18) 1 (cid:100)m/2(cid:101) + ··· + 1 1 (cid:19) 1 (m − 1) · 1 ≤ 2 (cid:98)m/2(cid:99) < c1 ln m m , where c1 is roughly 4. Suppose the lemma holds for k − 1, with k ≥ 3. The induction hypothesis is (cid:88) y1+···+yk−1=m y1,...,yk−1∈Z+ 1 y1y2 ··· yk−1 ≤ (c1 ln m)k−2 m , Since the logarithm function is increasing, we have (cid:88) y1+···+yk =m y1,...,yk∈Z+ 1 y1y2 ··· yk ≤ 1 1 (c1 ln(m − 1))k−2 m − 1 ≤ (c1 ln m)k−2 · (cid:88) 1 y1y2 + ··· + 1 m − 1 (c1 ln 1)k−2 1 y1+y2=m y1,y2∈Z+ ≤ (c1 ln m)k−2 · c1 ln m . m Therefore the inequality holds for all k. 9 Lemma 2. For any constant θ ∈ R with 0 ≤ θ < 1, there exists a constant c2 (may only depend on θ), such that for any constants k, n(cid:48) ∈ Z+, m ∈ R, and non-zero λ1, λ2, . . . , λk ∈ R, we have (cid:88) λ1y1+···+λk yk =m y1,...,yk∈{1,2,...,n(cid:48)} 1 2 ··· yθ 1yθ yθ k ≤ (c2n(cid:48))(k−1)(1−θ), where the left side is considered to be 0 if there is no y1, y2, . . . , yk ∈ {1, 2, . . . , n(cid:48)} satisfying λ1y1 +λ2y2 + ··· + λkyk = m. Proof. For each tuple (y1, y2, . . . , yk−1) ∈ {1, 2, . . . , n(cid:48)}k−1, there is at most one yk ∈ {1, 2, . . . , n(cid:48)} satisfying λ1y1 + λ2y2 + ··· + λkyk = m. Since 1 ≤ 1 because 0 ≤ θ < 1, we have (cid:88) λ1y1+···+λk yk =m y1,...,yk∈{1,2,...,n(cid:48)} yθ k 1 2 ··· yθ 1yθ yθ k ≤ = (cid:32) n(cid:48)(cid:88) i=1 (cid:88) (cid:33)k−1 1 iθ y1,...,yk−1∈{1,2,...,n(cid:48)} 1 2 ··· yθ 1yθ yθ k−1 ≤ (c2n(cid:48))(k−1)(1−θ), where c2 is roughly ( 1 1−θ ) 1 1−θ . Therefore the lemma is proved. Classification of paths. grid edges, which are edges on the grid, and long-range edges, which are randomly added. In a d-dimensional random graph KSW (n, d, γ), there are two kinds of edges: Fix two vertices u and v, a path from u to v may contain some long-range edges and some grid edges. We divide the path into several segments along the way from u to v: (a) each segment is either one long- range edge (called a long-range segment) or a batch of consecutive grid edges (called a grid segment); and (b) two consecutive segments cannot be both grid segments (otherwise combining them into one segment). We use a d-dimensional vector to denote each edge, so that the source coordinate plus this vector equals to the destination coordinate module n(cid:48). For grid with wrap-around, there may be multiple vec- tors corresponding to one edge. We choose the vector in which every element is from {−(cid:98) n(cid:48) 2 (cid:99) + 2 (cid:99)}. In this way, the vector representation of each edge is unique and the absolute value of every 1, . . . ,(cid:98) n(cid:48)−1 dimension is the smallest. We call this the edge vector of that edge. For every segment in the path, we call the summation (not module n(cid:48)) of all edge vectors the segment vector. For a vector (x1, x2, . . . , xd), define its sign pattern as (sgn(x1), sgn(x2), . . . , sgn(xd)). 2 (cid:99),−(cid:98) n(cid:48) We say two paths from u to v belong to the same category if (a) they have the same number of segments; (b) their corresponding segments are of the same type (long-range or grid segments); (c) for every pair of corresponding long-range segments in the two paths, the sign patterns of their segment vectors are the same; (d) for every pair of corresponding grid segments in the two paths, their segment vectors are equal; and (e) the summations (not module n(cid:48)) of all segment vectors in the two paths are equal. The last condition is only used to distinguish paths that go different rounds in each dimension on grid with wrap-around. In one category, there exist paths of which the long-range edges are identical but the grid edges may be different. To compute the probability of existing a path in a category, we only need to consider one path among the paths with identical long-range edges, since grid edges do not change probabilistic events and thus one such path exists if any only if other such paths exist. 10 We also assume that there are no repeated long-range edges in every path. For a path that has repeated long-range edges, we can obtain a shorter subpath without any repeated long-range edges so that the original path exists if and only if the new one exists. Since we are going to calculate the probability about paths not exceeding some length, it is safe to only consider paths without repeated long-range edges. Lemma 3. There exists a constant c3 (dependent on d) such that for any fixed (cid:96), the number of categories of paths from u to v of length (cid:96) is at most c3 (cid:96). Proof. For each edge on the path, if it is a grid edge, it could be in one of the d dimensions, and in each dimension it could be in one of the two opposite directions, and thus a grid edge has 2d possibilities. If the edge is a long-range edge, on each dimension its sign has three possibilities (+1, 0,−1), so totally 3d possibilities for the sign pattern of the long-range segment vector. Moreover, in the grid with wrap-around, we consider each wrap-around of the path on some dimension to be one round in that dimension. Then the path can go at most 2(cid:96) + 1 different numbers of rounds on each dimension (ranging from (cid:96) rounds in one direction up to (cid:96) rounds in the other direction), so the summation of all segment vectors has at most (2(cid:96)+1)d different values. The choice of each edge out of 2d + 3d possibilities and the total summation of segments vectors determine a category. Therefore, the number of categories is bounded by (2d + 3d)(cid:96)(2(cid:96) + 1)d < c3 (cid:96) for some c3. The above bound on the number of categories is not tight enough to be used for later analysis, when the number of long-range segments are small. Thus, we further bound the number of categories in the following way. Lemma 4. There exists a constant c4 (dependent on d), such that for any fixed (cid:96) < n(cid:48) and k with 1 ≤ k ≤ (cid:96), the number of categories of paths from u to v of length (cid:96) and having k long-range segments is at most k(cid:96)(k+1)(d+1)/kkd. c4 Proof. For a path from u to v of length (cid:96) and containing k long-range segments (1 ≤ k ≤ (cid:96) < n(cid:48)), the summation of all segment vectors has at most (2k + 1)d choices. This is because the path can go at most 2k + 1 different number of rounds on each dimension (k rounds in one direction to k rounds in the other direction). We consider the number of categories for a fixed summation of segment vectors first. Suppose there are t grid segments, each having a1, a2, . . . , at edges respectively (t ≤ k + 1, ai ≥ 1, a1 + a2 + ··· + at < (cid:96)). If t = 0, then k = (cid:96), and it is easy to see that there are at most (3d)k categories. Suppose now t ≥ 1. For the i-th grid segment with ai grid edges, its segment vector is such that on each dimension the only possible values are −ai,−ai + 1, . . . , 0, . . . , ai − 1, ai. Thus, the number of possible segment vectors is (2ai + 1)d ≤ 3dad i . Since each long-range edge has 3d possible sign patterns, the number i < 9(k+1)d((cid:96)/t)td, where the inequality of categories for fixed t and a1, a2, . . . , at is at most (3d)k(cid:81)t i=1 3dad of arithmetic and geometry means is used. The tuple (a1, a2, . . . , at) has less than (cid:96)t possibilities. Considering (2k + 1)d different possibilities of segment vectors summations, the total number of categories from u to v with length (cid:96) and containing k 11 long-range edges is at most (2k + 1)d < (2k + 1)d = (2k + 1)d (cid:40) (cid:26) (cid:26) (cid:41) (cid:96)t · 9(k+1)d((cid:96)/t)td k+1(cid:88) t=1 (3d)k + 3dk + (k + 1)9(k+1)d max {(cid:96)t((cid:96)/t)td} 3dk + (k + 1)9(k+1)d(cid:96)k+1( )(k+1)d 1≤t≤k+1 (cid:96) k + 1 (cid:27) (cid:27) < ck 4 · (cid:96)(k+1)(d+1) , kkd where c4 is a constant depending only on d. Probability calculation. We first give a lemma to calculate the probability of the existence of a specific edge. For an integer x, we define x to be x if x (cid:54)= 0 and 1 if x = 0. We also define function f (n(cid:48)) as follows: (cid:40) f (n(cid:48)) = ln n(cid:48) (n(cid:48))d−γ γ = d, 0 ≤ γ < d. Lemma 5. For two vertices u and v, the probability of the existence of a long-range undirected edge between u and v is at most c5(x1 · x2 ··· xd)− γ d /f (n(cid:48)), where c5 is a constant depending only on d and γ, and (x1, x2, . . . , xd) is the edge vector if there exists a long-range edge from u to v and depends only on u and v. Proof. Say the non-zero elements of (x1, x2, . . . , xd) are (xi1, xi2, . . . , xid(cid:48) ) (d(cid:48) ≤ d). Let p be the proba- bility to add an edge from u to v. Then p = (x1 + x2 + ··· + xd)−γ Θ((cid:80)n(cid:48) (cid:32)xi1 · xi2 ··· xid(cid:48)− γ (cid:80)n(cid:48) id−1 iγ ) (cid:33) i=1 id−1−γ i=1 d ≤ O = O = O (cid:33) (cid:32)xi1 · xi2 ··· xid(cid:48)− γ (cid:80)n(cid:48) (cid:33) (cid:32) (cid:80)n(cid:48) i=1 id−1−γ (x1 · x2 ··· xd)− γ i=1 id−1−γ d d(cid:48) = O (cid:32) (x1 · x2 ··· xd)− γ d f (n(cid:48)) (cid:33) . Moreover, the edge may also be from v to u, which also has probability p. By union bound the proba- bility of the undirected edge (u, v) is O(p). The following lemma gives the probability that one edge jumps within a local area. Lemma 6. For a vertex u and a long-range edge (u, v) from u, the probability that the grid distance between u, v is less than s is at most c6f (s)/f (n(cid:48)), where c6 is a constant depending only on d and γ. Proof. By union bound, the probability is at most (cid:32) s(cid:88) O (cid:33) id−1 i−γ f (n(cid:48)) = O id−1−γ f (n(cid:48)) ≤ c6 f (s) f (n(cid:48)) , (cid:33) where c6 is a constant. i=1 (cid:32) s(cid:88) i=1 12 Given a path category C, we now calculate the probability of existing a path in C. Lemma 7. Given a path category C with length (cid:96) and k long-range edges. The probability that there exists a path in C is at most  ck 7kk)d(cid:46) 5(ck 5c(k−1)(d−γ) ck 2 (ln n(cid:48))k (cid:46) (n(cid:48))d−γ γ = d, 0 ≤ γ < d, where c2 and c5 are the constants given in Lemma 5 and c7 is another constant. Proof. Let the segment vectors of the long-range edges in a path P ∈ C be (x11, x12, . . . , x1d), (x21, x22, . . . , x2d), . . . , (xk1, xk2, . . . , xkd). By our definition of a category, all paths in C have the same sign patterns on the corresponding long-range segment vectors. Thus, we can define the following sets for the category C: A+ i = {j xji > 0, 1 ≤ j ≤ k}, A− i = {j xji < 0, 1 ≤ j ≤ k}, and A0 i = {j xji = 0, 1 ≤ j ≤ k}, for all 1 ≤ i ≤ d. For fixed u and v, there is a fixed vector (t1, t2, . . . , td) such that the summation of the segment vectors of all long-range segments in any P ∈ C is vector (t1, t2, . . . , td). This is because the summation of all segment vectors from u to v is fixed, and all grid segments have the fixed segment vectors. Therefore, a path in C can be characterized by kd integers x11, . . . , xkd satisfying the following for all 1 ≤ i ≤ d:  xji ∈ {1, . . . , n(cid:48)} xji ∈ {−n(cid:48), . . . ,−1} xji = 0 xji − (cid:88) (cid:88) j∈A+ i j∈A− i for j ∈ A+ i , for j ∈ A− i , for j ∈ A0 i , xji = ti. (1) The probability that some path exists is the multiplication of the probability of the first edge, the probability of the second edge conditioned on the existence of the first edge, the probability of the third edge conditioned on the existence of the first two edge, etc. In our model, the probability of an (undirected) edge conditioned on the existence of other (undirected) edges is less than or equal to the probability without condition, because each vertex can only connect to exact one other vertex (when considering the edge direction). Hence we can use the multiplication of the probabilities of all edges as an upper bound of the probability of a path. By 13 union bound and Lemma 5, the probability that a path exists in C is at most k(cid:89) j=1 x11,...,xkd: satisfying (1) k(cid:89) (cid:88) j=1  (cid:40) (cid:88) all paths in C ≤ ck 5 f k(n(cid:48)) · d(cid:89) · d(cid:89) i=1 i=1 = = ck 5 f k(n(cid:48)) ck 5 f k(n(cid:48)) c5(xj1 · xj2 ··· xjd)− γ d f (n(cid:48)) (xj1 · xj2 ··· xjd)− γ d (cid:88) x1i,...,xki: (cid:80) xji− (cid:80) j∈A− (cid:88) ∪A− , xji=1; for j∈A+ j∈A+ i i i i for j∈A0 i xji=ti; , xji∈{1,...,n(cid:48)}  (cid:17)− γ d xji (cid:16) k(cid:89) (cid:16) (cid:89) j=1 (cid:17)− γ d (cid:41) . (2) xji The inner brace summation is considered to be 1 for A+ for disjoint sets A+, A− ⊆ {1, 2, . . . , k} (at least one is not empty) and numbers t ∈ Z, γ ≥ 0, d ≥ 0, i = ∅. Now we consider the following sum i = A− (cid:80) j∈A+ i xji− (cid:80) xji (j ranges in A+ i j∈A− i ∪A− ): xji=ti; and xji∈{1,...,n(cid:48)} i j∈A+ i ∪A− i (cid:88) (cid:80) j∈A+ yj− (cid:80) yj (j ranges in A+∪A−): j∈A− yj =t; and yj∈{1,2,...,n(cid:48)}  (cid:89) j∈A+∪A− − γ d yj . (3) • Case γ = d. If one of A+ and A− is ∅, we only need to consider the case that t (cid:54)= 0, because the sum (3) is 0 for t = 0. By Lemma 1, the sum (3) is bounded by (lnt)k t ≤ ck 1 max x≥1 ck 1 { (ln x)k x } = (c1k/e)k. If neither A+ nor A− is ∅, we assume that t ≥ 0. (The calculation for t < 0 is similar if we exchange 14  1(cid:81) j∈A+ yj   (cid:88) (cid:80) 1(cid:81) yj yj =s+t j∈A+ j∈A− · (c1 ln(s + t))A+−1 s + t A+ and A−.) By Lemma 1 the sum (3) is bounded by (cid:80) j∈A− (c1 ln s)A−−1 yj =s s=1  (cid:88) kn(cid:48)(cid:88) ≤ kn(cid:48)(cid:88) kn(cid:48)(cid:88) kn(cid:48)(cid:88) ≤ ck s=1 s=1 s 1 = ck 1 ≤ ck = ck s=1 1 · max x≥1 1 · (2k)k ek · (ln(s + t))k √ s(s + t) (cid:18) (ln(s + t))k ∞(cid:88) s + t { (ln x)k x0.5 } · · O(1). s=1 (cid:19) 1 s + t √ s 1 s1.5 In either case, the sum (3) is bounded by ck in C is at most ck 7kk)d/(ln n(cid:48))k. 5(ck 7kk for some constant c7. By (2) the probability of a path • Case 0 ≤ γ < d. By Lemma 2, the sum (3) is bounded by (c2n(cid:48))(A++A−−1)(1− γ d ) ≤ (c2n(cid:48))(k−1)(1− γ d ). Therefore, by (2) the probability of a path in C is at most ·(cid:16) d )(cid:17)d ck 5 (n(cid:48))k(d−γ) (c2n(cid:48))(k−1)(1− γ 5c(k−1)(d−γ) ck (n(cid:48))d−γ 2 . = Finally, we apply Lemmas 3, 4, 6, and 7 together to show that the probability of any two vertices connected by a short path with at least one long-range edge is diminishingly small. Lemma 8. For any two vertices u and v, the probability that a path exists connecting u and v with at least one long-range edge and total length at most (cid:96) is o(1), when (cid:96) ≤ (log n(cid:48)) 1.5(d+1)+ε (ε > 0) for γ = d; and (cid:96) < c log n(cid:48) (c is some constant depending only on d and γ) for 0 ≤ γ < d. 1 Proof. We first study the probability of a path with exact length (cid:96), and we divide it into the following two cases. • Case γ = d. If k = 1, the probability that a path from u to v with length (cid:96) exists is at most O((cid:96)dc6 ln(3(cid:96))/ ln n(cid:48)) = O((cid:96)d ln (cid:96)/ ln n(cid:48)). To see this, we divide the path into three segments: a grid segment followed by one long-range edge, then followed by another grid segments. The first grid 15 segment can reach at most O((cid:96)d) destinations. For each of this destination w, the long-range edge has to reach some vertex within grid distance (cid:96) of vertex v. And by triangle inequality, it must be within grid distance 3(cid:96) of vertex w since the distances between v, u and u, w are both at most (cid:96). By Lemma 6, we know this probability is c6 ln(3(cid:96))/ ln n(cid:48). Therefore, the above statement holds. For k ≥ 2, we simply combine Lemmas 4 and 7. Thus, the probability that a path with length (cid:96) exists is at most ln n(cid:48) (cid:18) (cid:96)d ln (cid:96) (cid:18) (cid:96)d ln (cid:96) (cid:18) (cid:96)d ln (cid:96) ln n(cid:48) (cid:19) (cid:19) (cid:19) ln n(cid:48) + + + k=2 (cid:96)(cid:88) (cid:96)(cid:88) (cid:96)(cid:88) k=2 k=2 O = O ≤ O (cid:0)ck 7kk(cid:1)d (cid:33)k (ln n(cid:48))k ck 4(cid:96)(k+1)(d+1) · ck 5 (cid:32) (cid:32) kkd c4c5cd c4c5cd 7 · (cid:96)(d+1)(1+ 1 k ) (cid:33)k ln n(cid:48) 7 · (cid:96)1.5(d+1) ln n(cid:48) . This probability is o(1) when (cid:96) ≤ (log n(cid:48)) 1 1.5(d+1)+ε for any ε > 0. • Case 0 ≤ γ < d. In this case, we combine Lemmas 3 and 7. The probability that a path with length (cid:96) exists is at most c3 (cid:96) · max 1≤k≤(cid:96) 5c(k−1)(d−γ) ck (n(cid:48))d−γ 2 ≤ (c3c5cd−γ (n(cid:48))d−γ 2 )(cid:96) , (cid:40) (cid:41) where the inequality is based on c2, c5 ≥ 1, which is obviously the case. This probability is o(1) when (cid:96) < c log n(cid:48) for some properly chosen constant c, which depends only on d and γ. We now consider the case of path length less than (cid:96). Let w be a grid neighbor of v. For any path connecting u and v with length less than (cid:96), we can add grid edges (v, w) followed by (w, v), to increase the path length to either (cid:96) − 1 or (cid:96). Thus, the probability that a path of length at most (cid:96) exists is the same as the probability that a path of length (cid:96) − 1 or (cid:96) exists. The case of (cid:96) − 1 follows exactly the same as the case of (cid:96) argued above. Therefore, the lemma holds. With Lemma 8, we are ready to prove Theorem 1 for the case of d ≥ 2 and 0 ≤ γ ≤ d. 1 Proof of Theorem 1 for the case of d ≥ 2 and 0 ≤ γ ≤ d. We define (cid:96) = (cid:98)(log n(cid:48)) 1.5(d+1)+ε /2(cid:99) when γ = d, and (cid:96) = (cid:98)c log n(cid:48)/2(cid:99) when 0 ≤ γ < d, where c is the constant determined by Lemma 8. In the base grid, find any square in any dimension with one side length equal to (cid:96). Consider the four corner vertices of the square. By Lemma 8, the probability that a pair of corners of this square are connected by a path with at least one long-range edge and total length at most 2(cid:96) is o(1). Thus by union bound, the distances between any pair of these four corner vertices are exactly their grid distance, with probability 1 − o(1). This means that the δ value of these four vertices is (cid:96), with probability 1 − o(1). Therefore, we know that with probability 1.5(d+1)+ε ) when d ≥ 2 and γ = d, and 1 − o(1), δ(KSW (n, d, γ)) = Ω((log n(cid:48)) δ(KSW (n, d, γ)) = Ω(log n(cid:48)) = Ω(log n) when d ≥ 2 and 0 ≤ γ < d. Remark (The limitation of this approach). We already have tight lower bound for 0 ≤ γ < d. However, 1.5(d+1)+ε ) for γ = d is still not matching the upper bound O(log n). We show the lower bound Ω((log n) 1.5(d+1)+ε ) = Ω((log n) 1 1 1 16 below that the lower bound can never be improved to Ω(log n) by the above technique of proving that the grid distance is the shortest on every small square (with high probability). Consider a KSW graph with γ = d. For an (cid:96) × (cid:96) square S, let u be its the upper left vertex and v be its lower right vertex. Similar to the proof in Lemma 6, the probability of existence of an edge linking any w into the (cid:96)/2 × (cid:96)/2 square on the lower right side of w within the square S (but excluding w's two grid neighbors in the square) is  (cid:96)/2(cid:88) i=2 (cid:40)  = i · i−d ln n(cid:48) q = Θ Θ( log (cid:96) 1 Θ( log n(cid:48) ) d = 2, log n(cid:48) ) d ≥ 3. (cid:16)(cid:113) log n(cid:48) (cid:17) log log n(cid:48) Consider the (cid:96)/2 × (cid:96)/2 square on the lower right side of u, which is the upper left quadrant of the original square. The probability that at least one vertex w in this quadrant links to its lower right (cid:96)/2 × (cid:96)/2 square √ is 1 − (1 − q)(cid:96)/2×(cid:96)/2. This probability is almost 1 when (cid:96) = ω log n(cid:48)) for d ≥ 3. If there exists such a vertex w in the upper right quadrant, and suppose it links to a vertex x in its lower right (cid:96)/2 × (cid:96)/2 square. Then x must also be in the original square S, and we can have a path from u to w following the grid path, then the long-range edge from w to x, and then the grid path from x to v. This path connects u and v and must be shorter than the grid paths from u to v. Therefore our technique cannot improve the lower bound to ω log n) for d ≥ 3. (cid:16)(cid:113) log n(cid:48) (cid:16)(cid:113) log n for d = 2, or (cid:96) = ω( log n(cid:48)) = ω( for d = 2 or ω( log log n(cid:48) = ω (cid:17) √ √ (cid:17) log log n 3.3.2 The case of d = 1 and 0 ≤ γ ≤ 1 In this section we give lower bounds of δ for the one dimensional KSW model (based on an n-vertex ring). Let the n vertices be v0, . . . , vn−1. Let (cid:96)0 = (cid:98)(log n) 1.5(d+1)+ε(cid:99) when γ = 1, or (cid:98)c log n(cid:99) when 0 ≤ γ < 1, where c is the number determined in Lemma 8. 1 The idea is to find a long-range edge e0 between two vertices with grid distance (cid:96)0. As e0 forms a local ring with the original grid, we can give a lower bound of δ such that the ring distances (with respect to the grid edges and e0) are the shortest even after adding the long-range edges. We first calculate the probability of ring distances being the shortest under the condition of existing e0. We divide the construction of a KSW graph into two stages: 1) Every vertex links to exactly one other vertex according to some distribution; and 2) we ignore the edge direction and consider the graph as undi- rected. Let Ei (0 ≤ i ≤ n−1) be the event that vi links to v(i+(cid:96)0 mod n) in the first stage. Under the condition that Ei happens, v(i+(cid:96)0 mod n) is still free to link to any vertex. The events E0,E1, . . . ,En−1 are independent. Lemma 9. Under the condition that Ei happens (vi links to v(i+(cid:96)0 mod n)), for any two vertices u, w on the curve from vi to v(i+(cid:96)0 mod n) (exclusive), the conditional probability of existing a path connecting u and w with at least one long-range edge other than (vi, v(i+(cid:96)0 mod n)) and path length at most (cid:96)0 is o(1). Proof. Let e0 be the edge (vi, v(i+(cid:96)0 mod n)). We still follow the arguments for d ≥ 2 and 0 ≤ γ ≤ d, but change the classification of paths slightly: now e0 is a type of edges by itself, and thus together with grid edges and long-range edges, we have three types of edges and three types of corresponding segments. For each original category of paths with length (cid:96) and k long-range segments defined in the previous section, we further divide it into at most k + 1 categories, based on whether e0 was the first, second, ..., or the k-th long-range segment, or e0 does not appear in the path. The number of long-range edges in a category with e0 is decreased by 1. For the categories with only grid edges and e0, those paths now have no long-range edge and they exist with conditional probability 1, hence they will not be calculated. 17 For Lemma 3, the number of categories is increased by a factor of at most (cid:96) + 1. For Lemma 4, the number of categories is increased by a factor of at most k + 1. Thus, we only need to properly adjust the constants c3 and c4 in these two lemmas to make them still hold. Lemma 5 is not changed except that e0 is no longer a long-range edge and the lemma is not applicable on e0. Lemma 6 is not affected. In the proof of Lemma 7, a category without e0 can be calculated normally. For a category with e0, the number of long-range edges is decreased by 1 as stated above. One can see that all the arguments still hold by changing the summation of long-range edges (ti in (1)) to contain e0. For Lemma 8, only the case γ = d and k = 1 (one long-range edge) needs some modification. If the path does not contain e0, the calculation still holds. Otherwise, we can divide the path into five segments: grid, long-range, grid, e0, grid (or grid, e0, grid, long-range, grid). We just consider the 3 consecutive segments grid, e0, grid as a whole, which contains O((cid:96)) edges and can reach O((cid:96)d) = O((cid:96)) destinations. One can see the previous argument still holds. Therefore, the consequence of Lemma 8 still holds. With Lemma 9, we give the proof of Theorem 1 for the case of d = 1 and 0 ≤ γ ≤ 1. 8 (cid:96)0(cid:99) mod n) and Di = v(i+(cid:98) 7 Proof of Theorem 1 for the case of d = 1 and 0 ≤ γ ≤ 1. Let F be the event δ ≥ 1 4 (cid:96)0 − 3. We first show that Pr{F Ei} = 1 − o(1). Pick four vertices Ai = v(i+(cid:98) 1 8 (cid:96)0(cid:99) mod n), Ci = 8 (cid:96)0(cid:99) mod n). By Lemma 9 and union bound, we know that with probability v(i+(cid:98) 5 1 − o(1), the distances between every pair of vertices are the ring (grid edges plus (vi, v(i+(cid:96)0 mod n))) dis- tances. That is, the distances between AiBi, BiCi, CiDi, DiAi are roughly 1 4 (cid:96)0 (off by at most 2), and the distances between AiCi and BiDi are roughly 1 2 (cid:96)0 (off by at most 1). Therefore, by considering the four 4 (cid:96)0 − 3 with conditional vertices AiBiCiDi, we have δ at least 1 probability 1 − o(1). 8 (cid:96)0(cid:99) mod n), Bi = v(i+(cid:98) 3 4 (cid:96)0 − 2− 1 4 (cid:96)0 − 2) = 1 2 (cid:96)0 − 1 + 1 2 (cid:96)0 − 1− 1 2 ( 1 (cid:40) For every Ei, the probability that vi links to v(i+(cid:96)0 mod n) is Pr{Ei} = Θ( −γ (cid:96) 0 f (n) ) = − 2+ε Θ((log n) Θ(log n/n1−γ) 3+ε ) γ = 1, 0 ≤ γ < 1. Define this probability as q. We have Pr{F and Ei} = Pr{F Ei} Pr{Ei} = (1 − o(1))q. Let K be the random variable denoting the number of Ei's that occur. We define m = E[K], and we have m = nq. One can check that m = poly(n) for both cases γ = 1 and 0 ≤ γ < 1. By Chernoff Bound, Pr{K − m ≤ m0.6} > 1 − 2e−(m−0.4)2/4·m = 1 − 2e−m0.2/4. Hence with very high probability, K is close to m. Let G denote the event that m − m0.6 ≤ K ≤ m + m0.6. We show that Pr{F and Ei and G} is very close to Pr{F and Ei}. In fact, Pr{F and Ei and G} ≥ Pr{F and Ei} − Pr{not G} = (1− o(1)) Pr{F and Ei}, because Pr{not G} < 2e−m0.2/4 = 2e−poly(n) is much smaller than Pr{F and Ei} = (1−o(1))q = ω(1/n). On the other hand, it is straightforward that Pr{F and Ei and G} ≤ Pr{F and Ei}. Hence Pr{F and Ei and G} differs from Pr{F and Ei} by a factor at most (1 − o(1)), and Pr{F and Ei and G} = (1 − o(1))q. For every r = r0r1 ··· rn−1 ∈ {0, 1}n, define Hr to be the event that Ej happens iff rj = 1 for all j = 0, 1, . . . , n − 1. We can see Hr's are mutually exclusive for r ∈ {0, 1}n. Hence Pr{F and Ei and G} = Pr{F and Hr}. m+m0.6(cid:88) (cid:88) k=m−m0.6 r∈{0,1}n ri=1 and r has k 1's 18 Therefore Pr{F and G} = = > = = k=m−m0.6 r∈{0,1}n r has k 1's (cid:88) m+m0.6(cid:88) · n−1(cid:88) m+m0.6(cid:88) m + m0.6 · n−1(cid:88) n−1(cid:88) k=m−m0.6 1 k i=0 i=0 1 1 i=0 m + m0.6 n(1 − o(1))q m + m0.6 = Pr{F and Hr} (cid:88) m+m0.6(cid:88) r∈{0,1}n ri=1 and r has k 1's (cid:88) Pr{F and Hr} k=m−m0.6 r∈{0,1}n ri=1 and r has k 1's Pr{F and Ei and G} m(1 − o(1)) m + m0.6 = 1 − o(1). Pr{F and Hr} The probability that δ ≥ 1 4 (cid:96)0 − 3 = Ω((cid:96)0) is Pr{F} ≥ Pr{F and G} = 1 − o(1). 3.3.3 The case of d = 1 and γ > 3 We first show that with high probability all long-range edges connect two vertices with grid distance o(n), for general d and γ > 2d. Lemma 10. In a random graph from KSW (n, d, γ) with γ > 2d, with probability 1 − o(1) there is no γ−d +ε, where ε is any positive long-range edge that connects two vertices with grid distance larger than n number. 1 Proof. For a vertex u, the probability that the long-range edge from u links to somewhere with distance longer than (cid:96)0 = n γ−d +ε from u is 1 O id−1 n1/d(cid:88) (cid:16) i=(cid:96)0 O j=1 jd−1j−γ i−γ (cid:80)n1/d (cid:16) (cid:17) = O n(cid:96)d−γ 0 n · n( 1 (cid:16) (cid:17) (cid:96)d−γ 0 .  = O  ∞(cid:88) γ−d +ε)(d−γ)(cid:17) i=(cid:96)0 id−1−γ  = O nε(d−γ)(cid:17) (cid:16) = O = o(1). By union bound, the probability that such u exists is Therefore with probability 1 − o(1) such u does not exist. Given a graph G in KSW (n, d, γ), let (cid:96)0(G) be the largest grid distance of two vertices connected by a long-range edge in G. From the above result, we know that when γ > 3d, (cid:96)0(G) < n n1/d) with high probability. For the rest of this section, with d = 1, we fix G to be any graph in KSW (n, 1, γ) γ−1 +ε, and show that δ(G) = Ω(nc) for some constant c. Since G is fixed, we will use (cid:96)0 with (cid:96)0(G) < n to be the short hand of (cid:96)0(G). γ−d +ε = o( √ 1 1 19 Now go back to the one dimensional grid with wrap-around, which is a ring with vertices v0, v1, . . . , vn−1. Notice that in one-dimensional case, the edge vector defined in Section 3.3.1 degenerates to a scalar value from {−(cid:98) n 2 (cid:99)}. We arrange v0, v1, . . . , vn−1 clockwise on the ring. Then a pos- itive edge scalar corresponds to a clockwise hop while a negative edge scalar corresponds to a counter- clockwise hop. 2(cid:99) + 1, . . . ,(cid:98) n−1 2(cid:99),−(cid:98) n Let A = v0 and B = v(cid:98)n/2(cid:99) be two specific vertices. We define two kinds of paths between A and B: a positive path is one in which the summation of edge scalars (not taking module n) is positive, while a negative path is one in which the summation of edge scalars (not taking module n) is negative. Lemma 11. There exists a positive path from A to B that does not go through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1, and the length is at most 2(cid:96)0 longer than the shortest positive path from A to B. Similarly, there exists a negative path from A to B that does not go through v1, v2, . . . , v(cid:98)n/2(cid:99)−1, and the length is at most 2(cid:96)0 longer than the shortest negative path from A to B. Proof. We only give the proof for the positive path case. Consider any shortest positive path P from A to B. We first show the following claim. Let SA = {v1, . . . , v(cid:96)0} be the set of (cid:96)0 consecutive vertices clockwise to A, and SB = {v(cid:98)n/2(cid:99)−(cid:96)0, v(cid:98)n/2(cid:99)−(cid:96)0+1, . . . , v(cid:98)n/2(cid:99)−1} be the set of (cid:96)0 consecutive vertices counter-clockwise to B. Claim. There must exist a subpath in P from a vertex u ∈ SA to a vertex w ∈ SB that does not go through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1. Say there are m edges in P. Let si (0 ≤ i ≤ m) denote the summation of the first i edge scalars in P (not taking module n). Initially we have s0 = 0, and the final value sm is kn + (cid:98)n/2(cid:99) for some integer k ≥ 0. One can also see that the position after going through the first i edges in P is at v(si mod n). Let i1 be the smallest integer such that si1 ≥ (cid:98)n/2(cid:99) (exist because sm ≥ (cid:98)n/2(cid:99)), and i2 be the largest integer such that i2 < i1 and si2 ≤ 0 (exist because s0 = 0). We consider the (i2+1)-th edge, which begins at v(si2 mod n) for some si2 ≤ 0, and ends at v(si2+1 mod n) for some si2+1 > 0. The number si2+1 is at most si2 + (cid:96)0 since no edge is longer than (cid:96)0. Therefore, si2+1 must be a number in (0, (cid:96)0] and v(si2+1 mod n) must be in SA. We choose u = v(si2+1 mod n) ∈ SA. Similarly, pick w = si1−1, which is the beginning point of the i1-th edge, we have w ∈ SB. The intermediate values si2+1, si2+2, . . . , si1−1 are all in the interval (0,(cid:98)n/2(cid:99)) by the definitions of i1 and i2. That is, for all j such that i2 + 1 ≤ j ≤ i1 − 1, sj mod n = sj, and the corresponding vertex v(sj mod n) = vsj ∈ {v1, v2, . . . , v(cid:98)n/2(cid:99)−1}. Therefore the subpath from u to w does not go through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1, and the claim holds. With the claim, we can construct a positive path P(cid:48), which use ring edges from A to u, then use the subpath in the claim from u to w, and then from w to B using ring edges. The length of P(cid:48) is at most 2(cid:96)0 longer than P, the shortest positive path from A to B. AB to denote the two paths stated in the above lemma. According to this lemma, one We use P + AB and P− Let C be the middle point of P + AC, P + AD, P− AB and P− AB is at most 2(cid:96)0 longer than the shortest path between A and B. AB (take a vertex nearest middle if the path has odd number of edges), CB be the two subpaths from A to C and C to B. Similarly, let D be the middle point of P− AB DB be the two subpaths. CB, P− of P + and P + and P− Lemma 12. The paths P + AC, P + corresponding pairs of vertices. AD and P− DB are at most 3(cid:96)0 +1 longer than the shortest paths between 20 Proof. We only give the proof for P + is at least 3l0 + 2 shorter than P + the point nearest middle of P + AB. Consider the last time that the path P∗ AC. The path P∗ AC. Suppose that it is not true, and the shortest path P∗ AC must be at least 3(cid:96)0 + 1 shorter than P + AC from A to C CB because C is AC gets into the range {v0, v1, . . . , v(cid:98)n/2(cid:99)}, the subpath of P∗ AC from that point to C must be one of the following cases. • It is a subpath from a vertex A(cid:48) ∈ {v0, v1, . . . , v(cid:96)0} to C not going through v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, AC by the path from A to A(cid:48) through ring edges concatenated with the subpath AB to decrease by at least 3(cid:96)0 + 2 − (cid:96)0 > 2(cid:96)0, AC from A(cid:48) to C. This will cause the length of P + . . . ,vn−1. Replace P + of P∗ which is impossible by Lemma 11. • It is a subpath from a vertex B(cid:48) ∈ {v(cid:98)n/2(cid:99)−(cid:96)0, v(cid:98)n/2(cid:99)−(cid:96)0+1, . . . , v(cid:98)n/2(cid:99)} to C that does not go through AC from C to B(cid:48) AB to decrease by at least v(cid:98)n/2(cid:99)+1, v(cid:98)n/2(cid:99)+2, . . . ,vn−1. Replace P + concatenated with ring edges from B(cid:48) to B. This will cause the length of P + 3(cid:96)0 + 1 − (cid:96)0 > 2(cid:96)0, which is impossible by Lemma 11. CB by the reverse of this subpath of P∗ Therefore the lemma holds. Then we consider the shortest path between C and D. AC and CB and reversed P− DB, or the concatenation of reversed P + Lemma 13. Either the concatenation of P + P− DA is at most 8(cid:96)0 + 2 longer than the shortest path between C and D. Proof. The shortest path from C to D (say P∗ CD) must go through either B's neighborhood v(cid:98)n/2(cid:99), v(cid:98)n/2(cid:99)+1, . . . , v(cid:98)n/2(cid:99)+(cid:96)0 or A's neighborhood v0, v1, . . . , v(cid:96)0. Without loss of generality, we assume that it goes through the point B(cid:48) in B's neighborhood. Use P∗ B(cid:48)D to denote the two subpaths from C to B(cid:48) and B(cid:48) to D respectively. They must also be shortest paths of CB(cid:48) and B(cid:48)D. CB(cid:48) is at most (cid:96)0 shorter than the shortest path between C and B, otherwise the path P∗ CB(cid:48) concatenated with ring edges from B(cid:48) to B would be shorter than the shortest path. Similarly, P∗ B(cid:48)D is at most (cid:96)0 shorter than the shortest path between B and D. Therefore the shortest path between C and D is at most 2(cid:96)0 shorter than the concatenation of shortest paths of CB and BD. Then by Lemma 12, the summation of P + DB is at most 2(3(cid:96)0 + 1) + 2(cid:96)0 = 8(cid:96)0 + 2 longer than the shortest path between C and D. CB(cid:48) and P∗ CB and P− The path P∗ We have the following corollary since the two paths in this lemma differ by at most 2 considering the length. Corollary 14. The concatenation of P + P− DA are both at most 8(cid:96)0 + 4 longer than the shortest path between C and D. CB and reversed P− DB, and the concatenation of reversed P + AC and Now we can prove the lower bound of δ for this case. Proof of Theorem 1 for the case of d = 1 and γ > 3. Consider the four points A, B, C and D defined above. Let d(x, y) denote the distance between vertices x and y. We can see the following consequences about pair- wise distances: (a) d(A, B) ≥ (cid:98)n/2(cid:99)/(cid:96)0; (b) d(C, D) ≥ P + DB− (8(cid:96)0 + 4) ≥ d(A, C) + d(D, B) − (8(cid:96)0 + 5), where the first inequality is due to Corollary 14; and (c) simi- larly, d(C, D) ≥ d(A, D) + d(C, B)− (8(cid:96)0 + 5). Therefore, we have both d(A, B) + d(C, D) ≥ d(A, C) + d(D, B) + (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5), and d(A, B) + d(C, D) ≥ d(A, D) + d(C, B) + (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5). DB−(8(cid:96)0 +4) ≥ P + AC−1+P− CB+P− 21 For (cid:96)0 < n 1 γ−1 +ε with any sufficiently small ε > 0 and sufficiently large n, we have (cid:98)n/2(cid:99)/(cid:96)0 >> 8(cid:96)0 + 5, and thus d(A, B) + d(C, D) is the largest distance pair. In this case, δ ≥ (cid:98)n/2(cid:99)/(cid:96)0 − (8(cid:96)0 + 5). γ−1 +ε. Therefore, with probability 1 − o(1), By Lemma 10, with probability 1 − o(1) there is (cid:96)0 < n γ−2 γ−1−ε) for d = 1, γ > 3 and any sufficiently small ε > 0. Since δ(KSW (n, 1, γ)) = Ω(n/n for any ε(cid:48) > ε > 0, n ), we have δ(KSW (n, 1, γ)) = Ω(n γ−2 γ−1−ε) for any ε > 0. γ−1 +ε) = Ω(n γ−2 γ−1−ε(cid:48) γ−2 γ−1−ε = Ω(n 1 1 3.4 Extensions of the KSW model Our analysis also holds for some variants of the KSW model. In this section, we study one variant of the underlying structure: grid without wrap-around; and two variants of edge linking: multiple edges for each vertex and linking edges independently. Grid without wrap-around. We modify our analysis so that the first two results of Theorem 1 still hold. For the case of d ≥ 2 and 0 ≤ γ ≤ d (Section 3.3.1), the changes are as follows. For a path from u to v, we divide it into segments as before. Elements in an edge vector are in {−n(cid:48),−n(cid:48) + 1, . . . , n(cid:48) − 1, n(cid:48)} now. Recall the last condition that we define two paths from u to v belong to the same category: the summations (not module n(cid:48)) of all segment vectors in the two paths are equal. This is always satisfied for grid without wrap-around, because the summation of all segment vectors depends only on the positions of u and v. In the proofs of Lemma 3 and Lemma 4, the summation of all segment vectors is fixed rather than (2(cid:96) + 1)d or (2k + 1)d choices respectively. Hence the upper bounds given in Lemmas 3 and 4 still hold. In Lemma 5, an edge between u and v can be from u to v or from v to u. The probabilities of the two cases may differ by a constant factor on grid without wrap-around. Hence the probability of existing an edge between u and v is changed by at most a constant factor, and Lemma 5 still holds. One can verify the rest analysis in Section 3.3.1 still hold. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), the only change is that event Ei, which is the event that vi links to vi+(cid:96)0, only applies when i = 0, 1, . . . , n− (cid:96)0 − 1. Since (cid:96)0 = O(log n) is much smaller than n, there are still almost n events Ei and the argument has no significant change. Hence Theorem 1 still holds for the cases that d ≥ 1 and 0 ≤ γ ≤ d. Multiple edges for each vertex. In this model, each vertex links a constant, say d0, number of edges dB(u,v)−γ according to the same distribution that u links to v with probability v(cid:48) dB(u,v(cid:48))−γ . We show that all our analysis still hold with some slight changes. For the case of d ≥ 2 and 1 ≤ γ ≤ d (Section 3.3.1), Lemma 5 still holds since the probability of the edge (u, v) is increased by at most d0 times using union bound. And the proof of Lemma 6 still works, because O(id−1 i−γ f (n(cid:48)) ) is an upper bound of the probability that u links to some vertex at distance i by union bound. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), we define −γ Ei as the event that at least one of vi's edges links to v(i+(cid:96)0 mod n). One can see Pr{Ei} is still Θ( (cid:96) f (n) ) and 0 the rest argument also holds. For the case of d = 1 and γ > 3 (Section 3.3.3), Lemma 10 still holds for the same reason as Lemma 6, that O(id−1 ) is an upper bound of the probability that u links to some vertex at distance i. One can verify all results of Theorem 1 still hold under this change. Linking edges independently. In this model, all edges exist independently. The edge between (u, v) (cid:80)n1/d exists with probability d0·dB(u,v)−γ , where d0 is some constant. We also give the changes in our analysis. i=1 id−1−γ Lemma 5 is straightforward in this model. Lemmas 6 and 10 still hold for the same reason as above. In the proof of Lemma 7, the first line of Eq (2), which uses the multiplication of edges' probabilities for an upper bound of the path's probability, still holds because it is now just the multiplication of independent events. For the case of d = 1 and 0 ≤ γ ≤ 1 (Section 3.3.2), we define Ei to be the event that the edge (cid:80)n1/d j=1 jd−1j−γ (cid:80) i−γ 22 (vi, v(i+(cid:96)0 mod n)) exists, one can see the analysis still works. All results of Theorem 1 still hold under this change. In summary, Theorem 1 of the case d ≥ 1 and 0 ≤ γ ≤ d still holds for grid without wrap-around, and Theorem 1 of all cases still holds for both variants of edge linking. The variants of edge linking can be combined with grid without wrap-around, for which Theorem 1 of the case d ≥ 1 and 0 ≤ γ ≤ d still holds. 4 δ-hyperbolicity of ringed trees In this section, we consider the δ-hyperbolicity of graphs constructed according to a variant of the small- world graph model, in which long-rang edges are added on top of a base graph that is a binary tree or tree-like low-δ graph. In particular, we will analyze the effect on the δ-hyperbolicity of adding long-range links to a ringed tree base graph; and then we will consider several related extensions, including an extension to the binary tree. Definition 6 (Ringed tree). A ringed tree of level k, denoted RT (k), is a fully binary tree with k levels (counting the root as a level), in which all vertices at the same level are connected by a ring. More precisely, we can use a binary string to represent each vertex in the tree, such that the root (at level 0) is represented by an empty string, and the left child and the right child of a vertex with string σ are represented as σ0 and σ1, respectively. Then, at each level i = 1, 2, . . . , k − 1, we connect two vertices u and v represented by binary strings σu and σv if (σu + 1) mod 2i = σv, where the addition treats the binary strings as the integers they represent. As a convention, we say that a level is higher if it has a smaller level number and thus is closer to the root. Figure 1(d) illustrates the ringed tree RT (6). Note that the diameter of the ringed tree RT (k) is Θ(log n), where n = 2k − 1 is the number of vertices in RT (k), and we will use RT (∞) to denote the infinite ringed tree when k in RT (k) goes to infinity. Thus, a ringed tree may be thought of as a soft version of a binary tree; and to some extent, one can view a ringed tree as an idealized picture reflecting the hierarchical structure in real networks coupled with local neighborhood connections, such as Internet autonomous system (AS) networks, which has both a hierarchical structure of different level of AS'es, and peer connections based on geographical proximity. 4.1 Results and their implications A visual comparison of the ringed tree of Figure 1(d) with the tessellation of Poincar´e disk (Figure 1(b)) suggests that the ringed tree can been seen as an approximate tessellation or coarsening of the Poincar´e disk. Our first result in this section makes this precise; in particular, we show that the infinite ringed tree and the Poincar´e disk are quasi-isometric. Theorem 2. The infinite ringed tree RT (∞) and the Poincar´e disk are quasi-isometric. Thus, by Proposition 1, we immediately have the following result. Corollary 15. There exists a constant c s.t., for all k, ringed tree RT (k) is c-hyperbolic. Alternatively, we also provide a direct proof of this corollary (Section 4.3.3) to show that the ringed tree RT (k) is Rips 5-hyperbolic, and Gromov's 40-hyperbolic in terms of the four point condition. Our direct analysis also provides important properties of ringed trees that are used by later analyses. 23 Next, we address the question of whether long-range edges added at each level of the ring maintains or destroys the hyperbolicity of the base graph. Given two vertices u and v at some level t of the ringed tree, we define the ring distance between u and v, denoted dR(u, v), to be the length of the shorter path connecting u and v purely through the ring edges at the level t. Given any function f from positive integers to positive integers, let RT (k, f ) denote the class of graphs constructed by adding long-range edges on the ringed tree RT (k), such that for each long-range edge (u, v) connecting vertices u and v at the same level, dR(u, v) ≤ f (n), where n = 2k − 1 is the number of vertices in the ringed tree RT (k). Since long-range edges do not reduce distances from root to any other vertices, the diameter of any graph in RT (k, f ) is still Θ(log n). Define δ(RT (k, f )) = maxG∈RT (k,f ) δ(G). Our second result (used in the proof of the first part of our next result, but explicitly stated here since it is also of independent interest) is the following. Theorem 3. δ(RT (k, f )) = O(log f (n)), for any positive function f and positive integer k, where n = 2k − 1 is the number of vertices in the ringed tree RT (k). This result indicates that if the long-range edges added do not span far-away vertices, then the graph should have good hyperbolicity. In particular, if we take f (n) = log n, then the theorem implies that the class RT (k, f ) is logarithmically hyperbolic. The theorem covers all (deterministic) graphs in the class RT (k, f ). We can extend it to random graphs, such that if we can show that with high probability the random graph is in the class RT (k, f ), then we know that the hyperbolic δ of the random graph is O(log f (n)) with high probability. The first result in the next theorem is proven via this approach. Next, we consider adding random edges between two vertices at the outermost level, i.e., level k − 1, such that the probability connecting two vertices u and v is determined by a function g(u, v). Let Vk−1 denote the set of vertices at level k − 1, i.e., the leaves of the original binary tree. Given a real-valued positive function g(u, v), let RRT (k, g) denote a random graph constructed as follows. We start with the ringed tree RT (k), and then for each vertex v ∈ Vk−1, we add one long-range edge to a vertex u with probability proportional to g(u, v), that is, with probability g(u, v)ρ−1 v where ρv =(cid:80) We study three families of functions g, each of which has the characteristic that vertices closer to one another (by some measure) are more likely to be connected by a long-range edge. The first two families use the ring distance dR(u, v) as the closeness measure. In particular, the first family uses an exponential decay function g1(u, v) = e−αdR(u,v). The second family uses a power-law decay function g2(u, v) = dR(u, v)−α, where α > 0. The third family uses the height of the lowest common ancestor of u and v, denoted as h(u, v), as the closeness measure, and the function is g3 = 2−αh(u,v). Note that this last probability function matches the function used by Kleinberg in a small-world model based on the tree structure [23]. Moreover, although g3 and g2 are similar, in the ringed tree they are not the same, since for two leaf nodes u and v, dR(u, v) may not be the same as 2h(u,v). For example, let u be the rightmost leaf of the left subtree of the root (i.e. u is represented as the string 01 . . . 1) and v be the leftmost leaf of the right subtree of the root (i.e. v is represented as the string 10 . . . 0), then dR(u, v) = 1 while h(u, v) = Θ(log n). The following theorem summarizes the hyperbolicity behavior of these three families of random ringed trees. u∈Vk−1 g(u, v). Theorem 4. Considering the follow families of functions (with u and v as the variables of the function) for random ringed trees RRT (k, g), for any positive integer k and positive real number α, with probability 1 − o(1) (when n tends to infinity), we have 1. δ(RRT (k, e−αdR(u,v))) = O(log log n); 2. δ(RRT (k, dR(u, v)−α)) = Θ(log n); 24 3. δ(RRT (k, 2−αh(u,v))) = Θ(log n); where n = 2k − 1 is the number of vertices in the ringed tree RT (k). This theorem states that, when the random long-range edges are selected using exponential decay function based on the ring distance measure, the resulting graph is logarithmically hyperbolic, i.e., the constant hyperbolicity of the original base graph is degraded only slightly; but when a power-law decay function based on the ring distance measure or an exponential decay function based on common ancestor measure is used, then hyperbolicity is destroyed and the resulting graph is not hyperbolic. One may notice that the function form in (1) and (3) above is similar but the result is different. This is because with height h(u, v) the subtree covers actually Θ(2h(u,v)) leaves, and thus (3) is naturally closer to the power-law function of (2). Intuitively, when it is more likely for a long-range edge to connect two far-away vertices, such an edge creates a shortcut for many internal tree nodes so that many shortest paths will go through this shortcut instead of traversing through tree nodes. (In Internet routing this is referred to as valley routes). Finally, as a comparison, we also study the hyperbolicity of random binary trees RBT (k, g), which are the same as random ringed trees RRT (k, g) except that we remove all ring edges. Theorem 5. Considering the follow families of functions (with u and v as the variables of the function) for random binary trees RBT (k, g), for any positive integer k and positive real number α, with probability 1 − o(1) (when n tends to infinity), we have δ(RBT (k, e−αdR(u,v))) = δ(RBT (k, dR(u, v)−α)) = δ(RBT (k, 2−αh(u,v))) = Θ(log n), where n = 2k − 1 is the number of vertices in the binary tree RBT (k, g). Thus, in this case, the original hyperbolicity of the base graph (δ = 0 for the binary tree) is destroyed. Comparing with Theorem 4, our results above suggest that the "softening" of the hyperbolicity provided by the rings is essential in maintaining good hyperbolicity: with rings, random ringed trees with exponential decay function (depending on the ringed distance) are logarithmically hyperbolic, but without the rings the resulting graphs are not hyperbolic. 4.2 Outline of the analysis In this subsection, we provide a summary of the proof of the four theorems in Section 4.1. For Theorem 2, we provide an embedding of the ringed tree to the Poincar´e disk, intuitively similar to the picture we show in Figure 1(d), and prove that it is a quasi-isometry. For the analysis of δ-hyperbolicity, we apply the Rips condition, which is equivalent to the Gromov's four point condition up to a constant factor. For any two vertices u and v on the ringed tree RT (k), we define the canonical geodesic (cid:104)u, v(cid:105) to be the geodesic from u to v such that the geodesic always goes up first, then follows ring edges, and then goes down (any of these segments may be omitted). We show that the canonical geodesic (cid:104)u, v(cid:105) and any other geodesic [u, v] are within distance 1 of each other, and any triangle ∆(u, v, w) formed by three canonical geodesics (cid:104)u, v(cid:105), (cid:104)u, w(cid:105), and (cid:104)v, w(cid:105) (called canonical triangle) are 3-slim. This immediately implies that any geodesic triangles in RT (k) is 5-slim, which is a direct proof that ringed trees are constantly hyperbolic. For Theorem 3, we inductively prove that any geodesic [u, v] in RT (k, f ) is within O(log f (n)) distance from the canonical geodesic (cid:104)u, v(cid:105), and vice versa. Together with the result that any canonical triangle is 3- slim, it follows know that any geodesic triangle is O(log f (n))-slim. For Theorem 4, Part (1), we show that with high probability the long-range edges only connect vertices within ring distance O(log n), and then we 25 can apply Theorem 3 to achieve the O(log log n) bound. For Theorem 4, Part (2), the key is to show that (a) with high probability some long-range link connects two vertices at ring distance Θ(nc) for some constant c; and (b) if such a long-range edge (u, v) exists, then we consider the geodesic triangle ∆(u, v, r) where r is a point with lowest layer number on the canonical geodesic between u, v, and show that the middle point of [r, u] is Θ(log n) away from the union of [r, v] and [v, u]. For Theorem 4, Part (3), we first show that with high probability some pair of vertices u, v with h(u, v) ≥ c log2 n for some constant c > 0, and then we observe that, in such configuration, the ring distance dR(u, v) has high probability to be Ω(nc/2), and results follows exactly the same analysis in the previous part. For Theorem 5, part (2) and (3) follow a similar strategy as those of Theorem 4. For part (1), we know that two "would-be" ring neighbors u and v have constant probability of having a long-range connection. √ However, since we do not have ring edges, the alternative path between u and v through the tree may be Θ(log n) in length. We show that there are at least Ω( n) such pairs, so with high probability at least one pair is connected, generating a bad δ of Ω(log n). 4.3 Detailed analysis on ringed trees 4.3.1 Properties of ringed tree We start by some properties of ringed tree, which will be repeatedly used in the following analysis on ringed tree related graphs and which may be of independent interest. We define the ring distance dR(u, v) of u and v on the same level to be their distance on the ring. Ringed trees have the following fundamental property. Lemma 16. Let u and v be two vertices on the same level, and u(cid:48) and v(cid:48) be their parents respectively. We have dR(u(cid:48), v(cid:48)) ≤ (dR(u, v) + 1)/2. Proof. On the ring, there are dR(u, v) + 1 vertices on segment between u and v, which belong to at most (dR(u, v) + 1)/2 + 1 parents, which correspond to at most (dR(u, v) + 1)/2 + 1 vertices on the ring segment between u(cid:48) and v(cid:48). This concludes the proof. For a geodesic [u, v] on the ringed tree RT (k), we call its level sequence the sequence of levels it passes by from u to v. Lemma 16 implies that the level sequence of any geodesic must be reversed unimodal: it first decreases, and then increases (but the increasing or decreasing segment may be omitted). The following lemma further characterizes geodesics in ringed-trees. Lemma 17. Let u, v be two vertices, u be on level (cid:96), and u(cid:48) be the parent of u at level (cid:96) − 1. Suppose [u, v] intersects level (cid:96) − 1, and let t be the intersection closest to u. Then d(u, t) ≤ 2, the segment [u, t] of [u, v] and {u, u(cid:48)} are within distance 1 to each other. Proof. Let t(cid:48) be the node just before t to u on [t, u]. d(t, u) ≤ 1 + dR(t, u(cid:48)) ≤ 1 + (dR(t(cid:48), u) + 1)/2 by Lemma 16. As t is the closest node on level (cid:96) − 1 on the geodesic to u, d(t, u) ≥ 1 + dR(t(cid:48), u). We get d(t(cid:48), u) ≤ 1 and d(t, u) ≤ 2 by combining these two inequalities. The segment [u, t] of [u, v] and {u, u(cid:48)} are within distance 1 to each other since d(t, u(cid:48)) ≤ 1. For two vertices u and v, we define the canonical geodesic (cid:104)u, v(cid:105) in a recursive fashion. 1. For u, v on the same level and dR(u, v) ≤ 3, (cid:104)u, v(cid:105) is the path on the ring from u to v. 2. For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively, then (cid:104)u, v(cid:105) = [u, u(cid:48)] ∪ (cid:104)u(cid:48), v(cid:48)(cid:105) ∪ [v(cid:48), v]. 26 3. For u, v on different levels, supposing u on upper level, let v(cid:48) be parent of v, then (cid:104)u, v(cid:105) = (cid:104)u, v(cid:48)(cid:105) ∪ [v(cid:48), v]. This is a well-founded definition. At each level of recursion, either the difference of levels of nodes de- creases, or in the case of nodes on the same level, ring distance decreases by Lemma 16, until we reach the base case, where dR(u, v) ≤ 3. We prove now that canonical geodesics are really geodesics. Lemma 18. For any u, v, (cid:104)u, v(cid:105) is a geodesic between u, v. Proof. For u, v on the same level and dR(u, v) ≤ 3, we can check that (cid:104)u, v(cid:105) is a geodesic between u, v. For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. Let t, s be the closest node to u, v to be in an upper level on [u, v] respectively. If t (cid:54)= u(cid:48), then d(u, t) ≥ 2 because the only way to go up one level in one step is to go to the parent. By Lemma 17, [u, t] and {u, u(cid:48)} are within distance 1 to each other. Therefore d(u(cid:48), t) = 1, as d(u, t) ≥ 2, and {u, u(cid:48)} ∪ [t, v] is also a geodesic from u to v. This is also correct for t = u(cid:48). The same can be proved for s. By combining, we have that {u, u(cid:48)} ∪ [t, s] ∪ {v(cid:48), v} is also a geodesic between u, v for any geodesics [t, s]. If we pick the canonical geodesic (cid:104)t, s(cid:105), in any cases, this will be the canonical geodesic (cid:104)u, v(cid:105). Therefore, (cid:104)u, v(cid:105) is a geodesic. For u, v on different levels, the induction is essentially the same as in the previous case, but we only need to reason on t only on the side of u. This concludes our induction. 4.3.2 Proof of Theorem 2: Quasi-isometry from infinite ringed tree to the Poincar´e disk In this subsection, we will exhibit and prove a quasi-isometry from the infinite ringed tree RT (∞) to the Poincar´e disk. We denote its distance dRT . We denote (D, dP ) the Poincar´e disk, where D is the open disk of radius 1 on the complex plane. Here is a brief summary of our approach here. First we propose a candidate of quasi-isometry, then all possible cases of images of two points of ringed tree are divided into four categories, each of which is separately analyzed. We then proceed with an analysis on the metric of ringed tree and show that the candidate of quasi-isometry is effective, thus ringed tree and the Poincar´e disk are quasi-isometric. The following inequalities are used in the following. ln(x) ≤ cosh−1(x) ≤ ln(2x) for x ≥ 1 2 π 1 − x 2 x ≤ sin(x) ≤ x for ≤ √ 1 − x ≤ 1 − 3x 5 0 ≤ x ≤ π 2 for 0 ≤ x ≤ 1 2 To state the promised quasi-isometry, we give coordinates to nodes in RT (∞). We know that we can number nodes with binary strings, which can be regarded as a number. For a node on the k-th level and numbered by m, its coordinates are (k, m), with 0 ≤ m ≤ 2k − 1. The root is level 0. Definition 7. Let the following mapping be the candidate of quasi-isometry : 1 − 2−ke2iπ m f : RT (∞) → D, (k, m) (cid:55)→(cid:112) 2k 27 For 0 ≤ k ≤ (cid:96), m < 2(cid:96)−1, we define D(k, (cid:96), m) = dP (f (k, 0), f ((cid:96), m)). This is a distance in the Poincar´e disk. Following is its full expression in k and m. D(k, (cid:96), m) = cosh−1(1 + 2 = cosh−1(1 + 2( (cid:107)√ 1 − 2−k − √ (cid:113) 2(cid:96)(2k − 1) −(cid:113) 2−k−(cid:96) 1 − 2−(cid:96)e2iπ m 2(cid:96) (cid:107)2 ) (cid:113) m 2(cid:96) )) We also define D(cid:48)(k, (cid:96), m) = dRT (f (k, 0), f ((cid:96), m)), with 0 ≤ k ≤ (cid:96), m < 2(cid:96)−1. This is a distance in ringed tree. 2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π 2k(2(cid:96) − 1))2 + 8 We will now try to bound D(k, (cid:96), m) with the following lemma. Lemma 19. We have the following bounds on D(k, (cid:96), m). 1. For k = 0, 2. For 0 < k = (cid:96), m > 0, ln(2) 2 (cid:96) + ln(2) 2 ≤ D(0, (cid:96), m) ≤ ln(2) 2 (cid:96) + ln(6). ln(2)(4 + 2(cid:98)log2 m(cid:99)) ≤ D(k, k, m) ≤ ln(2)(4 + 2(cid:98)log2 m(cid:99)) + ln( 5 4π2 )for(k ≥ 1). 3. For m = 0, 1 ≤ k < (cid:96), ln(2)((cid:96) − k) − ln(50) ≤ D(k, (cid:96), 0) ≤ ln(2)((cid:96) − k). 4. For 0 < k < (cid:96) and 0 < m < 2(cid:96)−k, ln(2)((cid:96) − k) − ln(100) ≤ D(k, (cid:96), m) ≤ ln(2)((cid:96) − k) + ln(66π2). 5. For 0 < k < (cid:96) and 2(cid:96)−k ≤ m < 2(cid:96)−1, ln(2)(k − (cid:96) + 2(cid:98)log2 m(cid:99) + 4) ≤ D(k, (cid:96), m) ≤ ln(2)(k − (cid:96) + 2(cid:98)log2 m(cid:99) + 6) + ln(π2 + 1). Proof. 1. Case k = 0 D(0, (cid:96), m) = cosh−1(1 + 2 If (cid:96) = 0, D(0, 0, m) = 0. For (cid:96) ≥ 1, we have (cid:112) 2(cid:96) − 1) and √ D(0, (cid:96), m) ≥ cosh−1(2 2(cid:96)−1) ≥ ln(2) 2 (cid:96) + ln(2) 2 √ D(0, (cid:96), m) ≤ cosh−1(3 2(cid:96)) ≤ ln(2) 2 (cid:96) + ln(6). 28 2. Case 0 < k = (cid:96), m > 0 D(k, k, m) = cosh−1(1 + 2k+3(2k − 1) sin2( Let a = (cid:98)log2 m(cid:99), we have m 2k π)) D(k, k, m) ≥ cosh−1(22k+2 sin2(2a−kπ)) ≥ cosh−1(22k+2(2a+1−k)2) ≥ ln(2)(4 + 2a) and D(k, k, m) ≤ cosh−1( 5 4 22k+2 sin2(2a+1−kπ)) ≤ cosh−1( 22k+2(2a+1−kπ)2) 5 4 ≤ ln(2)(4 + 2a) + ln( 5 4π2 ) 3. Case 0 < k < (cid:96), m = 0 D(k, (cid:96), 0) = cosh−1(1 + 2( (cid:113) 2(cid:96)(2k − 1) −(cid:113) (cid:112) 1 − 2−k −(cid:112) 2k(2(cid:96) − 1))2) 1 − 2−(cid:96))2) = cosh−1(1 + 2k+(cid:96)+1( 1 − 2−k > 0, and we have As 1 ≤ k < (cid:96), √ and 1 − 2−(cid:96) − √ (cid:112) 1 − 2−(cid:96) −(cid:112) (cid:112) 1 − 2−(cid:96) −(cid:112) 1 − 2−k ≥ 1 − 2−(cid:96)−1 − 1 + 3 5 2−k ≥ 1 5 2−k−1 1 − 2−k ≤ 1 − 3 5 2−(cid:96) − 1 + 2−k−1 ≤ 2−k−1 Therefore, we have ln(2)((cid:96) − k) − ln(50) ≤ D(k, (cid:96), 0) ≤ ln(2)((cid:96) − k). 4. Case 0 < k < (cid:96), 0 < m < 2(cid:96)−1 We now deal with the general case with m > 0 and 0 < k < (cid:96). (cid:113) (cid:113) (cid:113) D(k, (cid:96), m) = cosh−1(cosh(D(k, (cid:96), 0)) + 8 2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π m 2(cid:96) )) We always note a = (cid:98)log2 m(cid:99), and we have 2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π m 2(cid:96) ) ≥ 2(cid:96)+k−122a−2(cid:96)+2 = 2k−(cid:96)+2a+1 and 2(cid:96)(2(cid:96) − 1)2k(2k − 1) sin2(π m 2(cid:96) ) ≤ 2(cid:96)+k22a+2−2(cid:96)π2 ≤ 2k−(cid:96)+2a+2π2 The previous bound on D(k, (cid:96), 0) transforms into the following by applying cosh. 2(cid:96)−k 100 ≤ cosh(D(k, (cid:96), 0)) ≤ 2(cid:96)−k Suitable substitution of cosh(D(k, (cid:96), 0)) gives cosh−1( 2(cid:96)−k 100 + 2k−(cid:96)+2a+4) ≤ D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2). 29 For 0 ≤ a ≤ (cid:96) − k, therefore 0 < m < 2(cid:96)−k, D(k, (cid:96), m) ≥ cosh−1( 2(cid:96)−k 100 + 2k−(cid:96)+2a+4) ≥ ln( 2(cid:96)−k 100 ) = ln(2)((cid:96) − k) − ln(100) and D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2) ≤ ln(2(cid:96)−k33π2) + ln(2) = ln(2)((cid:96) − k + 1) + ln(33π2). For (cid:96) − k + 1 ≤ a < m − 1, therefore 2(cid:96)−k ≤ m < 2(cid:96)−1, D(k, (cid:96), m) ≥ cosh−1( 2(cid:96)−k 100 + 2k−(cid:96)+2a+4) ≥ ln(2k−(cid:96)+2a+4) = ln(2)(k − (cid:96) + 2a + 4) and D(k, (cid:96), m) ≤ cosh−1(2(cid:96)−k + 2k−(cid:96)+2a+5π2) ≤ ln((π2 + 1)2k−(cid:96)+2a+5) + ln(2) = ln(2)(k − (cid:96) + 2a + 6) + ln(π2 + 1). We will now try to relate D(k, (cid:96), m) and D(cid:48)(k, (cid:96), m) in the following lemma. Lemma 20. For any 0 ≤ k ≤ (cid:96), 0 ≤ m < 2(cid:96)−1, D(cid:48)(k, (cid:96), m) − ln(200) ≤ D(k, (cid:96), m) ≤ ln(2)D(cid:48)(k, (cid:96), m) + ln(66π2) ln(2) 2 In the first case, D(cid:48)(k, k, 1) = 1. In the second case, as the ancestor of any node (k, m) is (k − 1,(cid:98) m Proof. Consider the canonical geodesic. If k = (cid:96) and m = 1, it is an edge from (k, 0) to (k, 1). In other cases, it goes up first from ((cid:96), m) to a certain ancestor, then makes 2 or 3 moves on the ring, and finished by going straight down to (k, 0). 2 (cid:99)), by the form of canonical geodesics, we should first go up (cid:96) − k steps to reach level k. If m ≤ 2(cid:96)−k+1, it reaches (k, 0) by at most an extra step. In this case, (cid:96) − k ≤ D(cid:48)(k, (cid:96), m) ≤ (cid:96) − k + 1. If m > 2(cid:96)−k+1, we go up (cid:98)log2 m(cid:99) − 1 steps from ((cid:96), m) to reach an ancestor numbered 2 or 3, then go 2 or 3 steps on the ring to the node numbered 0 on the same level, and finish by going down to (k, 0). Thus we have 2(cid:98)log2 m(cid:99) + k − (cid:96) ≤ D(cid:48)(k, (cid:96), m)2(cid:98)log2 m(cid:99) + k − (cid:96) + 1 in this case. We conclude by comparing to bounds in Lemma 19. We want to bound distance between any two points in RT (∞) with the following lemma. Lemma 21. For u1, v1, u2, v2 ∈ RT (∞) with u1, v1, u2, v2 on the same level and dR(u1, v1) = dR(u2, v2), we have d(u1, v1) − d(u2, v2) ≤ 3. Proof. Let A = dR(u1, v1). It is clearly correct when A ≤ 3 by the structure of canonical geodesics. For A ≤ 3, when we consider the canonical geodesics, we take successive ancestors of u1 and v1 until their distance is 2 or 3. This takes at least (cid:98)log2 A(cid:99) − 1 generations, but at most (cid:98)log2(A − 1)(cid:99). These bounds differ by at most 1. Platforms differ by at most 1, therefore d(u1, v1) − d(u2, v2) ≤ 3. 30 Proof of Theorem 2. By symmetry, Lemma 21 and Lemma 20, for any u, v ∈ Rt(∞), we have: ln(2) 2 dRT (u, v) − ln(200) ≤ dP (f (u), f (v)) ≤ ln(2)dRT (u, v) + ln(66π2) There is only one thing left to prove quasi-isometry. We will now prove that for some constant , B(f (RT (∞)), ) covers the Poincar´e disk. Images of each level are all on concentric circles, and the differ- ence of radius between successive levels can be bounded by ln(6). Distance between images of neighboring nodes on the same level can be bounded by ln(16). For any point in the Poincar´e disk, its distance to the nearest image of nodes is bounded by ln(96), by first moving straight away from 0 until reaching a concentric circle of images, then take the shortest path to reach image of a certain node. ln(2) , ln(66π2))-quasi-isometry from RT (∞) to the Poincar´e disk, thus RT (∞) This proves f to be a ( 2 and the Poincar´e disk are quasi-isometric. Constants we found here are not tight. 4.3.3 A direct proof of Corollary 15 We begin with a lemma about the distance between a general geodesic and the corresponding canonical geodesic. Lemma 22. For any geodesic [u, v], [u, v] and (cid:104)u, v(cid:105) are within distance 1 to each other. Proof. We perform an induction on the structure of (cid:104)u, v(cid:105). For u, v on the same level and dR(u, v) ≤ 3, we can check that [u, v] and (cid:104)u, v(cid:105) are within distance 1 to each other. For u, v on the same level but dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. We have (cid:104)u, v(cid:105) = (cid:104)u, u(cid:48)(cid:105) ∪ (cid:104)u(cid:48), v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), v(cid:105) by construction. By Lemma 17, the parts of [u, v] that are on the same level with u, v verify the condition already. We only need to deal with the part on levels with lower numbering. Let t, s be the closest node to u, v that are in an upper level on [u, v] respectively. If t (cid:54)= u(cid:48), then d(u, t) ≥ 2 because the only way to go up one level in one step is to go to the parent. By Lemma 17, [u, t] and (cid:104)u, u(cid:48)(cid:105) are within distance 1 to each other. Therefore d(u(cid:48), t) = 1, as d(u, t) ≥ 2, (cid:104)u, u(cid:48)(cid:105)∪(cid:104)u(cid:48), t(cid:105)∪ [t, v] is also a geodesic from u to v. This is also correct for t = u(cid:48). The same can be proven for s. By combining the above, we have that (cid:104)u, u(cid:48)(cid:105) ∪ (cid:104)u(cid:48), t(cid:105) ∪ [t, s] ∪ (cid:104)s, v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), v(cid:105) is also a geodesic between u, v. Thus the section (cid:104)u(cid:48), t(cid:105) ∪ [t, s] ∪ (cid:104)s, v(cid:48)(cid:105) is also a geodesic from u(cid:48) to v(cid:48). By induction hypothesis, it is within distance 1 to (cid:104)u(cid:48), v(cid:48)(cid:105). However, this geodesic contains the part of [u, v] on levels with lower numbering than that of u, v, which is precisely [t, s]. We conclude that [u, v] and (cid:104)u, v(cid:105) are within distance 1 to each other. For u, v on different levels, the induction is essentially the same as in the previous case, but we only need to reason on t on the side of u. This concludes our induction. Lemma 23. Let u and v be two vertices at the same level (cid:96) such that (cid:104)u, v(cid:105) stays at level (cid:96). Then for any vertex w, (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) are within distance 3 of each other. 0 be the highest levels reached by (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105), respectively. Without loss of Proof. Let (cid:96)0 and (cid:96)(cid:48) generality, we assume that (cid:96)0 ≥ (cid:96)(cid:48) Consider the base case of (cid:96) = (cid:96)0. Let w(cid:48) be the ancestor of w at level (cid:96)0. Thus we know that both (cid:104)w(cid:48), u(cid:105) and (cid:104)u, v(cid:105) stay at level (cid:96)0. By definition dR(w(cid:48), u) ≤ 3 and dR(u, v) ≤ 3. We can enumerate all the possible 0 ≥ (cid:96)0 − 1), and cases of u, v, w(cid:48) arrangement to check that (cid:104)w(cid:48), v(cid:105) is at most one level higher than (cid:96)0 (i.e., (cid:96)(cid:48) (cid:104)w(cid:48), v(cid:105) and (cid:104)w(cid:48), u(cid:105) are within distance 3 of each other. Since (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) share the portion (cid:104)w, w(cid:48)(cid:105), the lemma holds for the case of (cid:96) = (cid:96)0. 0. Thus (cid:96) ≥ (cid:96)0. We prove the lemma by an induction on (cid:96). 31 For the induction step, consider (cid:96) > (cid:96)0. Let u(cid:48) and v(cid:48) be the parents of u and v, respectively. By Lemma 16 and dR(u, v) ≤ 3, we know that dR(u(cid:48), v(cid:48)) ≤ 2. Then (cid:104)u(cid:48), v(cid:48)(cid:105) must stay at level (cid:96) − 1. By induction hypothesis, (cid:104)u(cid:48), w(cid:105) and (cid:104)v(cid:48), w(cid:105) are within distance 3 of each other. Since (cid:104)u, w(cid:105) = (cid:104)u, u(cid:48)(cid:105)∪(cid:104)u(cid:48), w(cid:105), (cid:104)v, w(cid:105) = (cid:104)v, v(cid:48)(cid:105) ∪ (cid:104)v(cid:48), w(cid:105), and dR(u, v) ≤ 3, we know that the lemma holds in this case. We define canonical triangle ∆(u, v, w) to be a geodesic triangle in which all sides are canonical geodesics. Lemma 24. Any canonical triangle ∆(u, v, w) in RT (k) is 3-slim. Proof. Without loss of generality, let u be the vertex at the lowest level, which is (cid:96). We prove the lemma by an induction on (cid:96). The base case of (cid:96) = 0 is trivial. Consider the induction step with (cid:96) > 0. If neither v nor w is at level (cid:96), then both (cid:104)u, v(cid:105) and (cid:104)u, w(cid:105) go through u's parent u(cid:48). By induction hypothesis, we know that ∆(u(cid:48), v, w) is 3-slim. Adding u in this case does not change the distance among the sides, and thus ∆(u, v, w) is also 3-slim. Suppose now that v or w or both are at level (cid:96). In the first case, suppose that at least one pair, say u and v, is such that (cid:104)u, v(cid:105) stays at level (cid:96). By Lemma 23, we know that (cid:104)u, w(cid:105) and (cid:104)v, w(cid:105) are within distance 3 of each other. Since (cid:104)u, v(cid:105) has length at most 3, we know that ∆(u, v, w) is 3-slim. In the second case, suppose that all pairs at level (cid:96) have their canonical geodesics into level (cid:96) − 1. For each vertex at level (cid:96), we take its parent, together with perhaps another vertex already within level (cid:96)− 1, we can apply the induction hypothesis and show that their canonical triangle is 3-slim. Since for every vertex at level (cid:96), its canonical geodesics to the other two vertices all go through its parent, the vertices at level (cid:96) do not change the distance between any pair of sides of the canonical triangle. Therefore, ∆(u, v, w) is 3-slim. With Lemmas 22 and 24, we can provide a direct proof of Corollary 15. Direct proof of Corollary 15. We use Rips condition here. For any u, v, w, By Lemma 22, we have [u, v] ⊆ B((cid:104)u, v(cid:105), 1). By Lemma 24, we have (cid:104)u, v(cid:105) ⊆ B((cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105), 3). By Lemma 22 again, we have (cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105) ⊆ B([u, w] ∪ [v, w], 1). Therefore, we conclude that [u, v] ⊆ B([u, w] ∪ [v, w], 5), and thus δRips(RT (k)) ≤ 5. Since δ(RT (k)) ≤ 8δRips(RT (k)), we have δ(RT (k)) ≤ 40. 4.3.4 Proof of Theorem 3 We now apply Rips condition to analyze the hyperbolicity of ringed trees with limited long-range edges RT (k, f ). First we show that a geodesic in RT (k, f ) cannot make too many hops at the same level of the ringed tree. For any two vertices in a graph G ∈ RT (k, f ), let [u, v] denote any one of the geodesics between u and v in G, while (cid:104)u, v(cid:105) still denote the canonical geodesic between u and v in the base ringed tree RT (k). Lemma 25. For any u, v on the same level in RT (k) with d(u, v) > 1, 2 log2 dR(u, v) ≤ d(u, v) ≤ 2 log2(dR(u, v) − 1) + 2. Proof. We perform induction on dR(u, v). If dR(u, v) > 3, let u(cid:48), v(cid:48) be parents of u, v respectively. By induction hypothesis, 2 log2 dR(u(cid:48), v(cid:48)) ≤ d(u(cid:48), v(cid:48)) ≤ 2 log2(dR(u(cid:48), v(cid:48))− 1) + 2. By triangle inequality, d(u, v) ≤ d(u(cid:48), v(cid:48)) + 2 ≤ 2 log2(dR(u(cid:48), v(cid:48))− 1) + 4. But dR(u(cid:48), v(cid:48)) − 1 ≤ (dR(u, v) − 1)/2 by Lemma 16. And we have d(u, v) ≤ 2 log2(dR(u(cid:48), v(cid:48)) − 1) + 4 ≤ 2 log2(dR(u, v) − 1) + 2. On the other hand, d(u, v) ≥ 2 + d(u(cid:48), v(cid:48)) ≥ 2 log2(2dR(u(cid:48), v(cid:48))). As dR(u(cid:48), v(cid:48)) ≥ dR(u, v)/2, we have d(u, v) ≥ 2 log2 dR(u, v). Combining this two inequalities concludes the induction. If 1 < dR(u, v) ≤ 3, we can check that it is correct. 32 Corollary 26. For any u, v on the same level in RT (k), d(u, v) ≤ 2 log2 dR(u, v) + 2. Proof. We check for the case d(u, v) = 1 and it is satisfied. For d(u, v) > 1, this results directly from d(u, v) ≤ 2 log2(dR(u, v) − 1) + 2 ≤ 2 log2 dR(u, v) + 2. Lemma 27. For a graph in the class RT (k, f ) and two vertices u and v at the same level j, if [u, v] never goes into vertices at level i < j, then d(u, v) ≤ max(32, 4 log2 f (n))−1 and dR(u, v) ≤ f (n) max(32, 4 log2 f (n))− 1. Proof. First, we will prove dR(u, v)/f (n) ≤ d(u, v) ≤ 2 log2 dR(u, v) + 2. The first inequality is because the shortest distance from u to v without going into vertices in level i < j in the base ringed tree RT (k) is dR(u, v), and each long-range edge can jump at most f (n) hops on the ring at any level. The second inequality results directly from Corollary 26. Let x = d(u, v). From the above two inequalities, we have x ≤ 2 log2 xf (n) + 2. Then, f (n) ≥ 2(x−2)/2/x ≥ 2(x+1)/4 for x ≥ 32, and thus x = d(u, v) ≤ max(32, 4 log2 f (n)) − 1. It follows that dR(u, v) ≤ f (n) max(32, 4 log2 f (n)) − 1. Lemma 28. For a graph in the class RT (k, f (n)) and two vertices u and v, [u, v] and (cid:104)u, v(cid:105) are within distance 2 max(32, 4 log2 f (n)) to each other. Proof. The case of u and v are ancestor and descendant to each other on the tree are trivial. Thus we (cid:104)(cid:105) 0 and (cid:96)[ ] consider the case that u and v are not ancestor and descendant to each other. Let (cid:96) 0 be the innermost (cid:104)(cid:105) level that geodesics (cid:104)u, v(cid:105) and [u, v] reach, respectively. If (cid:96)[ ] 0 , then [u, v] uses at least two more tree 0 < (cid:96) edges than (cid:104)u, v(cid:105). This means (cid:104)u, v(cid:105) uses at least two ring edges. If (cid:104)u, v(cid:105) uses exactly two ring edges, all edges in [u, v] must be tree edges, which is impossible to be a geodesic given that u and v are not ancestor and descendant to each other. Thus, (cid:104)u, v(cid:105) uses exactly three ring edges. Then [u, v] uses exactly one ring (cid:104)(cid:105) or long-range edge. Let u(cid:48) and v(cid:48) be the ancestors of u and v at level (cid:96) 0 , respectively. In this case, the only (cid:104)(cid:105) 0 − 1, and (b) the parents of u(cid:48) and v(cid:48) are connected either by a ring edge possible situation is : (a) (cid:96)[ ] 0 = (cid:96) or a long-range edge, which is used by [u, v]. Hence, [u, v] and (cid:104)u, v(cid:105) share the tree edges from u to u(cid:48) and v(cid:48) to v, and (cid:104)u, v(cid:105) goes through ring edges from u(cid:48) to v(cid:48) while [u, v] goes through the edge connecting the parents of u(cid:48) and v(cid:48). We thus have that [u, v] and (cid:104)u, v(cid:105) are within distance 1 of each other. Therefore, from now on, we consider (cid:96)[ ] (cid:96)u ≥ (cid:96)v ≥ (cid:96)[ ] 0 . 0 ≤ (cid:96) ≤ (cid:96)u, let x(cid:96) be the first level-(cid:96) vertex on geodesic [u, v] starting from u, and let y(cid:96) be the first level-(cid:96) vertex on geodesic (cid:104)u, v(cid:105) starting from u. We claim that dR(x(cid:96), y(cid:96)) ≤ f (n) max(32, 4 log2 f (n)). prove the claim for level (cid:96)−1. By the induction hypothesis, we know that dR(x(cid:96), y(cid:96)) ≤ f (n) max(32, 4 log2 f (n)). Let x(cid:48) portion [x(cid:96), x(cid:48) dR(x(cid:48) parents of x(cid:48) claim holds for level (cid:96) − 1. By induction, our claim stands. (cid:96) be the level-(cid:96) vertex just before x(cid:96)−1 on [u, v] starting from u. By Lemma 27 and the fact that the (cid:96)) ≤ f (n) max(32, 4 log2 f (n)) − 1 . Therefore, (cid:96)] never goes to level i < (cid:96), we have dR(x(cid:96), x(cid:48) (cid:96), y(cid:96)) ≤ dR(x(cid:96), y(cid:96)) + dR(x(cid:96), x(cid:48) (cid:96)) ≤ 2f (n) max(32, 4 log2 f (n)) − 1. Since x(cid:96)−1 and y(cid:96)−1 are the (cid:96) and y(cid:96) respectively, by Lemma 16 we have dR(x(cid:96)−1, y(cid:96)−1) ≤ f (n) max(32, 4 log2 f (n)). Our 0 ≤ (cid:96) ≤ (cid:96)u. For (cid:96) on [u, v] (note that x may be at a level (cid:96)(cid:48) ≥ (cid:96)), by Lemma 27 we have We thus have d(x(cid:96), y(cid:96)) ≤ 2 log2(dR(x(cid:96), y(cid:96))) + 2 ≤ max(32, 4 log2 f (n)), for all (cid:96)[ ] Let (cid:96)u and (cid:96)v be the levels of u and v respectively. Without loss of generality, We can suppose that For level (cid:96)u, it is trivial. Suppose that our claim is correct for some level (cid:96) > (cid:96)[ ] 0 , and we inductively 0 ≥ (cid:96) (cid:104)(cid:105) 0 . For any level (cid:96) both reachable by [u, v] and (cid:104)u, v(cid:105), i.e., (cid:96)[ ] any vertex x between x(cid:96) and x(cid:48) 33 to z (cid:96)[ ] 0 , w (cid:96)[ ] 0 (cid:96)[ ] 0 0 , and d(z in geodesic [u, v], and from y (cid:96), x(cid:96)) + d(x(cid:96), y(cid:96)) ≤ 2 max(32, 4 log2 f (n)). Hence all such vertices d(x, y(cid:96)) ≤ d(x, x(cid:96)) + d(x(cid:96), y(cid:96)) ≤ d(x(cid:48) x are within distance 2 max(32, 4 log2 f (n)) from vertex y(cid:96) in (cid:104)u, v(cid:105), and vice versa. Similarly, we can define z(cid:96) to be the the first level-(cid:96) vertex on geodesic [v, u] starting from v, and w(cid:96) to be the first level-(cid:96) vertex on geodesic (cid:104)v, u(cid:105) starting from v, for all (cid:96)[ ] 0 ≤ (cid:96) ≤ (cid:96)v. By a symmetric argument, we can show that w(cid:96) are within distance 2 max(32, 4 log2 f (n)) from all vertices in the segment of [u, v] ) ≤ max(32, 4 log2 f (n)). from z(cid:96)−1 to z(cid:96) for (cid:96) > (cid:96)[ ] The only portion left to argue is from x (cid:96)[ ] 0 (cid:104)u, v(cid:105). By Lemma 27 and the definition of (cid:96)[ ] 0 , we know that d(x fore, all vertices in the segment from x to z both y bound the distance from x to [u, v]. Since dR(y 3f (n) max(32, 4 log2 f (n)), we have d(y , w Thus, for any vertex x in the segment from y z (cid:96)[ ] 0 [u, v]. Proof of Theorem 3. We use Rips condition here. For any u, v, w, by Lemma 28, we have [u, v] ⊆ B((cid:104)u, v(cid:105), 2 max(32, 4 log2 f (n))). By Lemma 24, (cid:104)u, v(cid:105) ⊆ B((cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105), 3). Again by Lemma 28, (cid:104)u, w(cid:105) ∪ (cid:104)v, w(cid:105) ⊆ B([u, w]∪[v, w], 2 max(32, 4 log2 f (n))). Combining these together, we have [u, v] ⊆ B([u, w]∪ [v, w], 4 max(32, 4 log2 f (n)) + 3). Therefore, since δ and δRips differ within a constant factor, we have δ(RT (k, f )) ≤ c log f (n) for some constant c. in geodesic ) ≤ max(32, 4 log2 f (n)). There- in geodesic [u, v] are within 2 max(32, 4 log2 f (n)) to in geodesic (cid:104)u, v(cid:105), we need to (cid:96)[ ] ) ≤ 0 ) + 2 ≤ max(32, 4 log2 f (n)). and in at most 2 max(32, 4 log2 f (n)) hops. Therefore, x is within distance 2 max(32, 4 log2 f (n)) from . Now, for any vertex x in the segment from y ) ≤ dR(y in geodesic (cid:104)u, v(cid:105), x can reach either x (cid:96)[ ] 0 (cid:96)[ ] 0 , w , x (cid:96)[ ] (cid:96)[ ] ) ≤ 2 log2 dR(y 0 0 to w (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 , z (cid:96)[ ] 0 (cid:96)[ ] 0 ) + dR(x , z (cid:96)[ ] 0 (cid:96)[ ] 0 ) + dR(z and w , w (cid:96)[ ] 0 (cid:96)[ ] 0 to w (cid:96)[ ] 0 , w (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 (cid:96)[ ] 0 to w (cid:96)[ ] 0 (cid:96)[ ] 0 4.3.5 Proof of Theorem 4 We first analyze the δ-hyperbolicity of RRT (k, e−αdR(u,v)). Proof of Theorem 4, part 1. eα ≤ ρ = (cid:80) v∈V \{u} e−dR(u,v)α ≤ 2(cid:80)+∞ i=1 eiα. Therefore, ρ = Θ(1). A vertex u on the leaves of RT (k) has a long-range edge with ring distance greater than k with probability Θ(e−kα)/ρ. Let k = 2 α log n, we know that a vertex has a long-range edge of ring distance greater than α log n with probability Θ(1/n2) = o(1/n). rem 3 it follows that δ(RRT (k, e−αdR(u,v))) = O(log log n), for any α > 0. Therefore, with probability 1 − o(1), long-range edges never exceed ring distance 2 α log n. From Theo- 2 For the case of δ(RRT (k, dR(u, v)−α)), we first look at a lemma about the effect of long-range edges with ring distance Ω(nc) on δ-hyperbolicity of ringed trees. Lemma 29. If we add an edge between u and v on the outermost ring of a k level ringed tree with dR(u, v) ≥ c(cid:48)nc, for some constants c and c(cid:48), then the resulted graph G (possibly with other edges on the outermost ring) has δ(G) = Ω(log n). Proof. Let w be a node of lowest layer number on (cid:104)u, v(cid:105). By Lemma 25 and the structure of canonical geodesic, d(w, u) ≥ (2 log2 c(cid:48)nc − 3)/2 ≥ c log2 n + log2 c(cid:48) − 3/2. We consider the midpoint x of [u, w]. For any point y in [v, w], by considering the canonical geodesic (cid:104)x, y(cid:105), we know that d(x, y) ≥ (c log2 n + log2 c(cid:48) − 3/2)/2 − 3. Therefore ∆(u, v, w) is at best ((c log2 n + log2 c(cid:48) − 3/2)/2 − 3)-slim, and thus δ(G) = δRips(G) = Ω(log n). 34 A probabilistic version comes naturally as the following corollary. Corollary 30. For a random graph G formed by linking edges on leaves of a ringed tree. if for some constant c with 0 < c < 1, with high probability there exists an edge linking some u and v with dR(u, v) = Θ(nc), then with high probability δ(G) = Θ(log n). Proof. Diameter of ringed tree gives O(log n) upper bound. Lemma 29 gives Ω(log n) lower bound. We can now estimate the δ-hyperbolicity of RRT (k, dR(u, v)−α). Proof of Theorem 4, part 2. Note that in a ringed tree with n vertices, at least n/2 of them are leaves. For a constant c with 0 < c < 1 and a fixed vertex u, the probability that the long-range edge (u, v) has dR(u, v) ≤ (n/4)c (we say that it is good) is p = 2ρ−1(cid:80)(n/4)c d=1 d−α, where ρ = Θ((cid:80)n For 0 < α < 1, p = O(n(1−α)(c−1)) = o(1). For α = 1, p = c + o(1). In these two cases, all edges are For α > 1, ρ = O(1). We take q = 1 − p. We have q = O(nc(1−α)). By picking c = min(1, good with probability at most (c + o(1))(n/2) = o(1). we have q = O(n−1/2). All edges are good with probability (1 − q)n/2 = O(e−√ In all three cases, by Corollary 30, with probability 1 − o(1), δ(RRT (k, dR(u, v)−α)) = Θ(log n). Finally, we estimate the δ-hyperbolicity of RRT (k, 2−αh(u,v)). d=1 d−α). n) = o(1). 2(α−1) ), 1 h=1 h=1 L /(1 − 21−α) for α (cid:54)= 1, and ρ = 1 2 log2 nL for α = 1. For α (cid:54)= 1, p(c) = n leaves v such that h(u, v) = h. Therefore ρ = (cid:80)log2 nL p(c) = ρ−1(cid:80)c log2 nL Proof of Theorem 4, part 3. We note nL = (n + 1)/2 the number of leaves. Fix a leaf u. There are 2h−1 2h−1−αh. For a constant c with 0 < c < 1, let 2h−1−αh be the probability that u never links to any v with h(u, v) ≥ c log2 n. We −(1−α)(1−c) have ρ = 2−αn1−α . L For α = 1, p(c) = c. For the case α ≤ 1, p(1/2) = O(1). Therefore with probability (1 − p(1/2))nL = o(1) there exists some u, v linked together with h(u, v) ≥ 1 2(α−1) ), nL) = o(1) linked together with and p(c0) = n h(u, v) ≥ c0 log2 nL. In any cases, with 1− o(1) probability, there exists u, v linked together by long-range edge with h(u, v) ≥ c log2 nL for some constant c. We notice that this occurs uniformly through all edges. Given u, v with h(u, v) = h, dR(u, v) < 2h/2 with probability at most 2h21−2h = 21−h by simply counting pairs within ring distance 2h/2. With h(u, v) ≥ c log2 nL, c > 0, we know that with probability 1 − 2n−c L . Combining with the previous analysis, we prove that with 1 − o(1) probability, there exists u, v linked together by long-range edge with dR(u, v) ≥ L for some constant c > 0. By Corollary 30 and by nL > n/2, with probability 1 − o(1) we have nc/2 δ(RRT (k, 2−αh(u,v))) = Θ(log n). . Therefore with probability (1 − p(c0))nL = O(e−√ L = 1 − o(1) we have dR(u, v) ≥ 2h/2 = nc/2 2 log2 n. For α > 1, we take constant c0 = min(1, −1/2 L 1 4.3.6 Proof of Theorem 5 We can order a binary tree to give it a ring distance. We will suppose that such a distance is defined hereinafter. We begin with a counter part of Lemma 29 in binary tree. Lemma 31. If there is an edge between two leaves u, v of a binary tree of size n with distance to lowest common ancestor h(u, v) = c1 log2 n + c2 for some constant c1 > 0, c2 > 0, then the resulted graph G (possibly with other edges on the outermost ring) has δ(G) = Ω(log n). 35 Proof. Consider w the lowest common ancestor of u, v, and x the midpoint of [u, w]. We have d(x, w) = d(w, u)/2 = h(u, v)/2. For any y in [w, v], d(x, y) ≥ h(u, v)/2, as the only path in the tree from y to x always passes by w, and we need to climb h(u, v)/2 levels if we use links on leaves. Therefore ∆(u, v, w) is at best h(u, v)/2 = 1 2 (c1 log2 n + c2), and we conclude that δ(G) = Ω(log n). Corollary 32. For a random graph G formed by linking edges on leaves of a binary tree. if for some constant c with 0 < c < 1, with high probability there exists an edge linking some u and v with h(u, v) = Θ(log n), then with high probability δ(G) = Θ(log n). Proof. Diameter of binary tree gives O(log n) upper bound. Lemma 31 gives Ω(log n) lower bound. Proof of Theorem 5. For RBT (k, e−αdR(u,v)), the height of the whole tree is h = (cid:98)log2 n(cid:99). There are √ n) subtrees of height h/2, with the root at the level h/2. For every neighboring such subtrees, the Θ( rightmost leaf u on the left subtree and the leftmost leaf v on the right subtree verifies dR(u, v) = 1, h(u, v) ≥ h/2. For each leaf, ρ = O(1). Therefore, for u, v with dR(u, v) = 1, there is an extra edge n such pairs, with probability 1 − (1 − between u, v with constant probability e−αρ−1 > 0. As there are n = 1 − o(1), there is a pair of leaves u, v linked by an extra edge with dR(u, v) = 1, h(u, v) ≥ e−αρ−1) h/2 = Θ(log n). By Corollary 32, with probability 1 − o(1), δ(RBT (k, e−αdR(u,v))) = Θ(log n). For RBT (k, dR(u, v)−α) and RBT (k, 2−αh(u,v)), using the same analysis in the proof of Theorem 4, we know that for some constant c > 0, with 1 − o(1) probability, there is an extra edge between u, v with dR(u, v) = Ω(nc). We have h(u, v) = Ω(log n) because a subtree of height h spans a ring distance at most 2h. By Corollary 32, we have δ(RBT (k, dR(u, v)−α)) = δ(RBT (k, 2−αh(u,v))) = Θ(log n). √ √ 4.4 Extensions of random ringed tree model We will now discuss some extensions of the random ringed tree (RRT) model, and show that our results still hold for these extensions, thus extending its expressivity. We start from some observations in the proof of Theorem 4. In this proof, the upper bound of δ- hyperbolicity is given by Theorem 3, and the lower bound is given by Corollary 30. In the statement of Theorem 3, by the definition of RT (k, f ), only a uniform bound of ring distance dR(u, v) for each long- range edge (u, v) is considered. In the statement of Corollary 30, the only quantity concerning a long-range edge (u, v) is also the ringed distance between u and v, and to apply this corollary, we only need to show that a long-range edge (u, v) with dR(u, v) = Θ(nc) for some constant c exists with high probability. Therefore, the proof of Theorem 4 relies only on the ring distances of long-range edges. To extend the RRT model while keeping similar properties on δ-hyperbolicity, we only need to show that Theorem 3 and Corollary 30 are still applicable in these extensions. We will here discuss two extensions on choosing long-range edges. A constant number of long-range edges for each node. In the original RRT model, each node only have one long-range edge connecting to other nodes. We can extend the model to allow each node to have a constant number of long-range edges connecting to a constant number of other nodes. In this extension, Theorem 4 still holds, since Theorem 3 is not concerned by the number of long-range edges, and Corollary 30 is still applicable as the required probability only increases with extra long-range edges. Independent long-range edges. In the original RRT model, we choose exactly one long-range edge for each node. A variant of the model is that each node u can choose edge (u, v) independently from other edges (u, v(cid:48)), with the same probability as in the original model such that on expectation u connect out with one long-range edge. In this variant, Theorem 4 still holds. The reason is that in expectation, at least a 36 constant fraction of nodes issue only one edge, and the computation for applying Corollary 30 stays similar. It is clear that the application of Theorem 3 stays valid. In the two variants discussed above, we can see that Theorem 4 still applies, and we have exactly the same property on δ-hyperbolicity of these variants. We can also combine these two variants, and it is clear that our results are still valid. 5 Discussions and open problems Perhaps the most obvious extension of our results is to close the gap in the bounds on the hyperbolicity in the low-dimensional small-world model when γ is at the "sweetspot," as well as extending the results for large γ to dimensions d ≥ 2. Also of interest is characterizing in more detail the hyperbolicity properties of other random graph models, in particular those that have substantial heavy-tailed properties. Finally, exact computation of δ by its definition takes O(n4) time, which is not scalable to large graphs, and thus the design of more efficient exact or approximation algorithms would be of interest. From a broader perspective, however, our results suggest that δ is a measure of tree-like-ness that can be quite sensitive to noise in graphs, and in particular to randomness as it is implemented in common network generative models. For example, the ringed trees have constant hyperbolicity but once adding some random links among leaves, our results show that very likely their hyperbolic δ reaches the level of graph diameter and they become not hyperbolic at all. Moreover, our results for the δ hyperbolicity of rewired trees (Theorem 5) versus rewired low-δ tree-like metrics (Theorem 4 (1)) suggest that, while quite appropriate for continuous negatively-curved manifolds, the usual definition of δ may be somewhat less useful for discrete graphs. Thus, it would be of interest to address questions such as: does there exist a measure other than Gromov's δ that is more appropriate for graph-based data or more robust to noise/randomness as it is used in popular network generation models; is it possible to incorporate in a meaningful way nontrivial randomness in other low δ-hyperbolicity graph families; and can we construct non-trivial random graph families that contain as much randomness as possible while having low δ-hyperbolicity comparing to graph diameter? Acknowledgments We are grateful to Yajun Wang and Xiaohui Bei for their helpful discussions on this topic. References [1] I. Abraham, M. Balakrishnan, F. Kuhn, D. Malkhi, V. Ramasubramanian, and K. Talwar. Reconstruct- ing approximate tree metrics. In Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing, pages 43 -- 52, 2007. [2] Y. Baryshnikov. On the curvature of the Internet. in Workshop on Stochastic Geometry and Teletraffic, Eindhoven, The Netherlands, April 2002. [3] Y. Baryshnikov and G. H. Tucci. Asymptotic traffic flow in an hyperbolic network I: Definition and properties of the core. Technical Report Preprint: arXiv:1010.3304, 2010. 37 [4] S. Bermudo, J. M. Rodr´ıguez, J. M. Sigarreta, and J.-M. Vilaire. Mathematical properties of Gromov hyperbolic graphs. In Proceedings of the 2010 International Conference of Numerical Analysis and Applied Mathematics, pages 575 -- 578, 2010. [5] M. Bogun´a, D. Krioukov, and K. Claffy. Navigability of complex networks. Nature Physics, 5:74 -- 80, 2009. [6] B. H. Bowditch. Notes on Gromov's hyperbolicity criterion for path-metric spaces. Group theory from a geometrical viewpoint (Trieste, 1990), pages 64 -- 167, 1991. [7] M. R. Bridson and A. Haefliger. Metric Spaces of Non-Positive Curvature. Springer, 1999. [8] V. Chepoi and F. Dragan. A note on distance approximating trees in graphs. European Journal of Combinatorics, 21(6):761 -- 766, 2000. [9] V. Chepoi, F. F. Dragan, B. Estellon, M. Habib, and Y. Vax`es. Diameters, centers, and approximating trees of δ-hyperbolic geodesic spaces and graphs. In Proceedings of the 24th Annual Symposium on Computational Geometry, pages 59 -- 68. ACM, 2008. [10] V. Chepoi, F. F. Dragan, B. Estellon, M. Habib, Y. Vax`es, and Y. Xiang. Additive spanners and distance and routing labeling schemes for hyperbolic graphs. Algorithmica, 62(3-4):713 -- 732, 2012. [11] V. Chepoi and B. Estellon. Packing and covering δ-hyperbolic spaces by balls. In Proceedings of the 10th International Workshop on Approximation, pages 59 -- 73, 2007. [12] F. de Montgolfier, M. Soto, and L. Viennot. Treewidth and hyperbolicity of the internet. In IEEE Networks Computing and Applications 2011. IEEE, 2011. [13] C. Gavoille and O. Ly. Distance labeling in hyperbolic graphs. In Proceedings of the 16th Annual International Symposium on Algorithms and Computation, pages 1071 -- 1079, 2005. [14] ´E. Ghys and P. de La Harpe. Sur Les Groupes Hyperboliques D'apr`es Mikhael Gromov. Birkhauser, 1990. [15] M. Gromov. Hyperbolic groups. Essays in group theory, 8:75 -- 263, 1987. [16] E. Howorka. On metric properties of certain clique graphs. Journal of Combinatorial Theory, Series B, 27(1):67 -- 74, 1979. [17] E. Jonckheere and P. Lohsoonthorn. Hyperbolic geometry approach to multipath routing. In Proceed- ings of the 10th Mediterranean Conference on Control and Automation, 2002. [18] E. Jonckheere and P. Lohsoonthorn. Geometry of network security. In Proceedings of the 2004 Amer- ican Control Conference, pages 2:976 -- 981, 2004. [19] E. Jonckheere, P. Lohsoonthorn, and F. Bonahon. Scaled Gromov hyperbolic graphs. Journal of Graph Theory, 57(2):157 -- 180, 2008. [20] E. Jonckheere, M. Lou, F. Bonahon, and Y. Baryshnikov. Euclidean versus hyperbolic congestion in idealized versus experimental networks. Internet Mathematics, 7(1):1 -- 27, 2011. 38 [21] E. A. Jonckheere, M. Lou, J. Hespanha, and P. Barooah. Effective resistance of Gromov-hyperbolic graphs: Application to asymptotic sensor network problems. In Proceedings of the 46th IEEE Confer- ence on Decision and Control, pages 1453 -- 1458, 2007. [22] J. Kleinberg. The small-world phenomenon: an algorithm perspective. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, pages 163 -- 170, 2000. [23] J. Kleinberg. Small-world phenomena and the dynamics of information. In Proceedings of Annual Advances in Neural Information Processing Systems, pages 431 -- 438, 2002. [24] J. Kleinberg. Complex networks and decentralized search algorithms. In Proceedings of the Interna- tional Congress of Mathematicians, 2006. [25] R. Kleinberg. Geographic routing using hyperbolic space. In Proceedings of the 26th IEEE Interna- tional Conference on Computer Communications, pages 1902 -- 1909, 2007. [26] D. Krioukov, k. c. claffy, K. Fall, and A. Brady. On compact routing for the Internet. Computer Communication Review, 37(3):41 -- 52, 2007. [27] D. Krioukov, F. Papadopoulos, M. Kitsak, A. Vahdat, and M. Bogun´a. Hyperbolic geometry of com- plex networks. Physical Review E, 82:036106, 2010. [28] D. Krioukov, F. Papadopoulos, A. Vahdat, and M. Bogun´a. Curvature and temperature of complex networks. Physical Review E, 80:035101(R), 2009. [29] J. Lamping and R. Rao. Laying out and visualizing large trees using a hyperbolic space. In Proceedings of the 7th Annual ACM Symposium on User Interface Software and Technology, pages 13 -- 14, 1994. [30] J. Lamping, R. Rao, and P. Pirolli. A focus+context technique based on hyperbolic geometry for visualizing large hierarchies. In Proceedings of CHI'95: Conference on Human Factors in Computing, pages 401 -- 408, 1995. [31] P. Lohsoonthorn. Hyperbolic Geometry of Networks. PhD thesis, University of. Southern California, 2003. [32] M. Lou. Traffic pattern in negatively curved network. PhD thesis, University of Southern California, 2008. [33] C. U. Martel and V. Nguyen. Analyzing Kleinberg's (and other) small-world models. In Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing, pages 179 -- 188, 2004. [34] T. Munzner. Exploring large graphs in 3D hyperbolic space. IEEE Computer Graphics and Applica- tions, 18(4):18 -- 23, 1998. [35] T. Munzner and P. Burchard. Visualizing the structure of the World Wide Web in 3D hyperbolic space. In Proceedings of the First Symposium on Virtual Reality Modeling Language, pages 33 -- 38, 1995. [36] O. Narayan and I. Saniee. Large-scale curvature of networks. Phys. Rev. E, 84:066108, Dec 2011. [37] O. Narayan, I. Saniee, and G. Tucci. Lack of spectral gap and hyperbolicity in asymptotic Erdos-R´enyi random graphs. In Proceedings of the 5th International Symposium on Communications Control and Signal Processing (ISCCSP), pages 1 -- 4, 2012. 39 [38] M. E. J. Newman and D. J. Watts. Scaling and percolation in the small-world network model. Physical Review E, 60(6):7332 -- 7342, 1999. [39] V. Nguyen and C. U. Martel. Analyzing and characterizing small-world graphs. In Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 311 -- 320, 2005. [40] F. Papadopoulos, D. V. Krioukov, M. Bogun´a, and A. Vahdat. Greedy forwarding in dynamic scale- free networks embedded in hyperbolic metric spaces. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM), pages 2973 -- 2981, 2010. [41] C. Papazian and E. R´emila. Some properties of hyperbolic networks. In Proceedings of the 9th International Conference on Discrete Geometry for Computer Imagery, pages 149 -- 158, 2000. [42] Y. Shang. Lack of Gromov-hyperbolicity in small-world networks. Central European Journal of Mathematics, 10(3):1152 -- 1158, 2012. [43] Y. Shavitt and T. Tankel. Hyperbolic embedding of Internet graph for distance estimation and overlay construction. IEEE/ACM Transactions on Networking, 16(1):25 -- 36, 2008. [44] G. H. Tucci. Random regular graphs are not asymptotically Gromov hyperbolic. Technical Report Preprint: arXiv:1203.5069 (2012), 2012. [45] J. A. Walter and H. Ritter. On interactive visualization of high-dimensional data using the hyperbolic plane. In Proceedings of the 8th Annual ACM SIGKDD Conference, pages 123 -- 132, 2002. 40
1611.10305
1
1611
2016-11-30T18:46:55
Influential Node Detection in Implicit Social Networks using Multi-task Gaussian Copula Models
[ "cs.SI", "cs.LG", "stat.ML" ]
Influential node detection is a central research topic in social network analysis. Many existing methods rely on the assumption that the network structure is completely known \textit{a priori}. However, in many applications, network structure is unavailable to explain the underlying information diffusion phenomenon. To address the challenge of information diffusion analysis with incomplete knowledge of network structure, we develop a multi-task low rank linear influence model. By exploiting the relationships between contagions, our approach can simultaneously predict the volume (i.e. time series prediction) for each contagion (or topic) and automatically identify the most influential nodes for each contagion. The proposed model is validated using synthetic data and an ISIS twitter dataset. In addition to improving the volume prediction performance significantly, we show that the proposed approach can reliably infer the most influential users for specific contagions.
cs.SI
cs
Influential Node Detection in Implicit Social Networks using Multi-task Gaussian Copula Models Qunwei Li Syracuse University Bhavya Kailkhura Lawrence Livermore National Labs Jayaraman J. Thiagarajan Lawrence Livermore National Labs Zhenliang Zhang Intel Labs Pramod K. Varshney Syracuse University [email protected] [email protected][email protected] [email protected] [email protected] Editor: Oren Anava, Marco Cuturi, Azadeh Khaleghi, Vitaly Kuznetsov, Alexander Rakhlin Abstract Influential node detection is a central research topic in social network analysis. Many ex- isting methods rely on the assumption that the network structure is completely known a priori. However, in many applications, network structure is unavailable to explain the underlying information diffusion phenomenon. To address the challenge of information dif- fusion analysis with incomplete knowledge of network structure, we develop a multi-task low rank linear influence model. By exploiting the relationships between contagions, our approach can simultaneously predict the volume (i.e. time series prediction) for each con- tagion (or topic) and automatically identify the most influential nodes for each contagion. The proposed model is validated using synthetic data and an ISIS twitter dataset. In addition to improving the volume prediction performance significantly, we show that the proposed approach can reliably infer the most influential users for specific contagions. 1. Introduction Information emerges dynamically and diffuses quickly via agent interactions in complex networks (e.g. social networks) (López-Pintado, 2008). Consequently, understanding and prediction of information diffusion mechanisms are challenging. There is a rapidly growing interest in exploiting knowledge of the information dynamics to better characterize the fac- tors influencing spread of diseases, planned terrorist attacks, and effective social marketing campaigns, etc (Guille and Hacid, 2012). The broad applicability of this problem in social network analysis has led to focused research on the following questions: (I) Which conta- gions are the most popular and can diffuse the most? (II) Which members of the network ∗. This work was supported in part by ARO under Grant W911NF-14-1-0339. This work was performed under the auspices of the U.S. Dept. of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344. 1 are influential and play important roles in the diffusion process? (III) What is the range over which the contagions can diffuse (Guille et al., 2013)? While attempting to answer these questions, one is confronted with two crucial challenges. First, a descriptive diffusion model, which can mimic the behavior observed in real world data, is required. Second, effi- cient learning algorithms are required for inferring influence structure based on the assumed diffusion model. A variety of information diffusion prediction frameworks have been developed in the literature (Yang and Leskovec, 2010; Wang et al., 2013; Guille et al., 2013; Du et al., 2013; Zhang et al., 2016). A typical assumption in many of these approaches is that a connected network graph and knowledge of the corresponding structure are available a priori. However, in practice, the structure of the network can be implicit or difficult to model, e.g., modeling the structure of the spread of infectious disease is almost impossible. As a result, network structure unaware diffusion prediction models have gained interest. For example, (Yang and Leskovec, 2010), Yang et. al. proposed a linear influence model, which can effectively predict the information volume by assuming that each of the contagions spreads with the same influence in an implicit network. Subsequently, in (Wang et al., 2013), the authors extended LIM by exploiting the sparse structure in the influence function to identify the influential nodes. Though the relationships between multiple contagions can be used for more accurate modeling, most of the existing approaches ignore that information. In this paper, we address the above issues by augmenting linear influence models with complex task dependency information. More specifically, we consider the dependency of dif- ferent contagions in the network, and characterize their relationships using Copula Theory. Furthermore, by imposing a low-rank regularizer, we are able to characterize the clustering structure of the contagions and the nodes in the network. Through this novel formulation, we attempt to both improve the accuracy of the prediction system and better regularize the influence structure learning problem. Finally, we develop an efficient algorithm based on proximal mappings to solve this optimization problem. Experiments with synthetic data reveal that the proposed approach fairs significantly better than a state-of-the-art multi-task variant of LIM both in terms of volume prediction and influence structure estimation per- formance. In addition, we demonstrate the superiority of the proposed method in predicting the time-varying volume of tweets using the ISIS twitter dataset1. 2. Background In this section, we present the formulation of linear influence model (LIM) (Yang and Leskovec, 2010) and discuss its limitations. Consider a set of N nodes that participate in an information diffusion process of K different contagions over time. Node u ∈ {1, . . . , N} can be infected by contagion k ∈ {1, . . . , K} at time t ∈ {0, 1, . . . , T}. The volume Vk(t) is defined as the total number of nodes that get infected by the contagion k at time t. Let the indicator function Mu,k(t) = 1 represent the event that node u got infected by contagion k at time t, and 0 otherwise. LIM models the volume Vk(t) as a sum of influences of nodes u 1. ISIS dataset from Kaggle is available at https://www.kaggle.com/kzaman/how-isis-uses-twitter. 2 that got infected before time t: Vk(t + 1) = N(cid:88) L−1(cid:88) u=1 l=0 Mu,k(t − l)Iu(l + 1), (1) where each node u has a particular non-negative influence function Iu(l). One can simply think of Iu(l) as the number of follow-up infections l time units after u got infected. The value of L is set to indicate that the influence of a node drops to 0 after L time units. Thus, the influence of node u is denoted by the vector Iu = (Iu (1) , . . . , Iu (L))T ∈ RL×1. Next, using the notation Vk = (V (1), . . . , V (T ))T ∈ RT×1 and I = (IT N )T ∈ RLN×1, the inference procedure of LIM can be formulated as follows 1 ,··· , IT minimize (cid:107)Vk − Mk · I(cid:107)2 2 + 1(I), (2) K(cid:88) k=1 K(cid:88) k=1 minimize 1 2 N(cid:88) u=1 N(cid:88) K(cid:88) u=1 k=1 where Mk is obtained via concatenation of Mu,k, (cid:107)·(cid:107)2 denotes the Euclidean norm, and 1(I) is an indicator function that is zero when Iuk (l) ≥ 0 and +∞ otherwise. Though LIM has been effective in predicting the future volume for each contagion, it assumes that each node has the same influence across all the contagions. Consequently, to achieve contagion-sensitive node selection in an implicit network, the LIM model was extended and the multitask sparse linear influential model (MSLIM) was proposed in (Wang et al., 2013). The influence function is defined by extending Iu in LIM into contagion-sensitive Iu,k ∈ RL×1, which is a L-length vector representing the influence of the node u for the contagion k. For each contagion k, let Ik ∈ RLN×1 be the vector obtained by concatenating I1k, . . . , IN k. For each node u, the influence matrix for the node u is defined: Iu = (Iu1, . . . , IuK) ∈ RL×K. Using these notations, the inference procedure to estimate Iu,k was formulated as follows (cid:107)Vk − Mk · Ik(cid:107)2 2 + λ (cid:107)Iu(cid:107)F + γ (cid:107)Iuk(cid:107)2 + 1(I), (3) N(cid:80) where (cid:107) · (cid:107)F denotes the Frobenius norm. The penalty term (cid:107)Iu(cid:107)F was used to encourage the entire matrix Iu to be zero altogether, which means that the node u is non-influential for all different contagions. If the estimated (cid:107)Iu(cid:107)F > 0 (i.e., the matrix Iu is non-zero), a (cid:107)Iuk(cid:107)2, which is essentially a group- fine-grained selection is performed by the penalty Lasso penalty and can encourage the sparsity of vectors {Iuk}. For a specific contagion k, one can identify the most influential nodes by finding the optimal solution {Iuk} of (3). However, the penalty terms used in MSLIM encourages that certain nodes have no influence over all the contagions which may not be true in practice. Furthermore, for most of the real world applications, there exists complex dependencies among the contagions. In order to alleviate these shortcomings, we propose a novel probabilistic multi-task learning framework and develop efficient optimization strategies. K(cid:80) u=1 k=1 3. Proposed Approach Probabilistic Multi-Contagion Modeling of Diffusion: We assume a linear regression model for each task:Vk = MkIk + nk, where Vk, Mk and Ik are defined as before, and 3 nk ∈ RT×1 is an i.i.d. zero-mean Gaussian noise vector with the covariance matrix Σk. The distribution for Vk given Mk, Ik and Σk can be expressed as (cid:16)− 1 2 (cid:0)Vk − MkIk(cid:1)T Σ−1 k (cid:0)Vk − MkIk(cid:1)(cid:17) VkMk, Ik, Σk ∼ N(cid:16) . (4) (cid:17) MkIk, Σk exp = (2π) T 2 Σk 1 2 Assuming that the influence for a single contagion is also Gaussian distributed, we can express the marginal distributions as Ikmk, Θk ∼ N (mk, Θk), where mk ∈ RLN×1 is the N,k]T , and Θk ∈ RLN×LN is the mean vector and can be expressed as mk = [mT covariance matrix of Ik. For a node u and contagion k, we assume that the variables in the influence Iuk have the same mean, i.e., mu,k = mu,k1L×1, where mu,k is a scalar and 1L×1 is a vector of all ones with dimension L × 1. Let m(cid:48) ∈ RN×K represent the mean matrix with entries mu,k, and it is connected as m = (m1, . . . , mK) = Qm(cid:48), where Q ∈ RLN×N = IN×N ⊗ 1L×1 and IN×N is the identity matrix with dimension N × N and ⊗ is the Kronecker product operator. 1,k, . . . , mT 3.1 Dependence Structure Modeling Using Copulas Consider a general case where the contagions are correlated. We construct a new influence matrix I = (cid:2)I1, . . . , IK(cid:3) ∈ RLN×K. In our formulation, Ik's are assumed to be correlated and the joint distribution of I is not a simple product of all the marginal distributions of Ik as is adopted by most multi-task learning formulations. Here, we propose to use a multi-task copula that is obtained by tailoring the copula model for the multi-task learning problem. Theorem 1 (Sklar's Theorem). Consider an N-dimensional distribution function F with marginal distribution functions F1, . . . , FN. Then there exists a copula C, such that for all x1, . . . , xN in [−∞,∞], F (x1, . . . , xN ) = C (F1 (x1) , . . . , FN (xN )). If Fn is continuous for 1 ≤ n ≤ N, then C is unique, otherwise it is determined uniquely on RanF1 × . . . × RanFN where RanFn is the range of Fn. Conversely, given a copula C and univariate CDFs F1, . . . , FN, F is a valid multivariate CDF with marginals F1, . . . , FN. As a direct consequence of Sklar's Theorem, for continuous distributions, the joint proba- bility density function (PDF) f (x1, . . . , xN ) is obtained by, (cid:32) N(cid:89) (cid:33) f (x1, . . . , xN ) = fn (xn) c (F1 (X1) , . . . , FN (XN )) , where fn (·) is the marginal PDF and c is termed as the copula density given by n=1 c(v) = ∂N C (v1, . . . , vN ) ∂v1, . . . , ∂vN (5) (6) where vn = Fn(xn). We extend the copula theory to multi-task learning and express the joint distribution of I as follows: p(I1, I2, . . . , IK) = c(F1(I1), F2(I2), . . . , FK(IK)), (7) (cid:33) (cid:32) K(cid:89) N (mk, Θk) k=1 4 where Fk(Ik) is the CDF of the influence for kth contagion. The copula density function c(·) takes all marginal CDFs {Fk(Ik)}K k=1 as its arguments, and maintains the output correlations in a parametric form. Gaussian copula: There are a finite number of well defined copula families that can characterize several dependence structures. Though, we can investigate the choice of an appropriate copula, we consider the Gaussian copula for its favorable analytical properties. A Gaussian copula can be constructed from the multivariate Gaussian CDF, and the resulting prior on I is given by a multivariate Gaussian distribution as (cid:16)− 1 2tr (cid:16) U−1 (I − m) Ω−1 (I − m)T(cid:17)(cid:17) (2π) LN K 2 Ω LN 2 U K 2 (8) I ∼ MN LN×K(m, U, Ω) = exp (cid:104) where U ∈ RLN×LN is the row covariance matrix modeling the correlation between the influence of different nodes, Ω ∈ RK×K is the column covariance matrix modeling the correlation between the influence for different contagions, and m ∈ RLN×K is the mean matrix of I. The two covariances can be computed as E = Utr(Ω) = Ωtr(U) respectively. We assume that N individual nodes are and E spreading the contagions and influencing others independently, and thus the row covariance n, n ∈ matrix is diagonal and can be expressed as U = diag(e2 {1, . . . , N} are scalars. The posterior distribution for I, which is proportional to the product of the prior in Eq. 4 and the likelihood function in Eq. 8, is given as (I − m) (I − m)T(cid:105) N ) ⊗ IL×L, where e2 (I − m)T (I − m) 1, e2 2, . . . , e2 (cid:104) (cid:105) p (IM, V, Σ, U, Ω) ∝ p (VM, I, Σ) p (Im, U, Ω) (cid:32) K(cid:89) k=1 N(cid:16) = (cid:17)(cid:33) MkIk, Σk MN LN×K (Im, U, Ω) , (9) where M = (M1, . . . , MK) ∈ RT×LN K, V = (V1, . . . , VK) ∈ RT×K, Σ is the corresponding covariance matrix of n = (n1, . . . , nK) ∈ RT×K. We assume Σk (cid:44) σ2IT×T and also an n = e2,∀k = 1, . . . , K,∀n = 1, . . . , N. We employ maximum a posteriori identical value of e2 (MAP) and maximum likelihood estimation (MLE), and obtain I, m, and Ω by K(cid:88) k=1 min I,m,Ω 1 σ2 (cid:107)Vk − MkIk(cid:107)2 2 + e2 tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + LN lnΩ + 1(I). 1 However, if we assume Ω−1 to be non-sparse, the solution to Ω−1 will not be defined (when K > LN) or will overfit (when K is of the same order as LN) (Rai et al., 2012). In fact, some contagions in the network can be uncorrelated, which makes the corresponding entry values in Ω−1 zero. Hence, we add a l1 penalty to promote sparsity of matrix Ω−1 to obtain 2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) − λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1 + 1(I). K(cid:88) min I,m,Ω (cid:107)Vk − MkIk(cid:107)2 k=1 5 3.2 Modeling Structure of Influence Matrix I In order to better characterize the influence matrix, we propose to impose a low rank struc- ture on the influence matrix I. The nodes or the contagions in the influence network are known to form communities (or clustering structures), which may be captured using the low-rank property of the influence matrix. Note that, the sparse structure in the influence matrix implies that most individuals only influence a small fraction of contagions in the network while there can be a few nodes with wide-spread influence. We incorporate this into our formulation by using a sparsity promoting regularizer over Iu,k. K(cid:88) k=1 min I,m,Ω (cid:107)Vk − MkIk(cid:107)2 2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) K(cid:88) N(cid:88) (10) − λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1 + λ4(cid:107)I(cid:107)∗ + λ5 (cid:107)Iuk(cid:107)2 + 1(I), where (cid:107) · (cid:107)∗ denotes the nuclear norm, and λ1, λ2, λ3, λ4 and λ5 are the regularization parameters. With the estimated {Iuk}, one can predict the total volume of the contagion k at T + 1 by Vk(T + 1) =(cid:80)N (cid:80)L−1 l=0 Muk(T − l)Iuk(l + 1). u=1 u=1 k=1 4. Algorithm We adopt an alternating optimization approach to solve the problem in Eq. 10. Optimization w.r.t. m: Given I and Ω−1, the mean matrix m can be obtained by solving the following problem tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) . min m The estimate m can be analytically obtained as m = 1 Optimization w.r.t. Ω: Given I and m, the contagion inverse covariance matrix Ω−1 can be estimated by solving the following optimization problem L QQT I. λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) − λ2 lnΩ−1 + λ3(cid:107)Ω(cid:107)1 min Ω The above is an instance of the standard inverse covariance estimation problem with sample (I − m)T (I − m), which can be solved using standard tools. In particular, we covariance λ1 λ2 use the graphical Lasso procedure in (Friedman et al., 2008) Optimization w.r.t. I: The corresponding optimization problem becomes Ω−1 = gLasso(cid:0)λ1/λ2(I − m)T (I − m), λ3 (cid:1) . 2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + λ4(cid:107)I(cid:107)∗ + λ5 N(cid:88) K(cid:88) K(cid:88) min I (cid:107)Vk − MkIk(cid:107)2 k=1 u=1 k=1 (11) (cid:107)Iuk(cid:107)2 + 1(I). (12) We rewrite the problem as (cid:96)(I) + λ4(cid:107)I(cid:107)∗ + 1(I). min I 6 K(cid:80) k=1 2 + λ1tr(cid:0)(I − m)Ω−1(I − m)T(cid:1) + λ5 N(cid:80) K(cid:80) Algorithm 1 Incremental Proximal Descent 1: Initialize I = A 2: repeat Set I = I − θ∇I(cid:96)(I) 3: Set I = proxθλ4(cid:107)·(cid:107)∗(I) 4: Set I = P1(I) 5: 6: until convergence 7: return I u=1 k=1 (cid:107)Vk − MkIk(cid:107)2 (cid:107)Iuk(cid:107)2. This where (cid:96)(I) = formulation involves a sum of a convex differentiable loss and convex non-differentiable reg- ularizers which renders the problem non-trivial. A string of algorithms have been developed for the case where the optimal solution is easy to compute when each regularizer is considered in isolation. This corresponds to the case where the proximal operator defined for a convex regularizer R : RLN×K → R at a point Z by proxR(Z) = arg min 1 F + R(I), is easy to compute for each regularizer taken separately. See (Combettes and Pesquet, 2011) for a broad overview of proximal methods. The proximal operator for the nuclear norm is given by the shrinkage operation as follows (Beck and Teboulle, 2009). If Udiag(σ1, . . . , σn)V T is the singular value decomposition of Z, then proxλ4(cid:107)·(cid:107)∗(Z) = Udiag((σi − λ4)+)iV T . The proximal operator of the indicator function 1(I) is simply the projection onto Iu,k(l) ≥ 0, which is denoted by P1(I). Next, we mention a matching serial algorithm introduced in (Bertsekas, 2011). We present here a version where updates are performed according to a cyclic order (Richard et al., 2012). Note that one can also randomly select the order of the updates. We use the optimization algorithm 1 to solve the optimization problem in Eq. 12. 2(cid:107)I − Z(cid:107)2 5. Experiments We compare the performance of the proposed approach to MSLIM by applying it to both synthetic and real datasets. Since the volume of a contagion over time Vk(t) can be viewed as a time series, we set up this problem as a time series prediction task and evaluate the performance using the prediction mean-squared error (MSE). Furthermore, for the synthetic data set, where we have access to the true influence matrix I, we also evaluate the perfor- mance of the influence matrix prediction task using the metric (cid:107)I − I(cid:107)F . We determined the regularization parameters for the proposed model using cross validation. In particular, we split the first 60% of the time instances as the training set and the rest for validation. Following (Wang et al., 2013), we combine the training and validation sets to re-train the model with the best selected regularization parameters and estimate the influence matrix. 5.1 Synthetic Data We created a synthetic dataset with the number of nodes fixed at N = 100 and the number of contagions at K = 20. In addition, we assumed that L = 10 and T = 20. A rank 5 (low- rank) influence matrix I was generated randomly with uniformly distributed entries. The matrix M was generated with uniformly distributed random integers {0, 1}. Following our 7 Table 1: Prediction performance for different information diffusion models on synthetic data. Approach Volume Prediction MSE Influence Matrix Estimation Error MSLIM Proposed 0.834 0.7681 0.007 0.62 model assumption, the volume for each Vk was calculated as follows Vk = Mk×Ik+N (0, ∆) where N (0, ∆) is a multivariate normal distribution with covariance matrix ∆. In Table 1, we present the results obtained using the proposed approach and its comparison to MSLIM. As can be observed, for both volume prediction and influence matrix estimation tasks, the proposed approach achieves highly accurate estimates. 5.2 ISIS Twitter Data In this section, we demonstrate the application of the proposed approach to a real-word analysis task. We begin by describing the twitter dataset used for analysis and the procedure adopted to extract the set of contagions. Following this, we discuss the problem setup and present comparisons to MSLIM on predicting the time-varying tweet volume. Finally, we present a qualitative analysis of the inferred influence structure for different contagions. The ISIS dataset from Kaggle2 is comprised of over 17, 000 tweets from 112 users posted between January 2015 and May 2016. In addition to the actual tweets, meta-information such as the user name and the timestamp for each tweet are included. We performed a standard pre-processing by removing a variety of stop words, e.g. URLs, symbols. After preprocessing, we converted each tweet into a bag-of-words representation and extracted the term frequency-inverse document frequency (tf-idf) feature. Topic Modeling: When applying our approach, the first step is to define semantically meaningful contagions. A simple way of defining topics is to directly use words as topics (e.g., ISIS). However, a single word may not be rich enough to represent a broad topic (e.g., social network sites). Hence, we propose to perform topic modeling on the tweets based on the tf-idf features. In our experiment, we obtained the topics using Non-negative Matrix Factorization (NMF), which is a popular scheme for topic discovery, with the number of topics K set at 10. Table 2 lists the top 10 words for each of the topics learned using NMF. Volume Time Series Prediction: In our experiment, we set one day as the discrete time step for aggregating the tweet volume. The parameter L denotes the number of time steps it takes for the influence of a user to decay to zero. We set the parameter L equal to 5 since we observed that beyond L = 5, there is hardly any improvement in performance. The MSE on the predicted volume is computed over the entire period of observation. The comparison of the prediction MSE is presented in Table 3. It can be seen that the proposed approach significantly outperforms MSLIM in predicting the time-varying volume. Influential Node Detection: For a contagion k, we identify the most influential nodes with respect to this contagion as nodes having high (cid:107)Iu,k(cid:107)2 values. First, in Figure 2(a), we 2. ISIS dataset from Kaggle is available at https://www.kaggle.com/kzaman/how-isis-uses-twitter. 8 Table 2: Top words for each topic learned using NMF with the ISIS twitter dataset. Topic 1 Topic 2 Topic 3 Topic 4 Topic 5 Topic 6 Topic 7 Topic 8 Topic 9 Topic 10 isis ramiallolah iraq attack libya warreporter1 saa aamaq usa abu killed soldiers today airstrikes injured wounded civilians militants iraqi attack syria russia ramiallolah turkey ypg breakingnews usa group saa terror state islamic fighters fighting group saudi new http wilaya control aleppo nid gazaui rebels north today northern syrian ypg turkish assad regime myra forces rebels fsa pro islam syrian jaysh al qaeda nusra abu sham ahrar islam jabhat http warreporter1 army iraq near ramiallolah iraqi lujah turkey ramadi west sinai allah people muslims abu accept muslim make know don islam breaking islamicstate forces amaqagency city fighters iraqi near area syrian (a) Average Influence (b) Maximum Influence Figure 1: Comparing statistics from the estimated influence matrix with the volume of In both tweets corresponding to each of the users to identify influential users. cases, the users with a large influence score are marked in red. plot the correlation among 10 topics learned by NMF. More specifically, we plot the pair- wise correlation structure learned by our approach. It can be seen that, a strong positive correlation structure exists, which enabled the improved prediction in Table 3. Following this, we use the predicted influence matrix to select a set of highly influential nodes from the dataset. A simple approach to select the influential users can be to select the ones with a large number of tweets. However, we argue that the influence predicted in an information diffusion model can be vastly different. Consequently, we consider a user to be influential if she has a high influence score for at least one of the topics, or if she can be influential for multiple topics. For example, in Figure 1(a), we plot average influence scores of the users (averaged over all the topics) against the total number of tweets. Similarly, in Figure 1(b), 9 (a) (b) Figure 2: (a) Correlation Structure among the topics (non-black color represents positive correlation), (b) Top 9 influential users and their tweet distributions. Table 3: Volume prediction performance on the ISIS twitter dataset. Approach MSLIM Proposed Volume Prediction MSE 2.7 0.329 we plot influence scores of the users (maximum over all the topics) against the total number of tweets. The first striking observation is that the users with high influence scores are not necessarily the ones with the most number of tweets. Instead, their impact on the information diffusion relies heavily on the complex dynamics of the implicit network. Finally, in Figure 2(b) we plot the percentage of tweets regarding each of the topics for top 9 influential nodes. Influential nodes are obtained as a union of nodes identified based on both average and maximum influence scores. More specifically, we select the union of users with average influence score greater than 1.3 and maximum influence score greater than 1.8. In addition to displaying the distribution across topics, for each influential user, we show the total number of tweets posted by that user. It can be seen that the total number of tweets of these users vary a lot and, therefore, is not a good indication of their influence. 6. Conclusion In this paper, we considered the problem of influential node detection and volume time series prediction. We proposed a descriptive diffusion model to take dependencies among the top- ics into account. We also proposed an efficient algorithm based on alternating methods to perform inference and learning on the model. It was shown that the proposed technique out- performs existing influential node detection techniques. Furthermore, the proposed model was validated both on a synthetic and a real (ISIS) dataset. We showed that the proposed approach can efficiently select the most influential users for specific contagions. We also presented several interesting patterns of the selected influential users for the ISIS dataset. 10 References Amir Beck and Marc Teboulle. A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM journal on imaging sciences, 2(1):183 -- 202, 2009. Dimitri P Bertsekas. Incremental gradient, subgradient, and proximal methods for convex optimization: A survey. Optimization for Machine Learning, 2010:1 -- 38, 2011. Patrick L Combettes and Jean-Christophe Pesquet. Proximal splitting methods in signal In Fixed-point algorithms for inverse problems in science and engineering, processing. pages 185 -- 212. Springer, 2011. Nan Du, Le Song, Manuel Gomez-Rodriguez, and Hongyuan Zha. Scalable influence estima- tion in continuous-time diffusion networks. In Advances in neural information processing systems, pages 3147 -- 3155, 2013. Jerome Friedman, Trevor Hastie, and Robert Tibshirani. Sparse inverse covariance estima- tion with the graphical lasso. Biostatistics, 9(3):432 -- 441, 2008. Adrien Guille and Hakim Hacid. A predictive model for the temporal dynamics of informa- tion diffusion in online social networks. In Proceedings of the 21st international conference on World Wide Web, pages 1145 -- 1152. ACM, 2012. Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A Zighed. Information diffusion in online social networks: A survey. ACM SIGMOD Record, 42(2):17 -- 28, 2013. Dunia López-Pintado. Diffusion in complex social networks. Games and Economic Behavior, 62(2):573 -- 590, 2008. Piyush Rai, Abhishek Kumar, and Hal Daume. Simultaneously leveraging output and task structures for multiple-output regression. In Advances in Neural Information Processing Systems (NIPS), pages 3185 -- 3193, 2012. Emile Richard, Pierre-andre Savalle, and Nicolas Vayatis. Estimation of simultaneously In Proceedings of the 29th International Conference on sparse and low rank matrices. Machine Learning (ICML), pages 1351 -- 1358, 2012. Yingze Wang, Guang Xiang, and Shi-Kuo Chang. Sparse multi-task learning for detecting influential nodes in an implicit diffusion network. In AAAI, 2013. Jaewon Yang and Jure Leskovec. Modeling information diffusion in implicit networks. In 2010 IEEE International Conference on Data Mining, pages 599 -- 608. IEEE, 2010. Peng Zhang, Jing He, Guodong Long, Guangyan Huang, and Chengqi Zhang. Towards anomalous diffusion sources detection in a large network. ACM Transactions on Internet Technology (TOIT), 16(1):2, 2016. 11
1801.07055
1
1801
2018-01-22T11:35:40
Multi-Source Social Feedback of Online News Feeds
[ "cs.SI" ]
The profusion of user generated content caused by the rise of social media platforms has enabled a surge in research relating to fields such as information retrieval, recommender systems, data mining and machine learning. However, the lack of comprehensive baseline data sets to allow a thorough evaluative comparison has become an important issue. In this paper we present a large data set of news items from well-known aggregators such as Google News and Yahoo! News, and their respective social feedback on multiple platforms: Facebook, Google+ and LinkedIn. The data collected relates to a period of 8 months, between November 2015 and July 2016, accounting for about 100,000 news items on four different topics: economy, microsoft, obama and palestine. This data set is tailored for evaluative comparisons in predictive analytics tasks, although allowing for tasks in other research areas such as topic detection and tracking, sentiment analysis in short text, first story detection or news recommendation.
cs.SI
cs
Multi-Source Social Feedback of Online News Feeds Nuno Moniz∗and Lu´ıs Torgo† LIAAD - INESC Tec FCUP - DCC, University of Porto January 23, 2018 Abstract The profusion of user generated content caused by the rise of social media platforms has enabled a surge in research relating to fields such as information retrieval, recommender systems, data mining and machine learning. However, the lack of comprehensive baseline data sets to allow a thorough evaluative comparison has become an important issue. In this paper we present a large data set of news items from well-known aggregators such as Google News and Yahoo! News, and their respective social feedback on multiple platforms: Facebook, Google+ and LinkedIn. The data collected relates to a period of 8 months, between November 2015 and July 2016, accounting for about 100,000 news items on four different topics: economy, microsoft, obama and palestine. This data set is tailored for evaluative comparisons in predictive analytics tasks, although allowing for tasks in other research areas such as topic detection and tracking, sentiment analysis in short text, first story detection or news recommendation.1. 1 Summary Social media is a broad term encompassing forums, blogs, video sharing websites, collaborative coding platforms and social networking platforms (e.g. Facebook, Twitter) [25]. Their common denominator is the possibility for users to generate and share content, i.e. web content. The web content generated by social media platforms, which is also referred to as social media data, is diverse, including text, images, audio and videos, and the impact of social media platforms is enormous when considering the volume of web traffic and content it generates. Consider the following statistics from three of the most popular platforms: i) the number of users in Youtube is almost a third of all Internet users (over a billion users) [30], representing a significant amount of all Internet traffic [7]; ii) in September 2016, Facebook had an average of more than a billion daily active users [4]; and Twitter generated over a billion visits to sites using embedded tweets [27]. Despite the profusion of social media data, the context in which it is generated and shared presents several factors that may facilitate or hinder the ability to use such data [15]. On one hand, social media data is massive and linked. On the other hand, it is commonly noisy, sparse, informal and biased. Additionally, it is heterogeneous, partial, asymmetrical and multi-sourced. This combination of factors illustrates well the difficulty of using web content and their impact in reducing the ability to successfully disclose its full potential. The potential of social media data is immense. Its broad definition concerns a very diverse set of data types with particular properties. For example, online news are a very dynamic type of web content, due to the information it conveys and its impact on everyday life. As such, new events and stories are constantly being published as well as updates on old stories. This causes news items to have a very short life span [3, 29]. In contrast, online videos have a much longer alive-time, enduring for weeks or months [23]. For over a decade, researchers have taken advantage of the profusion of user generated data in social media to tackle a diverse set of tasks concerning information retrieval, recommender systems, data mining and machine learning. Efforts by many data proprietaries have been made in order to allow access to this enormous amount of data. However, for several fields, the lack of ready-to-use, accessible, comprehensive, detailed and large data sets that would serve as basis for comparison between approaches, is a major issue. This is the main motivation for our contribution. In this paper we describe a large scale data set of news items from multiple official media sources and their respective social feedback in multiple social media platforms. Our objective is to establish this data set as ∗Email: [email protected] †Email: [email protected] 1Link to dataset: http://www.dcc.fc.up.pt/~nmoniz/MultiSourceNews 1 a well-known baseline for research efforts pertaining to various fields of research concerning web content, and specifically predictive analytics. 2 Data Description News data can be obtained from two types of sources: i) official media, and ii) social media sources. The first type of source, official media, relates to the origin of news items and their content. It may also provide an indication of the items' relevance according to the official media source, denoted by its ranking position. The second, social media, is a medium used to measure the attention received by news items, i.e. popularity. In previous work, the provenance of the data used can be framed in one of three settings: i) solely using official media sources (e.g. [28, 13, 23]), ii) solely using social media sources (e.g. [21, 19]), or iii) using data from both official and social media sources (e.g. [12, 8, 3]). Official media sources include legacy media2 outlets (e.g. The Washington Post), news aggregation platforms (e.g. Digg, Slashdot) and news recommender systems (e.g. Google News, Yahoo! News). Most of previous work solely concerning official sources was focused on the second, with emphasis on the Digg platform. Since one of our objectives is to allow the analysis of recommendation and/or learning to rank approaches, this data set is based on the third type of official sources: news recommender systems. This choice has the benefits of i) providing a potentially large list of items, and of ii) presenting a multitude of news outlets, including those that are not considered as being legacy media. Regarding social media sources of news data, research has shown that the micro-blogging platform Twitter covers almost all news-wire events but the opposite is not true [19]. Furthermore, Osborne and Dredze [18] have shown that Twitter is the preferred medium for breaking news, almost consistently leading Facebook or Google+. However, this claim has since grown out of date, as it has been shown [18] that Facebook is now the leading platform in accessing and sharing news, followed by Twitter. Newman et al. [17] provide a survey of over 50,000 people in 26 countries concerning news consumption. It shows that the most popular platform is Facebook, followed by Youtube, Twitter, Whatsapp, Google+, LinkedIn and Instagram. The data set presented in this paper does not include the sources Youtube, Whatsapp, Instagram and Twitter. Concerning the first three, for technical reasons, such platforms either do not allow the sharing of news items (although allowing it in comments) as in the case of Youtube and Instagram, or are essentially focused on direct messaging, significantly reducing the dynamics of popularity and social spread. In the case of Twitter, the decision was related to the deprecation of its API functionality allowing for the extraction of such data3. Nonetheless, considering the wide use of Twitter data in the context social media data research, it should be noted that other alternatives would be possible, such as using the search functionality of Twitter API or obtaining archive access services. The first possibility was discarded due to the loss of information implied in such functionality, since Twitter only allows the access to 1% of its data stream4. The second possibility was also discarded due to the heavy financial implications regarding such archive access services. In order to allow the analysis and discussion of the interplay between these two types of data sources, the data set presented in this paper uses data from both types of sources: official and social media. The information portrayed in such sources is used and interpreted differently. From official data sources descriptors of news items are extracted. As for social media sources, these are used to obtain the popularity of news, which may be denoted by different signals in each source. 3 Data Set This data set is a multi-source data set, using two official media sources (Google News and Yahoo! News) and three social media sources (Facebook, Google+ and LinkedIn). It contains news-related data concerning four topics: economy, microsoft, obama, and palestine. These topics were chosen ad-hoc, based on two factors: their worldwide popularity and constant activity, and the fact that they report to different types of entities (sector, company, person, and country, respectively). Notwithstanding, this choice raises some caveats. Being limited to a small number of topics might undermine conclusions concerning the ability to generalize the predictive ability reported in experiments. On the other hand, it does provide a deep insight into topics that have a daily activity of high magnitude, in opposition to having a news sample of a variety of topics. By approaching the development of data sets as proposed, possible problems related to context-sensitivity (i.e. topic) characteristics of text-based tasks [2] are also tackled. Furthermore, due to the technical restrictions, such as access limitations per hour that both Google News and Yahoo! News applies, extending the list of topics would not be possible unless the time intervals of access would be greater. In this light, we chose to maintain the previously mentioned list of topics. 2Common expression to denote traditional media outlets. 3Twitter API: https://developer.twitter.com/en/docs. The count method was deprecated on 20th of November, 2015. 4Adjustments Streaming (Twitter): to API sample volumes https://twittercommunity.com/t/ potential-adjustments-to-streaming-api-sample-volumes/31628 2 Concerning the data horizon, previous work has differed on the active time that one should consider news items relevant, since their publication, although agreeing that such items have a very short lifetime in terms of capturing the attention of users, in comparison to other types of web content, i.e. video. For example, researchers have shown evidence for alternative values such as two days [3, 10], four days [29, 1] and 30 days [24] concerning the alive-time for which news may receive the attention of users, leading to such items being shared on social media platforms. However, based on the analysis provided by these works, most of the popularity dynamics of news develop in the first day, although showing that in some cases it may develop for more time. Nonetheless, in the latter cases, the increase is very residual in terms of proportion. Given this, an active time for the news items of two days is established, since their publication. This means that the popularity evolution of each item is stored for this period, since their appearance in official media sources. Finally, it should be noted that a stochastic view of the popularity concept is assumed (i.e. aggregate behaviour [24]), considering all publications from every user equally. Different approaches have been proposed, such as those focused on determining the number of "retweets" (Twitter functionality to re-publish a tweet) a given tweet will obtain [22, 31, 8] or those using data concerning the social network of individual users to predict the popularity of content they generate [6]. The data composed in these data sets is not focused on the popularity of content generated by a single or a given group of users, but on the general popularity of content in social media platforms, allowing for a source-wide perception of news stories' popularity. The data set is divided in two sets of data files. The first set concerns news data, and is represented by a single data file, containing 11 variables that identify and describe the news items. The second set of data files relate to social feedback data concerning the news items, and is composed by 12 data files with 145 variables each. These variables contain the information of the evolution of the popularity of news items for a period of two days. In the following sections, the two sets of data files are described, and the methods used to obtain the data are detailed in Section 4. 3.1 News Data In this section, the data file concerning the description of news items is detailed. The data descriptors are based on information obtained by querying the official media sources Google News and Yahoo! News. Each news item is described by 11 variables, which are explained in Table 1. Table 1: Name, type of data and description of data variables in news data file. Variable IDLink Title Headline Source Topic PublishDate SentimentTitle SentimentHeadline Facebook GooglePlus LinkedIn Type numeric string string string string timestamp numeric numeric numeric numeric numeric Description Unique identifier of news items Title of the news item according to the official media sources Headline of the news item according to the official media sources Original news outlet that published the news item Query topic used to obtain the items in the official media sources Date and time of the news items' publication Sentiment score of the text in the news items' title Sentiment score of the text in the news items' headline Final value of the news items' popularity according to the social media source Facebook Final value of the news items' popularity according to the social media source Google+ Final value of the news items' popularity according to the social media source LinkedIn In addition to the original information retrieved from the official media sources, we chose to include the additional information of the sentiment scores of both the title and headline of the news items. Sentiment analysis, also known as opinion mining, is a field of text mining which studies people's opinions, judgments and ideas towards entities [14]. In this data set, the process to obtain these sentiment scores was carried out by applying the framework of the qdap R package [20] with default parametrization. It should be made clear that these results were obtained by an off-the-shelf approach, and as such, its values should not be interpreted as being verified as to its accuracy. The choice of adding such information was in order to enrich the data set and make clear the options for further research by data set users. In previous work, several authors have used social network features, such as its structure [9, 26] the number of followers and/or followees [11]. The reasons for not including such information in this data set are two. First, using social network features in a broad spectrum prediction-based system raises the issue of access to data. Although it is possible to relax this issue, by obtaining a sample of data which is used to derive and test prediction models, its extensive use would virtually require full access to real-time data. Unfortunately, it is highly unlikely that this option is available to anyone other than the data owners. Secondly, handling data on the connections that users establish with other users, as well as harnessing and using their interactions, raises issues related to privacy [5]. Figure 1 shows the global number of news per topic (left) and a smoothed approximation of the amount of news per day for each topic (right). The total amount of news retrieved in both official media sources is 93,239. 3 Figure 1: Number of news from both Google News and Yahoo! News (left) and a smoothed approximation of the amount of news per day, for each topic. 3.2 Social Feedback Data The second set of data files concerns the evolution of news items' popularity in the various social media sources. This set is composed of 12 data files, for all combinations of the four topics (economy, microsoft, obama and palestine) and the available social media sources Facebook, Google+ and LinkedIn. Each case is described by 145 variables: a unique identifier, and 144 measurements of popularity in 20 minute intervals for a total of 2 days. The evolution of popularity in each of the combination of social media source-topic available in the data sets is different. Figure 2 illustrates the evolution of popularity for each of the query periods in the data set, referred to as time slices. Results are depicted as the average proportion between the popularity scores at each given time slice, and the respective final popularity scores. Figure 2: Evolution of popularity (as proportion of final popularity) in each topic, for social media sources. Each time slice represents a 20 minute period. Based on the results depicted in Figure 2, it is observed that in most social media sources, news items obtain close to half of their final popularity in a short amount of time: Facebook, Google+ and LinkedIn show that in the first moments after publication, news items quickly obtain on average close to 20% (22%, 21.8% and 16.8%, respectively) of their final popularity. In Figure 3 the intersection of the sets of news that were published in each of the social media sources is illustrated. Results show that most of the news published in Google+ or LinkedIn are also published in 4 010000200003000040000economymicrosoftobamapalestineTopicnrNews5010015011−201512−201501−201602−201603−201604−201605−201606−201607−2016DaynrNewsTopiceconomymicrosoftobamapalestineFacebookGoogle+LinkedIn0501001500501001500501001500.000.250.500.751.00TimeSliceProportionTopicEconomyMicrosoftObamaPalestine Facebook (91.7% and 88.7% respectively). Conversely, data shows that roughly a third (36%) of news published in Facebook are also published in both Google+ and LinkedIn. Additionally, only 2,006 (7.9%) news stories were published in both Google+ and LinkedIn, and not on Facebook. Figure 3: Venn diagram of published news items in social media sources. 4 Methods The official media sources Google News and Yahoo! News were queried, during a period of approximately eight months (November 10th, 2015 until July 7th 2016), for each of the four topics (economy, microsoft, obama and palestine). The queries were done simultaneously, in 20 minute intervals. For each query, the top-100 recommended news of the respective official media sources were collected. For each recommended news item, the following information was collected: title, headline, publication date and the news outlet. In order to deal with duplicated cases, the following procedure was applied. First, cases with the same title, headline and from the same news outlet, are grouped. Second, the oldest case is kept and the remaining are removed from the data set. Finally, the identifiers of the removed cases are replaced by that of the case that was kept. In addition, concerning the data quality from official media sources, we should note that some of the news items' title and headline may be truncated (represented by the use of "..."), which is an option of the official media sources Google News and Yahoo! News. Alternatives to this shortcoming would include following the URL of each news and creating tailored components for each news outlet. Considering the magnitude of news outlets in our data set, we found this to be impractical. Also, standard operations for cleaning the textual variables were applied, namely the removal of double, trailing and leading white spaces. After retrieving the query-data from the official sources, the popularity of all known news items, with an alive time below the defined period of two days, is obtained from the social media sources Facebook, Google+ and LinkedIn, simultaneously. Considering the differences between each social media source, the procedures for obtaining popularity are different. They are described as follows. • For obtaining information from Facebook, the Facebook Graph API5 is used, by querying for information concerning the URL of each news item. The data retrieved reports the number of shares concerning each unique URL, which is used as a popularity measure. In 11,602 cases (12.4%) it was not possible to obtain the number of shares, and in 26,919 cases (28.9%) the news items' were not shared on Facebook; • The social media platform Google+ does not allow to obtain the number of shares of a given URL, due to technical restrictions. Nonetheless, it allows one to check the number of times users have "liked" the URL's. Despite the differences with other social media sources, it is nonetheless a valid metric of received attention by news stories. This process is carried out by querying a public end-point6 in order to obtain the amount of "+1" (similar to "like" in Facebook) a given URL received. In 5,744 cases (6.2%) it was not 5The Graph API: https://developers.facebook.com/docs/graph-api 6The number of "+1" received by a given URL in Google+ is obtained by appending the respective URL to https://plusone. google.com/_/+1/fastbutton?url=. This approach is no longer available. 5 FacebookGoogle+LinkedIn37640369402533464793333683389023328 possible to obtain the number of "+1", and in 55,114 cases (59.1%) the news items' did not obtain any "+1"; • Finally, concerning the LinkedIn platform, the number of times each news story URL was shared is obtained by querying its public end-point7, designed for such purposes. Concerning the overall statistics of the news items' presence in the platform, in 5,745 cases (6.2%) it was not possible to obtain information concerning the news item URL. In addition, in 54,413 cases (58.4%) the news were not shared on the LinkedIn platform. In some cases, the value of the popularity of news items at a given moment (i.e. timeslice) was not acquirable. These cases are denoted with the value −1, which are mostly associated to scenarios where the items are suggested in official media sources after two days have passed since its publication in the original news outlet. Such situations represent 12.4% of cases concerning the final popularity of items according to the social media source Facebook, and 6.2% of cases for both Google+ and LinkedIn sources. In addition, a common situation is when the news items appeared in the official media sources' recommen- dations with some delay w.r.t. their original publication time. This leads to some cases only having popularity data since a given time slice. Concerning this issue of the available data according to each time slice (i.e. query period of 20 minutes) of news items, Figure 4 depicts the evolution of the available data proportion for all social media sources and query topics. It illustrates the proportion of cases for which popularity data is available in each time slice. Figure 4: Evolution of available information in each time slice for all topics and social media sources. Finally, it is important to clarify the ethical component of this data set as it pertains to the use of publicly- available data generated by users in social media platforms [16]. As such, we should stress that, as previously denoted, this data set is based on a stochastic view of the popularity concept, and therefore the data concerns the aggregate behaviour of users. This data is obtained from public end-points of the social media sources, which is already anonymized and aggregated by the data proprietaries. Thus, this data set does not include any personally identifiable information either from single or groups of users, e.g. social network data, guaranteeing the privacy of the users. 5 User Notes In order to facilitate the quick use of the data set a file with basic operations was designed in the programming language R. This file is located in the data set archive. Acknowledgments This work is financed by the ERDF – European Regional Development Fund through the COMPETE 2020 Pro- gramme within project POCI-01-0145-FEDER-006961, and by National Funds through the FCT – Funda¸cao para a Ciencia e a Tecnologia (Portuguese Foundation for Science and Technology) as part of project UID/EEA/50014/2013. 7The number of times a given URL was shared in LinkedIn is obtained by appending the respective URL to https://www.linkedin. com/countserv/count/share?format=json&url=. 6 FacebookGoogle+LinkedIn0501001500501001500501001500.000.250.500.751.00TimeSliceProportionTopicEconomyMicrosoftObamaPalestine References [1] Roja Bandari, Sitaram Asur, and Bernardo A. Huberman. The pulse of news in social media: Forecasting popularity. In Proceedings of the Seventh International Conference on Weblogs and Social Media. The AAAI Press, 2012. [2] John Blitzer, Mark Dredze, and Fernando Pereira. Biographies, bollywood, boom-boxes and blenders: Domain adaptation for sentiment classification. In Proceedings of the 45th Annual Meeting of the Association of Computational Linguistics, pages 440–447. ACL, June 2007. [3] Gianmarco De Francisci Morales, Aristides Gionis, and Claudio Lucchese. From chatter to headlines: Harnessing the real-time web for personalized news recommendation. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, WSDM '12, pages 153–162. ACM, 2012. ISBN 978-1-4503-0747-5. doi: 10.1145/2124295.2124315. [4] Facebook. Facebook - statistics, 2016. URL http://newsroom.fb.com/company-info/#statistics. [On- line; accessed 23-January-2017]. [5] Florent Garcin, Christos Dimitrakakis, and Boi Faltings. Personalized news recommendation with context trees. In Proceedings of the 7th ACM Conference on Recommender Systems, RecSys'13, pages 105–112, New York, NY, USA, 2013. ACM. ISBN 978-1-4503-2409-0. [6] M. Gupta, J. Gao, C. Zhai, and J. Han. Predicting future popularity trend of events in microblogging platforms. In Andrew Grove, editor, ASIS&T 75th Annual Meeting, 2012. [7] Gonca Gursun, Mark Crovella, and Ibrahim Matta. Describing and forecasting video access patterns. In INFOCOM, pages 16–20. IEEE, 2011. ISBN 978-1-4244-9921-2. [8] Liangjie Hong, Ovidiu Dan, and Brian D. Davison. Predicting popular messages in twitter. In Proceedings of the 20th International Conference Companion on World Wide Web, WWW '11, pages 57–58, New York, NY, USA, 2011. ACM. ISBN 978-1-4503-0637-9. [9] Salman Jamali and Huzefa Rangwala. Digging digg: Comment mining, popularity prediction, and social network analysis. In Proceedings of the 2009 International Conference on Web Information Systems and Mining, WISM '09, pages 32–38, Washington, DC, USA, 2009. IEEE Computer Society. ISBN 978-0-7695- 3817-4. doi: http://dx.doi.org/10.1109/WISM.2009.15. [10] Himabindu Lakkaraju and Jitendra Ajmera. Attention prediction on social media brand pages. In Pro- ceedings of the 20th ACM Conference on Information and Knowledge Management, CIKM 2011, Glas- gow, United Kingdom, October 24-28, 2011, pages 2157–2160, 2011. doi: 10.1145/2063576.2063915. URL http://doi.acm.org/10.1145/2063576.2063915. [11] Kristina Lerman and Aram Galstyan. Analysis of social voting patterns on digg. In Proceedings of the First Workshop on Online Social Networks, WOSN '08, pages 7–12, New York, NY, USA, 2008. ACM. ISBN 978-1-60558-182-8. doi: 10.1145/1397735.1397738. [12] Kristina Lerman and Rumi Ghosh. Information contagion: An empirical study of the spread of news on digg and twitter social networks. In William W. Cohen and Samuel Gosling, editors, ICWSM. The AAAI Press, 2010. [13] Kristina Lerman and Tad Hogg. Using a model of social dynamics to predict popularity of news. In Proceedings of the 19th International Conference on World Wide Web, WWW '10, pages 621–630, New York, NY, USA, 2010. ACM. ISBN 978-1-60558-799-8. [14] Bing Liu and Lei Zhang. A survey of opinion mining and sentiment analysis. In Charu C. Aggarwal and ChengXiang Zhai, editors, Mining Text Data, pages 415–463. Springer, 2012. ISBN 978-1-4419-8462-3. [15] Huan Liu, Fred Morstatter, Jiliang Tang, and Reza Zafarani. The good, the bad, and the ugly: uncovering novel research opportunities in social media mining. International Journal of Data Science and Analytics, 1(3):137–143, 2016. ISSN 2364-4168. doi: 10.1007/s41060-016-0023-0. [16] Annette Markham and Elizabeth Buchanan. Ethical decision-making and internet research: Recommen- dations from the aoir ethics working committee (version 2.0). https://aoir.org/reports/ethics2.pdf. Accessed: 2018-01-13. [17] Nic Newman, Richard Fletcher, David A. L. Levy, and Rasmus Kleis Nielsen. Reuters institute digital news report 2016. Technical report, Reuters Institute for the Study of Journal (University of Oxford), 2016. 7 [18] M. Osborne and M. Dredze. Facebook, twitter and google plus for breaking news: Is there a winner? In Proc. of the 8th ICWSM 2014, 2014. [19] Sasa Petrovic, Miles Osborne, Richard McCreadie, Craig Macdonald, Iadh Ounis, and Luke Shrimpton. Can twitter replace newswire for breaking news? In Proc. of 7th ICWSM. The AAAI Press, 2013. [20] Tyler W. Rinker. qdap: Quantitative Discourse Analysis Package. University at Buffalo/SUNY, Buffalo, New York, 2013. URL http://github.com/trinker/qdap. 2.2.5. [21] Benjamin Shulman, Amit Sharma, and Dan Cosley. Predictability of popularity: Gaps between prediction and understanding. In Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016., pages 348–357, 2016. [22] B. Suh, L. Hong, P. Pirolli, and E. H. Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In Proc. of the 2nd IEEE SOCIALCOM, pages 177–184, DC, USA, 2010. IEEE. [23] Gabor Szabo and Bernardo A. Huberman. Predicting the popularity of online content. Commun. ACM, 53(8):80–88, 2010. ISSN 0001-0782. doi: 10.1145/1787234.1787254. URL http://doi.acm.org/10.1145/ 1787234.1787254. [24] Alexandru Tatar, Marcelo Dias de Amorim, Serge Fdida, and Panayotis Antoniadis. A survey on predicting the popularity of web content. Journal of Internet Services and Applications, 5(1):8, 2014. ISSN 1867-4828. [25] Manos Tsagkias. Mining Social Media: Tracking Content and Predicting Behavior. PhD thesis, Faculteit der Natuurwetenschappen, Wiskunde en Informatica, 2012. [26] Oren Tsur and Ari Rappoport. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, WSDM '12, pages 643–652, New York, NY, USA, 2012. ACM. ISBN 978-1-4503-0747-5. doi: 10.1145/2124295.2124320. [27] Twitter. Twitter - statistics, 2016. URL https://about.twitter.com/company. [Online; accessed 23- January-2017]. [28] F. Wu and B. A. Huberman. Novelty and collective attention. Proc. Natl. Acad. Sci. USA, 104(45): 17599–17601, 2007. [29] Jaewon Yang and Jure Leskovec. Patterns of temporal variation in online media. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM '11, pages 177–186, New York, NY, USA, 2011. ACM. ISBN 978-1-4503-0493-1. doi: 10.1145/1935826.1935863. URL http://doi. acm.org/10.1145/1935826.1935863. [30] Youtube. Youtube - statistics, 2016. URL https://www.youtube.com/yt/press/statistics.html. [Online; accessed 23-January-2017]. [31] Tauhid Zaman, Emily B. Fox, and Eric T. Bradlow. A bayesian approach for predicting the popularity of tweets. The Annals of Applied Statistics, 8(3):1583–1611, 2014. 8
1502.02341
2
1502
2015-06-02T18:56:33
First Women, Second Sex: Gender Bias in Wikipedia
[ "cs.SI" ]
Contributing to history has never been as easy as it is today. Anyone with access to the Web is able to play a part on Wikipedia, an open and free encyclopedia. Wikipedia, available in many languages, is one of the most visited websites in the world and arguably one of the primary sources of knowledge on the Web. However, not everyone is contributing to Wikipedia from a diversity point of view; several groups are severely underrepresented. One of those groups is women, who make up approximately 16% of the current contributor community, meaning that most of the content is written by men. In addition, although there are specific guidelines of verifiability, notability, and neutral point of view that must be adhered by Wikipedia content, these guidelines are supervised and enforced by men. In this paper, we propose that gender bias is not about participation and representation only, but also about characterization of women. We approach the analysis of gender bias by defining a methodology for comparing the characterizations of men and women in biographies in three aspects: meta-data, language, and network structure. Our results show that, indeed, there are differences in characterization and structure. Some of these differences are reflected from the off-line world documented by Wikipedia, but other differences can be attributed to gender bias in Wikipedia content. We contextualize these differences in feminist theory and discuss their implications for Wikipedia policy.
cs.SI
cs
First Women, Second Sex: Gender Bias in Wikipedia Eduardo Graells-Garrido1,2 1Web Research Group Universitat Pompeu Fabra Barcelona, Spain Mounia Lalmas3 Filippo Menczer4,5 2Telefónica I+D Santiago, Chile 3Yahoo Labs London, UK 4Yahoo Labs Sunnyvale, USA 5Indiana University Bloomington, USA 5 1 0 2 n u J 2 ] I S . s c [ 2 v 1 4 3 2 0 . 2 0 5 1 : v i X r a ABSTRACT Contributing to history has never been as easy as it is today. Anyone with access to the Web is able to play a part on Wikipedia, an open and free encyclopedia. Wikipedia, available in many languages, is one of the most visited websites in the world and arguably one of the primary sources of knowledge on the Web. However, not everyone is contributing to Wikipedia from a diversity point of view; several groups are severely underrepresented. One of those groups is women, who make up approximately 16% of the current contributor community, meaning that most of the content is written by men. In addition, although there are specific guidelines of verifiability, nota- bility, and neutral point of view that must be adhered by Wikipedia content, these guidelines are supervised and enforced by men. In this paper, we propose that gender bias is not about partici- pation and representation only, but also about characterization of women. We approach the analysis of gender bias by defining a methodology for comparing the characterizations of men and women in biographies in three aspects: meta-data, language, and network structure. Our results show that, indeed, there are differences in characterization and structure. Some of these differences are re- flected from the off-line world documented by Wikipedia, but other differences can be attributed to gender bias in Wikipedia content. We contextualize these differences in feminist theory and discuss their implications for Wikipedia policy. Categories and Subject Descriptors H.3.4 [Information Storage and Retrieval]: Systems and Soft- ware—Information networks Keywords Wikipedia; Gender; Gender Bias; Computational Linguistics. 1. INTRODUCTION Today’s Web creates opportunities for global and democratic me- dia, where everyone has a voice. One of the most visible examples is Wikipedia, an open encyclopedia where anyone can contribute content. In contrast to traditional encyclopedias, where a staff of experts in specific areas takes care of writing, editing and validating content, in Wikipedia these tasks are performed by a community of volunteers. Whether or not this open source approach provides reliable and accurate content [22, 43], Wikipedia has gained unprece- dented reach. Indeed, Wikipedia was the 7th most visited website during 2014.1 An extensive body of research builds upon Wikipedia [36], covering topics like participation, structured data, and analysis of historical figures, among others. In theory, by following its guidelines about verifiability, notability, and neutral point of view, Wikipedia should be an unbiased source of knowledge. In practice, the community of Wikipedians is not diverse, and contributors are inherently biased. One group that is severely underrepresented in Wikipedia is women, who represent only 16% of editors [24]. This disparity has been called the gender gap in Wikipedia, and has been studied from several perspectives to understand why more women do not join Wikipedia, and what can be done about it. It is a problem because reportedly women are not being treated as equals to men in the community [29], and potentially, in content. For instance, Filipacchi [17] described a controversy where women novelists started to be excluded from the category “American Novelists” to be included in the specific category “American Women Novelists.” Instead of focusing on the participatory gender gap, we focus on how women are characterized in Wikipedia articles, to assess whether gender bias from the off-line world extends to Wikipedia content, and to identify biases exhibited by Wikipedians in the characterization of women and of their historical significance. The research questions that drive our work are: Is there a gender bias in user-generated characteriza- tions of men and women in Wikipedia? If so, how to identify and quantify it? How to explain it based on social theory? The study of biases in Wikipedia is not new. Hecht and Gergle [23] defined the notion of self-focus bias to study the cultural biases present in Wikipedia from a “hyperlingual” approach. Having the gender gap in mind, we focus on gender bias not only to quantify it, but to understand what could be causing it. As a first approach to the problem, we focus on the English language to be able to analyze our results in terms of western feminist theories from the social sciences. In the book The Second Sex, Simone de Beauvoir widely discusses different aspects of women oppression and their historical signifi- cance. She wrote in 1949: “it is not women’s inferiority that has determined their historical insignificance: it is their historical in- significance that has doomed them to inferiority” [15]. More than 60 This is the author’s version of this paper. To be presented at the ACM Conference on Hypertext and Social Media 2015. 1http://www.alexa.com/siteinfo/wikipedia.org years later, almost anyone with access to the Web can contribute to the writing of history, thanks to Wikipedia. The scale of Wikipedia, as well as its openness, allows us to perform a quantitative analysis of how women are characterized in Wikipedia in comparison to men. Encyclopedias characterize men and women in many ways, e. g., in terms of their lives and the events in which they participated or were relevant. We concentrate on biographies because they are a good source to study gender bias, given that each article is about a specific person. We propose three dimensions along which to perform our analysis: meta-data, language, and network structure. This leads to three major findings: 1. Differences in meta-data are coherent with results in previous work, where women biographies were found to contain more marriage-related events than men’s. 2. Sex-related content is more frequent in women biographies than men’s, while cognition-related content is more high- lighted in men biographies than women’s. 3. A strong bias in the linking patterns results in a network structure in which articles about men are disproportionately more central than articles about women. The main contributions of this work are methods to quantify gen- der bias in user generated content, a contextualization of differences found in terms of feminist theory, and a discussion of the implica- tions of our findings for informing policy design in Wikipedia. As said earlier, we focus on the English Wikipedia, but our methods are generalizable to other languages and platforms. 2. BACKGROUND Research on the community structure and evolution of Wikipedia has been prominent. In its first steps, the focus was on growth [2] and dynamics [41], without attention toward gender. Later, it was found that there is a gender gap, as Wikipedia has fewer contribu- tions from women, and women stop contributing earlier than men [29]. There are differences in how genders behave. For instance, men and women communicate differently in the inner communi- cation channels in Wikipedia [30]: they focus on different topics [29] and the level of content revision differs by gender but also by amount of activity [4]. In addition, Lam et al. [29] found that women are more reverted than men (i.e., their contributions are dis- carded), and reportedly women contribute less because of aggressive behavior toward them [14, 48]. Efforts have been made to build a more welcoming community and to encourage participation [33, 13], and Wikimedia itself encourages initiatives like WikiWomen’s Collaborative.2 Content-wise, the study of biographies in Wikipedia enables cul- tural comparisons of coverage [9], as well as the construction of social networks of historical (and current) figures [6]. Although bias in content has been addressed before through self-focus bias [23], such bias has been measured at large-scale only in terms of culture, not gender. Lam et al. [29] found that coverage of “female topics” was inferior to “male topics ” when classifying topics as “male” or “female” according to the people who contributed to them. Reagle and Rhue [42] found that in characterization of women, in com- parison to commercial encyclopedias like Britannica, Wikipedia has better coverage of notable profiles, although this coverage is quite low and it is still biased towards men. Bamman and Smith [7] found that women biographies are more likely to include marriage or divorce events. Addressing the gender gap from a content perspective may help to improve the quality and value of the content. Currently, focus on quality in Wikipedia has been about predicting article quality [3, 2http://meta.wikimedia.org/wiki/WikiWomen’s_Collaborative 19]. However, focusing on quality without considering readers does not give the whole picture, as Wikipedia readers are not necessarily interested in the same topics as contributors [31] and might have a different concept of quality. Moreover, in our context, Flekova, Ferschke, and Gurevych [19] found that quality of biographies is assessed differently depending on the gender of the portrayed person. Is it because the raters were biased? Or is it because biographies were written differently? Our hypothesis is that biographies are written differently, an idea inspired by seminal work about how women are characterized by language [28]. To study differences in text, word frequency is commonly used. Word frequency follows Zipf’s law [53, 45]. An interesting property of Zipf distributions in language is that small sets of words that are semantically or categorically related also follow a Zipf distribution [39]. This property implies that, given two subsets of words that are related semantically or categorically, their frequency distribu- tions can be compared. Thus, we compare frequency distributions according to gender for several semantic categories derived from the Linguistic Inquiry and Word Count (LIWC) dictionary. LIWC studies “emotional, cognitive, structural, and process components present in individuals’ verbal and written speech samples” [37]. It has been used to analyze interactions between Wikipedia contrib- utors [25] and article content with respect to emotions [16]. In a context similar to ours, Schmader, Whitehead, and Wysocki [44] used LIWC to quantify differences in characterization of women and men in recommendation letters. In our work, we quantify gender bias in Wikipedia’s character- ization of men and women through their biographies. To do so we approach three different dimensions of biographies, which we analyze in different sections on this paper: meta-data, provided by the structured version of Wikipedia, DBPedia [32]; language, considering how frequent are words and concepts [45]; and net- work structure. In terms of network structure, we build a biography network [6] in which we estimate PageRank, a measure of node centrality based on network connectivity [8, 20]. In similar contexts, PageRank has been used to provide an approximation of historical importance [6, 46] and to study the bias leading to the gender gap [46]. We measure bias in link formation by comparing the impor- tance given by PageRank in the biography network with those of null models, i. e., graphs that are unbiased by construction but that maintain certain properties of the source biography network. 3. DATASET To study gender bias in Wikipedia, we consider three freely avail- able data sources: 1. The DBPedia 2014 dataset [32].3 2. The Wikipedia English Dump of October 2014.4 3. Inferred gender for Wikipedia biographies by Bamman and Smith [7].5 DBPedia and Meta-data. DBPedia is a structured version of Wikipedia that provides meta-data for articles, normalized article URIs (Uniform Resource Identifiers), and normalized links between articles (taking care of redirections). It provides a shallow hierarchy of classes, which includes a Person category. To provide the struc- tured meta-data, DBPedia processes from the content of infoboxes in Wikipedia articles. Infoboxes are template-based specifications for specific kinds of articles. When DBPedia detects an infobox with a template that matches those of a person, it assigns the article to the Person class, and to a specific subclass if applicable (e. g., Artist). 3http://wiki.dbpedia.org/Downloads2014 4https://dumps.wikimedia.org/enwiki/20141008/ 5http://www.ark.cs.cmu.edu/bio/ Table 1: Number of biographies in the dataset for the Person class and its most common child classes (in terms of biographies with gen- der). In this and the following tables, we use this legend for p-values: *** p < 0.001, ** p < 0.01, * p < 0.05. Ontology Person Athlete Artist OfficeHolder Politician MilitaryPerson Scientist SportsManager Cleric Royalty Coach FictionalCharacter Noble Criminal Judge With gender % Women 15.53 8.94 25.14 13.04 8.75 1.67 8.79 0.62 6.34 35.24 2.40 26.08 23.16 12.45 14.88 893380 187828 79690 38111 32398 22769 15853 11255 8949 7054 5720 4023 3696 1976 1949 OutD. t 20.77*** 10.64*** 12.95*** 10.97*** 1.29 4*** 4.91*** 0.79 3.23** 0.55 0.27 3.03** 3.16** 1.08 3.93*** Len. t -2.65** -2.83** -0.33 3.77*** -4.02*** 1.03 -0.01 -2.79** 0.02 1.75 -2.65** 0.39 2.05* -1.69 2.97** Figure 2: Distribution of biographies according to birth year. Of the set of 1,445,021 biographies (articles in the DBPedia Person class), 893,380 (61.82%) have gender meta-data. Of those, only 15.5% are about women. The mean article length is 5,955 characters for men and 6,013 characters for women (a significant difference according to a t-test for independent samples: p < 0.01, Cohen’s d = 0.01). The mean out-degrees (number of links) of 42.1 for men and 39.4 for women also differ significantly (p < 0.001, Cohen’s d = 0.06). Table 1 displays the number of biographies in the Person class, as well as its most common subclasses. Of all biographies in the dataset, 61.82% have gender meta-data. From the table, in comparison to the global proportion of women, the following categories over-represent women: Artist, Royalty, FictionalCharacter, Noble, BeautyQueen, and Model. The others over-represent men. The differences in length and degree do not hold for all classes, hinting that a study according to semantic categories of people is needed. However, in this paper we focus on the global differences in Person. Distribution According to Date of Birth. Figure 2 displays the dis- tribution of biographies according to their corresponding birthYear property, considering only those biographies between years 1600 and 2000 (inclusive). This accounts for 65.48% of biographies with gender (note that 34.07% does not have date of birth in meta-data). The distribution per gender (top chart) shows that most of the bi- ographies of both genders are about people from modern times. The distribution of fraction of women per year (bottom chart) shows that since the year 1943 the fraction of women is consistently above the global value of 0.155. Note that, of the biographies that have date of Figure 1: Infobox from the biography article of Simone de Beauvoir. For instance, Figure 1 displays the infobox of Simone de Beauvoir. The infobox contains specific meta-data pertinent to a biography, such as date and place of birth, but it does not include gender (in specific cases it does, see “Inferred Gender” next). DBPedia maps infobox properties to specific fields in a person’s meta-data. These properties are not always available in the infobox templates, and do not always have a standardized name. DBPedia, whenever possible, normalizes both attribute keys and attribute values. Wikipedia Biographies. We consider two versions of the biogra- phies: the overview and the full text. We analyze both in different contexts: in the overview we analyze the full vocabulary employed, while in the full text we analyze only the words pertaining to the LIWC dictionaries. The overview is described by Wikipedia as “an introduction to the article and a summary of its most important as- pects. It should be able to stand alone as a concise overview.” Since those aspects are subjective, the introduction content is a good proxy for any potential biases expressed by Wikipedia contributors. At the same time we avoid potential noise included in the full biography text from elements like quotations and the filmography of a given actor/actress. In both cases (overview and full content), template markup is removed from analysis. Inferred Gender. To obtain gender meta-data for biographies, we match article URIs with the dataset by Bamman and Smith [7], which contains inferred gender for biographies based on the number of grammatically gendered words (i. e., he, she, him, her, etc.) present in the article text. Bamman and Smith [7] tested their method in a random set of 500 biographies, providing 100% precision and 97.6% recall. This method has also been used before by Reagle and Rhue [42] and DBPedia itself [32], making DBPedia to include gender meta-data in some cases. However, note that the genders considered in these datasets (and thus, in this work) are only male and female. 4. META-DATA PROPERTIES In our first analysis we estimate the proportion of women in Wikipedia. We analyze meta-data by comparing how men and women proportionally have several attributes in the data from DB- Pedia. Presence and Proportion According to Class. DBPedia estimates the length (in characters) and provides the connectivity of articles. Table 2: Proportion of men and women who have the specified attributes in their infoboxes. Proportions were tested with a chi- square test, with effect size estimated using Cohen’s w. birthName careerStation deathDate deathYear formerTeam numberOfMatches occupation position spouse team title years % Men % Women 11.46 1.13 19.35 25.45 0.24 1.06 23.28 1.68 6.86 1.97 19.65 1.12 4.01 8.95 32.82 44.68 4.40 8.60 12.52 13.62 1.56 14.06 9.17 8.95 χ2 4.84* 6.84** 5.53* 8.28** 3.94* 6.61* 4.97* 10.46** 4.10* 10.39** 5.59* 6.84** w 0.81 0.94 0.64 0.66 0.97 0.94 0.68 0.94 0.88 0.93 0.73 0.94 Figure 4: A density hexbin plot of word frequencies in men/women’s biographies (left), and the PDF of word frequency distribution ac- cording to gender (right). the most common class with the spouse attribute is Person, the reference class, with 45% of the instances of the attribute. 5. LANGUAGE PROPERTIES In this section we explore the characterization of women and men from a lexical perspective. We analyze the vocabulary used in the overview of each biography through word frequency, and we use the estimated frequencies to find which words are associated with each gender. To estimate relative frequencies, words were considered once per biography, and we estimated bi-gram word collocations to identify composite concepts (e. g., New York). We obtained a vocabulary of size Vm = 1,013,305 for men, Vw = 376,737 for women, with V = 272,006 common words. Figure 4 displays a density plot of word frequency, and the Prob- ability Density Functions (PDFs) for both genders. The frequency distributions are similar across genders. Word frequencies in the common vocabulary for both genders follow a Zipf distribution P (f ) ∼ f−α with similar exponents α ≈ 1.8, consistent with the value found by Serrano, Flammini, and Menczer [45]. In addition, frequency with respect to gender presents a high rank-correlation ρ = 0.65 (p < 0.001). For reference, consider that the inter- language rank correlation of words with the same meaning across languages is 0.54 [10]. This implies that words share meanings when referring to men and women. Associativity of Words with Gender. To explore which words are more strongly associated with each gender, we measure Pointwise Mutual Information [12] over the set of vocabulary in both genders. PMI is defined as: PMI(c, w) = log p(c, w) p(c)p(w) Figure 3: Relation between the cumulative fraction of women and the fraction of women per year (dots). The y-axis was truncated to 0.25 for clarity. birth in their meta-data, 53% are from 1943 until 2000. To explore the evolution of growth of women presence, in Figure 3 we display the relationship between the cumulative fraction of biographies and the yearly fraction of biographies of women. The chart includes a LOWESS6 fit of the data, to be able to see the tendency of changes in representation. This tendency became positive in the period 1750– 1800. These results are discussed in terms of historical significance in the discussion section. Infobox Attributes. Given that there are different classes of in- foboxes, there are many different meta-data attributes than can be included in biographies. In total, we identified 340 attributes. For each one of them, we counted the number of biographies that contained it, and then compared the relative proportions between genders with a chi-square test. Only 3.53% presented statistically significant differences. Those attributes are displayed in Table 2. All of them have large effect sizes (Cohen’s w > 0.5). Inspection allows us to make several observations: • Attributes careerStation, formerTeam, numberOfMatches, po- sition, team, and years are more frequent in men. All these attributes are related to sports, and thus, these differences can be explained by of the prominence of men in sports-related classes (e. g., Athlete, SportsManager and Coach in Table 1). • Attributes deathDate, deathYear are more frequent in men. According to Figure 2, most women are from recent times, and thus they are presumably still alive. • Attribute birthName is more frequent in women. Its values refer mostly to the original name of artists, and women have considerable presence in this class (see Table 1). In addi- tion, other possible explanation is that, in the case of married women, they usually change their surnames to those of their husbands. • Attributes occupation and title are more frequent in women. Title is a description of a person’s occupation (the most com- mon are Actor and Actress), while occupation is a DBPedia resource URI (e.g., http://dbpedia.org/resource/Actor). The infoboxes of sport-related biographies do not contain these attributes because their templates are already indicators of their occupations, and thus, athletes (which are mostly men) do not contain such attributes. The case of the spouse attribute is different. The inspection does not offer a direct explanation other than the tendency to include this attribute more in women biographies than in men’s. For instance, 6Locally weighted scatterplot smoothing. where c is a class (men or women), and w is a word. The probabilities can be estimated from the proportions of biographies about men Figure 5: Words most associated with women (left) and men (right), estimated with Pointwise Mutual Information. Font size is inversely proportional to PMI rank. Color encodes frequency (the darker, the more frequent). and women, and the corresponding proportions of words and bi- grams. Since PMI overweights words with very small frequencies, we consider only words that appear in at least 1% of men or women biographies. Associativity results are displayed as word clouds in Figure 5. The top-15 words associated to each gender are (relative frequency in parentheses): • Women: actress (15.9%), women’s (8.8%), female (5.6%), her husband (4.1%), women (5.3%), first woman (1.9%), film ac- tress (1.6%), her mother (1.8%), woman (4.4%), nee (3.6%), feminist (1%), miss (1.9%), model (3.3%), girls (1.5%) and singer (6.5%). • Men: played (14.2%), footballer who (3.0%), football (4.5%), league (5.9%), john (7.9%), major league (1.8%), football league (1.6%), college football (1.5%), son (7%), football player (2.2%), footballer (2%), served (11.7%), william (4.6%), national football (2%) and professional footballer (1%). Clearly, the words most associated with men are related to sports, football in particular, which refers to both popular sports of soccer and American football (recall from Table 1 that Athlete is the largest subclass of Person). For women, the most associated words are related to arts (recall from Table 1 that Artist is the second largest subclass of Person), gender (women’s, female, first woman, feminist), and family roles (her husband, her mother, nee7). This is consistent with the results from the meta-data analysis, where women are more likely to have a spouse attribute in their infoboxes (see Table 2), and with the results of Bamman and Smith [7]. Gender Differences in Semantic Categories of Words. Words most associated to each gender might belong to categories that are hard to compare, given their richness and complexity. We use the Linguistic Inquiry and Word Count dictionary of semantic categories to find if different genders have different characterizations according to those semantic categories. The LIWC dictionary includes, for each category (and its corresponding subcategories), a list of words and prefixes that match relevant words. We consider the following pertinent categories to our context: Social Processes, Cognitive Processes, Biological Processes, Work Concerns and Achievement Concerns. To generate the final dictionaries from the vocabulary, we matched the prefixes in our corpus and performed manual cleaning of noisy keywords like place names (e. g., Virginia matches virgin* from the sexual category), surnames (Lynch matches lynch* from the death category), and words with unrelated meanings. In total, our cleaned dictionary contained 2,877 words. 7Adjective used when giving a former name of a woman. To compare the distribution of words in the semantic categories, we employed two metrics: relative frequency in overviews, as pre- viously done with PMI, and burstiness in the full text. Word fre- quencies identify how language is used differently to characterize men and women in terms of semantic categories. However, word frequency alone does not give insights on how those semantic cate- gories portray a given biography, or in other words, the importance that editors give to those categories. Burstiness is a measure of word importance in a single document according to the number of times it appears within the document, under the assumption that important words appear more than once (they appear in bursts) when they are relevant in a given document. We use the definition of burstiness from Church and Gale [11]: B(w) = Ew(f ) Pw(f ≥ 1) where Ew(f ) is the mean number of occurrences of a given word w per document, and Pw(f ≥ 1) is the probability that w appears at least once in a document. The differences in frequency and burstiness are tested using the Mann-Whitney U test, which indicates if one population tends to have larger values than another. It is non- parametric, i. e., it does not assume normality. Differences in Frequency. Table 3 shows statistics related to word frequency in biography overviews for the LIWC categories. Note that, although the medians are very similar for each category, the U test compares differences in the distribution instead of differences in means or medians. If the test revealed significant differences, we calculated the common language effect size (ES) as the percentage of words that had a greater relative frequency for the dominant gender. Of the 20 categories under consideration, two of them (one top-level) shown significant differences between genders: cogmech (cognitive processes, ES = 63%) is dominated by men, while sexual (sexual processes, subcategory of biological processes, ES = 85%) is dominated by women. Differences in Burstiness. Burstiness distributions in full biogra- phies per semantic category are displayed in Table 4. There are three (two top-level) categories with significant differences, both dominated by men: cogmech (cognitive processes, ES = 60%), its subcategory cause (causal processes, ES = 71%), and work (work concerns, ES = 64%). Overview of Results. In summary, in this section we found that words have similar meaning when referring to both genders, that there are qualitative differences in words most associated to them, and that a small number of the semantic categories show significant differences. Although this implies more similarities than differences Table 3: Word frequency in biography overviews. For each LIWC category we report vocabulary size, median frequencies, the result of a Mann-Whitney U test, and the three most frequent words. M and W mean men and women, respectively. Category social – family – friend – humans cogmech – insight – cause – discrep – tentat – certain – inhib – incl – excl bio – body – health – sexual – ingest work achieve Category social – family – friend – humans cogmech – insight – cause – discrep – tentat – certain – inhib – incl – excl bio – body – health – sexual – ingest work achieve V Median (M) Median (W) 498 43 33 59 1045 354 182 57 151 110 229 7 6 638 193 274 105 122 570 364 0.04% 0.03% 0.05% 0.13% 0.02% 0.02% 0.02% 0.02% 0.01% 0.03% 0.01% 0.25% 0.11% 0.01% 0.01% 0.01% 0.00% 0.01% 0.04% 0.05% 0.05% 0.09% 0.05% 0.17% 0.02% 0.02% 0.02% 0.02% 0.01% 0.02% 0.01% 0.29% 0.07% 0.01% 0.01% 0.01% 0.01% 0.01% 0.03% 0.04% U -1.12 -0.85 -0.58 -1.34 2.04* 0.73 1.31 0.06 0.85 0.92 1.75 -0.06 0.48 -1.63 -0.60 -0.40 -3.02** -0.51 1.12 1.06 Top-3 (M) team (7.5%), son (7.0%), received (5.1%) son (7.0%), father (5.0%), family (3.9%) fellow (2.0%), friend (0.8%), partner (0.8%) people (2.4%), man (2.2%), children (1.8%) became (10.8%), known (9.8%), made (8.1%) became (10.8%), known (9.8%), become (2.2%) made (8.1%), since (6.2%), based (3.3%) outstanding (0.4%), wanted (0.3%), besides (0.3%) appeared (3.2%), mainly (0.9%), mostly (0.8%) law (2.7%), total (1.1%), completed (1.0%) held (4.2%), conservative (0.7%), control (0.5%) addition (1.5%), open (0.8%), close (0.6%) except (0.2%), whether (0.2%), vs (0.1%) life (3.9%), head (2.5%), living (1.1%) head (2.5%), body (0.6%), face (0.5%) life (3.9%), living (1.1%), hospital (0.9%) love (0.8%), passion (0.2%), gay (0.2%) water (0.4%), food (0.3%), cook (0.2%) career (9.5%), team (7.5%), worked (6.4%) won (8.7%), team (7.5%), worked (6.4%) Top-3 (W) daughter (6.8%), received (5.9%), role (5.8%) daughter (6.8%), family (4.7%), father (3.7%) fellow (1.8%), partner (1.1%), friend (0.8%) female (5.6%), women (5.3%), children (4.5%) known (10.3%), became (9.2%), since (8.1%) known (10.3%), became (9.2%), become (2.0%) since (8.1%), made (6.7%), based (4.2%) outstanding (0.5%), wanted (0.4%), hope (0.4%) appeared (6.8%), appearing (1.1%), mainly (0.8%) law (2.0%), ever (1.0%), completed (0.9%) held (3.1%), hold (0.6%), opposite (0.5%) addition (1.7%), open (1.0%), close (0.4%) except (0.2%), whether (0.1%), vs (0.1%) life (4.7%), love (1.9%), living (1.7%) head (1.5%), body (0.8%), face (0.6%) life (4.7%), living (1.7%), health (1.2%) love (1.9%), sex (0.5%), lesbian (0.3%) food (0.5%), water (0.4%), cook (0.3%) career (8.1%), worked (6.6%), school (6.1%) won (13.0%), worked (6.6%), team (5.5%) Table 4: Word burstiness in full biographies for LIWC categories. Columns are analog to Table 3. V Median (M) Median (W) 498 43 33 59 1045 354 182 57 151 110 229 7 6 638 193 274 105 122 570 364 1.21 1.31 1.23 1.35 1.12 1.13 1.15 1.10 1.12 1.11 1.10 1.27 1.27 1.26 1.27 1.24 1.27 1.29 1.23 1.15 1.22 1.35 1.26 1.44 1.12 1.12 1.13 1.14 1.10 1.10 1.10 1.29 1.20 1.25 1.26 1.24 1.31 1.24 1.20 1.15 U 0.21 -1.12 -1.06 -1.00 2.85** 1.75 2.17* -1.05 1.86 1.62 1.09 -0.45 0.48 1.87 1.24 1.33 -0.51 1.30 2.62** 0.54 Top-3 (M) band (3.63), team (3.38), game (2.95) family (1.85), father (1.75), son (1.64) friendly (1.86), buddy (1.66), guest (1.59) sir (2.39), human (2.02), man (2.02) open (2.37), law (2.36), decision (2.34) decision (2.34), logic (2.15), became (1.88) force (2.05), made (1.92), production (1.85) desir (1.49), outstanding (1.48), idealism (1.45) mysterium (1.96), puzzle (1.70), appeared (1.68) law (2.36), total (2.14), truth (1.50) fencing (2.28), security (1.92), defensive (1.89) open (2.37), inside (1.30), close (1.30) vs (2.17), versus (1.32), whether (1.31) choke (5.18), lymphology (3.50), pelvimeter (3.00) pelvimeter (3.00), hip (2.15), pee (2.03) choke (5.18), lymphology (3.50), chiropractic (2.92) gay (2.56), hiv (2.35), love (2.12) chew (2.39), cook (2.22), coke (2.11) gre (4.54), team (3.38), dotcom (2.98) team (3.38), win (3.19), king (2.64) Top-3 (W) team (3.40), women (3.14), role (2.96) family (2.02), mother (1.98), granny (1.87) guest (1.75), fellowship (1.54), buddy (1.53) women (3.14), mrs (2.33), lady (2.25) open (3.28), revelator (2.75), law (2.31) revelator (2.75), became (1.86), ponder (1.86) causation (2.29), outcome (2.04), production (1.82) outstanding (2.03), wanna (1.58), oughta (1.55) appeared (2.02), bet (1.67), overall (1.63) law (2.31), reality (1.55), total (1.52) fencing (2.20), safe (2.16), blocker (2.02) open (3.28), close (1.31), additive (1.30) vs (1.75), versus (1.35), whether (1.24) love (2.52), prostatic (2.50), hiv (2.33) prostatic (2.50), pelvimeter (2.00), tits (1.98) hiv (2.33), choke (2.32), insulin (2.16) love (2.52), prostatic (2.50), hiv (2.33) cookery (2.18), cooking (1.98), food (1.95) pce (18.67), team (3.40), award (3.40) team (3.40), award (3.40), best (2.72) in characterization of women and men, in the discussion section we elaborate over the importance of such differences and the implica- tions of these findings. 6. NETWORK PROPERTIES To study structural properties of biographies, we first built a di- rected network of biographies from the links between articles in the Person DBPedia class. This empirical network was compared with several null graphs that, by construction, preserve different known properties of the original network. This allows us to at- tribute observed structural differences between genders either to empirical fluctuations in such properties, such as the heterogeneous importance of historical figures, or to gender bias. To do so, we consider PageRank, a measure of node centrality based on network connectivity [8, 20]. Empirical Network and Null Models. We study the properties of the directed network constructed from the links between 893,380 biographical articles in the Person class. After removing 192,674 sin- gleton nodes, the resulting graph has 700,706 nodes and 4,153,978 edges. We use this graph to construct the following null models: • Random. We shuffle the edges in the original network. For each edge (u,v), we select two random nodes (i,j) and replace (u,v) by (i,j). The resulting network is a random graph with neither the heterogeneous degree distribution nor the clustered structure that the Wikipedia graph is known to have [54]. • In-Degree Sequence. We generate a graph that preserves the in-degree sequence (and therefore the heterogeneous in- degree distribution) of the original network by shuffling the sources of the edges. For each edge (u,v), we select a random node (i) and rewire (u,v) to (i,v). Each node has the same in-degree, or popularity, as the corresponding biography. • Out-Degree Sequence. We generate a graph that preserves the out-degree sequence (and therefore the out-degree distribu- tion) of the original network by shuffling the targets of the edges. For each edge (u,v) select a random node (j) and rewire (u,v) to (u,j). • Full Degree Sequence. We generate a graph that preserves both in-degree and out-degree sequences (and therefore both distributions) by shuffling the structure in the original network. For a random pair of edges ((u,v), (i,j)) rewire to ((u,j), (i,v)). We repeat this shuffling as many times as there are edges. We tested the differences between observed and null models using a Mann-Whitney U test, and found that the observed model is always significantly different (U values shown in Figure 6, p < 0.001 for all pairwise comparisons with the observed model, Holm-Sidak cor- rected). This implies a biased behavior that cannot be explained by any of the heterogeneities in the structure of the network preserved by the null models. For instance, even if men biographies tended to have more incoming links (as they do), or to be more densely clus- tered, those factors would not explain the lower centrality observed in women biographies. 7. DISCUSSION Even though we found more similarities than differences in char- acterization, in this section we contextualize those differences in social theory and history. We do this to understand why such differ- ences exist, and whether they can be attributed to bias in Wikipedia or to a reflection of western society. Meta-data. We found that there are statistically significant differ- ences in biographies of men and women. Most of them can be explained because of the different areas to which men and women belong (mostly sports and arts, respectively), as well as the recency of women profiles available on Wikipedia. Other differences, like article length and article out-degree, although significant, have very small effect sizes, and depend on the person class being analyzed. The greater frequency of the spouse attribute in women can be interpreted as specific gender roles attributed to women. A similar result on Implicit Association was obtained by Nosek, Banaji, and Greenwald [34], as they found that Internet visitors tended to asso- ciate women to family and arts. Arguably, an alternative explanation is that people in the arts could be more likely to marry a notable spouse than people in sports. Yet, we found that the most common class was the generic one not assigned to any of those categories. In terms of time, we found that the year 1943 marked a hit on the growth of women presence. According to Strauss and Howe [49], the post-war Baby Boomers generation started in 1943. The following generations are Generation X (1961–1981) and Millenials (1982–2004). The social and cultural changes embraced by people from those generations, plus the increased availability of secondary sources, might explain this growth. The growth started in dates nearby the French Revolution (1789–1799), where women had an important role, although they were oppressed after it [1]. During these years seminal works about feminist philosophy and women’s rights were published, like the works of Mary Wollstonecraft (1792) and Olympe de Gouges (1791). It is reasonable to assume that these historical events paved the way for women to become more notable. Language. We found that the words most associated with men are mostly about sports, while the words most associated with women are to arts, gender and family. Of particular interest are two con- cepts strongly associated with women: her husband and first woman. These results are arguably indicative of systemic bias: the usage of her husband was found in concordance with our meta-data re- sults and previous work by Bamman and Smith [7], and the already mentioned work on Implicit Association [34]. These results can be contextualized in terms of stereotyping theory [40], as they catego- rize women, either as norm breaking (being the first is an exception to the norm) or as with predefined roles (being wives). As Fiske and Neuberg [18] indicate in their continuum model of impression formation, such categorization makes individuals more prone to stereotyping than those who are not categorized. The usage of first woman might indicate notability, but it also has been seen as an indicator of gender bias, as indicated by the Bechdel-inspired Figure 6: Women fraction in top biographies sorted by PageRank. Note that although the in- and out-degree of each node is unchanged, the degree correlations and the clustering are lost. • Small World. We generate a undirected small world graph using the model by Watts and Strogatz [51]. This model inter- polates a random graph and a lattice in a way that preserves two properties of small world networks: average path length and clustering coefficient. All null models have the same number of nodes n = 700,706 and approximately the same mean degree k ≈ 4 as the empirical network. Gender, Link Proportions and Self-Focus Ratio. For each graph, we estimated the proportion of links from gender to gender, and we tested those proportions against the expected proportions of men and women present in the dataset using a chi-square test. Table 5 shows the results. None of the null models show any bias in link proportions. The observed graph, on the other hand, shows a signifi- cant difference in the proportion of links from women biographies. In particular, articles about women tend to link to other women biographies more than expected (χ2 = 40.54, p < 0.001, Cohen’s w = 0.76). Men biographies show a greater proportion of links to men and a lesser proportion to women than expected, but the difference is not statistically significant, although it has an impact on the estimated Self-Focus Ratio [23]. In our context, this ratio is defined as the relation between the sum of PageRank for men and the sum of PageRank for women. A SFR above 1 confirms the presence of self-focus, which, given the proportions of men and women in the dataset, is expected. In fact, given those proportions, the expected SFR is 5.41. Note that the null models have similar SFRs to the expected value, in contrast with the observed model with SFR of 6.55. Biography Importance. As an approximation for historical im- portance in our biography network we considered the ranking of biographies based on their PageRank values. To compare the observed distribution of PageRank by gender to those of the null models, we analyzed the fraction of women biogra- phies among the top-r articles by PageRank, for r ∈ [10, 700, 706] (i. e., we considered only nodes with edges). In the absence of any kinds of bias, whether endogenous to Wikipedia or exogenous, one would expect the fraction of women to be around 15% (the overall proportion of women biographies) irrespective of r. In the presence of correlations between popularity or historical importance and gen- der, we expect the ratio to fluctuate. But such fluctuations would also be observed in the null models. The results are shown in Figure 6. While the null models sta- bilize around the expected value by r ≤ 104, the proportion of women in the observed network reaches 15% only when the en- tire dataset is considered. This systematic under-representation of women among central biographies is not mirrored in the null models. Table 5: Comparison of the empirical biography network and the null models. M and W mean men and women, respectively. Nodes Edges Observed Small World Random In Deg. Seq. Out Deg. Seq. Full Deg. Seq. 693843 693843 693843 693843 693843 693843 4106916 2775372 4106916 4106916 4106916 4106916 Clust. Coeff. 0.16 0.16 0.00 0.00 0.00 0.00 Edges (M to M) 90.05% 84.45% 84.41% 85.36% 84.43% 85.34% Edges (M to W) χ2 (M to W) 9.95% 2.38 15.55% 0.00 15.59% 0.00 14.64% 0.06 15.57% 0.00 14.66% 0.06 Edges (W to M) 62.19% 84.15% 84.39% 85.27% 84.37% 85.39% Edges (W to W) χ2 (W to W) 37.81% 37.83*** 15.85% 0.01 15.61% 0.00 14.73% 0.05 15.63% 0.00 14.61% 0.06 SFR 6.55 5.41 5.41 5.75 5.42 5.74 Finkbeiner-test8 about scientific women, where it is explicitly men- tioned that an article about a woman does not pass the test if it mentions “How she’s the ‘first woman to . . . ”’ Despite being infor- mal, the Finkbeiner-test raises awareness on how gender becomes more important than the actual achievements of a person. To formalize the PMI analysis, we performed analysis based on semantic dictionaries of words. According to Nussbaum [35], one possible indicator of objectification is the “denial of subjectivity: the objectifier treats the object as something whose experience and feelings (if any) need not be taken into account.” This idea is supported as, in the overviews, men are more frequently described with words related to their cognitive processes, while women are more frequently described with words related to sexuality. In the full biography text, the cognitive processes and work concerns categories are more bursty in men biographies, meaning that those aspects of men’s lives are more important than others at the individual level. Presence and Centrality of Women. Women biographies tend to link more to other women than to men, a disproportion that might be related with women editing women biographies in Wikipedia, one of the reported interests of women editors [48]. Since we are consid- ering notable people, it is known that men and women’s networks evolve differently through their careers [26], not to mention the set of life-events that influence those changes like child-bearing and marriage (see a in-depth discussion by Smith-Lovin and McPherson [47]). Thus, link proportion between women cannot be attributed to bias in Wikipedia, as it seems to be more a reflection of what happens in the physical world. We found that network structure is biased in a way that gives more importance to men than expected, by comparing the distribution of PageRank across genders. The articles with highest centrality, or historical importance [6], tend to be predominantly about men, beyond what one could expect from the structure of the network. As shown in Figure 6, there are women biographies with high central- ity, but their presence is not a sign of an unbiased network: “the successes of some few privileged women neither compensate for nor excuse the systematic degrading of the collective level; and the very fact that these successes are so rare and limited is proof of their unfavorable circumstances” [15]. 7.1 Implications At this point, considering the gender gap that affects Wikipedia [24], it is pertinent to recall the concept of feminine mystique by Friedan [21], developed from the analysis of women’s magazines from the 50s in the United States, which were edited by men only. Fortunately, as discussed earlier, we have found women in different fields, mostly arts, in contrast to the “Occupation: Housewife” iden- tified by Friedan [21], as well as more similarities in characterization than differences. Moreover, the presence of women is increasing steadily and most of the differences found are not from an inherent bias in Wikipedia. Nevertheless, the identified language differences 8http://www.doublexscience.org/the-finkbeiner-test/ objectify women and the network structure diminishes their findabil- ity and centrality. Hence, the gender bias in Wikipedia is not just a matter of women participation in the community, because content and characterization of women is also affected. This is important, for example, because Wikipedia is used as an educational tool [27], and “children learn which behaviors are appropriate to each sex by observing differences in the frequencies with which male and female models as groups perform various responses in given situations” [38]. Editing Wikipedia and NPOV. Critics may rightly say that by relying on secondary sources, Wikipedia just reflects the biases found in them. However, editors are expected to write in their own words, “while substantially retaining the meaning of the source material”9, and thus, the differences found in terms of language that objectify women are chosen explicitly by them. In this aspect, Wikipedia should provide tools that help editors to reduce sexism in language, for instance, by considering already existing manuals like [5]. Furthermore, their neutral point of view guidelines should be updated to explicitly include gender bias, because biased language is a clear violation of their guidelines. Affirmative Action for Women in Notability Guidelines. The current notability guidelines for biographies in Wikipedia state: “1. The person has received a well-known and significant award or honor, or has been nominated for one several times. 2. The person has made a widely recognized contribution that is part of the enduring historical record in his or her specific field.”10 However, the boundary between not being notable according to sources and exclusion from history is blurred when evaluating the notability of women. For instance, consider a discussion about women in philosophy: “Feminist historians of philosophy have argued that the historical record is incomplete because it omits women philosophers, and it is biased because it devalues any women philosophers it forgot to omit. In addition, feminist philosophers have argued that the philosophical tradition is conceptually flawed because of the way that its fundamental norms like reason and objectivity are gendered male” [52]. Women, specially in historical contexts before 1943, should be targeted by affirmative actions that would allow them to appear in the content if they are not there, and be linked from other articles. We acknowledge that this is not easy, because relaxing notability guidelines can open the door to original research, which is not allowed. However, a correctly defined affirmative strategy would allow to grow the proportion of women in Wikipedia, make women easier to find, both through search (as it increases relevance) and exploratory browsing. 7.2 Summary, Limitations and Future Work We studied gender bias in Wikipedia biographies. Our results indicate significant differences in meta-data, language, and network 9https://en.wikipedia.org/wiki/Wikipedia:No_original_ research #Any_biography 10https://en.wikipedia.org/wiki/Wikipedia:Notability_(people) structure that can be attributed not only to the mirroring of the offline world, but also to gender bias endogenous to content generation in Wikipedia. Our contribution is a set of methodologies that detect and quantify gender bias with respect to content and structure, as well as a contextualization of the differences found in terms of feminist theory. As concluding remark, we discussed that Wikipedia may wish to consider revising its guidelines, both to account for the non-findability of women and to encourage a less biased use of language, which is a violation of its neutral point of view guideline. Limitations. Our study has two main limitations. First, our focus is on the English Wikipedia, which is biased towards western cultures. However, a parallel work to ours by Wagner et al. [50] focused on hyperlingual quantitative analysis, and obtained similar results for other languages. Our methods can be applied in other contexts given the appropriate dictionaries with semantic categories, although our discussion remains to be applied, as it is culture-dependent. The second limitation is a binary gendered view, but we believe this is a first step towards analyzing the gender dimension in content from a wider perspective, given the social theory discussion we have made. Future Work. At least three areas are ripe for further work. The first is the construction of editing tools for Wikipedia that would help editors detect bias in content, and suggest appropriate actions. The second is a study of individual differences among contributors, as our work analyzed user generated content without considering who published and edited it. This aspect can be explored by analyzing how contributors discuss and edit content based on their gender and other individual factors. The last area is a further exploration of bias considering more fine-grained ontology classes and meta- data attributes. For instance, it may be possible that gender bias is stronger or weaker for different ontology classes (e.g., Scientist vs. Artist) or in biographies of people from different regions and religions. Finally it would be helpful to study whether gender bias depends on the quality of an article: does bias decrease with increasing number of edits or other measures of article maturity? Acknowledgments. We thank Daniela Alarcón for fruitful discus- sion and Luca Chiarandini for tool code. This work was partially funded by Grant TIN2012-38741 (Understanding Social Media: An Integrated Data Mining Approach) of the Min. of Economy and Competitiveness of Spain. References [1] Jane Abray. “Feminism in the French Revolution”. In: The American Historical Review (1975), pp. 43–62. [2] Rodrigo Almeida, Barzan Mozafari, and Junghoo Cho. “On the Evolution of Wikipedia.” In: International Conference on Weblogs and Social Media. 2007. [3] Maik Anderka, Benno Stein, and Nedim Lipka. “Predicting quality flaws in user-generated content: the case of Wikipedia”. In: Proceedings of the 35th international ACM SIGIR confer- ence on Research and development in information retrieval. ACM. 2012, pp. 981–990. Judd Antin et al. “Gender differences in Wikipedia editing”. In: Proceedings of the 7th International Symposium on Wikis and Open Collaboration. ACM. 2011, pp. 11–14. [4] [5] APA. “Publication Manual of the American Psychological Association”. In: Sixth. American Psychological Association, 2000. Chap. General Guidelines for Reducing Bias. [7] David Bamman and Noah A Smith. “Unsupervised Discovery of Biographical Structure from Text”. In: Transactions of the Association for Computational Linguistics 2 (2014), pp. 363– 376. [8] Sergey Brin and Lawrence Page. “The anatomy of a large- scale hypertextual Web search engine”. In: Computer net- works and ISDN systems 30.1 (1998), pp. 107–117. [9] Ewa S Callahan and Susan C Herring. “Cultural bias in Wikipedia content on famous persons”. In: Journal of the American society for information science and technology 62.10 (2011), pp. 1899–1915. [10] Andreea S Calude and Mark Pagel. “How do we use lan- guage? Shared patterns in the frequency of word use across 17 world languages”. In: Philosophical Transactions of the Royal Society of London B: Biological Sciences 366.1567 (2011), pp. 1101–1107. [11] Kenneth W Church and William A Gale. “Poisson mixtures”. In: Natural Language Engineering 1.02 (1995), pp. 163–190. [12] Kenneth Ward Church and Patrick Hanks. “Word association norms, mutual information, and lexicography”. In: Computa- tional linguistics 16.1 (1990), pp. 22–29. [13] Giovanni Luca Ciampaglia and Dario Taraborelli. “Mood- Bar: Increasing new user retention in Wikipedia through lightweight socialization”. In: arXiv preprint arXiv:1409.1496 (2014). [14] Benjamin Collier and Julia Bear. “Conflict, criticism, or confidence: an empirical examination of the gender gap in Wikipedia contributions”. In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM. 2012, pp. 383–392. [15] Simone De Beauvoir. The second sex. Random House LLC, 2012. [16] Michela Ferron and Paolo Massa. “Psychological processes underlying Wikipedia representations of natural and man- made disasters”. In: Proceedings of the Eighth Annual Inter- national Symposium on Wikis and Open Collaboration. ACM. 2012, p. 2. [17] Amanda Filipacchi. “Wikipedia’s sexism toward female nov- elists”. In: The New York Times, April 28th, 2013 (2013). [18] Susan T Fiske and Steven L Neuberg. “A continuum of im- pression formation, from category-based to individuating processes: Influences of information and motivation on atten- tion and interpretation”. In: Advances in experimental social psychology 23 (1990), pp. 1–74. [19] Lucie Flekova, Oliver Ferschke, and Iryna Gurevych. “What makes a good biography?: multidimensional quality analysis based on Wikipedia article feedback data”. In: Proceedings of the 23rd international conference on World wide web. Inter- national World Wide Web Conferences Steering Committee. 2014, pp. 855–866. [20] S. Fortunato et al. “On local estimations of PageRank: A mean field approach”. In: Internet Mathematics 4.2–3 (2007), pp. 245–266. DOI: 10.1080/15427951.2007.10129294. [6] Pablo Aragón et al. “Biographical social networks on Wikipedia: a cross-cultural study of links that made history”. In: Pro- ceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration. ACM. 2012, p. 19. [22] [21] Betty Friedan. The feminine mystique. WW Norton & Com- pany, 2010. Jim Giles. “Internet encyclopaedias go head to head”. In: Nature 438.7070 (2005), pp. 900–901. [40] Felicia Pratto, Peter J Hegarty, and Josephine D Korchmaros. “How communication practices and category norms lead peo- ple to stereotype particular people and groups”. In: Stereo- type dynamics: Language based approaches to the formation, maintenance, and transformation of stereotypes (), pp. 293– 313. Jacob Ratkiewicz et al. “Characterizing and modeling the dynamics of online popularity”. In: Physical review letters 105.15 (2010), p. 158701. Joseph Reagle and Lauren Rhue. “Gender bias in Wikipedia and Britannica”. In: International Journal of Communication 5 (2011), p. 21. [41] [42] [43] Roy Rosenzweig. “Can history be open source? Wikipedia and the future of the past”. In: The Journal of American History 93.1 (2006), pp. 117–146. [44] Toni Schmader, Jessica Whitehead, and Vicki H Wysocki. “A linguistic comparison of letters of recommendation for male and female chemistry and biochemistry job applicants”. In: Sex Roles 57.7-8 (2007), pp. 509–514. [45] M Ángeles Serrano, Alessandro Flammini, and Filippo Menczer. “Modeling statistical properties of written text”. In: PloS ONE 4.4 (2009), e5372. [46] Steven S. Skiena and Charles B. Ward. Who’s Bigger?: Where Historical Figures Really Rank. Cambridge Univ. Press, 2014. [47] Lynn Smith-Lovin and J Miller McPherson. “You are who you know: A network approach to gender”. In: Theory on gender/feminism on theory (1993), pp. 223–51. [48] Sarah Stierch. Women and Wikimedia Survey 2011. https: / / meta . wikimedia . org / wiki / Women _ and _ Wikimedia _ Survey_2011. [Online; accessed April 2015]. 2013. [49] William Strauss and Neil Howe. Generations: The history of America’s future, 1584 to 2069. Morrow New York, NY: 1991. [50] Claudia Wagner et al. “It’s a Man’s Wikipedia? Assessing Gender Inequality in an Online Encyclopedia”. In: arXiv preprint arXiv:1501.06307 (2015). [51] Duncan J Watts and Steven H Strogatz. “Collective dynam- ics of ‘small-world’ networks”. In: Nature 393.6684 (1998), pp. 440–442. [52] Charlotte Witt and Lisa Shapiro. “Feminist History of Philos- ophy”. In: The Stanford Encyclopedia of Philosophy. Ed. by Edward N. Zalta. Winter 2014. 2014. [53] George Kingsley Zipf. Human behavior and the principle of least effort. Addison-Wesley Press, 1949. [54] Vinko Zlati´c et al. “Wikipedias: Collaborative web-based encyclopedias as complex networks”. In: Physical Review E 74.1 (2006), p. 016115. [23] Brent Hecht and Darren Gergle. “Measuring self-focus bias in community-maintained knowledge repositories”. In: Proceed- ings of the fourth international conference on Communities and technologies. ACM. 2009, pp. 11–20. [24] Benjamin Mako Hill and Aaron Shaw. “The Wikipedia Gen- der Gap Revisited: Characterizing Survey Response Bias with Propensity Score Estimation”. In: PloS ONE 8.6 (2013), e65782. [25] Daniela Iosub et al. “Emotions under discussion: Gender, status and communication in online collaboration”. In: PloS ONE 9.8 (2014), e104880. Jerry A Jacobs. Revolving doors: Sex segregation and women’s careers. Stanford University Press, 1989. [26] [27] Piotr Konieczny. “Teaching with Wikipedia and other Wiki- media foundation wikis”. In: Proceedings of the 6th Interna- tional Symposium on Wikis and Open Collaboration. ACM. 2010, p. 29. [28] Robin Tolmach Lakoff. “Language and woman’s place”. In: Language in Society 2, No. 1, Apr. (1973), pp. 45–80. [29] Shyong Tony K Lam et al. “WP: clubhouse?: an exploration of Wikipedia’s gender imbalance”. In: Proceedings of the 7th International Symposium on Wikis and Open Collaboration. ACM. 2011, pp. 1–10. [31] [30] David Laniado et al. “Emotions and dialogue in a peer- production community: the case of Wikipedia”. In: Proceed- ings of the Eighth Annual International Symposium on Wikis and Open Collaboration. ACM. 2012, p. 9. Janette Lehmann et al. “Reader preferences and behavior on Wikipedia”. In: Proceedings of the 25th ACM conference on Hypertext and Social Media. ACM. 2014, pp. 88–97. Jens Lehmann et al. “DBpedia - A Large-scale, Multilingual Knowledge Base Extracted from Wikipedia”. In: Semantic Web Journal (2014). Jonathan T Morgan et al. “Tea and sympathy: crafting positive new user experiences on Wikipedia”. In: Proceedings of the 2013 conference on Computer supported cooperative work. ACM. 2013, pp. 839–848. [32] [33] [34] Brian A Nosek, Mahzarin Banaji, and Anthony G Greenwald. “Harvesting implicit group attitudes and beliefs from a demon- stration web site.” In: Group Dynamics: Theory, Research, and Practice 6.1 (2002), p. 101. [35] Martha C Nussbaum. “Objectification”. In: Philosophy & Public Affairs 24.4 (1995), pp. 249–291. [36] Chitu Okoli et al. “Wikipedia in the eyes of its beholders: A systematic review of scholarly research on Wikipedia readers and readership”. In: Journal of the American Society for Information Science and Technology (2014). James W Pennebaker, Martha E Francis, and Roger J Booth. “Linguistic inquiry and word count: LIWC 2001”. In: Mah- way: Lawrence Erlbaum Associates 71 (2001), p. 2001. [37] [38] David G Perry and Kay Bussey. “The social learning theory of sex differences: Imitation is alive and well.” In: Journal of Personality and Social Psychology 37.10 (1979), p. 1699. [39] Steven T Piantadosi. “Zipf’s word frequency law in natural language: A critical review and future directions”. In: Psy- chonomic bulletin & review (2014), pp. 1–19.
1706.06253
1
1706
2017-06-20T03:19:33
Social Events in a Time-Varying Mobile Phone Graph
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
The large-scale study of human mobility has been significantly enhanced over the last decade by the massive use of mobile phones in urban populations. Studying the activity of mobile phones allows us, not only to infer social networks between individuals, but also to observe the movements of these individuals in space and time. In this work, we investigate how these two related sources of information can be integrated within the context of detecting and analyzing large social events. We show that large social events can be characterized not only by an anomalous increase in activity of the antennas in the neighborhood of the event, but also by an increase in social relationships of the attendants present in the event. Moreover, having detected a large social event via increased antenna activity, we can use the network connections to infer whether an unobserved user was present at the event. More precisely, we address the following three challenges: (i) automatically detecting large social events via increased antenna activity; (ii) characterizing the social cohesion of the detected event; and (iii) analyzing the feasibility of inferring whether unobserved users were in the event.
cs.SI
cs
Social Events in a Time-Varying Mobile Phone Graph Carlos Sarraute Grandata Labs [email protected] Klaus Wehmuth LNCC [email protected] Jorge Brea Grandata Labs Javier Burroni Grandata Labs [email protected] [email protected] Artur Ziviani LNCC [email protected] J.I. Alvarez-Hamelin UBA -- CONICET [email protected] 7 1 0 2 n u J 0 2 ] I S . s c [ 1 v 3 5 2 6 0 . 6 0 7 1 : v i X r a Introduction The large-scale study of human mobility has been signifi- cantly enhanced over the last decade by the massive use of mobile phones in urban populations [1, 2]. Studying the ac- tivity of mobile phones allows us, not only to infer social networks between individuals, but also to observe the move- ments of these individuals in space and time [4]. In this work, we investigate how these two related sources of in- formation can be integrated within the context of detecting and analyzing large social events. We show that large social events can be characterized not only by an anomalous in- crease in activity of the antennas in the neighborhood of the event, but also by an increase in social relationships of the attendants present in the event. Moreover, having detected a large social event via increased antenna activity, we can use the network connections to infer whether an unobserved user was present at the event. More precisely, we address the following three challenges: (i) automatically detecting large social events via increased antenna activity; (ii) character- izing the social cohesion of the detected event; and (iii) an- alyzing the feasibility of inferring whether unobserved users were in the event. Data Source and Methodology Our data source is an anonymized traffic dataset from a mobile phone operator in Argentina, collected mostly in the Buenos Aires metropolitan area, over a period of 5 months. The raw data logs contain about 50 million calls per day. Call Detail Records (CDR) are an attractive source of loca- tion information since they are collected for all active cel- lular users (about 40 million users in Argentina). Further, additional uses of CDR data incur little marginal cost. Together with the location of the clients of the mobile phone network, the CDRs allow us to reconstruct a social graph derived from the communications among users. We first define a contact graph G composed of all users partici- pating in the mobile network, where an edge between users exist if they have communicated at any point within the 5 months period. We note that G includes non client users that have communicated with client users. Then, we define a time series of subgraphs of G composed only of users present at a given location at a given time. In this work, these subgraphs are restricted to client nodes (users for which we have mobility data) using the event an- tenna at a specified day, for a given time window. Note that the existence of a link between such nodes in any subgraph depends on whether there is a link between them in G. These subgraphs allow us to focus on the social dynamics of a set of users present at a particular location at a given time as is the case of client users attending a large-scale event. We formalize this temporal sequence of subgraphs within the context of a Time-Varying Graph (TVG) based on the representation encountered in [6]. We consider a TVG as an object H = (V, E, T ), where V is a vertex set, T is a time instant set, and E is an edge set. In this context, an edge e ∈ E is primarily a quadruple of the form (cid:104)u, ta, v, tb(cid:105), where u, v ∈ V are vertices and ta, tb ∈ T are time instants. In this representation, an edge (cid:104)u, ta, v, tb(cid:105) then shows a relation between vertex u at time ta and vertex v at time tb, i.e. a directed relation, where the pair (cid:104)u, ta(cid:105) is the origin and the pair (cid:104)v, tb(cid:105) is the destination. Note that the represented relation is between the composite objects u = (cid:104)u, ta(cid:105) and v = (cid:104)v, tb(cid:105). In this representation, a TVG edge e ∈ E ⊂ V × T × V × T can be thus seen as an ordered pair (cid:104)u, v(cid:105) ∈ (V × T ) × (V × T ) of composite vertices. In this work, each edge in a subgraph is represented as a tuple (cid:104)(x, tx), (y, ty)(cid:105), where user x is the caller, user y is the callee, tx = ty is the date and time of the call. In addition to the origin and destination composite vertices present on the TVG edge, we also wish to identify the local base station antenna (BSA) used on the call represented by each TVG edge. In order to achieve this, we represent the BSA identity as an edge attribute, so that the TVG edge used in this particular work becomes an ordered 5-tuple of the format (cid:104)x, tx, y, ty, l(cid:105) where in addition to the known edge elements, l represents the BSA identity. Automatic Event Detection In this section, we show how we can use the mobile phone data in an endogenous manner to detect past events auto- matically (as [3, 5] did with social media such as Twitter). The events we are interested in involve a large amount of people, hence they significantly increase the usage demand of antennas nearby, as evidenced by their traffic time series. Our strategy thus is to locate time windows where the an- tenna activity is significantly higher than some appropriate baseline. Defining an appropriate activity baseline is not a trivial task since this is possibly dependent on the size of the event one is trying to detect and on the regularity of the normal antenna activity patterns. In this work, the antennas activity is given by the number of calls per hour registered in each antenna, according to the week wi (0 ≤ i < n, where n is the number of weeks in the studied dataset), the day of the week dj (0 ≤ j ≤ 6), and the hour of the day hk (0 ≤ k ≤ 23). For each time slot (wi, dj, hk), we denote the number of calls as C(i,j,k) which we then normalise be the average activity over a period of 3 months, defining an event index E(i,j,k) given by (cid:80) E(i,j,k) = 1 n C(i,j,k) (cid:96) C((cid:96),j,k) for the ith week in the 3 month period, jth day of the week, kth hour of the day, and where (cid:96) sums over all weeks in the whole time period considered (0 ≤ (cid:96) < n). Figure 1 shows the event index E for an antenna near the stadium of River Plate, a major soccer team in Buenos Aires, for each time slot (hour) from January 1 to March 31, 2012. We consider a large-scale event to have occurred when the event index is within the highest 99-percentile while considering the whole 3 months period. During January and February, we observe the event in- dex smoothly oscillating around the mean value except for small sharp increases due to normal peak daily activity. As we approach March, the oscillations' amplitude starts to in- crease reaching its peak value by mid March. On top of this large oscillations we see very large sharp peaks reach- ing values of E = 9.98 on March 20. Additional high peaks are also observed on March 7, 9, 10, 12, 14, 15, 17, and 18. Retrospectively, we corroborated that a sequence of 9 Roger Waters concerts took place at this location during March on the same days of the observed peaks. We thus highlight that the event index has clearly spotted the Roger Waters events on the exact days the concerts took place. An open question is to understand the slight increase in the background oscillation during these peak periods. A plausible explanation is an increase in activity due to gath- erings before the event (e.g., fans trying to get tickets, or- ganizers working at the stadium, January and February are vacations month in Argentina, etc.) or it might be a sta- tistical fluctuation one could verify if one had access to a much longer dataset. In any case, further study of this back- ground activity can prove very useful, for instance, allowing for the forecasting of large-scale events. Identifying these early precursors could allow us not only to automatically detect events retrospectively, but also give us the possibility of anticipating a future event. Social Dimension of Events Having detected a large-scale event, we now take a look at social relationships of users attending these events. We con- sider all communications from the event antenna for a pe- riod of 5 months from November 1, 2011 to March 31, 2012, therefore including the Roger Waters concert series from March 7 -- 20, 2012. For each day, we compute the implicit social subgraph induced by G restricted to users observed at the event antenna during the time window from 18:00 to 22:00 (time window for the Roger Waters concerts). Figure 2 shows the induced subgraphs for February 7 and 17, in which no event took place (a, b), along with March 7 and 17 for which two Roger Waters concerts took place (c, d). The total number of nodes on February 7 and 17 were 107 and 130, respectively, whereas on March 7 and 17 we observe 716 and 740 attenders, respectively. Most nodes are singlets and are thus not shown in the plots, leaving only nodes for whom at least one of his/her contacts in G was also present at the event location, at the same day, and during the defined time window. Therefore, one can expect that it is somewhat likely that the nodes present in these subgraphs are attending this lo- cation together. We call these nodes social attenders and all nodes, singlets included, attenders. An immediate observa- tion is the larger number of social attenders at the days of the concerts than on a normal day. This is expected given the larger attendance during the event. More interestingly, for the days of the event, especially on March 17, we observe more complex group relationships of up to 7 nodes, possi- bly indicating larger groups of people attending the concert together. (a) Feb 7 (b) Feb 17 (c) March 7 (d) March 17 Figure 2: Implicit social graphs: (a), (b) two days with no large event; (c), (d) two days of the Roger Waters concerts. Probability of Being in an Event The increased social structure suggested in Fig. 2 motivates the following question: can we estimate the probability that a user attended the event, given that k of his/her contacts in graph G also attended the event? We compute this prob- ability as follows: p(x ∈ Uk contacts ∈ U ) = users ∈ U with k contacts ∈ U users with k contacts ∈ U , Figure 1: Event index E for an antenna near the River Plate soccer stadium. where U is the set of all users in the event. The results are shown in Fig. 3, where we also plot a linear regression curve showing how strongly the expectation of finding a user in the event depends on the amount of graph contacts this user has in the event. The scatter plot and the regression curve (R = 0.83) show that the probability that a given user attended the event grows linearly with the number of his/her contacts in the event. If several of the user contacts in G represent real social relationships, such as friends or family members, and a significant fraction of such contacts Jan2012FebMarApr0246810Event Index E are in a social event, such as a music concert, one could expect an increase in the likelihood the user is also attending the event. Nevertheless, it is worth noticing that the linear relation does no saturate even for high values of k. Figure 3: Scatter plot and linear regression curve for the conditional probability of a user being in an event given that k of his/her contacts in graph G were in the event. We also computed the ratio between the number of users in the event and the number of users with contacts in the event (such users can be at the event or not), both having at least K contacts in the event U . This ratio is displayed in Fig. 4, which can be interpreted as the conditional probabil- ity that a user is in the event given that at least K of his/her contacts are in the event, as a function of K. This proba- bility remarks the social character of the event because, as the number of contacts in the event increases, the probabil- ity of users with such contacts also increases up to K = 10. Then, it starts to decrease due to the less significant pro- portion of people with more than 10 contacts. Notice that the sample space, where each probability is taken, is defined independently for each K. Figure 4: Probability of a user being in the event U , given the user has at least K contacts in the event. Conclusion and Future Work In this work, we have shown how we can combine the mobil- ity and social network information present in mobile phone datasets to detect large social events and characterize their social features, such as an increase in local community struc- tures of users present at an event. We have also shown that it is plausible to infer the probability of a user (in the con- tact graph) attending an event, given the number of his/her contacts who attended the event. Finding useful inference algorithms of users attendance to a particular location given the mobility of their contacts can be of tremendous use for mobile phone companies. Mobile phone carriers have no mobility information about users in the contact graph G who are not clients of the carrier. There- fore, having the possibility of making at least weak inferences about the locations and mobility of these users can add a valuable dimension for the carrier to better understand these (non client) users. We have presented this work within the formalism of time- varying graphs (TVG). Even though this work has not yet explored the potential uses of the TVG to analyse the dy- namics of the graph structure, we believe this is a useful formalism to extend this work into further understanding the changes in social dynamic networks as one approaches large-scale events. Acknowledgements Authors are grateful to the STIC-AmSud program. Brazil- ian authors thank CAPES, CNPq, FAPERJ, and FINEP for their support. 1. REFERENCES [1] R. Becker, R. C´aceres, K. Hanson, S. Isaacman, J. M. Loh, M. Martonosi, J. Rowland, S. Urbanek, A. Varshavsky, and C. Volinsky. Human mobility characterization from cellular network data. Communications of the ACM, 56(1):74 -- 82, Jan. 2013. [2] F. Calabrese, L. Ferrari, and V. D. Blondel. Urban sensing using mobile phone network data: A survey of research. ACM Computing Surveys, 47(2):25:1 -- 25:20, Nov. 2014. [3] F. C. T. Chua and S. Asur. Automatic summarization of events from social media. In International AAAI Conference on Weblogs and Social Media -- ICWSM, 2013. [4] N. Ponieman, A. Salles, and C. Sarraute. Human mobility and predictability enriched by social phenomena information. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pages 1331 -- 1336. ACM, 2013. [5] A. Ritter, O. Etzioni, S. Clark, et al. Open domain event extraction from twitter. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1104 -- 1112. ACM, 2012. [6] K. Wehmuth, A. Ziviani, and E. Fleury. A Unifying Model for Representing Time-Varying Graphs. Technical Report RR-8466, INRIA, Feb. 2014. 024681012141618Number of contacts in event0.000.050.100.150.200.250.300.35Probability of x∈ event024681012141618K (contacts ∈U)0.050.000.050.100.150.200.25p(x∈Ux with k≥K contacts)
1912.02484
1
1912
2019-12-05T10:33:41
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions
[ "cs.SI", "cs.IR" ]
Despite the significant efforts made by the research community in recent years, automatically acquiring valuable information about high impact-events from social media remains challenging. We present EviDense, a graph-based approach for finding high-impact events (such as disaster events) in social media. One of the challenges we address in our work is to provide for each event a succinct keyword-based description, containing the most relevant information about it, such as what happened, the location, as well as its timeframe. We evaluate our approach on a large collection of tweets posted over a period of 19 months, using a crowdsourcing platform. Our evaluation shows that our method outperforms state-of-the-art approaches for the same problem, in terms of having higher precision, lower number of duplicates, and presenting a keyword-based description that is succinct and informative. We further improve the results of our algorithm by incorporating news from mainstream media. A preliminary version of this work was presented as a 4-pages short paper at ICWSM 2018.
cs.SI
cs
EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions OANA BALALAU, Inria and École Polytechnique, France CARLOS CASTILLO, Universitat Pompeu Fabra, Spain MAURO SOZIO, Télécom Paris University, France Despite the significant efforts made by the research community in recent years, automatically acquiring valu- able information about high impact-events from social media remains challenging. We present EviDense, a graph-based approach for finding high-impact events (such as disaster events) in social media. One of the challenges we address in our work is to provide for each event a succinct keyword-based description, contain- ing the most relevant information about it, such as what happened, the location, as well as its timeframe. We evaluate our approach on a large collection of tweets posted over a period of 19 months, using a crowdsourc- ing platform. Our evaluation shows that our method outperforms state-of-the-art approaches for the same problem, in terms of having higher precision, lower number of duplicates, and presenting a keyword-based description that is succinct and informative. We further improve the results of our algorithm by incorporating news from mainstream media. A preliminary version of this work was presented as a 4-pages short paper at ICWSM 2018 [4]. CCS Concepts: • Information systems → Social networks; Data mining; • Mathematics of computing → Graph algorithms; Additional Key Words and Phrases: Event detection, crisis event, weighted quasi-clique 1 INTRODUCTION Social media have been playing increasingly a major role during crises and disasters. For example, the American Red Cross (ARC) pointed out the effectiveness of social media and mobile apps in handling emergency situations such as those generated by a disaster event (e.g. earthquakes, mass shootings, etc.)1. Automatically acquiring valuable information about high-impact events from social media would be extremely valuable, however, it presents non-trivial challenges. Social content is often noisy, inconsistent and ambiguous. Tweets, for example, are short and written by non-experts using informal language while containing typos and abbreviations. Moreover, relevant information is often intertwined with noisy or non-interesting content such as spam or posts by so-called Twitter bots. Another additional difficulty when analyzing data from Twitter lies on the fact that not all tweets are publicly available, with only a small fraction of them being accessible through rate-limited APIs. Indeed, despite the significant efforts made by the research community -- see, e.g., surveys [3, 5, 11] -- automatically acquiring valuable information about high-impact events from social media remains challenging. 1http://www.redcross.org/news/press-release/More-Americans-Using-Mobile-Apps-in-Emergencies Authors' addresses: Oana Balalau, Inria and École Polytechnique, France, [email protected]; Carlos Castillo, Universitat Pompeu Fabra, Spain, [email protected]; Mauro Sozio, Télécom Paris University, France, [email protected]. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). © 2019 Copyright held by the owner/author(s). XXXX-XXXX/2019/12-ART https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: December 2019. 2 Oana Balalau, Carlos Castillo, and Mauro Sozio One of the challenges we address in our work is how to provide a succinct keyword-based description of high-impact events containing the most relevant information about the events, such as what happened, where, and when. According to a survey by the US Congressional Service, the administrative cost for monitoring multiple social media sources, which typically produce large amounts of noisy data, is significant [16]. Therefore, in order to alleviate the burden of analyzing social content, a succinct and informative description of the events is needed. Our approach consists of the following steps: i) filtering of the tweets by retaining only those containing at least one term in a given lexicon. In our work, we use the lexicon constructed in Olteanu et al. [22] which contains terms related to disaster events, however, any lexicon can be used; ii) finding locations whose number of occurrences in tweets deviates significantly on a given time window from their expected frequency; iii) a graph mining approach for selecting the relevant keywords in the description, based on a novel definition of a clique and a quasi-clique in a weighted graph. To ensure that the description is succinct we enforce an upper bound (specified in input) on the number of keywords to be selected. We call our approach EviDense, as our graph mining approach is based on finding "dense" re- gions in the graph representing the co-occurrence of keywords in the tweets. We evaluate this al- gorithm against state-of-the-art approaches on a collection of tweets covering the period between November 2015 and May 2017, by means of a crowdsourcing platform. Our evaluation represents one of the most extensive evaluations for an event detection algorithm in social media. It shows that our approach outperforms the baselines both in terms of precision (at k) and number of dupli- cates, while the keyword-based description provided by our algorithm is succinct and informative. Moreover, we show how to further improve the results of our algorithm by incorporating news from mainstream media. Given these results, we consider EviDense could represent a valuable tool for analyzing both social content and news articles from mainstream media, as well as for studying how they compare. It could also be used to boost the performance of other approaches, such as automatic classifiers. For this purpose, we released a collection of tweets containing mentions of the disaster events identified by our approach. To summarize, the contributions of this paper are: • We propose a completely unsupervised technique for finding with high precision mentions of high-impact events. • We show that our approach can incorporate information from mainstream media in order to improve event detection in social media. • We propose a new definition of a clique and quasi-clique in a weighted graph and we com- pare its performance to other dense subgraph definitions. The quasi-clique is a building block of our event detection algorithm and gives a succinct description of an event. • We show that our approach is versatile and can be used for finding other mentions of high- impact events, such as political events. • We provide a dataset containing tweets that were retrieved using the disasters' keyword descriptions computed by our algorithm. The rest of the paper is organized as follows: In Section 2 we outline the related work; in Section 3 we present our algorithm, while we compare it against state-of-the-art approaches in Section 4. In Section 5, we compare different definitions of dense subgraphs for the task of event description in social media. Finally, we recap and discuss some possible use cases in Section 6. 2 RELATED WORK Event detection. Several approaches have been proposed for event detection in social media, which can be classified according to whether they focus on a particular pre-specified class of events , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 3 (e.g., such as earthquakes, computer security breaks) or whether such a class is not specified. An- other criteria that can be used to classify the related work is the main technique used. The most successful techniques that have been employed for this task include clustering-based methods, graph mining approaches, wavelet, and supervised learning methods based on SVMs or gradient boosted decision trees. There are extensive surveys on this topic [3, 11, 17, 20]. Approaches that deal with a pre-specified class of events typically use classifiers in order to label tweets [11, 29] or aggregations of tweets [25, 27]. In [11], the authors present a platform for automatic classification of messages during a disaster event. More precisely, first tweets are crawled using certain crite- ria like location or keywords and then human annotators label tweets using different categories, such as "needs". An automatic classifier is trained based on the labels and retrained as new labels arrive. The authors emphasize that automatic classification using a pre-existing dataset is not a good solution as disaster events can have very specific aspects that differentiate them. In order to facilitate the task of finding mentions of disasters, we propose an unsupervised approach for finding such mentions that can scale to very large datasets. Therefore, in the following we focus on other unsupervised event detection methods that allow a large-scale analysis. Weng and Lee [36] propose an event detection algorithm (EDCoW ) based on clustering of the wavelet-based signal of words. More precisely, the frequency of words in text over time is a time series, which can be processed using wavelet analysis. The authors filter trivial words using auto- correlation of signals and cluster the remaining words employing as a similarity metric the cross- correlation of signals. Clusters are finally ranked according to a score which takes into account the cross-correlation of words and the total number of words associated with each cluster. Cordeiro [6] proposes an algorithm based on continuous wavelet transformation and Latent Dirichlet Allocation (LDA), a widely-used unsupervised method for topic modeling. In the first step, the frequency of hashtags over time is analyzed using continuous wavelet transformation and hashtags that present a peak in their pattern of occurrence are selected. After filtering the hashtag, LDA is used to infer topics associated with each tag. For intervals of five minutes, all the tweets containing the hashtag are retrieved and passed to the LDA algorithm for the computation of five representative topics of the hashtag. LDA has been modified in Pan and Mitra [24] in order to take into account temporal and geographic features. The approach in Pan and Mitra [24] represents a pioneering work, but it suffers from the fact that either the number of topics or the number of events has to be fixed. Angel et al. [1] develop an algorithm for maintaining overlapping dense subgraph with size limit in a dynamic graph. Each dense subgraph represents an event, where the nodes are words describing the event. Their main contribution consists in designing an efficient data structure for maintaining overlapping subgraphs. Guille and Favre [10] leverage the intuition that during an event users will mention more of- ten other users in order to engage in conversation or they will retweet posts of other users. The words from tweets containing mentions are selected and for each of them, the deviation from the expected frequency for given time periods is computed. To provide a better description of an event, additional words sharing similar temporal patterns with the initial word are added. Event detection shares some similarities with trend detection,2 which is one main focus for Twit- ter. Trend detection aims at finding keywords or hashtags whose frequency deviates significantly from the average frequency. However, it does not focus on a given class of real-world events (such as disaster events), nor does it provide a short description of the topics. 2https://blog.twitter.com/2015/trend-detection-social-data , Vol. 1, No. 1, Article . Publication date: December 2019. 4 Oana Balalau, Carlos Castillo, and Mauro Sozio We evaluate our algorithm against Guille and Favre [10], as it is the approach which performed best in our experimental evaluation. We select also the technique presented in [36], as it has been shown [35] to perform better than several other event detection techniques [6, 33, 34]. Dense subgraphs. Dense subgraphs discovery has applications in many areas, for example in community detection [7], finding patterns in gene annotation graphs [28], link spam detection [8] and event detection [1]. One of the most well known and studied definitions of density is the aver- age degree density and the problem of finding a subgraph that has the maximum average degree is called the densest subgraph problem. Goldberg [9] formally defined the problem in an undirected graph and presented an algorithm that computes the densest subgraph in O(lo❕(n)) maximum-flow computations. When enforcing a limit on the size of the subgraph, finding the densest subgraph of exactly k vertices (DkS), the problem becomes NP-hard. Variations on the problem, finding a densest subgraph with at most k vertices(DamkS) or a densest subgraph with at least k vertices (DalkS) are also NP-hard [12]. Recent work [14], showed that exact solutions for the heaviest k-subgraph (DkS in a weighted graph) can be obtained efficiently when considering real-world graphs. An interesting variation on finding a dense subgraph is the cocktail party problem [30], where the task is to find a dense subgraph that contains a specified set of input nodes. Cliques and quasi-cliques are dense subgraphs par excellence. Given an undirected, unweighted graph, a clique is a fully connected subgraph. A quasi-clique in an unweighted graph has been defined as a subgraph with a number-edges-to-number-edges-clique-same-size ratio larger than a given threshold value in [32], and a subgraph maximizing the edge surplus over the expected number of edges under the random-graph model in [31]. When considering undirected weighted graphs, cliques have been defined either as a subgraph of maximum total weight where any two nodes are connected [23], or as a subgraph with a sum-edge-weight-to-number-edges-clique-same- size ratio larger than a threshold [32]. 3 ALGORITHMS Our algorithm consists of the following main steps: 1) collection of tweets containing keywords related to disaster events by means of the Twitter API; 2) recognition and tagging of mentions of locations in the tweets; 3) finding bursts of mentions of locations; 4) mentions of locations are finally complimented with related keywords so as to provide more informative results. Each of these steps is described in the following sections. Collection of Tweets and Preprocessing Tweets have been collected by means of the Twitter API while specifying a list of keywords related to disaster events, such as attack, flood, victims. To this end, we use the list of keywords provided in [22]. For the recognition and tagging of locations, we use an entity recognition tagger that was trained on Twitter data [26]. Such a tagger focuses on ten different categories: person, location, company, product, facility (e.g. Cornell University), tv show, movie, sports team, and band. We retain only location and facility tags while ignoring the others. Our intuition is that bursts in the mentions of a location ( in tweets dealing with disaster events ) might signal the happening of an important event in that location. After the tagging step, we lemmatize the words and then we filter them such that to remove stop words, URLs and infrequent terms (i.e. terms with an hourly frequency smaller than 5). Finding Bursts of Locations When an event such as a disaster event occurs, we observe a burst of activity in Twitter with terms pertinent to the event increasing suddenly their frequency in tweets. In our approach (where tweets contain keywords related to disaster events), a burst in the number of mentions of a location , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 5 gives us a first signal that a disaster event is unfolding at that location. Previous works [24] have used geolocation of posts and not mentions of locations. We argue that using mentions of locations makes our algorithm more versatile, allowing it to analyze datasets coming from different sources. Burstiness of words in streams of data is a well-studied topic [13, 37] and in our approach, we use a simple technique, similar to other event detection methods [10]. For each location, we compute a set of intervals in which the deviation between the frequency of the location and its expected frequency is always above a threshold. Our intuition is that all tweets (dealing with the same location) posted during each of those intervals refer to the same event. We refer to such intervals as interesting intervals. We are interested in finding maximal interesting intervals. The expected frequency of a location is computed assuming that location frequencies can be approximated by the binomial distribution. Our algorithm computes for every location and every maximal interesting interval of that location its frequency and how much it deviates from the expected frequency. Then, all the (location, maximal interesting interval) pairs are ranked according to how much the frequency of a location deviates from its average frequency. A larger deviation corresponds to a higher interest in the event, therefore we retain the top k (location, maximal interesting interval) pairs with the largest deviation from the average. Below we provide more technical details. The expected frequency of a term (a location in our case) is computed as follows. Let Xw be the random variable indicating the number of tweets con- taining a term w while letting N be the number of tweets. We assume that the probability of having n tweets containing w, denoted as P(Xw = n), can be approximated by a binomial distribution: P(Xw = n) = (cid:18)N n(cid:19)pn w (1 − pw )N −n, where pw is the probability of a tweet containing the term w. In order to have an estimate of pw , we sample a collection of tweets written well before the event (we will take tweets from the previous month). Given the percentage of tweets containing w in that collection, we obtain a 95% interval of confidence for pw using Wilson score method [19]. Afterwards, we can compute the expected number of tweets containing a term w and the stan- dard deviation as follows: Let fl, w (t) be the frequency of a term w in all tweets posted in the time window [t, t + l ]. We let E[Xw ] = Npw and σ [Xw ] = pNpw (1 − pw ). βl, w (t) = fl, w (t) − E[Xw ] σ [Xw ] , which measures how much fl, w (t) deviates from the expected frequency of the term w. We say that an interval I = [a, b] is interesting with respect to a term w if for all t ∈ I, βl, w (t) ≥ α. We say that an interesting interval I = [a, b] is maximal if for all ¯a < a and ¯b > b, [a, ¯b], and [ ¯a, b] are not interesting. Given a maximal interesting interval I, we define β max l, w (I) = maxt ∈I βl, w (t), i.e. the maximum deviation from the expected frequency of w in I. When it is clear from the context we use the abbreviation βmax. Our goal is to find all maximal interesting intervals for every term w together with their corresponding βmax 's. We then retain only the top k intervals with maximum βmax 's among all the terms. Algorithm 1 shows a pseudocode for computing all bursts of a given location, while Algorithm 3 shows a pseudocode for computing the top k maximal interesting intervals together with their corresponding locations, as well as other relevant terms (to be discussed next). , Vol. 1, No. 1, Article . Publication date: December 2019. 6 Oana Balalau, Carlos Castillo, and Mauro Sozio Algorithm 1 FindTermBurst(C, w, α, ℓ) 1: Input: A collection of tweets C with their timestamps, a location w, a threshold α ≥ 0, a window size ℓ 2: S ← ∅, βmax ← 0, I ← ∅ 3: t ← minT imestamp(C) 4: while t ≤ maxT imestamp(C) − ℓ do 5: 6: 7: I ← I ∪ [t, t + ℓ] βmax ← max(βmax, βℓ, w (t)) if βℓ, w (t) ≥ α then 8: 9: 10: if (βℓ, w (t) < α or t = maxT imestamp(C) − ℓ) and I , ∅ then S ← S ∪ (w, I, βmax) I ← ∅, βmax ← 0 t ← t + 1 11: 12: Return S Locations in tweets might be mentioned at different levels of granularity (city, state or a country). As a result, two tweets might refer to the same event, even if two different locations are mentioned in the corresponding tweets (e.g. Los Angeles and California). Therefore, determining whether there is a hierarchical relationship between two locations might help us determining whether two events are duplicate events, thereby improving the fraction of unique events. To this end, we use GeoNames, a geographical dataset which can be queried using web services 3. In our algorithm we remove a tuple (l max) with I max) from further consideration, if there exists another tuple (l max and an hierarchical relation between l , I ′ , ∅, β ′ and l ′′. max ≤ β , I , β ′ ′ , β ∩ I ′′ ′′ ′′ ′ ′ ′′ ′′ Finding (cid:30)asi-Cliques In order to complement the set of locations (found with Algorithm 1) with additional information about the corresponding event, we employ a graph mining approach. In particular, for each loca- tion and each interesting interval for that location, we wish to find a set of terms which induce a dense region in the co-occurrence graph during that time interval. Given an interesting interval I and a collection of tweets, we define a weighted undirected graph G I = (VI, E I), where VI con- sists of the set of terms in the collection of tweets, while there is an edge between two nodes if the corresponding terms co-occur in at least one tweet posted within I. A weight function c : E → R+ represents the number of co-occurrences of terms in tweets posted within I. Cliques and quasi-cliques are dense subgraphs par excellence. Several definitions of weighted cliques have been provided in the literature, such as a subgraph of maximum total weight where any two nodes are connected [23], as well as a subgraph with a sum-edge-weight-to-number-edges- clique-same-size ratio larger than a threshold [32]. Observe that both definitions would favor the graph on the left in Figure 1, which exhibit weak connections between the set of nodes {1, 2} and {3,4}. As a result, those two different parts of the graph might actually refer to two different events. It is more likely that the nodes of the graph on the right in Figure 1 refer to the same event, as the edges of the graph have the same weight. 3http://www.geonames.org/export/web-services.html , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 7 Fig. 1. The le(cid:28) subgraph has a larger weight than the right one, but the nodes in the right subgraph are much be(cid:29)er connected. This motivates the following definitions of cliques and quasi-cliques. We say that a graph H is a weighted clique if all pairs of nodes in H are connected by an edge with the same weight. Given a parameter γ > 0, we then define a weighted quasi-clique as follows. Definition 1 (Weighted (cid:28)asi-Cli(cid:27)e). Given an undirected weighted graph H = (V (H ), E(H ), w), 0 < γ ≤ 1, we say that H is a weighted γ -quasi-clique if the following holds: e ∈E(H ) w(e) ≥ γ · wmax (H )(cid:18)V (H ) 2 (cid:19), (1) where wmax (H ) = maxe ∈E(H )(w(e)). We define the function qG : V → (0, 1] (q for short) to be the function which associates to every set S ⊆ V a rational number γ such that the subgraph induced by S in G is a γ -quasi-clique and γ is the largest value for which this holds. Finding quasi-cliques is an NP-hard problem, therefore we resort to the following heuristic for finding quasi-cliques containing a node v and at most s nodes. The algorithm starts with v and adds the edge with maximum weight containing v. At any given step, let S be set of current nodes. If S = s, the algorithm stops. Otherwise, it adds a node x in the neighborhood of S maximizing q(S ∪ {x }) provided that by adding x the resulting subgraph is still a γ -quasi-clique. Algorithm 2 shows a pseudocode, where ∆(u) denotes the sets of neighbors of u. Algorithm 2 FindQuasiClique(G, v, γ , s) if S = s return S ∆(S) ← ∪u ∈S ∆(u) \ S if ∆(S) = ∅ then 1: Input: A graph G = (V , E), a vertex v, 0 < γ ≤ 1 2: Output: A weighted quasi-clique containing v 3: u ← arg maxu:uv ∈E w(uv) 4: S ← {u, v } 5: while true do 6: 7: 8: 9: 10: 11: 12: 13: 14: Return S return S S ← S ∪ {x } return S x ← arg maxu ∈∆(S ) q(S ∪ {u}) if q(S ∪ {x }) < γ then , Vol. 1, No. 1, Article . Publication date: December 2019. 8 Oana Balalau, Carlos Castillo, and Mauro Sozio EviDense: Analysis of its Running Time Our algorithm for event detection can then be recapped as follows. The first step consists of col- lecting tweets from Twitter specifying as a filter a list of terms related to disaster events. Then, mentions of locations in tweets are recognized and tagged. A list of the top k bursty locations is computed, each of them is then complemented with additional terms related to the same event by finding quasi-cliques in the co-occurrence graph. Algorithm 3 shows a pseudocode for our main algorithm. Algorithm 3 EviDense(C, γ , α, ℓ, k, s) 1: Input: A collection C of tweets each one containing at least one term related to disaster events (lexicon provided in [22]), 0 < γ ≤ 1, an integer α, a window size ℓ, integer k, s 2: Output: The list of the top k events in C 3: S ← ∅ 4: Recognize and tag locations in C with [26] 5: for w ∈ Locations(C) do 6: 7: Let Sk be the top k triples in S with maximum βmax's 8: for (w, I, β) ∈ Sk do 9: 10: Compute G I output (FindQuasiClique ( G I, w, γ , s), I) S ← S∪ FindTermBurst(C, w, α, ℓ, k) To ease the presentation, Algorithm 1 and Algorithm 3 show a simple pseudocode of the main steps of our algorithm. However, our algorithm can be efficiently implemented so that it requires a few constant passes over the collection of tweets. For each location we store its frequency in the current time window (i.e. fl, w (t)) together with the corresponding I, βmax. Every time we process a new tweet, we verify for every location in that tweet the conditions from Algorithm 1 lines 5-10. Let c be the maximum number of terms in a tweet. We can then claim that the total running time of Algorithm 1 is O(c C). Let n, m be the number of nodes and the number of edges in G, respectively (i.e. the input of Algorithm 2). For line 3 we require O(n) operations, for line 7 we need at each iteration O(n) operations, while the computation at line 10 requires in the worst case to process all the edges in G. Thus, the overall running time of Algorithm 2 is O(s(m +n)). We now evaluate the running time of Algorithm 3, lines 5-10, that is, excluding the tagger. Line 7 is implemented using a heap of size k, requiring a number of operation of O(Cc log k). Any graph constructed from a collection of at most C tweets will have at most c 2 C edges and c C nodes. For computing a graph G I, we need at most O(c 2 C) operations. Then, the running time for lines 8-10 is O(ksc 2 C), which implies a total running time of Algorithm 3 of O(T + ksc 2C), where T is the running time required by the tagger. Notice that in practice k, s, c are small constants. Incorporating Information from Mainstream Media By running EviDense on a collection of titles of news articles, we can detect high-impact events in mainstream media as well. This observation leads to the question of whether our approach could benefit from incorporating news articles from mainstream media. This is done as follows. Recall that the ranking of a result is determined by the deviation from the expected frequency of its location in a given interval. We introduce a new random variable Yl oc = X ne w s l oc are random variables denoting the frequency of the location l oc, where X ne w s and X t w + X t w l oc l oc , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 9 , X t w loc in news and tweets in a given interval, respectively. We make the simplifying assumption that the random variables X ne w s l oc are independent. Such an assumption holds up to some extent, given that news articles and tweets are written typically by different people. Therefore, the expected value and the standard deviation of Yl oc can be computed as the sum of the expected values and standard deviations of the two random variables, respectively. We will then compute the maximum deviation of that location considering the sum of mentions of the location in both datasets. l oc To summarize, we first select the top k bursty locations in mainstream media. For each of these locations, we shall consider the random variable Yl oc to determine the expected frequency, while for the remaining locations we shall consider the variable X t w l oc. We then compute the top k results in Twitter. 4 EXPERIMENTAL EVALUATION Experimental Se(cid:29)ings We evaluate our approach on a large collection of tweets, as well as, news articles, by means of a crowdsourcing platform. We mostly focus on disaster events, while in Section 4 we investigate if our approach is effective for other classes of events, as well. We consider a disaster, any event that is included in any of the lists provided by the US Government4 or the International Disaster Database5 (such as earthquakes, mass shootings, floods, etc.). Corpora. We collect tweets posted over a period of 19 months between November 2015 and May 2017. We use the Twitter Streaming API while filtering the tweets so that they contain at least one term related to disasters [22]. We focus on tweets written in English. We obtain 16M tweets in total, which we divide into nineteen datasets (one per month). We then use an entity recognition tagger [26] for recognizing and tagging the mentions of locations in the tweets. We collected news articles over the same time period using GDELT6, as in [21], which contains major international, national, regional, and local news. The GDELT dataset is updated regularly, every 15 minutes, with news posted in that timeframe. We filtered the news using the same lexicon used to filter the tweets, which can be done by specifying the tag "CRISISLEX_CRISISLEXLEC"7 in GDELT. From each news article, we retain its title and publication date which are given in input to our algorithm. In order to get an estimate of the probability of a tweet or a news article to contain a location, we sampled the month previous to the event, and we obtained a 95% interval of confidence using Wilson score method[19]. For simplicity, we selected the upper bound of the interval as the value of the probability. Related work. We compare against MABED [10] and EDCoW [36]. All approaches are evaluated on the same collection of tweets. There has been significant disagreement among the crowd work- ers when interpreting the results of [1]. Therefore, we omit the approach from our study, deferring a more careful evaluation to future work. Parameter settings. In our approach, we set s to 10, k to 20, ℓ to three hours, α = 8 and γ = 0.5. We run MABED using the implementation provided by the authors8 and the setting specified in the original paper [10], that is p = 10, θ = 0.7 and σ = 0.5. The parameter σ controls the similarity between the events produced in the results. Small values of sigma correspond to more diverse results. We observe that determining the right value for such a parameter is crucial in the MABED approach. In particular, if σ is too small one may not get enough relevant results, while with 4https://www.ready.gov/be-informed 5http://www.emdat.be/classification 6http://blog.gdeltproject.org/gdelt-2-0-our-global-world-in-realtime/ 7https://blog.gdeltproject.org/crisislex-taxonomies-now-available-in-gkg/ 8https://github.com/AdrienGuille/MABED , Vol. 1, No. 1, Article . Publication date: December 2019. 10 Oana Balalau, Carlos Castillo, and Mauro Sozio large values of σ the algorithm might return many duplicates of the same "popular" event. For the EDCoW algorithm we use the implementation of [35] and we set the parameters as follows: the size of first level of intervals is s = 100s, while we take ∆ = 32, setting a size of 3200s for the second-level intervals and, as in [35], we set γ = 1. As EDCoW does not enforce any constraint on the size of the output, we order the results according to ϵ (as defined in the original paper), which measures the relevance of the results and retain only the top k results. Machine stats. We run our experiments on a Linux machine equipped with 4 processors Intel Xeon CPU E7-4870 @ 2.40 GHz as well as 10 cores split into 2 threads each (a total of 80 threads) and 64 G of RAM DDR3 1333 MHz. Methodology We run the three approaches on each of the first four months of our dataset from Twitter and evaluate the top 10 as well as the top 20 results for each such dataset. MABED and EDCoW provide a measure of relevance for their results which we use to determine the top results. The approach that performs best is then evaluated against our approach, over the whole period of 19 months. All approaches receive in input the same collection of tweets. Metrics. We evaluate the precision at k for all three approaches on our collection of tweets. Preci- sion at k, denoted with P@k (or precision for short), is defined as the percentage of true events in the top k results, divided by k. In addition to the precision, we compute the percentage of duplicate events among all the events retrieved, i.e. the DeRate [15]. From these two metrics, we can infer a third one, which measures the percentage of unique events (i.e. duplicates do not contribute) in the top k results. We denote such a metric with U @k. We observe that if an algorithm performs best in terms of U @k, it performs best also in terms of recall. Therefore, we do not report recall in our experimental evaluation. Crowdsourcing Settings. In order to ensure a fair comparison, we use a crowdsourcing service, GetHybrid9. For each result produced by any of the approaches, we ask 5 workers to determine whether it was a disaster event, that is an event considered to be a disaster by the US Government or the International Disaster Database.10. We added to the description of a result two relevant tweets in order to facilitate the labeling task. We note that as we find the relevant tweets automatically, a larger collection of tweets could be used for other applications, such as to create training sets for automatic classifiers. In order to evaluate a result, a worker would select one of the following answers to the question of what type of event do the keywords and tweets describe: (A) A natural disaster (earthquake, landslide, volcano, extreme temperature, hurricane, large and dense fog, large storm, flood, tsunami, drought, wildfire, epidemic, insect infestation, large accident involving animals, asteroid impact), (B) A technological disaster (chemical spill, building collapse, explosion, fire, gas leak, large poisoning, nuclear, radiation, cyberattack), (C) A human-induced disaster (war, shooting, terror attack), (D) A large transport accident (air, road, rail, water), (E) Not a natural, technological, or human-induced disaster, or large transport accident. Answers A-D correspond to a disaster. We label a result as a disaster if 3 out of 5 workers confirmed. 9https://www.gethybrid.io 10https://www.ready.gov/be-informed, http://www.emdat.be/classification , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 11 In order to compute the DeRate, we use the following definition for duplicate events: two events (E1, E2) are duplicates if they can be referenced to a more general event (E), that is each event satisfies one of the conditions: (1) describes the event E, (2) describes a sub-event of the event E, e.g. the Bataclan attack was one of the sub-events of the Paris attacks in November 2015, (3) describes the consequences of the event E, e.g. actions taken in the aftermath of a tornado. As before we label two events as being duplicates if 3 out of 5 workers confirmed. Estimating DeRate and U@k. The task of estimating the average number of duplicate events is non-trivial, given the large number of results. Asking the workers in GetHybrid to estimate the number of duplicate events in a list containing approximately 20 or more results is time-consuming and most probably would result in a non-accurate evaluation. Therefore, we draw a random sample from the set of all possible event pairs. Each worker is then asked to determine whether a given pair of events in the sample contains duplicate events or not. The resulting percentage of duplicate event pairs in the sample is used to infer a 95% confidence interval on the percentage of duplicate event pairs on the whole dataset, using the Wilson score method [19]. We then proceed to estimate the number of unique events produced in output by the different approaches. Given a 95% confidence interval [a, b] for the number of duplicate event pairs, we compute a 95% confidence interval [ ¯a, ¯b] for the number of duplicate events as follows. In the case when there are at least a duplicate event pairs, there are at least ¯a = n − 1 duplicate events where n is the smallest integer such that (cid:0)n be at most ¯b = b duplicate events. Therefore, for an approach with precision (at k) p > 0 and 95% confidence interval [ ¯a, ¯b] on the number of duplicate events, we estimate that the number of unique events be in the range [max(1, p · k − ¯b), p · k − ¯a]. 2(cid:1) ≥ a. If there are at most b duplicate event pairs, there can Results Comparison. In Table 1 we present the average P@10 and the average P@20 for all the approaches over the time period November 2015 - February 2016. The evaluation has been conducted using the GetHybrid crowdsourcing platform, as discussed in Section 4. We observe that EviDense out- performs the other two approaches for both top-10 and top-20 results. Method EDCoW MABED EviDense Average P@10 Average P@20 42.5% 60% 70% 32.5% 53.7% 73.7% Table 1. Average precision over the time period November 2015 - February 2016. We evaluate the number of duplicate events in the results, as discussed in Section 4. First, we measure the percentage of duplicate event pairs in our sample. This is shown in Table 2. Observe, that EviDense produces less duplicate event pairs. In particular, our results are better with a 95% confidence. From the results shown in Table 2, we obtain a 95% confidence interval on the percentage of duplicate events, i.e. the DERate. We obtain a 95% confidence interval of [0%, 84.6%] for EDCoW, [37.2%, 90.6%] for MABED, and [0%, 47.4%] for EviDense. From the latter result, it is difficult to determine which algorithm performs best in terms of DERate. Moreover, observe that approaches with higher precision might be penalized by the DERate, in that, they tend to have a larger number , Vol. 1, No. 1, Article . Publication date: December 2019. 12 Oana Balalau, Carlos Castillo, and Mauro Sozio Method EDCoW MABED EviDense Percentage in sample 95% Confidence Interval 12% 22% 2% 4.9% to 25% 14.5% to 31.6% 0.3% to 7.7% Table 2. Percentage of duplicate event pairs. of duplicates. For example, an approach which retrieves exactly one event has a DERate of zero. Therefore, we also consider the U @k metric, that is, the percentage of unique events in the top k results, as discussed in Section 4. The results are shown in Table 3. We can see that even with a pessimistic estimate, EviDense outperforms the other approaches in terms of U @k, while the percentage of unique events in the top-20 results can be up to 73.7%. The output of our algorithm is shown in Table 6. We can see that the description of each of the events is succinct and informative. In particular, one can easily retrieve the location of the event (in bold), its time-frame and what happened. Method EDCoW MABED EviDense U @20 5% to 32.5% 5% to 33.7% 38.7% to 73.7% Table 3. Average percentage of unique events over the time period November 2015 - February 2016. Long-Term Comparison. In order to give further proof of the performance of our approach, we compute the precision with 95% confidence of EviDense and the second best algorithm MABED for the period of 19 months of our dataset. We retrieve the top 20 results for every month, giving a total of 380 results for each approach. From these results, we randomly selected 100 results per method and we used crowdsourcing to evaluate the precision. For EviDense, 72 events out of 100 are disaster events, giving a precision between 61.9% and 80.3% with 95% confidence, while for MABED, 33 events out 100 are disaster events, resulting in a precision between 24.1% to 43.2% with 95% confidence. These results are summarized in Table 4. This confirms that our approach has higher precision than MABED, while it performs remarkably well over such an extensive experimental evaluation. Method MABED EviDense Percentage in sample 95% Confidence Interval 33% 72% 24.1% to 43.2% 61.9% to 80.3% Table 4. Average precision over the period November 2015 - May 2017 for the best two methods. Tweets & News Articles. We investigate whether our approach could benefit from incorporat- ing another source of information such as news articles from mainstream media, as discussed in Section 3. The results are shown in Table 5. We observe that we obtain significantly better re- sults for top-10 and slightly better results for top-20. Overall, the precision improves when adding additional information from mainstream media. Running time. Annotating the entities in the tweets using the entity recognition tagger [26] takes on average 0.02s/tweet. The average running time for the algorithms (without taking into , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 13 Method Average P@10 Average P@20 EviDense on News EviDense on Twitter EviDense Merged 80% 70% 77.5% 66.2% 73.7% 76.2% Table 5. Comparison of the performance of EviDense on different datasets: news articles, Twi(cid:29)er and both. account the annotating phase) is the following: for MABED is around 90s, for EDCoW is 52min and around 25s for EviDense. Time interval (UTC) Dec 03 02:20 , Dec 07 08:50 Event keywords San Bernardino, dead, female, #san- bernardino, killed, male, police, shoot- ing Dec 27 01:04 , Dec 28 03:37 Dallas, Rowlett, tornado Dec 07 03:24 , Dec 10 21:11 Chennai, damaged, flood, fresh, issue, lost, passport, psks, sushmaswaraj Dec 04 09:12 , Dec 04 23:23 Cairo, attack, firebomb, killed, night- club, people, restaurant Dec 28 20:15 , Dec 29 09:21 Cleveland, 12-year-old, Tamir Rice charged, death, grand, indict, jury, po- lice, prosecutor, shooting Dec 01 12:32 , Dec 06 22:03 Chennai, find, flood, girl, lost, parent, pls Dec 27 01:39 , Dec 27 08:38 Garland, Texas, dead, hit, killed, peo- ple, storm Dec 21 04:56 , Dec 22 00:57 Dec 18 16:40 , Dec 19 02:32 Dec 07 13:31 , Dec 08 08:59 Las Vegas, crash, critical, dozen, driver, injured, pedestrian, people, strip republican, agrabah, aladdin, bomb- ing, country, #nottheoni, nationally, ppppolls, primary Pearl Harbor, attack, #pearlharbor, honor, live, lost, remember, today, year Description The San Bernardino terrorist at- tack. Many tornadoes in Dallas and Rowlett. Chennai residents whose pass- ports were damaged during the floods could get a new one. People killed in Cairo at a restaurant that operated also as a nightclub. Not a disaster event. A girl has disappeared during the floods and her parents are looking for her. A series of tornados hit the state of Texas, reaching Gar- land, Dallas and Rowlett (dupli- cate event). Driver in Las Vegas deliber- ately attacked pedestrians. Not a disaster event, also we can notice a mislabelling of the tagger. Commemoration of the attack on Pearl Harbor 74 years ago to- day. Table 6. Top 10 events discovered in December 2015 by EviDense. The event is centered on the location given in bold. Parameter Se(cid:29)ings for EviDense Our algorithm has four input parameters: k, ℓ, α and γ . For the experiments we used the values k = 10 or k = 20, we set ℓ to three hours, α = 8 and γ = 0.5. The first parameter k is used to limit the output size. The size of the time-window, ℓ, has two functionalities: firstly, it has a smoothing , Vol. 1, No. 1, Article . Publication date: December 2019. 14 Oana Balalau, Carlos Castillo, and Mauro Sozio effect over the number of occurrences of a term and can alleviate the difference between active periods and inactive periods, such as day and night. Secondly, because of the smoothing effect, it can decrease the importance of small events which have short-lived peaks and increase the importance of events which are discussed for longer periods but without having important peaks. We experiment with different values of ℓ in order to balance between the segmentation of a single event and the order of magnitude of an event. In order to assess what is the best value for the time window, we compute the percentage of duplicate events between the events retrieved, the DeRate. We only include an evaluation of the top 20 events in the month of December 2015, as the results are similar to the other datasets. In Figure 2a, we can notice that the number of duplicate events decreases as the time window increases, which is intuitive, as a larger time window decreases the effect of an inactive period. We settled for three hours, as choosing larger time windows would likely merge different events that occur in the same location. Moreover, larger time windows would also increase the running time of the algorithm, as shown in Figure 2b. This is due to the fact that the search for weighted quasi-cliques is performed on a larger graph. 140s e m i i t g n n n u R 71s 40s 11s16s22s28s 1h2h3h4h 6h 12h Window size (hours) 24h 1h2h3h4h 6h 12h Window size (hours) 24h (a) DeRate vs ℓ (b) Running time vs ℓ s l a v r e t n i g n i t s e r e t n i h t g n e l g v A 53h 42h 30h 18h 11h 42 8 16 α coefficient 32 (d) Avg length of maximal intervals vs α 0.29 0.180.18 e t a R e D 0.06 0.05 00 0.27 0.22 0.18 0.12 e t a R e D 0.06 2 4 8 16 α coefficient (c) DeRate vs α 32 Fig. 2. Parameter se(cid:29)ings The parameter α is used as a threshold for determining which location has a frequency which deviates significantly from the average frequency. We use the binomial distribution as a simple model that gives an estimate of a mean and standard deviation, and we try several values for α, as shown in Figure 2c. When increasing the parameter α the average length of interesting intervals decreases (Figure 2d) and given that our goal is to minimize the length of interesting intervals without reporting the same event twice, we select the value α = 8. The last parameter, γ , is used to provide different levels of detail concerning an event. We have obtained good results for a large range of values of γ . The best is to avoid values smaller than 0.3 which might add unrelated terms to an event, and values larger than 0.8 as the description of the events could be not informative. , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 15 Disaster Dataset We released a dataset 11 containing 32K tweets written in the period November 2015 -February 2016. The dataset was obtained by selecting tweets referring to each true disaster event discovered by EviDense. The tweets were written in the timeframe of the disaster event and contained the mention of the event location and of at least one more event keyword. In order to test the quality of the dataset, we randomly sampled 200 tweets and we marked them as being disaster-related or not. A tweet was considered as being disaster-related if it described a disaster event, described a sub-event of a disaster event or described the consequences of a disaster event. We obtained a precision of 86.5%, which gives a 95% confidence interval [19] for the precision in the entire dataset between 83.05% and 92.42%. Beyond Disaster Events In this section, we study a different category of events in order to understand whether our approach can effectively be used to detect other classes of events. We focus on political events. In order to obtain tweets relevant to our task, we create a lexicon of terms related to politics. We include keywords like "protest", "immigration", "election" or "government", however, better results could be obtained if the list of words is produced in the same fashion as the lexicon provided in [22]. Detecting bursts in the mentions of locations turned out to be an effective method to detect disaster events. In the case of political events, politicians might play an important role in this kind of events. Therefore, we detect bursts in the mentions of locations or persons, as the latter ones might refer to well-known politicians. In order to recognize and tag mentions of well-known persons, we use we use the same entity recognition tagger used in the rest of paper [26]. The rest of the algorithm remains unchanged. We obtain the following results. In the month of November 2015 the first event retrieved by our algorithm is related to the declaration of François Hollande that France will close its borders in the aftermath of the November 13th attacks described by the following terms "attacks", "France", "borders", "closes", "declares", followed by an event about people injured at protests calling for the resignation of South Korea's president ("Korea", "beaten", "happening", "people", "protest"). In December 2015 most of the detected events are related to the presidential elections in the US ("bernie", "hillary", "#demdebate", "war"), however, we find also a mention of the killing of peaceful protesters during a pro-Biafra protest (nigerian, #ipob, navy, police, protester, shooting, unarmed). In January 2016 the UN holds an emergency meeting after North Korea claims having done a nuclear test (North Korea, council, emergency, meeting, security, set, test), while in February 2016 Jeb Brush and Rand Paul suspend their presidential campaigns. Another event detected in February is related to the Yemen civil war (Yemen, #usakillyemenis, saudi-led, us-backed) and was triggered by a bombing at a cement factory close to the capital of Yemen, which resulted in the death of civilians. These observations suggest that our approach is robust and it has good potential in providing meaningful results for other classes of events. 5 USING DENSE SUBGRAPHS FOR EVENT DESCRIPTION In this section, we investigate if the weighted quasi-clique definition that we introduced in this paper is the best suited for describing events. We compare our method with well-known definitions of dense subgraphs. 11https://github.com/nyxpho/evidense , Vol. 1, No. 1, Article . Publication date: December 2019. 16 Oana Balalau, Carlos Castillo, and Mauro Sozio Dense subgraphs definitions and algorithms In this section, we give the definitions for the types of dense subgraphs we consider for the com- parison. We make simple modifications to some of the baselines, in order to enforce that a query node q is part of the solution. Definition 2 (Heaviest k-subgraph containing (cid:27)ery node q (HkS)). Given an undirected weighted graph G = (V , E, w), an integer k and a query node q, the induced subgraph H = (V (H ), E(H )) is the heaviest k-subgraph containing query node q, if H has size k, contains the query node q and has maximum sum of edge weights. Definition 3 (Heaviest k-cli(cid:27)e containing (cid:27)ery node q (HkC)). Given an undirected weighted graph G = (V , E, w), an integer k and a query node q, the induced subgraph H = (V (H ), E(H )) is the heaviest k-clique containing query node q, if H is a k-clique, contains the query node q and has maximum sum of edge weights. Definition 4 (Cocktail party problem (CP)). Given an undirected weighted graph G = (V , E, w) and a query node q, the induced subgraph H = (V (H ), E(H )) is a solution to the cocktail party prob- lem if H contains the query node q, is connected and maximizes the minimum weighted degree of all nodes in the subgraph. This definition is a particular case of Problem 1 defined in [30]. Definition 5 (Cocktail party problem with distance d (CPD)). Given an undirected weighted graph G = (V , E, w), an integer d and a query node q, the induced subgraph H = (V (H ), E(H )) is a solution to the cocktail party problem with distance d if H contains node q, is connected, all the nodes of H are connected to the query node through a short path of at most size d, and maximizes the minimum weighted degree of all nodes in the subgraph. This definition is a particular case of Problem 2 defined in [30]. Finally, we also consider the following simple baseline. Definition 6 (Top k co-occurrences (Topk)). Given a query word q, a collection of tweets C and an integer k, the top k word co-occurrences represent k words co-occurring the most often in a tweet with word q. These four definitions of dense subgraphs are well studied in literature [2, 14, 23, 30]. In order to compute the dense subgraphs, we implemented the techniques presented in [14, 30] with small adjustements for our problem. We describe these implementations in the following. In [14], the au- thors present an exact and an approximate algorithm for the heaviest k-subgraph. The algorithm is a well designed branch and bound technique that enumerates the candidate solutions. The ap- proach is bottom up, that is it gradually adds nodes to the candidate solutions. We enforce that the query node is present in the final solution by adding it in the initialization of the candidate solutions. In order to compute the heaviest k-clique containing a query node q, we modify the branch and bound algorithm [14]. We shortly remind the approach: in the first step the edges are sorted in non-increasing order of the weights and each edge has assigned its index in the order. We can visualize the branch and bound algorithm as a tree, in which the root corresponds to all possible solutions and each node to a subset of solutions. Each node on a level i has two children, one child corresponding to the solutions containing edge i ( where i is the position in the sorted order) and one to the solutions that don't contain the edge. A node has an upper bound which represents the maximum possible weight of a solution of that node and a lower bound which is the weight of the subgraph induced by the edges accepted in the node. In the bounding phase, we update , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 17 the upper bound of the subgraph and we decide if this branch can lead to the optimum solution. This is done by comparing the upper bound with the current best lower bound. For the heaviest k-clique problem, we add the constraint that each subgraph that we keep has to be a clique, which is intuitive as every induced subgraph of the heaviest k-clique is also a clique. For the solution to contain the input query node q, we initialize each solution set with the query node q. For the cocktail party problem, we implement the GREEDY algorithm presented in [30]. The algorithm can be summarized as follows: starting from an input graph G, at each step, the node of minimum degree is removed. If the node of minimum degree is q or if the graph becomes dis- connected, we stop. The solution is the the induced subgraph with the largest minimum degree. The cocktail party problem already allows for an input query node q to be given in input, so no further modification is necessary. The algorithm for the cocktail party with distance d works as follows: starting from an input graph G, at each step a node at distance bigger than d from the query node q is removed, or if no such node exists than the node of minimum degree is removed. We define the distance between two nodes to be the length of the shortest path and the degree to be the weighted degree. Keyword coherence In order to evaluate which method produces the best set of keywords, we use a metric proposed for the automatic evaluation of the coherence of keywords describying a topic [18]. The metric has been shown to be a good indicator of human judgment. Given a collection of tweets C, a set of keywords K, the frequencies of keywords f (k1) and keyword co-occurrences f (k1, k2) in C, the coherence of K given C is: Coherence(K C) = k1, k2 ∈K log( f (k1, k2) + 1 f (k1) ) (2) Evaluation In order to assure a fair comparison, we run Algorithm 3 while only changing line 10, that is the subroutine for computing keywords associated with the event. We considered the top 20 events in the months November 2015 - February 2016, in total 80 events. We compute the coherence of every event description given by the 6 methods (quasi clique, heaviest k-subgraph, heaviest k-clique, cocktail party problem, cocktail party problem with distance d and top co-occurrences). For the heaviest k subgraph and heaviest k-clique we choose k = 10. For the cocktail party with distance d we experimented with d = 1 and d = 2 and we choose d = 1 as it gave better results. For the top k co-occurrences, we return the 9 top co-occuring keywords with query node d. For each approach, the query node is the location and the co-occurrence graph is created from tweets written in the event timeframe. We compare these results with the results returned by running the quasi clique subroutine with v = location, γ = 0.4, s = 10. We report the results in Table 7. A cell (i, j) gives the percentage of events on which the method i performed better or equally well in comparison with method j. The results show that our definition of a weighted quasi-clique (W QC) gives the best results in terms of keyword coherence. The second best technique is cocktail party with distance 1, followed by top k co-occurrences. 6 CONCLUSIONS We presented EviDense, a graph-based approach for finding high-impact events in social media. In particular, we address the challenge of providing a succinct and informative description of the events retrieved with our approach. We focus on disaster events, while we discuss how our ap- proach could be adapted to other classes of events. Our extensive experimental evaluation over a , Vol. 1, No. 1, Article . Publication date: December 2019. 18 Oana Balalau, Carlos Castillo, and Mauro Sozio - Method W QC W QC HkS HkC CP CPD T opk 11.25% 17.5% 8.75% 40% 30% HkS 90% - 82.5% 37.5% 83.75% 87.5% HkC CP 86.25% 92.5% 18.75% 63.75% 78.75% - 27.5% 70% 73.75% - 98.75% 90% CPD T opk 68.75% 76.25% 13.75 16.25 32.5% 32.5% 11.25 12.5% 57.5% - 48.75% - Table 7. Comparison of keyword coherence between W QC, HkS, HkC, CP, CPD,T opk. On each line, we have the percentage of events on which the method performed be(cid:29)er or equally well in respect to the other approaches. For example,W QC performed be(cid:29)er or equally well on 90% of event descriptions when compared with HkS. period of 19 months shows that our approach outperforms state-of-the-art approaches in terms of precision and fraction of unique events retrieved, while the description provided by our algorithm is succinct and contains the most relevant information such as the location, what happened and the timeframe. We also showed how to improve the results even further by incorporating results from mainstream media. Given these results, we consider EviDense could represent a valuable tool for analyzing both social content and news articles from mainstream media, as well as for studying how they compare. It could also be used to boost the performance of other approaches. For example, the dataset we released could be used to create training sets for automatic classifiers. 7 ACKNOWLEDGMENTS Part of this work was done while Oana Balalau was a student at Télécom ParisTech University. Carlos Castillo is partially funded by La Caixa project LCF/PR/PR16/11110009. Mauro Sozio is partially funded by the French National Agency (ANR) under project FIELDS (ANR-15-CE23-0006). Data and code sharing. The ids of the tweets we use in our evaluation are publicly available, together with our code.12 REFERENCES [1] Albert Angel, Nick Koudas, Nikos Sarkas, Divesh Srivastava, Michael Svendsen, and Srikanta Tirthapura. 2014. Dense subgraph maintenance under streaming edge weight updates for real-time story identification. VLDB Journal (2014), 175 -- 199. https://doi.org/10.1007/s00778-013-0340-z arXiv:arXiv:1203.0060v1 [2] Yuichi Asahiro, Kazuo Iwama, Hisao Tamaki, and Takeshi Tokuyama. 2000. Greedily finding a dense subgraph. J. Algorithms 34, 2 (2000). [3] Farzindar Atefeh and Wael Khreich. 2015. A Survey of Techniques for Event Detection in Twitter. Comput. Intell. (Feb. 2015), 132 -- 164. https://doi.org/10.1111/coin.12017 and Mauro Castillo, Balalau, [4] Oana Carlos Sozio. 2018. Method Events with https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17889 Unique High-Impact Finding for Succinct EviDense: Graph-Based Keyword-Based Descriptions. A [5] Carlos Castillo. 2016. Big Crisis Data: Social Media in Disasters and Time-Critical Situations. Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9781316476840 [6] Mário Cordeiro. 2012. Twitter event detection: combining wavelet analysis and topic inference summarization. Pro- ceedings of Doctoral Symposium on Informatics Engineering (2012). Community detection in graphs. [7] Santo Fortunato. 2010. https://doi.org/10.1016/j.physrep.2009.11.002 arXiv:0906.0612 Physics Reports 486, 3-5 (2010), 75 -- 174. 12https://github.com/nyxpho/evidense , Vol. 1, No. 1, Article . Publication date: December 2019. EviDense: a Graph-based Method for Finding Unique High-impact Events with Succinct Keyword-based Descriptions 19 [8] David Gibson, Ravi Kumar, and Andrew Tomkins. 2005. Discovering large dense subgraphs in 721 -- -732. massive graphs. http://portal.acm.org/citation.cfm?id=1083592.1083676 International Conference on Very Large Data Bases (VLDB) (2005), [9] Av V Goldberg. 1984. Finding a maximum density subgraph. [10] Adrien Guille and Cecile Favre. 2014. Mention-anomaly-based Event Detection and Tracking in Twitter. ASONAM 2014 - IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Asonam (2014), 375 -- 382. https://doi.org/10.1109/ASONAM.2014.6921613 [11] Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, and Sarah Vieweg. 2014. AIDR: Artificial intelligence for disaster response. Proceedings of the companion publication of the 23rd international conference on World wide web companion October (2014), 159 -- 162. https://doi.org/10.1145/2567948.2577034 [12] Samir Khuller and Barna Saha. 2009. On finding dense subgraphs. Icalp 5555 (2009), 597 -- 608. [13] Theodoros Lappas, Benjamin Arai, Manolis Platakis, Dimitrios Kotsakos, and Dimitrios Gunopulos. 2009. On Burstiness-Aware Search for Document Sequences. (2009), 477 -- 485. [14] Matthaios Letsios, Oana Denisa Balalau, Maximilien Danisch, Emmanuel Orsini, and Mauro Sozio. 2016. Finding Heaviest k-Subgraphs and Events in Social Media. In The Sixth IEEE ICDM Workshop on Data Mining in Networks (DaMNet 2016), Barcelona Spain, 12. [15] Chenliang Li, Aixin Sun, and a Datta. 2012. Pro- ceedings of the 21st ACM international conference on Information and knowledge management (2012), 155 -- 164. https://doi.org/10.1145/2396761.2396785 Twevent: Segment-based Event Detection from Tweets. [16] Bruce R Lindsay. 2011. Social media and disasters: Current uses, future options, and policy considerations. [17] Amina Madani and Omar Boussaid. 2014. What's Happening : A Survey of Tweets Event Detection. INNOV 2014 : The Third International Conference on Communications, Computation, Networks and Technologies (2014), 16 -- 22. [18] David Mimno, Hanna M Wallach, Edmund Talley, and Miriam Leenders. 2011. Optimizing Semantic Coherence in Topic Models. 2 (2011), 262 -- 272. [19] Robert G Newcombe. 1998. Two-sided confidence intervals for the single proportion: comparison of seven methods. Statistics in medicine 17, 8 (1998), 857 -- 872. [20] A Nurwidyantoro and E Winarko. 2013. Event detection in social media: A survey. ICT for Smart Society (ICISS), 2013 International Conference on (2013), 1 -- 5. https://doi.org/10.1109/ICTSS.2013.6588106 [21] Alexandra Olteanu, Carlos Castillo, Nicholas Diakopoulos, and Karl Aberer. 2015. Comparing events coverage in online news and social media: The case of climate change. [22] Alexandra Olteanu, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2014. CrisisLex: A Lexicon for Collecting and Filtering Microblogged Communications in Crises. In In Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (ICWSM'14). [23] Patric R J Östergård. 1999. A New Algorithm for the Maximum-Weight Clique Problem. Electronic Notes in Discrete Mathematics 3 (1999), 153 -- 156. https://doi.org/10.1016/S1571-0653(05)80045-9 [24] Chi-Chun Pan and Prasenjit Mitra. 2011. Event Detection with Spatial Latent Dirichlet Allocation. In Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries (JCDL '11). ACM, New York, NY, USA, 349 -- 358. https://doi.org/10.1145/1998076.1998141 [25] Ana-Maria Popescu, Marco Pennacchiotti, and Deepa Paranjpe. 2011. Extracting events and event descriptions from Twitter. Proceedings of the 20th international conference companion on World wide web - WWW '11 (2011), 105 -- 106. https://doi.org/10.1145/1963192.1963246 [26] Alan Ritter, Sam Clark, Mausam, and Oren Etzioni. 2011. Named Entity Recognition in Tweets: An Experimental Study. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP '11). Association for Computational Linguistics, Stroudsburg, PA, USA, 1524 -- 1534. http://dl.acm.org/citation.cfm?id=2145432.2145595 [27] Alan Ritter, Evan Wright, William Casey, and Tom Mitchell. 2015. Weakly Supervised Extraction of Computer Security Events from Twitter. WWW 2015 i (2015). [28] Barna Saha, Allison Hoch, Samir Khuller, Louiqa Raschid, and Xiao Ning Zhang. 2010. Dense subgraphs with restrictions and applications to gene annotation graphs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6044 LNBI (2010), 456 -- 472. https://doi.org/10.1007/978-3-642-12683-3_30 [29] Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010. 851 -- 860. [30] Mauro Sozio and Aristides Gionis. 2010. The community-search problem and how to plan a successful cocktail party. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010. 939 -- 948. , Vol. 1, No. 1, Article . Publication date: December 2019. 20 Oana Balalau, Carlos Castillo, and Mauro Sozio [31] Charalampos Tsourakakis, Francesco Bonchi, Aristides Gionis, Francesco Gullo, and Maria Tsiarli. 2013. Denser Than the Densest Subgraph: Extracting Optimal Quasi-cliques with Quality Guarantees. In KDD. 104 -- 112. [32] Takeaki Uno. 2010. An Efficient Algorithm for Solving Pseudo Clique. (2010), 3 -- 16. https://doi.org/10.1007/s00453-008-9238-3 [33] Andreas Weiler, Michael Grossniklaus, and Mh Scholl. 2014. Identification and Tracking in So- cial Media Streaming Data. Workshop Proceedings of the EDBT/ICDT 2014 Joint Conference (2014), 282 -- 287. http://ceur-ws.org/Vol-1133/paper-46.pdf Event [34] Andreas Weiler, Marc H. Scholl, Franz Wanner, and Christian Rohrdantz. 2013. Event identification for local areas using social media streaming data. Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks - DBSocial '13 (2013), 1 -- 6. https://doi.org/10.1145/2484702.2484703 [35] Mark Weiler, Andreas, Grossniklaus, Michael and Scholl. 2015. Evaluation Measures for Event Detection Techniques on Twitter Data Streams. Bicod (2015), 1 -- 157. https://doi.org/10.1007/978-3-319-20424-6 [36] Jianshu Weng and Bu-Sung Lee. 2011. Event Detection in Twitter. In International Conference on Weblogs and Social Media. [37] Yunyue Zhu and Dennis Shasha. 2003. Efficient Elastic Burst Detection in Data Streams. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '03). ACM, New York, NY, USA, 336 -- 345. https://doi.org/10.1145/956750.956789 , Vol. 1, No. 1, Article . Publication date: December 2019.
1703.06988
1
1703
2017-03-20T22:19:22
The Fake News Spreading Plague: Was it Preventable?
[ "cs.SI" ]
In 2010, a paper entitled "From Obscurity to Prominence in Minutes: Political Speech and Real-time search" won the Best Paper Prize of the Web Science 2010 Conference. Among its findings were the discovery and documentation of what was termed a "Twitter-bomb", an organized effort to spread misinformation about the democratic candidate Martha Coakley through anonymous Twitter accounts. In this paper, after summarizing the details of that event, we outline the recipe of how social networks are used to spread misinformation. One of the most important steps in such a recipe is the "infiltration" of a community of users who are already engaged in conversations about a topic, to use them as organic spreaders of misinformation in their extended subnetworks. Then, we take this misinformation spreading recipe and indicate how it was successfully used to spread fake news during the 2016 U.S. Presidential Election. The main differences between the scenarios are the use of Facebook instead of Twitter, and the respective motivations (in 2010: political influence; in 2016: financial benefit through online advertising). After situating these events in the broader context of exploiting the Web, we seize this opportunity to address limitations of the reach of research findings and to start a conversation about how communities of researchers can increase their impact on real-world societal issues.
cs.SI
cs
The Fake News Spreading Plague: Was it Preventable? Eni Mustafaraj Department of Computer Science Wellesley College Wellesley, MA, USA [email protected] Panagiotis Takis Metaxas Department of Computer Science Wellesley College Wellesley, MA, USA [email protected] 7 1 0 2 r a M 0 2 ] I S . s c [ 1 v 8 8 9 6 0 . 3 0 7 1 : v i X r a ABSTRACT In 2010, a paper entitled "From Obscurity to Prominence in Minutes: Political Speech and Real-time search" [8] won the Best Paper Prize of the Web Science 2010 Conference. Among its findings were the discovery and documentation of what was termed a "Twitter-bomb", an organized effort to spread misinformation about the democratic candidate Martha Coakley through anonymous Twitter accounts. In this paper, after summarizing the details of that event, we outline the recipe of how social networks are used to spread misinformation. One of the most important steps in such a recipe is the "infiltration" of a community of users who are already engaged in conversations about a topic, to use them as organic spreaders of misinformation in their ex- tended subnetworks. Then, we take this misinformation spreading recipe and indicate how it was successfully used to spread fake news during the 2016 U.S. Presidential Elec- tion. The main differences between the scenarios are the use of Facebook instead of Twitter, and the respective motiva- tions (in 2010: political influence; in 2016: financial benefit through online advertising). After situating these events in the broader context of exploiting the Web, we seize this opportunity to address limitations of the reach of research findings and to start a conversation about how communi- ties of researchers can increase their impact on real-world societal issues. Keywords fake news; misinformation spreading; Facebook; Twitter; Google INTRODUCTION 1. 1.1 The Anatomy of a political Twitter-Bomb It was January 15, 2010, when a group of nine Twit- ter accounts, all created within an interval of 15 minutes, with names such as "CoakleyAgainstU", "CoakleyCatholic", etc. These were accounts with names starting with the Figure 1: The journalist John Carney (at that time with CNBC), received one of these "reply-tweets", which he retweeted adding a comment expressing his surprise, "<Wow! Political Tweetbots!–JC>", because this was an unknown phenomenon at that time on Twitter. Carney deleted the URL of the original tweet. name of the democratic candidate Martha Coakley who was running in the Special Election for the Massachusetts U.S. Senate seat. The newly minted accounts sent 929 tweets addressed to 573 unique users in the course of 138 min- utes. All the tweets contained a URL to the same website http://coakleysaidit.com, (also registered on January 15, 2010), that showed video and audio from a speech by Martha Coakley, taken out of context, to advance the false claim that she is against the employment of Catholics in the emergency room. The nine accounts were sending a tweet per minute and repeating more or less the same content a A¸S reasons to be flagged as a spamming account. Twitter discovered the automated tweets and consequently suspended all nine ac- counts. Their existence and their misinformation attack would have gone unnoticed had it not been for one fortunate circumstance: we were collecting all tweets containing the names a AIJcoakleya AI and a AIJbrown," for Martha Coak- ley and Scott Brown respectively who were the two candi- dates for the senate election, in real-time during the week leading to the election. But, the tweets sent by these anony- mous accounts were not simple tweets, they were so-called "reply tweets", tweets directed to particular users. Why? Because a new account on Twitter doesn't have any follow- ers. Tweets sent by such an account will not be read by anyone. Thus, addressing the tweets to a particular user makes it likely that the tweet will be read. But to what user do you send the tweet, out of the millions that are on Twitter? This is when a common spamming technique on Twitter comes in handy: reply to users who used certain desired keywords in their tweets, that is, to users already attuned to the topic. Our analysis of the recipients of these "reply tweets" revealed that 96% of them had been tweeting about the MA senate race in the four-hour interval between the time the anonymous accounts were created and when they started to send the "reply tweets". Almost 25% of the users who received a tweet (143 out of 573) retweeted the message. A screenshot from one of the retweets is shown in Figure 1. We chose to show this tweet, because the user is a well known journalist1 and experienced user who joined Twitter on March 2007. His surprise at the message indi- cates the novelty of this technique at the time. The retweets had the effect that the followers of the retweeters were likely exposed to the misinformation, which they would have not seen otherwise. This is because the messages didn't include hashtags, a common way to group together tweets about a topic. Our estimation of the audience size, based on the fol- lowers of the retweeters, amounted to 61,732 Twitter users. 1.2 A recipe for spreading misinformation on Twitter All the facts presented in the previous subsection were part of [8]. What we didn't do in that paper was to summa- rize our findings in an easily memorable recipe, which con- tains the steps used by the propagandists in spreading their misinformation on Twitter. We're providing this recipe for the first time in this paper. Step 1 Register a domain name for a new website, for example: http://coakleysaidit.com Step 2 Create anonymous accounts, for example: Step 3 CoakleySaidWhat, etc. Identify a community of users interested in the topic, for example, the MA Senate Election race. Step 4 Target members of this community with messages, for example, reply to users pro- viding link to website. Step 5 Wait for members of community to spread message via retweets in their organic sub- networks. Table 1: A recipe for spreading misinformation on Twitter via a "Twitter-Bomb". Our discovery attracted the attention of both journalists and other researchers. A team at Indiana University, headed by Fil Menczer, developed Truthy 2, a system that collects Twitter data to analyze discourse in near real-time [13]. In addition, our team at Wellesley developed Twitter Trails 3, a system that can be used to monitor the spreading of rumors on Twitter [7]. This focus on Twitter is justified by the fact that it provides APIs for researchers to collect and analyze its data, as well as the public nature of conversations on Twitter. Both these features are missing on Facebook (not entirely, but they are severely limited), thus, only Facebook employees are able to study them. As evidence, see [2]. Meanwhile, researchers not affiliated with the company have almost no opportunities to study information spreading on 1John Carney, https://twitter.com/carney. 2Truthy, now known as OSoMe, http://truthy.indiana.edu 3TwitterTrails.com, http://twittertrails.com Facebook, especially that of rumors, hoaxes, and recently fake news, a topic to which we turn our focus now. The term "fake news" refers to lies presented as news, that is, falsehoods online formatted and circulated in such a way that a reader might mistake them for legitimate news arti- cles. "Fake news" has been around since ancient times, but information technology has made it possible to produce and consume it on a massive scale. Such articles appear on a vari- ety of little known websites, then turn a profit by competing for clicks as advertisements on social media sites. In order to be successful in attracting user attention, they present a fake story of political nature, religious nature, or anything with an emotional appeal. Typically, fake news stories, which may or may not have some remote connection to reality, are planted on social media sites using provocative titles and images. "Click bait" attracts the attention of unsuspecting social media users who click on links to these stories think- ing they are visiting a legitimate news site. These engaged users are drawn in by the emotional appeal, while fake news providers get a share of advertising money from each click. 1.3 Spreading Fake News on Facebook After the surprise results of the 2016 U.S. Presidential Election, the American media directed its ire at Facebook and Google, as in this NY Times piece [20] written by the Editorial Board, on November 19, 2016: Most of the fake news stories are produced by scammers looking to make a quick buck. The vast majority of them take far-right positions. But a big part of the responsibility for this scourge rests with internet companies like Facebook and Google, which have made it possible for fake news to be shared nearly instantly with millions of users and have been slow to block it from their sites. This criticism is only partly correct. Facebook had been working toward fixing (or containing) the spread of hoaxes on the site at least since January 2015, almost two years be- fore the election [12]. They defined a hoax as a form of News Feed spam report that includes scams ("Click here to win a lifetime supply of coffee"), or deliberately false or mislead- ing news stories ("Man sees dinosaur on hike in Utah"). As we can notice from this definition, in 2015, the phrase "fake news" wasn't being applied yet to the kind of false stories that flooded Facebook in the weeks before the election. However, since it was difficult for independent researchers to know the extent to which Facebook users were affected by this issue, everything continued more or less as before, and Facebook was alone in its fight. This changed in early 2016, when the online publication BuzzFeed took an interest on Facebook's unsuccessful efforts to deal with the problem. In an article published in April 2016, BuzzFeed proclaims: "it is the golden age of fake news" [5]. The article reveals that BuzzFeed had conducted a study of fake news that was spreading via nine known fake news sites such as the Na- tional Report, Huzlers, or Empire News, using the services of the company Crowdtangle, specialized in measuring so- cial engagement. The findings revealed that while traffic for these sites had gone down for a while during 2015, in early 2016, it had started picking up again. The article also interviewed Allen Montgomery – a fake identity for Jestin Coler, the creator of a factory of fake news websites, as [19] Figure 3: Screenshot from Google search results about Donald Trump on Jan 23, 2017. In addition to the many sections to the page (such as the "featured snippet" on the right column), notice how the tweets shown above the fold belong to Trump himself. (and others on the same topic), we noticed the clear similar- ities to the process that lead to the Twitter-bomb against Martha Coakley in 2010. In fact, we are able to map the steps in the two recipes one to one, as shown in Table 2. Step 1 Register web domains for lots of related websites, with catchy names such as: http://TrumpVision365.com, see [17]. Step 3 Step 2 Create Facebook accounts of fictitious people, e.g, Elena Nikolov or Antonio Markoski, see [18]. Identify and join a Facebook group about a political candidate, e.g., "Hispanics for Trump" or "San Diego Bernicrats", see [18]. Step 4 Target members of the Facebook group with posts, by linking to the fake news website stories, see [18]. Step 5 Wait for members of the group to spread the fake news in their organic subnetworks, by sharing and liking it. Table 2: The recipe for spreading "fake news" on Facebook in the wake of the 2016 U.S. Presidential election. It contains the same steps as the recipe shown in Table 1. Figure 2: Screenshot from Google search results about Martha Coakley on Jan 12, 2010. Notice in highlighted red, the tweets attacking Coakley. This was a finding from [8] on how Google was inadver- tently giving premium space to political propagan- dists, in an effort to have "fresh" and relevant search results. revealed after the election. Coler's interview reveals some of the tricks of the trade of fake news, and points out why he believes he can win over Facebook: Coler believes Facebook is fighting a losing battle, doomed to fail no matter what it does. "They can shut down National Report. Of course they can do that," he said. "But I could have 100 domains set up in a week, and are they going to stop every one of those? Are they now going to read content from every site and determine which ones are true and which ones are selling you a lie? I don't see that happening. That's not the way that the Internet works." [19] Despite this sounding of alarm bells by BuzzFeed (as early as April 2016), things got only worse with fake news on Face- book. We counted at least 25 articles published on the topic of fake news from April to November 2016 on BuzzFeed, culminating with the story of "How teens in the Balkans are duping Trump supporters with fake news", published on November 3, 2016 and followed up by the related piece on "How Macedonian spammers are using Facebook groups to feed you fake news". These two articles provide details about one of the fake news factories operated by young people in the small town of Ceres, Macedonia, that targeted Facebook users in the United States. After reading these news articles This similarity should not be surprising. Once a spam- ming technique has been proven successful, it is easily repli- cated, since the knowledge about its working is also shared on the Internet. What should surprise and worry us is the fact that researchers and web platform developers may also know about such techniques, but they do little to warn and educate the public of the consequences. It is also unfortu- nate that tech companies who have been used to facilitate this practice, do not act pro-actively or effectively in stop- ping it. As an example of ineffective action we refer to the way Facebook handled the accusation that its news verifica- tion was not balanced. We discuss it in a next section. 2. FROM PROPAGANDA TO FAKE NEWS We should not give the reader the impression that on- line propaganda started with Twitter-bombs or Facebook fake news. In fact, it is much older than Social Media, it is as old as the Web itself. However, before the develop- ment of search engines it was not easy for propaganda to discover you. Search engines made it easy for propagandists to spread their message using techniques we now call Web Spam [6]. Advertisers, political activists and religious zealots of all kinds have been busy modifying the structure of the Web in an effort to promote their own biased results over the organic, unbiased results. The Search Engine Optimiza- tion (SEO) industry has grown out of this effort, sometimes using unethical techniques to promote their message, and search engines have been continuously evolving to fend off these attacks. In much of the first decade of the new millennium, search engines tried to defend against Web Spam, but the spam- mers were successful in circumventing their defenses by using first "Link Farms" and later "Mutual Admiration Societies", collections of web sites that would intentionally link to each other in order to increase everyone's PageRank [6]. Even when Google was reportedly using up to 200 different sig- nals to measure quality [14], professional SEOs would man- age to get sites like JC Penney's at the top of search results [15]. Google's ingenious solution to the problem of "unfair competition for high placement on a page" was the introduc- tion of the advertising model of AdWords and AdSense that gave spammers an opportunity to make money while follow- ing rules. That seemed to work for a while. However, these financial incentives were so lucrative that they provided a reason for anyone to have a presence on the Web, especially if that Web presence managed to attract clicks and thus, ad dollars. This led to "click bait" and to the creation of ads masquerading as outrageous (fake) news stories, as we discussed in the previous section. But as Search Engines and Social Media evolve, so do the propagandistic techniques. The rise of three recent methods of spamming in the wake of the U.S. presidential elections, "fake news", "featured snippets" manipulation [4], and "auto- completion revelations" [3] are the latest chapters in spread- ing propaganda through search engines and social media so that it will find you. As a community of researchers we need to embrace the challenge of documenting and understand- ing these phenomena as well as finding ways to make these issues known to the platforms providers. Journalists and non-specialists also need to be informed, as they sometimes give credence to conspiracy theories, confusing the public [21]. 3. RESEARCH THAT INFORMS DESIGN It is important for researchers, journalists and web users to continue to pay attention to the information and misinfor- mation they encounter on the Web, be it on Google, Twitter, or Facebook. In this section, we discuss how research results and their publicizing lead over time to changes in the design features of these systems, addressing the exhibited weak- nesses. 3.1 The Evolution of Real-Time Search Re- sults The central finding that gave the title to [8] was the ma- nipulation of Google real-time search results through repe- tition of Twitter posts by accounts (real users or bots) sup- porting a particular candidate. In December 2009 (just one month before the MA special election for the U.S. Senate seat in 2010), Google followed Bing in introducing "real- time search results", placing social media messages in one of the top positions search results for a relevant search query. These messages came mostly from Twitter, which had an easy-to-use API to pull the tweets. Tweets appearing in the search results were those that had been recently posted. That created the opportunity for political propagandists to exploit the search rankings creating a Twitter-enabled Google Bomb. As we documented in our paper, the manipulators were repeating the same messages, something also allowed by Twitter, over and over to increase the volume of conver- sation about a particular topic and keep it fresh for search engines to include in their real-time results. Repetition of a message would be annoying to the propagandist followers, but the target was not their followers' feed; it was Google and Bing, and through them, the public. We can see these highly-placed tweet messages from ran- dom Twitter accounts in a screen shot for Martha Coakley's search results, taken in January 2010 (Figure 2). During 2010, Google eventually recognized that giving anonymous social media accounts a premium spot in its search results was not in line with its goals for reliable information and for a few years this feature disappeared. However, it has come back again, but in a different format: when searching for a person, it will pull up tweets from their timeline, as opposed to tweets about them, as exemplified in Figure 3. This is a great improvement, because it prevents actors who have an interest to promote their adversarial messages about an individual or product to receive an unearned spot at the top of the search results. 3.2 The Evolution of Retweeting In [8], we included the following observation at the end of Section 4: Our experiments with Google real-time search have shown that, even though Google doesn't dis- play tweets from users that have a spammer sig- nature, it does display tweets from non-suspected users, even when these are retweets coming from spammers. Thus, simply suspending spamming attacks is not sufficient. There should be some mechanism that allows for retroactively deleting retweets of spam and some mechanism that la- bels some Twitter users as enablers of spam. At that time (in 2010), Twitter didn't have an easy way to quote a tweet and it allowed users to edit the original tweet text when retweeting, as the tweet shown in Figure 1 indicated. That design feature turned out to be very prob- lematic, among others for the reason mentioned in the quote above: deleted spam tweets lived in the retweets of other Twitter users. However, it was also problematic because users often were purposefully changing the meaning of the text they were retweeting [10]. Most of this re-purposing was possible via third-party applications that were very popular in the early years of Twitter. These applications were shut down over the years and nowadays Twitter doesn't allow the editing of a tweet that is being retweeted. Additionally, if the original is deleted, the retweet is also deleted, while in a quoted retweet, the text "This tweet is unavailable." will 4. DISCUSSION What is the moral of the story? In the past, researchers were the ones discovering and documenting the misuse and abuse of socio-technical platforms by the hands of dubious actors with dubious agendas. [8] is only one such example. However, our discovery was possible only because we were collecting data in real-time, after having noticed some evi- dence of foul play. When we think about Twitter's approach to combating spammers, it seems reasonable that tweets created by misinformation-spreading accounts are automat- ically deleted and retracted from the entire network, once the accounts are suspended. However, the downside of such an approach is that it makes it impossible for researchers and fact-checkers to go back in time and study the origin of misinformation campaigns and the mechanism for spreading them. That is a severe limitation to research. The problem becomes even more pronounced in the content of fake news spreading on Facebook. Most Facebook groups are private and if they are the source for starting certain cascades of fake news, outside researchers cannot observe them in their early stages, missing crucial information that would lead to their understanding. Thus, it is not surprising that in the current situation created by the fake news plague, researchers didn't play a leading role in their discovery. It were journalists and not researchers in academia or Facebook and Google who raised concerns, but were not heard. This is worrisome. Facebook, by replacing humans with algorithms, has played a crucial role in fueling the fake news spreading phenomenon. Simi- larly, the ease with which Google enables earning ad money for page impression provided the financial incentives for the creation of the fake news industry. In light of what we know so far, here is our open ques- tion to the research communities interested in information retrieval: in the context of the now omnipresent, web-based, socio-technical systems such as Facebook, Google, and Twitter, what tasks should be performed by humans and what tasks by algorithms? Our communities should lead the way in providing answers to this question. 5. REFERENCES [1] S. Frenkel. Renegade facebook employees form task force to battle fake news. BuzzFeed, http:// bzfd.it/ 2mITL31 , 2016-11-14. [2] A. Friggeri, L. Adamic, D. Eckles, and J. Cheng. Rumor Cascades. In Proc. of ICWSM, 2014. [3] Q. Hardy and M. Richtel. Don't ask? internet still tells. New York Times, http:// nyti.ms/ 2nyWnSx , year = 2012-11-21. [4] A. Jeffries. Google's featured snippets are worse than fake news. The Outline, http:// bit.ly/ 2n5vgB2 , 2017-03-05. [5] A. Kantrowitz. Facebook wanted a fight against fake news. it got one. Facebook Newsroom, http:// bzfd.it/ 2nLCmsl , 2015-01-20. [6] P. Metaxas. Web Spam, Social Propaganda and the Evolution of Search Engine Rankings. Lecture Notes BIP, Springer-Verlag, 2010. Figure 4: Facebook recently moved into implement- ing a system of warning towards sharing news items that have been disputed. show in place of the deleted tweet. 3.3 The Evolution of Fake News on Facebook The proliferation of fake news on Facebook achieved new levels once Facebook made a big change in how its algorithm for the Trending News feature worked. Before August 2016, when this change took effect, the Trending News feature was being curated by human editors, who filtered out unreliable sources and chose neutral or balanced sources for breaking news stories. However, when the online tech blog Gizmodo posted an article in May 2016 [11], in which former employ- ees of the Trending News lamented anti-conservative bias, Facebook reacted hastily and clumsily. Worried about po- tential lawsuits for suppressing freedom of speech, it fired its team of human editors and replaced them with Machine Learning algorithms. Given their prior research on rumor cascades on facebook [2] one would expect that technical experts had a better understanding on the limitations of AI algorithms, but maybe they were not involved in the deci- sion [1]. It didn't take long after that change for fake news to start achieving Trending News status, as BuzzFeed reported on August 30, 2016 [16]. Despite BuzzFeed's relentless re- porting on the fake news plague throughout the pre-election season, the rest of the media and the public didn't tune in into this conversation until after the election. Facebook initially disputed that it had a fake news prob- lem, claiming that it accounts for only 1% of the news sto- ries. However, the company changed course under the in- creased and sustained public pressure and introduced new features in its interface and the algorithms to address the issue [9]. One important feature that has rolled out recently is the labeling of news posts as "Disputed" via fact-checking, third- party providers such as Snopes or PolitiFact. The screens hot in Figure 4 is an example of this feature in action. In addition to adding this label, Facebook warns users with an alert box before they try to share a disputed story, but they are still allowed to share [9]. It remains to be seen how this new feature will affect fake news spreading. Again, access to Facebook data that could allow independent researchers to evaluate the effectiveness of such interventions. Without it, our understanding of changes in human behavior correlated with or caused by changes in the socio-technical platforms they inhabit, will be limited. This is a reason of concern for our research com- munities. [7] P. T. Metaxas, S. Finn, and E. Mustafaraj. Using twittertrails.com to investigate rumor propagation. CSCW'15 Companion, http://bit.ly/2n1CkMH, pages 69–72, 2015. [8] P. T. Metaxas and E. Mustafaraj. From obscurity to prominence in minutes: Political speech and real-time search. In Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, http:// bit.ly/ 2n1IEUC , April 2010. [9] A. Mosseri. News feed fyi: Addressing hoaxes and fake news. Facebook Newsroom, http:// bit.ly/ 2mzv8pe, 2016-12-15. [10] E. Mustafaraj and P. T. Metaxas. What edited retweets reveal about online political discourse. In AAAI Workshop on Analyzing Microtext, http:// bit.ly/ zWSeMF , 2011. [11] M. Nunez. Former facebook workers: We routinely suppressed conservative news. Gizmodo, http:// bit.ly/ 2ngF2k5 , 2016-05-09. [12] E. Owens and U. Weinsberg. News feed fyi: Showing fewer hoaxes. Facebook Newsroom, http:// bit.ly/ 2mBUnIF , 2015-01-20. [13] J. Ratkiewicz, M. Conover, M. Meiss, B. Goncalves, S. Patil, A. Flammini, and F. Menczer. Truthy: Mapping the spread of astroturf in microblog streams. In WWW'11, 2011. [14] Google Keeps Tweaking Its Search Engine, 2007. URL: http://nyti.ms/2n5JjGx [accessed: 2007-06-03]. [15] D. Segal. The dirty little secrets of search. New York Times, http:// nyti.ms/ 2nXfSE0 , 2012-02-12. [16] C. Silverman. Facebook must either innovate or admit defeat at the hands of fake news hoaxsters. BuzzFeed, http:// bzfd.it/ 2nMvfia, 2016-08-30. [17] C. Silverman and L. Alexander. How teens in the balkans are duping trump supporters with fake news. BuzzFeed, http:// bzfd.it/ 2mC6tBm, 2016-11-03. [18] C. Silverman and L. Alexander. How macedonian spammers are using facebook groups to feed you fake news. BuzzFeed, http:// bzfd.it/ 2mzvCM0 , 2016-11-08. [19] L. Sydell. We tracked down a fake-news creator in the suburbs. here's what we learned. NPR, http:// n.pr/ 2nuHN1T . [20] The Editorial Board. Facebook and the digital virus called fake news. New York Times, 2016-11-19. [21] C. Timberg. Could google rankings skew an election? new group aims to find out. Washington Post, http:// wapo.st/ 2mNa0wY , 2017-03-14.
1707.03608
1
1707
2017-07-12T09:11:58
A Probabilistic Embedding Clustering Method for Urban Structure Detection
[ "cs.SI", "physics.soc-ph" ]
Urban structure detection is a basic task in urban geography. Clustering is a core technology to detect the patterns of urban spatial structure, urban functional region, and so on. In big data era, diverse urban sensing datasets recording information like human behaviour and human social activity, suffer from complexity in high dimension and high noise. And unfortunately, the state-of-the-art clustering methods does not handle the problem with high dimension and high noise issues concurrently. In this paper, a probabilistic embedding clustering method is proposed. Firstly, we come up with a Probabilistic Embedding Model (PEM) to find latent features from high dimensional urban sensing data by learning via probabilistic model. By latent features, we could catch essential features hidden in high dimensional data known as patterns; with the probabilistic model, we can also reduce uncertainty caused by high noise. Secondly, through tuning the parameters, our model could discover two kinds of urban structure, the homophily and structural equivalence, which means communities with intensive interaction or in the same roles in urban structure. We evaluated the performance of our model by conducting experiments on real-world data and experiments with real data in Shanghai (China) proved that our method could discover two kinds of urban structure, the homophily and structural equivalence, which means clustering community with intensive interaction or under the same roles in urban space.
cs.SI
cs
A Probabilistic Embedding Clustering Method for Urban Structure Detection Xin Lina,b, Haifeng Lib*, Yan Zhangb, Lei Gaob, Ling Zhaob, Min Dengb a School of Civil Engineering, Central South University, Changsha, China b School of Geosciences and info-physics, Central South University, Changsha, China Commission IV, WG IV/3 KEY WORDS: Urban Structure, Embedding, Clustering Method, Probabilistic Model, Feature Representation ABSTRACT: Urban structure detection is a basic task in urban geography. Clustering is a core technology to detect the patterns of urban spatial structure, urban functional region, and so on. In big data era, diverse urban sensing datasets recording information like human behaviour and human social activity, suffer from complexity in high dimension and high noise. And unfortunately, the state-of-the- art clustering methods does not handle the problem with high dimension and high noise issues concurrently. In this paper, a probabilistic embedding clustering method is proposed. Firstly, we come up with a Probabilistic Embedding Model (PEM) to find latent features from high dimensional urban sensing data by "learning" via probabilistic model. By latent features, we could catch essential features hidden in high dimensional data known as patterns; with the probabilistic model, we can also reduce uncertainty caused by high noise. Secondly, through tuning the parameters, our model could discover two kinds of urban structure, the homophily and structural equivalence, which means communities with intensive interaction or in the same roles in urban structure. We evaluated the performance of our model by conducting experiments on real-world data and experiments with real data in Shanghai (China) proved that our method could discover two kinds of urban structure, the homophily and structural equivalence, which means clustering community with intensive interaction or under the same roles in urban space. 1. INTRODUCTION Urban structure detection is a basic task in urban geography, beneficial to urban planning, government management and so on (Bourne, 1963). In big data era, there are diverse urban sensing data to describe the city on different preservatives. Those data help us analysis and understand the process of urban structure in some aspects, such as urban functional regions (Yuan et al., 2012), socioeconomic environment (Liu et al., 2015), and sentiment computing (Xue et al., 2014). How to uncover the urban structures and discover patterns behind massive human behave data in unbans is vital. Clustering is one of core technique which utilizes the similarity between samples in a dense and short representation. From a large body of clustering techniques (spectral clustering method (Luxburg, 2007; Ng et al., 2001), hierarchical clustering method (Rokach and Maimon, 2005), Fuzzy Clustering (Bezdek et al., 1984; Gustafson and Kessel, 1978), self-organization mapping (Kohonen and Honkela, 2007), etc.), it derives many relative works in urban structure exploration. For example, spectral clustering has already been used with success in urban land segmentation with social media data (Frias-Martinez and Frias-Martinez, 2014; Noulas et al., 2011); Hierarchical clustering method has been adopted to model urban structure with commuting flow data (Fusco and Caglioni, 2011); Google word2vec model also has been utilized to discover spatial distribution of urban land use with the data of points of interest (POI) (Yao et al., 2016). However, some of the state-of-the-art clustering methods are expensive for large real-world networks since they invlove * Corresponding author: [email protected] eigendecomposition of the appropriate data matrix. Secondly, most of the methods rely on a rigid notion of a network neighbourhood, which fails to allow a flexible algorithm for a network mixed by complex structures (Tang and Liu, 2011). Moreover, the noise in real-world data calls for a robust algorithm. Consequently, facing the complexity in high- dimensional data, the key problem is how to find a compact and expressive feature, i.e. an embedding representation in low dimension feature space from a high-dimensional data space. And the approach needs to be flexible and robust. In this paper, we proposed a probabilistic embedding clustering method to meet the need. Our contributions are listed as following. Firstly, we proposed a Probabilistic Embedding Model (PEM) to learn embedded representation of high dimensional urban sensing data. With the probabilistic model, we can reduce uncertainty caused by high noise and high dimension. Then, by the representations, we do clustering and could catch essential features hidden in the data known as patterns of urban structure. Secondly, our model could discover two kinds of urban structures, the homophily (Fortunato and Santo, 2010; Hoff et al., 2002) and structural equivalence (Henderson et al., 2012). The homophily contains nodes with intensive interaction or belonging to similar communities, while structural equivalence includes nodes having the same roles in urban structure. The rest of the paper is structured as follows. We present the details of our method in Section 2. In Section 3, we evaluate the clustering performance of our method by conducting everything else, but near things are more related than distant things" (Tobler, 1970). To determine the neighborhood, PEM uses a biased random walk of 2nd order Markovian. It defines two types of search strategies, the breadth-first search (BFS) (Kurant et al., 2010; Skiena, 2008) and the depth-first search (DFS) (Tarjan, 1972). BFS samples immediate neighbors of the source node while DFS samples neighbors sequentially at increasing distances from the source node. The strategies are controlled by hyperparameters p and q. Figure 1. Urban data matrix (a): information of parcels is stored in arrays and thus the urban data matrix is formed. There are 2 types of urban data matrix. One is to describe intrinsic properties of parcels (b) and the other one is to describe the interaction among parcels (c). Given a source node t, and that the walk just sampled the node v as the neighbour and is now carrying out its next step, the biased random walk works as Figure 2 and it shows how hyperparameters p and q drive the walk. Figure 2. Illustration of the biased 2nd random walk procedure in node2vec: It shows that how hyper-parameters p and q guide the walk between BFS and DFS. there Besides the hyperparameters, there are also other global parameters involved in the random walk and effective in the clustering results (Table 1). Unfortunately, is no systematic study investigating the effects of parameters and hyperparameters on clustering and coming up with well- justified rules of thumb. As a general recommendation, we suggest to set p to a lower value and q to a higher value for BFS while set p to a higher value and q to a lower value for DFS. If you want to balance the walk between BFS and DFS, a low q and a low p (a high q and a high p) are recommended. When (p, q) = 1, the random walk is just driven by the weights in SRG. Other parameters are suggested to be set higher for a more experiments on real-world data, including parameter sensitivity and perturbation analysis. In Section 4, we carry on a case study in Shanghai as an example for the detection urban structure. In Section 5, we conclude our work and illuminated some directions for future works. 2. PROBABILISTIC EMBEDDING CLUSTERING (PEC) METHOD In this section, we will present the details of our method, the Probabilistic Embedding Clustering (PEC) Method. PEC is based on the algorithm, Node2vec (Grover and Leskovec, 2016), which is initiated to learn continuous feature representations for nodes in networks. By extending the meaning of networks (directed and weighted) and combining with a clustering method, we have developed the node embedding method into a general embedding-clustering method without changing its basic idea. There are three components of PEC method: (1) Construction of Space Relation Graph (SRG), (2) Probabilistic Embedding Model (PEM), (3) Clustering. We would discuss each of these in detail in the remaining part. 2.1 Construction of Space Relation Graph (SRG) When recording the information of a city, we are used to divide the city into spatial parcels and the data stream is transformed to a set of arrays which describe the features of each parcel (Figure 1(a)). As known, the features could be intrinsic properties, like the size, population, number of Point of Interests (POIs) and so on (Figure 1(b)), but also the interaction with other parcels, like orientation-destination flow (Figure 1(c)). The set of arrays is called Urban Data Matrix. With such a matrix, we aim to find urban structure. In essence, the goal requires us to summarize the similarity or dissimilarity among different parcels according to their features. Thus, we proposed the Space Relation Graph (SRG). In the graph, each node presents the parcel of the city and each edge denotes the relationship between parcels. As the features, the relationship could represent for the similarity of intrinsic properties among parcels (SRG-I), but also the degree of interaction among parcels (SRG-II). The only restriction is that the graph ought to be undirected. For SRG-I, we measure the similarity by pairwise distance or other similarity function, such as Euclidean distance, cosine distance or Gaussian similarity function. While for SRG-II, since it is naturally a network, we simply normalize the pairwise interaction volume as the weight of edges. 2.2 Probabilistic Hyperparameters Embedding Model (PEM) & After obtaining SRG, we learn a probabilistic embedding representation (PER) for each node based on Node2vec(Grover and Leskovec, 2016) which is to maximize the likelihood of preserving network neighbourhoods of nodes and learn a mapping of nodes to a low-dimensional space for obtaining feature representations. PER is such a feature representation existing in a low-dimensional space for each node. The basic idea of PEM is utilizing the relationship between a node and the neighbours of it to represent the node itself. A fundamental hypothesis is the representation of a node in a network should be decided by its neighbourhood. The idea is similar to the Tobler's First Law, "Everything is related to accurate clustering result. It would saturate around some values definitely but no firm theoretic ground is proposed towards various networks. All these recommendations would be examined in Section 3. Parameters Definition d l r k Number of dimensions of the embedding vector for feature representation. Walk length which determines the length of sampling from a source node. Number of walks which denotes the times of sampling from a source node. Neighbourhood size which restricts the size of neighbourhood. Table 1. Global parameters involved in the biased random walk: Setting them to higher values would help obtain a more accurate clustering result. 2.3 Clustering We use k-means algorithms on PER to get final results. Speaking from experience, when adopting BFS (p≤1, q>1), we could uncover the community where the subjects have intensive interaction, named as homophily. While with DFS (p≥1, q<1), we could divide the subjects into a hierarchical pattern where the subjects play the same role within a grade, named as structural equivalence. The two types of structure make great sense in urban space: The homophily could help describe the phenomenon of spatial separation and the structural equivalence is conducive to find the urban hierarchy. Though the search strategy and other parameters influences the detection of urban structure, the network itself restricts the detection. For example, for SRG with actual interaction, we are likely to find the homophily and structural equivalence. For SRG with virtual similarity between the property like functions of places, we utilize BFS mainly to explore the urban functional regions. To determine the number of clusters, we use several clustering criteria: Davies-Bouldin index (Davies and Bouldin, 1979), Dunn index (Dunn, 1973), Silhouette index (Rousseeuw, 1987) and so on. Of course, other clustering criteria is welcomed as well. In certain cases, the number of clusters could be also decided by priori knowledge. 3. EVALUATION In this section, we mainly evaluate the performance of our method on a real-world network, Metro Line Network in Shanghai (China), including parameter sensitivity, perturbation analysis and so on. 3.1 Experimental Setup Dataset: Line 1 to 11 of Shanghai metro network are used in this section and we transformed the metro line network in Shanghai to an urban data matrix in this way: if the two subway stations are connected directly, the pairwise distance is and denoted as 1. Otherwise, we regard the distance is infinitely big. Thus, the connection among subway stations is used to represent the stations themselves. Here, SRG is equal to the data matrix. 3.1.1 Dataset: Line 1 to 11 of Shanghai metro network are used in this section and we transformed the metro line network in Shanghai to an urban data matrix in this way: if the two are connected directly, the pairwise subway stations and distance is denoted as 1. Otherwise, we regard the distance is infinitely big. Thus, the connection among subway stations is used to represent the stations themselves. Here, SRG is equal to the data matrix. 3.1.2 Ground-truth: The metro line network is mixed with homophily and structural equivalence. With using SRG of metro line network in the way mentioned above, it is much easier to discover the structural equivalence. The network only has a hierarchy of two levels: transfer station or not. Thus, the number of clusters (n) are taken as 2 and the corresponding ground-truth have two kinds of labels marking transfer station or not. For another thing, the homophily definitely means clusters with subway stations on the same line. Thus, the number of clusters are taken as 11 and the corresponding ground-truth has 11 unique labels marking which line the subway station is on. With using this SRG, it needs to catch information at a larger neighbourhood for obtaining structure of homophily. 3.1.3 Comparison groups: Our experiments evaluate the embedding vectors obtained by PEM on clustering. For the task, we compare the performance of PEM with that of the following clustering algorithms: Spectral clustering (SC) (Frias-Martinez and Frias-Martinez, 2014; Luxburg, 2007): SC is a clustering method which also construct a similarity graph at first. However, it is a naturally factorization approach where we take the top d eigenvectors of the normalized Laplacian matrix of the graph as the embedding vector for nodes. And then it uses k-means to do clustering. Hierarchical clustering analysis (HCA) (Fusco and Caglioni, 2011; Rokach and Maimon, 2005): HCA is a clustering method which seeks to build a hierarchy of clusters. There are 2 types of strategies: Agglomerative (a bottom-up approach merging observations from each one) and Divisive (a top-down approach dividing the observations from one cluster). Here, we adopt Agglomerative HCA. All the experiments would be repeated 20 times (if possible) and the average is taken as the final results. 3.2 Hyperparameters We regard that BFS and DFS are guided by hyperparameters p and q and thus influence whether the detected result of urban structure is homophily or structural equivalence. We now empirically show this phenomenon. The other parameters are set as d=5, l=10, r=10 and k=5. As mentioned in Section 3.1.2, we could deduce that adopting BFS helps discover the structural equivalence (when n=2) while using DFS helps find the homophily (when n=11) in this network. Figure 3 shows that when the search strategy is more inclined to BFS (p<1 or q >1), Macro-F1 scores of structural equivalence get higher and when the search strategy is more inclined to DFS (p>1 or q<1), Macro-F1 of homophily get higher. Additionally, with most settings of hyperparameters, PEM outperforms SC and HCA in both cases. Thus, it proves that PEM is flexible, which is able to discover different kinds of structure through tuning hyperparameters. And it is also accurate when the values of p and q is proper. Figure 3. Changes of Macro-F1 versus hyperparameters p and q: when the search strategy is more inclined to BFS (p<1 or q >1), Macro-F1 scores of structural equivalence get higher and when the search strategy is more inclined to DFS (p>1 or q<1), Macro-F1 of homophily get higher. Additionally, with most settings of hyperparameters, PEM outperforms SC and HCA in 3.3 Parameter Sensitivity both cases. PEM involves a set of parameters and we examine the recommendations about how to choose the parameters in Section 2.2. Here, the basic parameters are set as d=5, l=10, r=10, k=5 and the hyperparameters are set as p=4, q=1. The influences of parameters on the detection of homophily and structural equivalence in this network are shown as Figure 4. As seen in Figure 4, the overall effect of parameters is positive: Macro-F1 scores are on the rise despite the fluctuations. It is also could be seen that the parameters have little effect on the results when n=2. As mentioned above, when p=4 and q=1, it's DFS guiding the random walk and we are likely to discover structure of homophily in this network. Thus, under the significant influence of hyperparameters, it is reasonable that Macro-F1 scores are not hardly affected by the parameters when n=2 while Macro-F1 scores rise obviously. Among the parameters, k has a significant influence on the clustering, and d as well as r follows. The influence of l is limited. 3.4 Perturbation Analysis Since many real-world datasets co-exists with uncertain noise, we perform a perturbation study where we added noise data. The distribution of noise obeys Gaussian distribution Ν(0,σ2) (σ ∈ (0.2,0.5,1,2,4)) and Poisson distribution P(λ) (λ ∈ (1,2,4,8,16)) respectively and the value of created noise matrices is processed into [0, 1]. The experimental results are shown as following. It could be seen that Macro-F1 scores change little whatever the distribution of noise is. Thus, PEM is proved to be able to handle the problem with high noise. 4. CASE STUDY: URBAN STRUCTURE IN SHANGHAI USING TAXI TRAJECTORY DATA 4.1 Experimental Setup Figure 4. Parameter Sensitivity: the overall effect of parameters is positive: Macro-F1 scores are on the rise despite the fluctuations1. Figure 5. Perturbation analysis: The steady Macro-F1 results show that PEM could handle the problem with high noise Figure 6. The studied area: We take the central area within the outer ring of Shanghai as the studied area and divide the area into 4422 uniform grids whose size is 500m×500m. 4.1.1 Dataset: We use the dataset containing trajectories of over 160 million records created by more than 4,000 taxis from December 2nd to December 5th in 2013 (a four-day pattern). Derived from the trajectory datasets, we obtain the orientation- destination matrix about 4422 grids. The studied area: We take the central area within the outer ring of Shanghai as the studied area and divide the area into 4422 uniform grids whose size is 500m×500m (Figure 6). 1 Since the accurate values of experimental results are not repeatable, the Macro-F1 scores have a little difference. But the trends reflected by the experiments are provable. 0.247 0.147 0.165 0.413 0.021 ACKNOWLEDGEMENTS 5. CONCLUSION AND FUTURE WORKS structure through tuning hyperparameters Through the evaluation on the real-world network (the metro line network in Shanghai, China), PEM is flexible to explore urban and outperforms Spectral Clustering and Hierarchical Clustering Analysis with proper settings of parameters. In usual, when p is lower or q is higher, it is inclined to adopt BFS. In contrast, it is inclined to adopt DFS. In different networks, BFS (or DFS) would find different type of structure. While in general, the influence of parameters (dimension d, walk of length l, number of walks r and context size k) have a positive influence on the accuracy. Additionally, the perturbation analysis verifies that PEM is able to learn feature presentations for nodes and do clustering under high dimension and high noise. Based on the study, with the taxi dataset in Shanghai, we utilized PEM to explore the structure of region distributions successfully. However, to improve the theory and method, there is still a long way to go. In the future work, we would add more experiments with different urban sensing data and other 2vec models and fully utilize the flexibility of PEM to explore urban structure. And the systematic study of setting parameters and link with other theories would be extended. This research has also been supported by National Natural Science Foundation of China (41571397 and 41501442) and Natural Science Foundation of Hunan Province (2016JJ3144) . This research has also been supported in part by the Open Research Fund Program of Shenzhen Key Laboratory of Spatial Smart Sensing and Services (Shenzhen University), and the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry (50-20150618). REFERENCES Bezdek, J.C., Ehrlich, R., Full, W., 1984. FCM: The fuzzy c- means clustering algorithm. Computers & Geosciences 10, 191- 203. Bourne, L.S., 1963. Internal structure of the city : readings on urban form, growth, and policy. Historian 26, 1–18. Davies, D.L., Bouldin, D.W., 1979. A Cluster Separation Measure. IEEE Computer Society. Dunn, J.C., 1973. A fuzzy relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters. Journal of Cybernetics 3, 32-57. Fortunato, Santo, 2010. Community detection in graphs. Physics Reports 486, 75-174. Frias-Martinez, V., Frias-Martinez, E., 2014. Spectral clustering for sensing urban land use using Twitter activity. Engineering Applications of Artificial Intelligence 35, 237-245. Fusco, G., Caglioni, M., 2011. Hierarchical Clustering through Spatial Interaction Data. The Case of Commuting Flows in South-Eastern France. Springer Berlin Heidelberg. 4.1.2 Experimental settings: We set hyperparameters and parameters as p=1, q=1, d=64, l=80, r=10 and k=5. The number of clusters is determined to be 5 according to the fast unfolding algorithm. 4.2 Result and Discussion As p=1 and q=1, the random walk is balanced between BFS and DFS. The detection result (Figure 7) of urban structure would thus reflect the interaction between regions faithfully. As Figure 7(a) shows, the regions are cohesive and have clear boundary. Figure 7(b) shows that it almost confirms to the boundary of administrative districts. It could be seen that people seldom take taxi for a further place and the interaction frequency within a region are much higher than that between regions (Table 2). Consequently, PEM discovered the homophily structure of the studied area successfully. Region Region Region Region Region 1 2 3 4 5 0.502 0.082 0.204 0.137 0.073 0.228 0.376 0.162 0.212 0.016 0.177 0.053 0.611 0.082 0.077 Freq. Region 1 Region 2 Region 3 Region 4 Region 0.257 0.023 0.314 5 Table 2. The interaction frequency between regions: the 0.044 0.362 interaction frequency within a region are much higher than that between regions. Figure 7. The detection result of urban structure in the studied area: (a) the visualization by ARCGIS; (b) the detection result compared with the administrative map: the regions are cohesive and have clear boundary which almost confirms to the boundary of administrative districts. Grover, A., Leskovec, J., 2016. node2vec: Scalable Feature Learning for Networks, The ACM SIGKDD International Conference. Areas and Users in Location-based Social Networks. AAAI Workshop - Technical Report. Gustafson, D.E., Kessel, W.C., 1978. Fuzzy clustering with a fuzzy covariance matrix, Decision and Control Including the Symposium on Adaptive Processes, 1978 IEEE Conference on, pp. 761-766. Henderson, K., Gallagher, B., Eliassi-Rad, T., Tong, H., Basu, S., Akoglu, L., Koutra, D., Faloutsos, C., Li, L., 2012. RolX:structural role extraction & mining in large graphs, ACM Knowledge Discovery and Data Mining, pp. 1231-1239. Hoff, P.D., Raftery, A.E., Handcock, M.S., 2002. Latent Space Approaches to Social Network Analysis. Journal of the American Statistical Association 97, 1090-1098. Rokach, L., Maimon, O., 2005. Clustering Methods. Springer US. Rousseeuw, P.J., 1987. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational & Applied Mathematics 20, 53-65. Skiena, S.S., 2008. The Algorithm Design Manual. Springer London. Tang, L., Liu, H., 2011. Leveraging social media networks for classification. Data Mining and Knowledge Discovery 23, 447- 478. Kohonen, T., Honkela, T., 2007. Kohonen network. 2, 1568. Tarjan, R., 1972. Depth first search and linear graph algorithms. SIAM JORNAL ON COMPUTNG 1. Kurant, M., Markopoulou, A., Thiran, P., 2010. On the bias of BFS (Breadth First Search). Teletraffic Congress, 1-8. Liu, Y., Liu, X., Gao, S., Gong, L., Kang, C., Zhi, Y., Chi, G., Shi, L., 2015. Social Sensing: A New Approach to Understanding Our Socioeconomic Environments. Annals of the Association of American Geographers 105, 512-530. Luxburg, U.V., 2007. A tutorial on spectral clustering. Statistics & Computing 17, 395-416. Ng, A.Y., Jordan, M.I., Weiss, Y., 2001. On Spectral Clustering: Analysis and an algorithm. Advances in Neural Information Processing Systems, 849--856. Noulas, A., Scellato, S., Mascolo, C., Pontil, M., 2011. Exploiting Semantic Annotations for Clustering Geographic Tobler, W.R., 1970. A Computer Movie Simulating Urban Growth in the Detroit Region. Economic Geography 46, 234- 240. Xue, B., Fu, C., Zhan, S., 2014. A Study on Sentiment Computing and Classification of Sina Weibo with Word2vec, IEEE International Congress on Big Data, pp. 358-363. Yao, Y., Li, X., Liu, X., Liu, P., Liang, Z., Zhang, J., Mai, K., 2016. Sensing spatial distribution of urban land use by integrating points-of-interest and Google Word2Vec model. 1- 24. Yuan, J., Zheng, Y., Xie, X., 2012. Discovering regions of different functions in a city using human mobility and POIs, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 186-194.
1906.05143
1
1906
2019-06-12T13:59:51
A decentralized trust-aware collaborative filtering recommender system based on weighted items for social tagging systems
[ "cs.SI", "cs.IR" ]
Recommender systems are used with the purpose of suggesting contents and resources to the users in a social network. These systems use ranks or tags each user assign to different resources to predict or make suggestions to users. Lately, social tagging systems, in which users can insert new contents, tag, organize, share, and search for contents are becoming more popular. These systems have a lot of valuable information, but data growth is one of its biggest challenges and this has led to the need for recommender systems that will predict what each user may like or need. One approach to the design of these systems which uses social environment of users is known as collaborative filtering (CF). One of the problems in CF systems is trustworthy of users and their tags. In this work, we consider a trust metric (which is concluded from users tagging behavior) beside the similarities to give suggestions and examine its effect on results. On the other hand, a decentralized approach is introduced which calculates similarity and trust relationships between users in a distributed manner. This causes the capability of implementing the proposed approach among all types of users with respect to different types of items, which are accessed by unique id across heterogeneous networks and environments. Finally, we show that the proposed model for calculating similarities between users reduces the size of the user-item matrix and considering trust in collaborative systems can lead to a better performance in generating suggestions.
cs.SI
cs
A decentralized trust-aware collaborative filtering recommender system based on weighted items for social tagging systems Hossein Monshizadeh Naeen1,2, Mehrdad Jalali3 1 Department of Computer Engineering Neyshabur Branch, Islamic Azad University, Neyshabur, Iran, monshizadeh@iau- neyshabur.ac.ir 2 Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin,Iran, [email protected] 3 Department of Computer Engineering, Islamic Azad University of Mashhad, Mashhad, Iran, [email protected] Abstract Recommender systems are used with the purpose of suggesting contents and resources for users in a social network. These systems use ranks or tags each user assign to different resources to predict or make suggestions to users. Lately, social tagging systems, in which users can insert new contents, tag, organize, share, and search for contents are becoming more popular. These systems have a lot of valuable information, but data growth is one of its biggest challenges and this has led to the need for recommender systems that will predict what each user may like or need. One approach to the design of these systems which uses social environment of users is known as collaborative filtering (CF). One of the problems in CF systems is trustworthy of users and their tags. In this work, we consider a trust metric (which is concluded from users tagging behavior) beside the similarities to give suggestions and examine its effect on results. On the other hand, a decentralized approach is introduced which calculates similarity and trust relationships between users in a distributed manner. This causes the capability of implementing the proposed approach among all types of users with respect to different types of items, which are accessed by unique id across heterogeneous networks and environments. Finally, we show that the proposed model for calculating similarities between users reduces the size of the user-item matrix and considering trust in collaborative systems can lead to a better performance in generating suggestions. Keywords: Recommender Systems, Collaborative filtering, Trust, Social Tagging. 1. Introduction Social networks and multimedia content sharing web sites have become increasingly popular in recent years [1], and then recommender systems (RS) have emerged as an important response to the so-called information overload problem in which users are finding it difficult to locate the right information at the right time [2]. These systems are applied in a variety of applications and fields. Social tagging systems such as Delicious, CiteULike, Flickr, etc., allow users to assign personal labels to resources based on their own background knowledge with a purpose to manage, organize, share, discover and recover resources, 1 utilize recommender systems for their suggestion and prediction process [3]. In different types of RSs, they aggregate users' reviews of products, services, and each other, into valuable information. Notable commercial examples include Amazon, Google's page ranking system [e.g. 4], and the Epinions web of trust/reputation system [e.g. 5]. One of RS implementation models which we use in this work are known as Collaborative Filtering (CF) recommender systems. CFs have some weaknesses; data sparsity is the first serious issue of collaborative filtering, i.e. the most active users will only have tagged or rated a small subset of the overall database. Thus, even the most popular items have been viewed by very few users. This weakness is especially evident on cold start users, users who are new in the system or we have very little existing data about them, so we have problems providing good recommendations to these users. The other weakness is Scalability problem. Usually there are millions of users and products. Thus, a large amount of computation power is often necessary to calculate recommendations. The last weakness we mention here is noisy or spam tags, users may make mistakes when they are using the system, or CF results can easily be affected by malicious users' attacks or some agents give wrong tags on purpose for advertisement [6]. In this article in general, we use collaborative filtering, and we try to give more accurate recommendations to users, in particular. For this we assign a degree of trust to each user, according to their tagging behavior in the network. Some neighbors of a user, who are similar to them, based on the resources they have tagged, might not be trustworthy enough to participate in recommendation process. Briefly, Similarity metric on its own is not reliable, so beside similarity of a user, credibility should be considered too. To compute trust values, we study user's behavior in the system based on tags they assigned to different resources and comparing their view with global views. The remainder of the paper is organized as follows. In Section 2 we introduce the background of recommender systems. In Section 3 we define the problem. We describe proposed model Section 4. Section 5 includes results and evaluation. In Section 6 we talk about conclusions and future works. 2. Background As the number of recommender systems is increasing and more users are getting interested in social networking sites, and also because of information explosion in these systems, many approaches on recommender systems have been studied and proposed. In this section we will review related works on recommender systems with tag orientation and also the studies that are done in the trust field. 2.1. Context-based studies There have already been a reasonable amount of researches in using different attributes that exist in social networks as background knowledge to give recommendation in RS such as [7,8,9], but none of them did 2 not use tags as an attribute to decide on predictions. Some other studies work on using tagging information for recommendation purposes based on the recommendation of tags for assisting the user in annotation related tasks, or to predict tags for contents of the site[10,11]. But Contextual information has been proved to be efficient in recommender systems. Adomavicius et al. [12] presented a reduction-based approach for multidimensional recommendation model that incorporates contextual information, such as place and time, Companion, into the process of recommendation. Vig et al. [13] used tags given to movies of MovieLens site and defined two different metrics, tag relevance and tag preference. tag relevance describes the relationship between a tag and an item, and tag preference shows the user's sentiment towards a tag. They give a list of suggested movies to each client, using basic CF based on ratings users give to movies. Then they show relevance and preference scales to help the user understand why an item was recommended (justification) and also to help users make good decisions by this information. 2.2. Tag-based CF Interests in involving tags in collaborative filtering recommender systems have been increased in recent years. Tso-Sutter et al.[14] proposed an approach to integrate tags in recommender systems by first extending the user-item matrix and then applying an algorithm that fuses two popular RS algorithms, item based CF and user based CF, such that the correlations between users, items and tags can be captured simultaneously. But they have not mentioned the scalability in their work, as long as they extend matrix in two dimensions, it seems the scalability problem gets much worse in this case. Nakamoto et al. [15] introduced a tag based CF which uses tags overlaps to compute similarities between users in two different approaches. However their work may have problem if there are not sufficient overlaps of tags. In another work, Zheng et al. [16] worked on a tag and trust based recommender system, in which they try to get better results by giving weight to temporal information and then combine the time weights with similarity weights. 2.2. Trust-based CF In trust field there are different works done according to information and facilities that exist in the social network which we will review some of them in the follow. O'Donovan et al. [17] proposed a number of computational models of trust based on the past rating behavior of individual profiles, these models operate at the profile-level (average trust for the profile overall) and at the profile-item-level (average trust for a particular profile when it comes to making recommendations for a specific item) and then they discuss about 3 different ways to incorporate these trust values into the recommendation process, and the results show that prediction error has been reduced when trust is considered, by the way their approach is only based on ratings and does not involve tags. In other article [18] users can review items (such as cars, books, movies, software, etc.) and also assign them numeric ratings in the range 1 (min) to 5 (max). Users can 3 also express their Web of Trust, i.e. reviewers whose reviews and ratings they have consistently found to be valuable or not valuable, then they aggregate all the trust statements to produce a trust network then to interfere trust values between users who have not directly declare their trust to other users (trust propagation). Their work as you see, considers trust and also covers cold start problem so can calculate similarity between more users, even new users. But it needs users in the system declare their degree of trust to other users, which is not supported by all social networking sites. Jin et al. [19] have used similarity of friends as a trust metric, and then defined a modified random walk algorithm on the friends trust network to recommend top-k items to each user. Their work needs a social network with the ability to add users as friends. Noll et al. [20] introduced the time of tagging as an additional dimension for assessing the trust of a user in Delicious. They proposed a graph-based algorithm, called spammingresistant expertise analysis and ranking (SPEAR). It computes the expertise score of a user and the quality score of a content which are dependent on each other. The time of tagging is considered so that the earlier a user tags a content, the more expertise score he/she receives. These two scores are calculated iteratively in a similar way to that of the HITS algorithm. It was shown that SPEAR produces better ranking of users than the HITS method. SPEAR was able to demote different types of spammers and remove them from the top of the ranking. 3. Problem definition 3.1. Collaborative Filtering Systems Recommender systems (RS) predict ratings of items or suggest a list of items that is unknown to the user[14]. They take the users, items as well as the ratings or tags of items into account. In general there are two types of Recommender Systems, content-based and collaborative filtering [18]. Content-Based approaches use the characteristics of items and try to recommend items that are similar to those that a user liked in the past[20]. Collaborative Filtering considers users' social environment i.e. they collect and analyzing a large amount of information on users' behaviors, activities or preferences in the social network and predict what each user will like. The underlying assumption of the collaborative filtering approach is that if a person A has the same opinion as a person B on an issue, A is more likely to have B's opinion on a different issue [21]. Collaborative filtering has been widely used in applications which produce a predicted likeliness score or a list of top-N recommended resources for a given user [22]. User-item matrix acts as a basic part in CF, user similarity are discovered from matrix and resource recommendation is also calculated based on the matrix [16]. In rating based systems values of the matrix are fulfilled with the user given ratings, but in tag based approaches traditional log-based ratings are generated based on user's log behaviors with each element taken a binary value 1 or 0, indicating whether a user has viewed a resource [23]. In this case, each viewed resource plays an equal role for a user and ratings are static over time, which may be against the common sense that people tend to present different preferences towards different 4 resources. As we will explain later in this paper we estimate a degree of users interests to each different item that they tag rather than binary values. 3.2. Trust Across most current research, definitions of trust fall into various categories, and a solid definition for it, in many cases can be quite elusive [17], because there are different trust views between users. There are algorithms whose goal is to predict, based on the trust network, the trustworthiness of "unknown" users, i.e. users in which a certain user didn't express a trust statement [18]. There are many different trust metrics, an important classification of trust metrics is global and local ones [24]. Local trust metrics take into account the very personal and subjective views of the users and predict different values of trust in other users for every single user. Instead global trust metrics predict a global "reputation" value that approximates how the community as a whole considers a certain user. From another point of view in a social tagging system, spam or noise can be injected at three different levels: spam content, spam tag- content association, and spammer [26]. Trust modeling can be performed at each level separately or different levels can be considered jointly to produce trust models, for example, to assess a user's reliability, one can consider not only the user profile, but also the content that the user uploaded to a social system (e.g., [27]). So from this aspect trust can get categorized into two classes according to the target of trust, i.e., user and content trust modeling[1] The distribution of the trust values of the users or contents in a social network can be used to represent the health of that network. Content trust modeling is used to classify content (e.g., Web pages, images, and videos) as spam or legitimate. In this case, the target of trust is a content (resource), and thus a trust score is given to each content based on its content and/or associated tags. In user trust modeling, trust is given to each user based on the information extracted from a user's account, their interaction with other participants within the social network, and/or the relationship between the content and tags that the user contributed to the social tagging system [28]. There are other classifications for trust, for example a trust value can be static, it means trust values are given by users or an administrator assign trust values to the clients, or it can be dynamic, i.e., a user's trust in a social tagging system is dynamic and it changes over time according to the user behavior in the social environment, our proposed model which is explained in the next section is based on a dynamic trust model, in which we conclude users' trust values from the transactions they have had in the system. 4. Proposed model Our goal is to introduce a model for collaborative filtering systems which can find similarities and can create trust relationships among all types of similar users, with respect to different types of items, 5 accessible through unique id (e.g. URL) across heterogeneous social tagging systems. Fig.1. shows the proposed model scheme. For this purpose our system is made up of 4 main modules. The first module is profile manager, which either creates or updates profiles of users and items. The second module will find the similarities between users by an item-weighing strategy in a distributed manner. The third part estimates trust between a user and its neighbors, also done in a decentralized manner. Finally the recommendation module selects k neighbors with highest ranks (i.e. with high similarity and trust values) and makes suggestions. Note that there is no global view of a trust network for users and they are only provided with information regarding their neighbors and their tagging history. Therefore, it is possible to maintain user and item profiles in different groups on several servers to achieve better scalability. To cope with privacy requirements, these servers can be located in different organizations, while profiles of users and items are accessible only through their URL. Fig. 1. Proposed model scheme -- A collaborative filtering system works based on similarity and trust in a decentralized manner. 4.1. Profile Manager Profile manager responsibility is to create or update user and item profiles when a user tags an item. It consists of two parts: User Profile Manager and Item Profile Manager. 4.1.1. User Profile Manager User profile manager task is to create or update a user profile, when the user tags an item. In each user profile we store item URLs tagged by the user, tags assigned by the user to the item and the item weight that will be calculated for that user. 4.1.1.1. Item weight We want to fulfill the user-item matrix values [discussed in section 3.1] with item weights based on the 6 Items NetworksUsers NetworksUser Tags ItemsSimilar UsersPartial Trust NetworkUsing TagsRecommendation Profile ManagerItem ProfilesUser Profiles tags each user assigns to different items, instead of using basic 0 and 1 values. In general, the more a tag has been used, the more interest the user has in the related resources. So we assume that users are more likely to prefer the resources bookmarked with the tags of high usage by them. And we also assume that a single user will use the same tags when describing similar resources to express his interests. Therefore we define tag weigh as follows. 𝑊𝑡𝑎𝑔(𝑢, 𝑟) = ∑ 𝑡𝑎∈𝑡𝑎𝑔(𝑢,𝑟) 𝑊𝑢,𝑡𝑎 (1) Where tag(u,r) denotes the set of tags with which a user u has given to a resource r, 𝑊𝑢,𝑡𝑎 denotes tag score of each tag ta in tag(u,r). Tag weight, 𝑊𝑡𝑎𝑔(𝑢, 𝑟), measures how much a user u is interested in a tagged resource r, which implies a user's preference to for a resource. Tag score, Wu,ta, of each tag is calculated as follows. 𝑊𝑢,𝑡𝑎 = ∑ 𝑓𝑟𝑒𝑞(𝑢,𝑡𝑎) 𝑘 𝑙=1 𝑓𝑟𝑒𝑞(𝑢,𝑡𝑙) (2) 𝑓𝑟𝑒𝑞 (𝑢, 𝑡𝑎) represents the times a tag ta has been used by a user u, k is the total number of tags a user u has tagged with any resources. According to the definition of tag score, tag weight takes a real number between 0 and 1, and the higher the weight is, the more interested a user is in a resource. This approach does not suffer from natural language issues, such as ambiguity and synonym tags, which are the main problems when dealing with tags [29], since tag weight is generated within a single user's tag space. It goes without saying, each time a user applies a new tag in the system their profile will be updated, i.e. Wtag(u,r) values for different resources are dynamic and may change when a new resource is tagged. 4.1.2. Item Profile Manager Item profile manager creates or updates an item's profile when a user tags an item. In each item's profile we store URLs of users who have tagged the item, list of tags each user has assigned to the item and the transaction trust value that we calculate for the related transaction. These values are dynamic and change with a new tag assignment. We define a transaction in a social tagging network as a triple (u,TTR,r), denotes a transaction in the system for user u, annotating resource r with a set of tags TTR. 4.1.2.1. Transaction-level trust Trust: If we take a deeper step towards the collaborative nature of social tagging systems, we will find that knowledge on the tagging scheme does exists in the way numerous users annotating resources with tags. Halpin et al. [30] have pointed out, if there are sufficient active users, over time, a stable distribution with a limited number of stable tags and a much larger "long-tail" of more idiosyncratic tags will develop. So we can consider this stabilized distribution as a convergence of the tagging scheme. We believe we can use the collaborative knowledge that implicitly exists in social tagging networks. In this work we estimate 7 a degree of trust for users in two steps. In the first step a trust value is calculated for each transaction a user has within the system, based on comparing the assigned tags by the user, with those assigned by other users, which is the item profile manager task, which we will explain in this section. In the second step we shall find users trust values that will be discussed in section 4.4 in detail. Trust to a transaction: Information value or trust value of a transaction TR can be calculated as the average of the tags' tagging information values in TTR. 𝑉𝑇𝑅 = ∑ 𝑡∈𝑇𝑇𝑅 𝑉𝑟(𝑡) 𝑇𝑇𝑅 Where Vr(t) is tag t's tagging information value. 𝑉𝑟(𝑡) = 𝑆𝑟(𝑡) 𝑆𝑟(𝑡′) ∑ 𝑡′∈𝑇𝑟 (3) (4) Where Sr(t) is the number of times the tag t is used by separate users to annotate the resource r. A transaction with low information value indicates a divergence from crowd and a poor value of tagging information. 4.2. Neighbors and Candidate Items Before we calculate similarity and user trust values in a decentralized approach we will define two terms, neighbors and candidate items that are needed for this purpose in the following. 4.2.1. Neighbors Rating (or weighting) matrix in collaborative filtering systems has two demotions: user and item. This matrix is used to find similarities between users. If you take a look at the matrix you will realize that if the union of items between a user u with a user x is null, i.e. users u and x have not tagged any common item yet, similarity value between these two users is equal to 0. So in practice to make this matrix for user u in the item dimension we don't need users like x. Therefor the neighbors of a user include users who have tagged at least one common item with the user. For this reason to specify the neighbors of a user u, we collect list of users that are recorded in profiles of items that u has already tagged (e.g. fig. 2). 8 Fig. 2. An example of specifying neighbors of a user in a decentralized approach. (a) Shows a user u and other users and items tagged by each user in the system. (b) Shows how this system finds neighbors of the user u through items tagged by him. 4.2.2. Neighbors As we mentioned, each user that has a nonzero similarity value with a user u, is counted as u's neighbor (e.g. fig. 3(a)). So the only users that participate in recommendation for user u are his neighbors, they represent the items already tagged by them, as candidate items that will be suggested to the user u. We define the union of all items that are recommended by a user's neighbors as candidate items (e.g. fig. 3(b)). It is obvious that we don't consider the set of items that are already visited by the user, as candidate items that will be recommended to them(marked by * in Fig. 3 (b)). Fig 3. (a) Shows neighbors of a user which we specify in a decentralized approach. (b) Shows how we find candidate items using neighbors' profiles. 4.3. Similarity User similarity calculation aims to mine the relationship among users. According to the approach we explained above, after we specify neighbors of a user and set of candidate items, we form user-item matrix with neighbors in user dimension and item dimension which is made up of candidate items and other 9 resources that are tagged by the user. Matrix is filled with item weights which we keep in each item's profile. Since we don't need to collect all users and items information to make the weighting matrix to calculate similarities, this method leads to a noticeable size reduction in both dimensions compared to matrixes that are used in basic methods. There are a number of techniques to calculate the similarity between users, such as Pearson correlation coefficient, Spearman correlation coefficient, cosine similarity and Jaccard similarity. In this work we use cosine similarity method to compute the similarity value between user u and user v which is defined as follows. 𝑠𝑖𝑚 (𝑢, 𝑣) = ∑ 𝑥∈𝑋(𝑢,𝑣) 𝑊𝑡𝑎𝑔(𝑢,𝑥)×𝑊𝑡𝑎𝑔(𝑣,𝑥) √∑ 𝑥∈𝑋(𝑢,𝑣) 𝑊2 𝑡𝑎𝑔(𝑢,𝑥) ×√∑ 𝑥∈𝑋(𝑢,𝑣) 𝑊2 𝑡𝑎𝑔(𝑣,𝑥) (5) Where X(u,v) is the set of resources that both user u and user v have tagged. 𝑊𝑡𝑎𝑔 is the weight we calculated in equation 3. 4.4. User Level Trust The straightforward idea is to use the average transaction information value, which we compute in equation 3 and store in related item profiles to represent a user trustworthiness, but this method does not take the resources importance into account. Since the popularity of resources in social tagging systems directly reflect the collaborative knowledge on resources quality, we define an importance value for each resource as follows, 𝐼(𝑟) = 𝑈𝑟 𝑈𝑟′ (6) Where Ur is the set of users who have tagged resource r and Ur' is the set of users in the similarity matrix. Finally, we define a user u trust value as the weighted average of transaction information value, with resource importance as weight, 𝑇𝑟𝑢𝑠𝑡𝑢(𝑛) = 4.5. Recommendation ∑ 𝑇𝑅′∈𝑇𝑅𝑛 𝐼(𝑟)∗𝑉𝑇𝑅′ 𝑇𝑅𝑛 (7) In this section we use trust and similarity values to select best neighbors for item recommendation and then give our suggestions based on these users information. Selecting neighbors: As our objective is to provide a resource-recommendation model with both similarity and trust information, we combine the two weights into a single one in two steps. First, as the measured 10 values of trust and similarity have different scales we normalize them to adjust them to a notionally common scale. For this purpose we find similarity values of the nearest and the farthest neighbors to a user u {Maxu(similarity), Minu(similarity)} and by using min-max normalization (equation 8) we change the similarity values of neighbors so the nearest neighbor will get the value 1 and the farthest one value will become 0. ∀𝑛 ∈ 𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢): 𝑉𝑎𝑙𝑢𝑒𝑛 = 𝑆𝑖𝑚(𝑢,𝑛)−𝑀𝑖𝑛𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦) 𝑀𝑎𝑥𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦)−𝑀𝑖𝑛𝑢(𝑠𝑖𝑚𝑖𝑙𝑎𝑟𝑖𝑡𝑦) (8) In the same way we normalize trust values as follows. 𝑛 ∈ 𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢): 𝑇𝑛 = 𝑇𝑟𝑢𝑠𝑢(𝑛)−𝑀𝑖𝑛𝑢(𝑇𝑟𝑢𝑠𝑡) 𝑀𝑎𝑥𝑢(𝑇𝑟𝑢𝑠𝑡)−𝑀𝑖𝑛𝑢(𝑇𝑟𝑢𝑠𝑡) (9) Where Maxu(Trust)and Minu(Trust) are minimum and maximum trust values of user u's neighbors respectively. In the second step we define the rank value for each neighbor n of user u as their total weight which is given in equation 10. 𝑅𝑎𝑛𝑘𝑉𝑎𝑙𝑢𝑒𝑢(𝑛) = 𝜆(𝑉𝑎𝑙𝑢𝑒𝑛) + (1 − 𝜆)𝑇𝑛 (10) Where parameter λ is introduced to adjust the significance of the two normalized weights. In contrast to the traditional log-based ratings, our item-recommendation model uses both similarity and trust information to select better neighbors. Generating recommendations: Finally the recommendation module selects k neighbors with the highest rank values for resource suggestion. We use equation (11) to calculate each recommended item score, 𝑆𝑐𝑜𝑟𝑒(𝑢, 𝑟) = ∑ 𝑣∈𝑇𝑜𝑝𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢) 𝑊𝑡𝑎𝑔(𝑣,𝑟)×𝑠𝑖𝑚(𝑢,𝑣) 𝑇𝑜𝑝𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑟(𝑢) (11) Where TopNeighbor(u) denotes the number of top-n neighbors of a user u. 11 5. Experiments 5.1. Data set The data set we have used in our experiments is the MovieLens data. In MovieLens site users can rate, tag and search for their favorite movies. This data set was published in May 2011 by GroupLens research group. It includes 2112 users, 10197 movies (include tagging and rating information), it has 13222 distinct tags and 47957 tag assignments (tas), i.e. tuples [user, tag, movie] to 5908 different movies. Average tas per user is 22.696 and distinct movies tagged by each user is 12.13 on average. The data set is divided into 2 parts: 20% of each user transactions form the testing set and the remaining 80% of transactions form the training set. We removed the movies that had not been bookmarked more than once, since they don't represent valuable information for us. 5.2. Implementation and results We implemented our program with four different methods, The first set of experiments we conduct aims to analyze the impact of basic CF, it means similarity based in which user-item matrix is filled with 0 and 1 values. In the second set of experiments, we evaluate the impact of tag weight alone, i.e. similarity based model in which user-item matrix is filled with item weights to calculate similarities between users. In the third time we combined basic CF method with trust values estimated for neighbors of each user. Finally we evaluate our proposed model, the combination of similarity matrix (using item weighting approach) and the trust method we explained in section 4. We vary neighborhood sizes from 5 to 50 by an interval of 5 and recommended 10 top items to each user. To evaluate our results we used Recall, Precision and Coverage. Recall and precision are used to evaluate system accuracy in top-10 recommended items for each user. Similar to Sarwar et al. [23], our evaluations consider any item in the recommendation set that matches any item in the testing set as a "hit". Note that we use mean average recall and mean average precision in our evaluations. Fig. 4. (a) Recall and (b) precision results for the first and second experiments -- Impact of item-weight strategy on recommendation quality. 12 Figure 4 shows the positives impact of item-weight strategy on precision and recall values. It is usually expected that recall decrease where precision increase and vice versa, but since we suggest only top 10 items to each user, both precision and recall accuracy get better when we increase the number of neighbors for recommendation process; so in the rest of this section we only show the results of calculated recalls for our different experiments. The effect of trust-aware approaches (experiments 3 and 4) on recall are illustrated in Fig.5. These methods have led to better quality in recall for every number of neighbors compared to models based on only similarity values. Fig 5. . Recall results - Impact of trust on recommendation quality. Not surprisingly, our computational approaches with trust information outperform both traditional log- based (basic CF) model and item-weight model. As shown in Fig. 6.(a) weighting strategy has noticeable effect on recall results while trust strategy has led to slight improvement in accuracy of the recommender system. Coverage is used for recommendation suitability [31], which measures the percentage of a dataset that the recommender system is able to provide predictions for; systems with lower coverage may be less valuable to users, since they will be limited in the decisions they are able to help with. Coverage is particularly important for the Find All Good Items task, since systems that cannot evaluate many of the items in the domain cannot find all of the good items in that domain. Fig. 6 (b) shows coverage results of the four implemented approaches. Fig. 6. (a) Recall results for 4 implemented approaches. (b) Coverage results for 4 implemented approaches 13 Comparing the results as we expected methods using weighted tags and items (experiment 2 and 4) have better accuracy than the methods which use basic user-item matrix for their similarity calculation. As it can be seen in coverage graph, there are significant improvements in trust based approaches. We can conclude from recall results that in the selected MovieLens data set there are not noticeable malicious users or spam tags, but in total, trust-aware models have led to selecting better neighbors, so we have improvement in finding all good items and the total recommended items set covers more elements in the testing set. 6. Conclusion and future works We proposed a collaborative filtering system which uses trust beside similarity to select neighbors of users with more accuracy; it is a novel approach of calculating trusts based on users tagging behaviors alone. Trust in recommender systems is used to protect system against malicious users and noisy or spam tags which is one of the weaknesses of these systems. Another advantage of the proposed system is that it calculates user interests toward their bookmarked items independently and makes user-item matrix based on their interests. So the system does not suffer from some natural language problems such as synonym words or ambiguity in tags. The proposed model aslo leads to matrix size reduction which helps to lessen scalability issue in these kind of systems. In our work, there is a limitation that we used only MovieLens dataset for experiments. It is needed to evaluate our computational approach using other datasets. Therefore, for the future work, we want to evaluate our item recommendation model with other data sets, such as Delicious, Flickr and Citeulike. We also plan to find other ways of aggregating trust with the standard collaborative filtering method and also to work on other weaknesses of these systems such as cold start users. References [1] Ivanov, Ivan, Peter Vajda, Jong-Seok Lee, and Touradj Ebrahimi. "In tags we trust: Trust modeling in social tagging of multimedia content." Signal Processing Magazine, IEEE 29, no. 2 (2012): 98-107. [2] Fazili, Soude, Alireza Zarghami, Nima Dokoohaki, and Mihhail Matskin. "Elevating Prediction Accuracy n Trust-aware Collaborative Filtering Recommenders through T-index Metric and TopTrustee Lists." Journal of Emerging Technologies in Web Intelligence 2, no. 4 (2010): 300-309. [3] Xu, Zhichen, Yun Fu, Jianchang Mao, and Difu Su. "Towards the semantic web: Collaborative tag suggestions." In Collaborative web tagging workshop at WWW2006, Edinburgh, Scotland. 2006. 14 [4] Page, Lawrence, Sergey Brin, Rajeev Motwani, and Terry Winograd. "The PageRank citation ranking: Bringing order to the web." (1999). [5] Pennock, David M., Eric Horvitz, and C. Lee Giles. "Social choice theory and recommender systems: Analysis of the axiomatic foundations of collaborative filtering." In AAAI/IAAI, pp. 729-734. 2000. [6] Massa, Paolo, and Paolo Avesani. "Trust metrics on controversial users: Balancing between tyranny of the majority." International Journal on Semantic Web and Information Systems (IJSWIS) 3, no. 1 (2007): 39-64. [7] Basilico, Justin, and Thomas Hofmann. "Unifying collaborative and content-based filtering." In Proceedings of the twenty-first international conference on Machine learning, p. 9. ACM, 2004. [8] Li, Qing, and Byeong Man Kim. "An approach for combining content-based and collaborative filters." In Proceedings of the sixth international workshop on Information retrieval with Asian languages- Volume 11, pp. 17-24. Association for Computational Linguistics, 2003. [9] Tso, Karen HL, and Lars Schmidt-Thieme. "Evaluation of attribute-aware recommender system algorithms on data with varying characteristics." In Advances in Knowledge Discovery and Data Mining, pp. 831-840. Springer Berlin Heidelberg, 2006. [10] Marinho, Leandro Balby, and Lars Schmidt-Thieme. "Collaborative tag recommendations." In Data Analysis, Machine Learning and Applications, pp. 533-540. Springer Berlin Heidelberg, 2008. [11] Mishne, Gilad. "Autotag: a collaborative approach to automated tag assignment for weblog posts." In Proceedings of the 15th international conference on World Wide Web, pp. 953-954. ACM, 2006. [12] Adomavicius, Gediminas, Ramesh Sankaranarayanan, Shahana Sen, and Alexander Tuzhilin. "Incorporating contextual information in recommender systems using a multidimensional approach." ACM Transactions on Information Systems (TOIS) 23, no. 1 (2005): 103-145. [13] Vig, Jesse, Shilad Sen, and John Riedl. "Tagsplanations: explaining recommendations using tags." In Proceedings of the 14th international conference on Intelligent user interfaces, pp. 47-56. ACM, 2009. [14] Tso-Sutter, Karen HL, Leandro Balby Marinho, and Lars Schmidt-Thieme. "Tag-aware recommender systems by fusion of collaborative filtering algorithms." In Proceedings of the 2008 ACM symposium on Applied computing, pp. 1995-1999. ACM, 2008. [15] Nakamoto, Reyn, Shinsuke Nakajima, Jun Miyazaki, and Shunsuke Uemura. "Tag-based contextual collaborative filtering." In Proceedings of the 18th IEICE Data Engineering Workshop. 2007. [16] Zheng, Nan, and Qiudan Li. "A recommender system based on tag and time information for social tagging systems." Expert Systems with Applications 38, no. 4 (2011): 4575-4587. [17] O'Donovan, John, and Barry Smyth. "Trust in recommender systems." In Proceedings of the 10th international conference on Intelligent user interfaces, pp. 167-174. ACM, 2005. [18] Massa, Paolo, and Paolo Avesani. "Trust-aware recommender systems." In Proceedings of the 2007 ACM conference on Recommender systems, pp. 17-24. ACM, 2007. 15 [19] Jin, Jian, and Qun Chen. "A trust-based Top-K recommender system using social tagging network." In Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on, pp. 1270-1274. IEEE, 2012. [20] Noll, Michael G., Ching-man Au Yeung, Nicholas Gibbins, Christoph Meinel, and Nigel Shadbolt. "Telling experts from spammers: expertise ranking in folksonomies." In Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, pp. 612-619. ACM, 2009. [21] Ricci, Francesco, Lior Rokach, and Bracha Shapira. Introduction to recommender systems handbook. Springer US, 2011. [22] Chin, Chun Ming. "Mobile Health Monitoring: The Glucose Intelligence Solution." University of California, Berkeley, USA (2012). [23] Sarwar, Badrul, George Karypis, Joseph Konstan, and John Riedl. "Item-based collaborative filtering recommendation algorithms." In Proceedings of the 10th international conference on World Wide Web, pp. 285-295. ACM, 2001. [24] Lee, Jong-Seok, Chi-Hyuck Jun, Jaewook Lee, and Sooyoung Kim. "Classification-based collaborative filtering using market basket data." Expert Systems with Applications 29, no. 3 (2005): 700- 704. [25] Massa, Paolo, and Paolo Avesani. "Trust metrics on controversial users: Balancing between tyranny of the majority." International Journal on Semantic Web and Information Systems (IJSWIS) 3, no. 1 (2007): 39-64. [26] Markines, Benjamin, Ciro Cattuto, and Filippo Menczer. "Social spam detection." In Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, pp. 41-48. ACM, 2009. [27] Krause, Beate, Christoph Schmitz, Andreas Hotho, and Gerd Stumme. "The anti-social tagger: detecting spam in social bookmarking systems." In Proceedings of the 4th international workshop on Adversarial information retrieval on the web, pp. 61-68. ACM, 2008. [28] Naeen, Hossein Monshizadeh, Mehrdad Jalali, and Ali Monshizadeh Naeen. "A trust-aware collaborative filtering system based on weighted items for social tagging systems." In Intelligent Systems (ICIS), 2014 Iranian Conference on, pp. 1-5. IEEE, 2014. [29] De Gemmis, Marco, Pasquale Lops, Giovanni Semeraro, and Pierpaolo Basile. "Integrating tags in a semantic content-based recommender." In Proceedings of the 2008 ACM conference on Recommender systems, pp. 163-170. ACM, 2008. [30] Halpin, Harry, Valentin Robu, and Hana Shepherd. "The complex dynamics of collaborative tagging." In Proceedings of the 16th international conference on World Wide Web, pp. 211-220. ACM, 2007. 16 [31] Herlocker, Jonathan L., Joseph A. Konstan, Loren G. Terveen, and John T. Riedl. "Evaluating collaborative filtering recommender systems." ACM Transactions on Information Systems (TOIS) 22, no. 1 (2004): 5-53. 17
1504.06672
1
1504
2015-04-25T00:58:33
Locating influential nodes via dynamics-sensitive centrality
[ "cs.SI", "physics.data-an", "physics.soc-ph" ]
With great theoretical and practical significance, locating influential nodes of complex networks is a promising issues. In this paper, we propose a dynamics-sensitive (DS) centrality that integrates topological features and dynamical properties. The DS centrality can be directly applied in locating influential spreaders. According to the empirical results on four real networks for both susceptible-infected-recovered (SIR) and susceptible-infected (SI) spreading models, the DS centrality is much more accurate than degree, $k$-shell index and eigenvector centrality.
cs.SI
cs
Locating influential nodes via dynamics-sensitive centrality Jian-Hong Lin1, Qiang Guo1, Jian-Guo Liu1* Tao Zhou2 , 3* September 25, 2018 1Research Center of Complex Systems Science, University of Shanghai for Science and Technology, Shanghai 200093, PR China; 2CompleX Lab, Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 611731, PR China; 3Big Data Research Center, University of Electronic Science and Technology of China, Chengdu 611731, PR China. With great theoretical and practical significance, locating influential nodes of complex networks is a promising issues. In this paper, we propose a dynamics-sensitive (DS) centrality that integrates topological features and dynamical properties. The DS centrality can be directly applied in locating influential spreaders. According to the empirical results on four real networks for both susceptible-infected-recovered (SIR) and susceptible-infected (SI) spreading models, the DS centrality is much more accurate than degree, k-shell index and eigenvector centrality. 5 1 0 2 r p A 5 2 ] I S . s c [ 1 v 2 7 6 6 0 . Spreading dynamics represents many important processes in nature and society 1,2, such as the propagation of computer virus 3 and traffic conges- tion 4, the reaction diffusion 5, the spreading of infectious diseases 6 and the cascading failures 7. The estimation of nodes' spreading influences can help in hindering the epidemics or accelerating the innovation 8, and similar methods can be further applied in identifying the influential spreader in social networks 9, quantifying the influence of scientists and their publications 10, evaluating the impacts of injection points in the diffusion of microfinance 11, finding drug targets in directed pathway networks 12, predicting essential proteins in protein interaction networks 13, and so on. The significance of this issue triggers a variety of novel approaches in identifying influential spreaders in networks, which can be roughly categorized into three classes. Firstly, some scientists argued that the location of a node is more important than its immediate neighbors, and thus proposed k-shell index 14,15 and its variants 16 -- 18 as indicators of spreading influences. Secondly, some scientists quantified a node's influence only accounting for its local surroundings 19 -- 21. Thirdly, some scientists evaluated nodes' influences according to the steady states of some introduced dynamical processes, such as random walk 22,23 and iterative refinement 24. 4 0 5 1 : v i X r a The above-mentioned approaches only take into account the topological features, while recent experiments indicate that the performance of struc- tural indices is very sensitive to the specific dynamics on networks 25 -- 27. For example, when the spreading rate is very small, the degree usually performs better than the eigenvector centrality 28 and k-shell index 14, while when the infectivity is very high, the eigenvector centrality is the best one among the three (see figures 1 and 2, with details shown later). To the best of our knowledge, there are few works taking into account the properties of the underlying spreading dynamics 29 -- 31. Via a Markov chain analysis, Klemm et al. 29 suggested that the eigenvector centrality can be used in estimating nodes' dynamical influences in the susceptible-infected-recovered (SIR) spreading model (also called susceptible-infected-removed model) 32. Li et al. 30 provided complementary explanation of the suitability of eigenvector centrality based on perturbation around the equilibrium of the epidemic dynamics and discussed the limitations of eigenvector centrality for homogeneous community networks. Both the above two works did not pay enough attention to the specific parameters in the spreading models, and thus their suggested index only works well in a limited range of the parameter space. Bauer and Lizier 31 directly counted the number of possible infection walks with different lengths. Their method is very effective but less efficient due to the considerable computational cost, in addition, for the fundamental complexity in counting the number of paths connecting two nodes, their method can not be formulated in a compact analytical form. In this paper, we describe the infectious probabilities of nodes by a matrix differential function that accounts both topological features and dynamical properties. Accordingly, we propose a dynamics-sensitive (DS) centrality, which can be directly applied in quantifying the spreading influences of nodes. According to the empirical results on four real networks, for both the SIR model 32 and the susceptible-infected (SI) model 33,34, the DS centrality is more accurate than degree, k-shell index and eigenvector centrality in locating influential nodes. The method proposed in this paper can be extended to other Markov processes on networks. 1 Dynamics-Sensitive Centrality An undirected network G = (V, E) with n = V nodes and e = E edges could be described by an adjacent matrix A = {aij} where aij = 1 if node i is connected with node j, and aij = 0 otherwise. A is binary and symmetric with zeros along the main diagonal, and thus its eigenvalues are real and can be arrayed in a descending order as λ1≥λ2≥. . .≥λn. Since A is a symmetric and real-valued matrix, it can be factorized as A = QΛQT , where Λ = diag(λ1, λ2, . . ., λn), Q = [q1, q2, . . . , qn] and qi is the eigenvector corresponding to λi. Considering a spreading model where an infected node would infect its neighbors with spreading rate β and recover with recovering rate µ (see Materials and Methods for details). We denote x(t) (t ≥ 0) as an n × 1 vector whose components are the probabilities of nodes to be ever infected no later than the time step t, and then x(t) − x(t − 1) (t > 1) is the probabilities of nodes to be infected at time step t. Notice that, x(t) is the cumulative probability that can be larger than 1, and we use the term probability just for simplicity. For example, if i is the only initially infected node, then 1 xi(0) = 1 and xj6=i(0) = 0. In the first time step, x(1) = βAx(0), and for t > 1, we have (see the derivation in Materials and Methods) where I is an n × n unit matrix. Denoting H = βA + (1 − µ)I, then βAHt−1x(0) represents the probabilities of nodes to be infected at time step t, and thus the probabilities of nodes to be ever infected no later than t can be rewritten as x(t) − x(t − 1) = βA[βA + (1 − µ)I]t−1x(0), (1) x(t) = t X r=2 [x(r) − x(r − 1)] + x(1) = t−1 X r=0 βAHrx(0). (2) We define Si(t) the spreading influence of node i at time step t, which can be quantified by the sum of infected probabilities of all nodes, given i the initially infected seed. According to Eq. (2), the infected probabilities can be written as x(t) = t−1 X r=0 βAHrei, (3) where ei = (0, · · · , 0, 1, 0, · · · , 0)T is an n × 1 vector with only the ith element being 1. As all elements other than the ith one of ei are zero, x(t) is indeed the sum of all the ith columns of βA, βAH, · · · , βAHt−1. Given x(0) = ei, Si(t) is defined as the sum of all elements of x(t), which is equal to the sum of all elements in the ith columns of βA, βAH, · · · , βAHt−1, as where L = (1, 1, · · · , 1)T is an n × 1 vector whose components are all 1. Obviously, AT = A, HT = H and AH = HA, then the spreading influence of all nodes can be described by the vector Si(t) = h(cid:0)βA + βAH + · · · + βAHt−1(cid:1)T Lii , (4) S(t) = t−1 X r=0 βAHrL. (5) i=1 Pt−1 r=0 βAHrL = Pt−1 r=0 βAHr (cid:0)Pn Notice that, Pt−1 r=0 βAHrei is the infected probabilities of all nodes given node i the only initially infected seed according to Eq. (2), so S(t) can also be roughly explained as the sum of infected probabilities over the n cases with every node being the infected seed once. This relationship shows an underlying symmetry, that is, in an undirected network, the node having higher influence is also the one apt to be infected. The readers are warned that such conclusion is not mathematically rigorous since we have ignore the complicated entanglement by allowing the elements of x(t) being larger than 1. r=0 βAHrei, and Pt−1 i=1 ei(cid:1) = Pn According to the Perro-Frobenius Theorem 35, the eigenvectors of H is the same to the ones of A and βλi + 1 − µ is the ith eigenvalue of H, corresponding to qi. When βλ1 + 1 − µ < 1, i.e. β/µ < 1/λ1 (for the case µ 6= 0), HtL could converge to null vector when t → ∞ and S(t) could be written by the following way For SIR model, without loss of generality, we set µ = 1, and then S(t) = βA(I − H)−1L = [(β/µ)A + (β/µ)2A2 + · · · + (β/µ)tAt]L. S(t) = (βA + β 2A2 + · · · + βtAt)L, (6) (7) where (AtL)i counts the total number of walks of length t from node i to all nodes in the network, weighted by βt that decays as the increase of the length t. As S(t) quantifies nodes' spreading influences, we call it dynamics-sensitive (DS) centrality, where the term dynamics-sensitive emphasizes the fact that S(t) is determined not only by the network structure (i.e., A), but also the dynamical parameters (i.e., β and t). In particular, when t = 1, the initially infected node only has the chance to infect its neighbors and Si(1) = (βAL)i with (AL)i being exactly the degree of node i. When µ = 0 (corresponding to the SI model) or β ≥ 1/λ1, S(t) would be infinite when t → ∞, which could not reflect the spreading influences. In fact, as we allow the infected probability of a node to be cumulated and exceed 1, the DS centrality may considerably deviate from the real spreading influences at large β and large t. It is because that our theoretical deviation contains an underlying approximation that 1 − (1 − β)m ≈ mβ, where the left-hand side characterizes the real spreading process with any infected probability smaller than 1 and the right-hand side could exceed 1 when β and m are large. Since m denotes the number of contacts from infected nodes, the larger t will result in larger m before the end of epidemic spreading. Notice that, our main goal is to find out the ranking of spreading influences of nodes, namely to identify influential nodes, and thus we are still not aware of the impacts on the ranking from the above deviation because every node's influence is over estimated. Fortunately, as we will show later, the DS centrality performs much better than other well-known indices for a very broad ranges of β and t that cover most practical scenarios. 2 Results We test the performance of DS centrality in evaluating the nodes' spreading influences according to the SIR model and SI model, with varying spreading rate β. Four real networks, including a scientific collaboration network, an email communication network, the Internet at the router level and a protein-protein interaction network, are used for the empirical analysis (see data description in Materials and Methods), and three well-known indices, including degree, k-shell index and eigenvector centrality, are used as benchmark methods for comparison (see Materials and Methods for the definitions of those indices). Given the time step t, the spreading influence of an arbitrary node i is quantified by the number of infected nodes (for SI model) or the number of infected and recovered nodes (for SIR model) at t, where the spreading process starts with only node i being initially infected. Here we use Kendall's Tau τ 36 to measure the correlation between nodes' spreading influences and the considered centrality measure, where τ is in the range [−1, 1] and the larger τ corresponds to the better performance (see Materials and Methods for the definition of τ ). As shown in Fig. 1, the Kendall's Tau τ for the DS centrality is between 0.968 and 0.995 for β ∈ [0.01, 0.1], indicating that the ranking lists generated by the DS centrality and the real SIR spreading process are highly identical to each other. In comparison, the DS centrality performs much 2 1.0 0.9 0.8 τ 0.7 1.0 0.9 τ 0.8 0.6 0.00 Erdös 0.7 Email 0.02 0.04 0.06 0.08 0.10 0.00 0.02 0.04 0.06 0.08 0.10 β β 1.0 0.9 0.8 0.7 0.6 τ 1.0 0.9 0.8 0.7 0.6 0.5 τ Router Protein 0.00 0.02 0.04 0.06 0.08 0.10 0.00 0.02 0.04 0.06 0.08 0.10 β β degree k-shell eigenvector DS Figure 1 The accuracy of four centrality measures in evaluating nodes' spreading influences according to the SIR model (µ = 1) in the four real networks, quantified by the Kendall's Tau. The spreading rate β varies from 0.01 to 0.10, and the time step is set as t = 5. Each data point is obtained by averaging over 104 independent runs. better than degree, k-shell index and eigenvector centrality. As shown in Fig. 2, similar result is also observed for the SI model where the DS centrality performs much better than others. The results for larger β and t are respectively shown in Fig. S1 and Fig. S2 of Supplementary Information, where the DS centrality still performs the best. Since A is a symmetric, real-valued matrix, the DS centrality S(t) can be written in the following way by decomposing A Si(t) = m1q1i n X j=1 q1j + n X r=2 mrqri n X j=1 qrj, where mr = βλr[1 − (βλr + 1 − µ)t](µ − βλr)−1 for 1 ≤ r ≤ n. Rewriting Eq. (8) into Si(t) m1 = q1i n X j=1 q1j + n X r=2 mr m1 qri n X j=1 qrj. (8) (9) will converge to 0, and thus the ranking lists generated by S(t) will be identical to q1, which is exactly the same to the With the increase of t and β, mr m1 eigenvector centrality. This relationship is in accordance with the results presented in Fig. S1 and Fig. S2, where the difference between the eigenvector centrality and DS centrality gets smaller as the increase of β and t. 3 Discussion Estimating the spreading influences and then identifying the influential nodes are fundamental task before any regulation on the spreading process. For such task, most known works only took into account the topological information 8. Recently, Aral and Walker 37 showed that the attributes of nodes are highly correlated with nodes' influences and tendencies to be influenced. In this paper, in addition to the topological information, we get down to the underlying spreading dynamics and propose a dynamics-sensitive (DS) centrality, which is a kind of weighted sum of walks ending at the target node, where both the spreading rate and spreading time are accounted in the weighting function. The DS centrality can be directly applied in quantifying the spreading influences of nodes, which remarkably outperforms degree, k-shell index and eigenvector centrality according to the empirical analyses of SIR model and SI model on four real networks. The DS centrality performs particular well in the early stage of spreading, which provides a powerful tool in early detection of potential super-spreaders for epidemic control. The DS centrality tells us an often ignored fact that the most influential nodes are dependent not only on the network topology but also on the spreading dynamics. Given different models and parameters, the relative influences of nodes are also different. Roughly speaking, if the spreading rate is small, we can focus on the close neighborhood of a node since it is not easy to form a long spreading pathway (i.e., βt decays very fast as the increase of t when β is small) while if the spreading rate is high, the global topology should be considered. A clear limitation of this work is that before calculating the DS centrality, we have to know the spreading rate that is usually a hidden parameter. This parameter can be effectively estimated according to the early spreading process 38 and then we can calculate the DS centralities by varying the spreading rates over the estimated range and see which nodes are the most influential ones in average. Some other centralities related to specific dynamical processes have also been proposed recently, including routing centrality 39, epidemic central- ity 40, diffusion centrality 41, percolation centrality 42 and game centrality 43. Comparing with these centralities, similar to the works by Klemm et 3 1.0 0.9 0.8 τ 0.7 1.0 0.9 τ 0.8 0.6 0.00 Erdös 0.7 Email 0.02 0.04 0.06 0.08 0.10 0.00 0.02 0.04 0.06 0.08 0.10 β β 1.0 0.9 0.8 0.7 0.6 τ Router 1.0 0.9 0.8 0.7 0.6 0.5 τ Protein 0.00 0.02 0.04 0.06 0.08 0.10 0.00 0.02 0.04 0.06 0.08 0.10 β β degree k-shell eigenvector DS Figure 2 The accuracy of four centrality measures in evaluating nodes' spreading influences according to the SI model (µ = 0) in the four real networks, quantified by the Kendall's Tau. The spreading rate β varies from 0.01 to 0.10, and the time step is set as t = 5. Each data point is obtained by averaging over 104 independent runs. al. 29,44,45, this paper provides a more general framework that could in principle deal with all networked Markov processes and thus can be extended and applied in many other important dynamics, such as the Ising model 46, Boolean dynamics 47, voter model 48, synchronization 49, and so on. Furthermore, the DS centrality can also be directly extended to asymmetrical networks and weighted networks. We hope this work could highlight the significant role of underlying dynamics in quantifying the individual nodes' importance, and then the difference between lists of critical nodes may give us novel insights into the hardly notices distinguishing properties of different dynamical processes. 4 Materials and Methods Derivation of Eq. (1). The probabilities of nodes to be infected at time step t = 2 can be approximated as x(2) − x(1) = βAx(1) + βA(1 − µ)x(0) = βA[βA + (1 − µ)I]x(0). (10) We assume that when t ≤ p, x(p) − x(p − 1) = βA[βA + (1 − µ)I]p−1x(0), then for t = p + 1, we have p−2 x(p + 1) − x(p) = βA{ X r=0 p−2 = βA{ X r=0 p−3 = βA{ X r=0 (1 − µ)r[x(p − r) − x(p − r − 1)] + (1 − µ)p−1x(1) + (1 − µ)px(0)} (1 − µ)rβA[βA + (1 − µ)I]p−r−1 + (1 − µ)p−1[βA + (1 − µ)I]}x(0) (1 − µ)rβA[βA + (1 − µ)I]p−r−1 + (1 − µ)p−2[βA + (1 − µ)I]2}x(0) (11) · · · = βA{βA[βA + (1 − µ)I]p−1 + (1 − µ)[βA + (1 − µ)I]p−1}x(0) = βA[βA + (1 − µ)I]px(0). Therefore, according to the mathematical induction, Eq. (1) is established. Spreading Model. Here we apply the standard susceptible-infected-recovered (SIR) model (also called the susceptible-infected-removed model) 32. In the SIR model, there are three kinds of individuals: (i) susceptible individuals that could be infected, (ii) infected individuals having been infected and being able to infect susceptible individuals, and (iii) recovered individuals that have been recovered and will never be infected again. In this paper, the spreading process starts with only one seed node being infected initially, and all other nodes are initially susceptible. At each time step, each infected node makes contact with its neighbors and each susceptible neighbor is infected with a probability β. Then each infected node enters the recovered state with a probability µ. Without loss of generality, we set µ = 1. In the standard SI model, nodes can only be susceptible or infected, corresponding to the case with µ = 0. 4 Table 1 Basic statistical features of Erdos, Email, Router and Protein networks, including the number of nodes n, the number of the edges e, the average degree hki and the reciprocal of the largest eigenvalue 1/λ1. Network Erdos Email Router Protein n 456 1133 2114 2783 e 1314 5451 6632 6007 hki 5.763 9.622 6.274 4.317 1/λ1 0.079 0.048 0.036 0.063 Benchmark Methods. The degree of an arbitrary node i is defined as the number of its neighbors, namely ki = n X j=1 aij , (12) where aij is the element of matrix A. Degree is widely applied for its simplicity and low computational cost, which works especially well in evaluating nodes' spreading influences when the spreading rate is small. The main idea of eigenvector centrality is that a node's importance is not only determined by itself, but also affected by its neighbors' importance 28. Accordingly, eigenvector centrality of node i, vi, is defined as where λ is a constant. Obviously, Eq. (13) can be written in a compact form as Av = λv, vi = 1 λ n X j=1 aijvj , (13) (14) where v = (v1, v2, · · · , vn)T . That is to say, v is the eigenvector of the adjacent matrix A and λ is the corresponding eigenvalue. Since the influences of nodes should be nonnegative, according to Perro-Frobenius Theorem 35, v must be the largest eigenvector of A, say v = q1. Kitsak et al. 14 argued that k-shell index (i.e., coreness) is a better index than degree to locate the influential nodes. The k-shell can be obtained by the so-called k-core decomposition 50. The k-core decomposition process is initiated by removing all nodes with degree k = 1. This causes new nodes with degree k ≤ 1 to appear. These are also removed and the process is continued until all remaining nodes are of degree k > 1. The removed nodes (together with associated links) form the 1-shell, and their k-shell indices are all one. We next repeat this pruning process for the nodes of degree k = 2 to extract the 2-shell, that is, in each step the nodes with degree k ≤ 2 are removed. We continue with the process until we have identified all higher-layer shells and all network nodes have been removed. Then each node i is assigned a k-shell index ci. Kendall's Tau. For each node i, we denote yi as its spreading influence and zi the target centrality measure (e.g., degree, k-shell index, eigenvector centrality and DS centrality), the accuracy of the target centrality in evaluating nodes' spreading influences can be quantified by the Kendall's Tau 36, as τ = 2 n(n − 1) X i<j sgn[(yi − yj )(zi − zj)], (15) where sgn(y) is a piecewise function, when y > 0, sgn(y) = +1; y < 0, sgn(y) = −1; when y = 0, sgn(y) = 0. τ measures the correlation between two ranking lists, whose value is in the range [−1, 1] and the larger τ corresponds to the better performance. Data description. Four real networks are studied in this paper as follows. (i) Erdos, a scientific collaboration network, where nodes are scientists and edges represent the co-authorships. The data set can be freely downloaded from the web site http://wwwp.oakland.edu/enp/thedata/. (ii) Email 51, which is the email communication network of University Rovira i Virgili (URV) of Spain, involving faculty members, researchers, technicians, managers, administrators, and graduate students. (iii) Router 52, the Internet at the router level, where each node represents a router and an edge represents a connection between two routers. (iv) Protein 53, an initial version of a proteome-scale map of human binary protein-protein interaction. Basic statistical properties of the above four networks are presented in Table 1. References 1. Zhou, T., Fu, Z. Q. & Wang, B. H. Epidemic dynamics on complex networks. Porg. Nat. Sci. 16, 452 (2006). 2. Pastor, R., Satorras, C. C., Van Mieghem, P. & Vespignani, A. Epidemic processes in complex networks. arXiv: 1408.2701 (2014). 3. Kephart, J. O., Sorkin, G. B., Chess, D. M. & White, S. R. Fighting computer viruses. Sci. Am. 277, 56 (1997). 4. Li, D., Fu, B., Wang, Y., Lu, G., Berezin, Y., Stanley, H. E. & Havlin, S. Percolation transition in dynamical traffic network with evolving critical bottlenecks. Proc. Nat. Acad. Sci. U.S.A. 112, 669 (2015). 5. Colizza, V., Pastor-Satorras, R. & Vespignani, A. Reaction-diffusion processes and metapopulation models in heterogeneous networks. Nat. Phys. 3, 276 (2007). 6. Keeling, M. J. & Rohani, P. Modeling Infectious Diseases in Humans and Animals. Princeton University Press, Princeton (2008). 7. Motter, A. E. Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004). 8. Pei, S. & Makse, H. A. Spreading dynamics in complex networks. Journal of Statistical Mechanics: Theory and Experiment 2013, P12002 (2013). 9. Gonz´alez-Bail´on, S., Borge-Holthoefer, J., Rivero, A. & Moreno, Y. The dynamics of protest recruitment through an online network. Sci. Rep. 1, 197 (2011). 10. Zhou, Y. B., Lu, L. & Li, M. Quantifying the influence of scientists and their publications: distinguishing between prestige and popularity. New. J. Phys. 14, 033033 (2012). 11. Banerjee, A., Chandrasekhar, A. G., Duflo, E. & Jackson, M. O. The diffusion of microfinance. Science 341, 1236498 (2013). 12. Csermely, P., Korcsm´aros, T., Kiss, H. J., London, G. & Nussinov, R. Structure and dynamics of molecular networks: a novel paradigm of drug discovery: a comprehensive review. Pharmacol. Ther. 138, 333 (2013). 13. Li, M., Zhang, H., Wang, J. H. & Pan, Y. A new essential protein discovery method based on the integration of protein-protein interaction and gene expression data. BMC Syst. Biol. 6, 15 (2012). 5 14. Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E. & Makse, H. A. Identification of influential spreaders in complex networks. Nat. Phys. 6, 888 (2010). 15. Castellano, C. & Pastor-Satorras, R. Competing activation mechanisms in epidemics on networks. Sci. Rep. 2, 371 (2012). 16. Zeng, A. & Zhang, C. J. Ranking spreaders by decomposing complex networks. Phys. Lett. A 377, 1031 (2013). 17. Liu, J. G., Ren, Z. M. & Guo, Q. Ranking the spreading influence in complex networks. Physica A 392, 4154 (2013). 18. Lin, J. H., Guo, Q., Dong, W. Z., Tang, L. Y. & Liu, J. G. Identifying the node spreading influence with largest k-core values. Phys. Lett. A 378, 3279 (2014). 19. Chen, D. B., Lu, L., Shang, M. S., Zhang, Y. C. & Zhou, T. Identifying influential nodes in complex networks. Physica A 391, 1777 (2012). 20. Chen, D. B., Gao, H., Lu, L. & Zhou, T. Identifying influential nodes in large-scale directed networks: the role of clustering. PLoS ONE 8, e77455 (2013). 21. Pei, S., Muchnik, L., Andrade Jr, J. S., Zheng, Z. & Makse, H. A. Searching for superspreaders of information in real-world social media. Sci. Rep. 4, 5547 (2014). 22. Lu, L., Zhang, Y. C. & Zhou, T. Leaders in social networks, the delicious case. PLoS ONE 6, e21202 (2011). 23. Li, Q., Zhou, T., Lu, L. & Chen, D. B. Identifying influential spreaders by weighted LeaderRank. Physica A 404, 47 (2014). 24. Ren, Z. M., Zeng, A., Chen, D. B., Liao, H. & Liu, J. G. Iterative resource allocation for ranking spreaders in complex networks. EPL 106, 48005 (2014). 25. Borge-Holthoefer, J., Rivero, A. & Moreno, Y. Locating privileged spreaders on an online social network. Phys. Rew. E 85, 066123 (2012). 26. Borge-Holthoefer, J. & Moreno, Y. Absence of influential spreaders in rumor dynamics. Phys. Rew. E 85, 026116 (2012). 27. Liu, Y., Tang, M., Zhou, T. & Do, Y. Core-like groups resulting in invalidation of k-shell decomposition analysis. Sci. Rep. 5, 9602 (2015). 28. Borgatti, S. P. Centrality and network flow. Soc. Netw. 27, 55 (2005). 29. Klemm, K., Serrano, M., Eguiluz, V. & Miguel, M. A measure of individual role in collective dynamics. Sci. Rep. 2, 292 (2012). 30. Li, P., Zhang, J., Xu, X. K. & Small M. Dynamical Influence of Node Revisited: A Markov Chain Analysis of Epidemic Process on Networks. Chin. Phys. Lett. 29, 048903 (2012). 31. Bauer, F. & Lizier, J. T. Identifying influential spreaders and efficiently estimating infection numbers in epidemic models: a walk counting approache. EPL 99, 68007 (2012). 32. Hethcote, H. W. The mathematics of infectious diseases. SIAM Rev. 42, 599 (2000). 33. Barth´elemy, M., Barrat, A., Pastor-Satorras, R., & Vespignani, A. Velocity and hierarchical spread of epidemic outbreaks in scale-free networks. Phys. Rev. Lett. 92, 178701 (2004). 34. Zhou, T., Liu, J. G., Bai, W. J., Chen, G. & Wang, B. H. Behaviors of susceptible-infected epidemics on scale-free networks with identical infectivity. Phys. Rev. E 74, 056109 (2006). 35. Hom, R. A. & Johnson, C. R. Matrix analysis. Cambridge University Press, Cambridge (1985). 36. Kendall, M. G. A New Measure of Rank Correlation. Biometrika 30, 81 (1938). 37. Aral, S. & Walker, D. Identifying influential and susceptible members of social networks. Science 68, 337 (2012). 38. Chen, D. B., Xiao, R. & Zeng, A. Predicting the evolution of spreading on complex networks. Sci. Rep. 4, 6108 (2014). 39. Dolev, S., Elovici, Y. & Puzis, R. Routing betweenness centrality. J. ACM 57(4), 25 (2010). 40. Siki´c, M., Lanci´c, A., Antulov-Fantulin, N. & Stefanci´c, H. Epidemic centralityłis there an underestimated epidemic impact of network peripheral nodes?. Eur. Phys. J. B 86, 440 (2013). 41. Ide, K., Zamami, R. & Namatame, A. Diffusion Centrality in Interconnected Networks. Proc. Comput. Sci. 24 227 (2013). 42. Piraveenan, M., Prokopenko, M. & Hossain, L. Percolation centrality: Quantifying graph-theoretic impact of nodes during percolation in networks. PLoS ONE 8, e53095 (2013). 43. Simko, G. I. & Csermely, P. Nodes having a major influence to break cooperation define a novel centrality measure: game centrality. PLoS ONE 8, e67159 (2013). 44. Ghanbarnejad, F. & Klemm, K. Impact of individual nodes in Boolean network dynamics. EPL 99, 58006 (2012). 45. Klemm, K. Searchability of Central Nodes in Networks. J. Stat. Phys. 151, 707 (2013). 46. Dorogovtsev, S. N., Goltsev, A. V. & Mendes, J. F. Critical phenomena in complex networks. Rev. Mod. Phys. 80, 1275 (2008). 47. Kauffman, S. A. The Origins of Order. Oxford University Press, New York, 1993. 48. Castellano, C., Fortunato, S. & Loreto, V. Statistical physics of social dynamics. Rev. Mod. Phys. 81, 591 (2009). 49. Arenas, A., D´ıaz-Guilera, A., Kurths, J., Moreno, Y. & Zhou, C. Synchronization in complex networks. Phys. Rep. 469 93 (2008). 50. Seidman, S. B. Network structure and minimum degree. Soc. Netw. 5, 269 (1983). 51. Guimera, R., Diaz-Guilera, A., Giralt, F. & Arenas, A. Self-similar community structure in a network of human interactions. Phys. Rew. E 68, 065103 (2003). 52. Rossi, R. A. & Ahmed, N. K. The Network Data Repository with Interactive Graph Analytics and Visualization. Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (2015). 53. Rual, J. F., et al. Towards a proteome-scale map of the human protein-protein interaction network. Nature 437, 1173 (2005). Acknowledgements The authors acknowledge the valuable discussion with Wen-Xu Wang and Liming Pan, as well as the Erdos Number Project in Oakland University for the data set. This work is supported by the National Natural Science Foundation of China (Nos. 71171136, 61374177, 112222543 and 61433014), the Shanghai Leading Academic Discipline Project of China (No. XTKX2012), JGL is supported by the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning. Author Contributions wrote the paper. Correspondence and requests for materials should be addressed to J.G.L. ([email protected]) or T.Z. ([email protected]). JHL, JGL and TZ designed research, JHL, JGL and QG perform research, JHL, JGL and TZ analysed data, and JHL, JGL, QG and TZ Competing Interests The authors declare that they have no competing financial interests. 6
1704.00386
2
1704
2018-09-14T04:07:32
Local Algorithms for Hierarchical Dense Subgraph Discovery
[ "cs.SI", "cs.DS" ]
Finding the dense regions of a graph and relations among them is a fundamental problem in network analysis. Core and truss decompositions reveal dense subgraphs with hierarchical relations. The incremental nature of algorithms for computing these decompositions and the need for global information at each step of the algorithm hinders scalable parallelization and approximations since the densest regions are not revealed until the end. In a previous work, Lu et al. proposed to iteratively compute the $h$-indices of neighbor vertex degrees to obtain the core numbers and prove that the convergence is obtained after a finite number of iterations. This work generalizes the iterative $h$-index computation for truss decomposition as well as nucleus decomposition which leverages higher-order structures to generalize core and truss decompositions. In addition, we prove convergence bounds on the number of iterations. We present a framework of local algorithms to obtain the core, truss, and nucleus decompositions. Our algorithms are local, parallel, offer high scalability, and enable approximations to explore time and quality trade-offs. Our shared-memory implementation verifies the efficiency, scalability, and effectiveness of our local algorithms on real-world networks.
cs.SI
cs
Local Algorithms for Hierarchical Dense Subgraph Discovery Ahmet Erdem Sarıyuce University at Buffalo [email protected] C. Seshadhri Univ. of California, Santa Cruz [email protected] Ali Pinar Sandia National Laboratories [email protected] 8 1 0 2 p e S 4 1 ] I S . s c [ 2 v 6 8 3 0 0 . 4 0 7 1 : v i X r a ABSTRACT Finding the dense regions of a graph and relations among them is a fundamental problem in network analysis. Core and truss decompositions reveal dense subgraphs with hi- erarchical relations. The incremental nature of algorithms for computing these decompositions and the need for global information at each step of the algorithm hinders scalable parallelization and approximations since the densest regions are not revealed until the end. In a previous work, Lu et al. proposed to iteratively compute the h-indices of neighbor vertex degrees to obtain the core numbers and prove that the convergence is obtained after a finite number of iterations. This work generalizes the iterative h-index computation for truss decomposition as well as nucleus decomposition which leverages higher-order structures to generalize core and truss decompositions. In addition, we prove convergence bounds on the number of iterations. We present a framework of local algorithms to obtain the core, truss, and nucleus de- compositions. Our algorithms are local, parallel, offer high scalability, and enable approximations to explore time and quality trade-offs. Our shared-memory implementation ver- ifies the efficiency, scalability, and effectiveness of our local algorithms on real-world networks. PVLDB Reference Format: Ahmet Erdem Sarıyuce, C. Seshadhri, and Ali Pinar. Local Al- gorithms for Hierarchical Dense Subgraph Discovery. PVLDB, 12(1): xxxx-yyyy, 2019. DOI: https://doi.org/10.14778/3275536.3275540 INTRODUCTION 1. A characteristic feature of the real-world graphs is sparsity at the global level yet density in the local neighborhoods [15]. Dense subgraphs are indicators for functional units or un- usual behaviors. They have been adopted in various ap- plications, such as detecting DNA motifs in biological net- works [12], identifying the news stories from microblogging streams in real-time [2], finding price value motifs in finan- cial networks [10], and locating spam link farms in web [24, 13, 9]. Dense regions are also used to improve efficiency of Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Articles from this volume were invited to present their results at The 45th International Conference on Very Large Data Bases, August 2019, Los Angeles, California. Proceedings of the VLDB Endowment, Vol. 12, No. 1 Copyright 2018 VLDB Endowment 2150-8097/18/09 $ 10.00. DOI: https://doi.org/10.14778/3275536.3275540 compute-heavy tasks like distance query computation [21] and materialized per-user view creation [14]. Detecting dense structures in various granularities and finding the hierarchical relations among them is a funda- mental problem in graph mining. For instance, in a citation network, the hierarchical relations of dense parts in various granularities can reveal how new research areas are initiated or which research subjects became popular in time [38]. k- core [39, 27] and k-truss decompositions [34, 6, 44, 48] are effective ways to find many dense regions in a graph and construct a hierarchy among them. k-core is based on the vertices and their degrees, whereas k-truss relies on the edges and their triangle counts. Higher-order structures, also known as motifs or graphlets, have been used to find dense regions that cannot be detected with edge-centric methods [4, 42]. Computing the frequency and distribution of triangles and other small motifs is a sim- ple yet effective approach used in data analysis [19, 30, 1, 33]. Nucleus decomposition is a framework of decomposi- tions that is able to use higher-order structures to find dense subgraphs with hierarchical relations [37, 38]. It generalizes the k-core and k-truss approaches and finds higher-quality dense subgraphs with more detailed hierarchies. However, existing algorithms in the nucleus decomposition framework require global graph information, which becomes a perfor- mance bottleneck for massive networks. They are also not amenable for parallelization or approximation due to their interdependent incremental nature. We introduce a frame- work of algorithms for nucleus decomposition that uses only local information. Our algorithms provide faster and ap- (a) Convergence rates (b) Scalability performance Figure 1: On the left, we present the convergence rates for k- truss decomposition on five graphs. Kendall-Tau similarity score compares the obtained and the exact decompositions; becomes 1.0 when they are the same. Our local algorithms compute the almost-exact decompositions in around 10 it- erations. On the right, we show the runtime performances w.r.t. partially parallel peeling algorithms. On average, k- truss computations are 4.8x faster when we switch from 4 threads to 24 threads. -1.0-0.50.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI0.01.02.03.04.05.06.07.0 4 6 12 24speedupnumber of threadsASKFRIHGORKSLJWIKIPeeling-24t57.3s30.8s2794s proximate solutions and their local nature enables query- driven processing of vertices/edges. 1.1 Problem and Challenges The standard method to compute a k-core decomposition is a sequential algorithm, known as the peeling process. To find a k-core, all vertices with degree less than k are re- moved repeatedly until no such vertex remains. This process is repeated after incrementing k until no vertices remain. Batagelj and Zaversnik introduced a bucket-based O(E) algorithm for this process [3]. It keeps track of the vertex with the minimum degree at each step, thus requires global information about the graph at any time. k-truss decom- position has a similar peeling process with O((cid:52)) complex- ity [6]. To find a k-truss, all edges with less than k triangles are removed repeatedly and at each step, algorithm keeps track of the edge with the minimum triangle count, which requires information from all around the graph. Nucleus de- composition [37] also facilitates the peeling process on the given higher-order structures. The computational bot- tleneck in the peeling process is the need for the global graph information. This results in inherently se- quential processing. Parallelizing the peeling process in a scalable way is challenging since each step depends on the results of the previous step. Parallelizing each step in itself is also infeasible since synchronizations are needed to decrease the degrees of the vertices that are adjacent to multiple ver- tices being processed in that step. Iterative h-index computation: Lu et al. introduced an alternative formulation for k-core decomposition [26]. They proposed iteratively computing h-indices on the vertex de- grees to find the core numbers of vertices (even though they do not call out the correspondence of their method to h- indices). Degrees of the vertices are used as the initial core number estimates and each vertex updates its estimate as the h-index value for its neighbors' core number estimates. This process is repeated until convergence. At the end, each vertex has its core number. They prove that convergence to the core numbers is guaranteed, and analyze the conver- gence characteristics of the real-world networks and show runtime/quality trade-offs. We generalize Lu et al.'s work for any nucleus decom- position, including k-truss. We show that convergence is guaranteed for all nucleus decompositions and prove the first upper bounds for the number of iterations. Our frame- work of algorithms locally compute any nucleus decompo- sition. We propose that iteratively computing h-indices of vertices/edges/r-cliques based on their degrees/triangle/s- clique counts converges in the core/truss/nucleus numbers (r < s). Local formulation also enables the parallelization. Intermediate values provide an approximation to the ex- act nucleus decomposition to trade-off between runtime and quality. Note that this is not possible in the peeling process, because no intermediate solution can provide an overall ap- proximation to the exact solution, e.g., the densest regions are not revealed until the end. 1.2 Contributions Our contributions can be summarized as follows: • Generalizated nucleus decomposition: We general- ize the iterative h-index computation idea [26] for any nu- cleus decomposition by using only local information. Our approach is based on iteratively computing the h-indices on the degrees of vertices, triangle counts of edges, and s-clique counts of r-cliques (r < s) until convergence. We prove that the iterative computation by h-indices guaran- tees exact core, truss, and nucleus decompositions. • Upper bounds for convergence: We prove an upper bound for the number of iterations needed for conver- gence. We define the concept of degree levels that models the worst case for convergence. Our bounds are applicable to any nucleus decomposition and much tighter than the trivial bounds that rely on the total number of vertices. • Framework of parallel local algorithms: We intro- duce a framework of efficient algorithms that only use local information to compute any nucleus decomposition. Our algorithms are highly parallel due to the local com- putation and are implemented in OpenMP for shared- memory architectures. • Extensive evaluation on real-world networks: We evaluate our algorithms and implementation on various real-world networks. We investigate the convergence char- acteristics of our new algorithms and show that close ap- proximations can be obtained only in a few iterations. This enables exploring trade-offs between time and ac- curacy. Figure 1a presents the convergence rates for the k-truss decomposition. In addition, we present a metric that approximates solution quality for informed decisions on accuracy/runtime trade-offs. We also evaluate run- time performances of our algorithms, present scalability results, and examine trade-offs between runtime and ac- curacy. Figure 1b has the results at a glance for the k-truss case. Last, but not least, we highlight a query-driven sce- nario where our local algorithms are used on a subset of vertices/edges to estimate the core and truss numbers. 2. BACKGROUND We work on a simple undirected graph G = (V, E) where V is the set of vertices and E is the set of edges. We define r-clique as a complete graph among r vertices for r > 0, i.e., each vertex is connected to all the other vertices. We use R (and S) to denote r-clique (and s-clique). 2.1 Core, Truss, and Nucleus Decompositions Definition 1. k-core of G is a maximal connected sub- graph of G, where each vertex has at least degree k. A vertex can reside in multiple k-cores, for different k values, which results in a hierarchy. Core number of a vertex is defined to be the the largest k value for which there is a k-core that contains the vertex. Maximum core of a vertex is the maximal subgraph around it that contains vertices with equal or larger core numbers. It can be found by a traversal that only includes the vertices with larger or equal core numbers. Figure 2a illustrates k-core examples. Definition 2. k-truss of G is a maximal connected sub- graph of G where each edge is in at least k triangles. Cohen [6] defined the standard maximal k-truss as one- component subgraph such that each edge participates in at least k − 2 triangles, but here we just assume it is k tri- angles for the sake of simplicity. An edge can take part in multiple k-trusses, for different k values, and there are also hierarchical relations between k-trusses in a graph. Similar to the core number, truss number of an edge is defined to (a) k-cores (b) k-trusses Figure 2: Illustrative examples for k-core and k-truss. On the left, red, blue, and green regions show the 3-, 2-, and 1-cores. Core numbers are also shown for each vertex. For the same graph, trusses are presented on the right. Entire graph is a 0-truss. Five vertices on the right form a 1-truss, in blue. There are also two 2-trusses and one of them is a subset of the 1-truss. Truss numbers of the edges are also shown. be the largest k value for which there exists a k-truss that includes the edge and maximum truss of an edge is the max- imal subgraph around it that contains edges with larger or equal truss numbers. We show some truss examples in Fig- ure 2b. Computing the core and truss numbers are known as the core and truss decomposition. Unifying k-core and k-truss: Nucleus decomposition is a framework that generalizes core and truss decompositions [37]. k-(r, s) nucleus is defined as the maximal subgraph of the r- cliques where each r-clique takes part in at least k s-cliques. We first give some basic definitions and then formally define the k-(r, s) nucleus subgraph. Definition 3. Let r < s be positive integers. • R(G)and S(G) are the set of r-cliques and s-cliques in G, respectively (or R and S when G is unambigous). • S-degree of R ∈ R(G) is the number of S ∈ S(G) such that S contains R (R ⊂ S). It is denoted as dsG(R) (or ds(R) when G is obvious). (cid:48) • Two r-cliques R, R are S-connected if there exists in R such a sequence R = R1, R2, . . . , Rk = R that for each i, some S ∈ S contains Ri ∪ Ri+1. • Let k, r, and s be positive integers such that r < s. A which contains the k-(r, s) nucleus is a subgraph G edges in the maximal union S of s-cliques such that ) is at least (cid:48) (cid:48) (cid:48) -- S-degree of any r-clique R ∈ R(G -- Any r-clique pair R, R k. (cid:48) (cid:48) ) are S-connected. For r = 1, s = 2, k-(1, 2) nucleus is a maximal (induced) connected subgraph with minimum vertex degree k. This is ∈ R(G (a) k-trusses (b) k-(3,4) nuclei Figure 3: Illustrative examples for k-truss and k-(3, 4) nu- cleus. On the left, entire graph is a single 1-truss and all except vertex g forms a 2-truss. For the same graph, k-(3, 4) nuclei are shown on the right. Entire graph is a 0-(3,4) nu- cleus and there are two 1-(3,4) nuclei (in red): subgraph among vertices a, b, c, d and subgraph among c, d, e, f, h. Note that those two subgraphs are reported as separate, not merged, since there is no four-clique that contains a triangle from each nuclei (breaking S-connectedness). Table 1: Notations Description graph r-clique s-clique Symbol G R S R(G) (or R) set of r-cliques in graph G S(G) (or S) set of s-cliques in graph G C(G) (or C) R(G) ∪ S(G) S-degree of R: number of s-cliques dsG(R) that contains R in graph G (or ds(R)) minimum S-degree of an r-clique in graph G δr,s(G) neighbor R(cid:48)s s.t. ∃ an s-clique S ⊇ (R ∪ R(cid:48)) Ns(R) largest k s.t. R is contained in a k-(r, s) nucleus κs(R) κ2(u), κ3(e) Core number of vertex u, truss number of edge e largest h s.t. at least h numbers in set K are ≥ h H(K) U update operator, (τ : R → N) → (U τ : R → N) exactly the k-core. Setting r = 2, s = 3 gives maximal sub- graphs where every edge participates in at least k triangles, which corresponds to k-truss, and all edges are triangle con- nected, which is also introduced as a k-truss community [18]. Note that the original k-truss definition is different from (2, 3) nucleus since it does not require triangle connectiv- ity. In this work, we focus on core, truss, and κs indices (Definition 4) and our algorithms work for any connectivity constraint. We skip details for brevity. Nucleus decomposition for r = 3 and s = 4 has been shown to give denser (and non-trivial) subgraphs than the k-cores and k-trusses, where density of G = (V, E) is de- (cid:1) [37]. Figure 3 presents the difference fined as 2E/(cid:0)V 2 between k-truss and k-(3, 4) nucleus on a toy graph. It is used to analyze citation networks of APS journal papers and discovered hierarchy of topics i.e., a large subgraph on complex networks has children subgraphs on synchroniza- tion networks, epidemic spreading and random walks, which cannot be observed with core and truss decompositions [38]. Nucleus decomposition for larger r and s values are costly and only affordable for small networks with a few thousand edges. Enumerating r-cliques and checking their involve- ments in s-cliques for r, s > 4, can become intractable for larger graphs, making k-(3, 4) is a sweet spot. In graph G, minimum S-degree of an r-clique R ∈ R(G) is denoted as δr,s(G), e.g., the minimum degree of a vertex in G is δ1,2(G). We also use Ns(R) to denote the set of neighbor r-cliques of R such that R(cid:48) ∈ Ns(R) if ∃ an s- clique S s.t. S ⊃ R and S ⊃ R(cid:48). As in k-core and k- truss definitions, an r-clique can take part in multiple k- (r, s) nuclei for different k values. We define the κs index of r-clique analogous to the core numbers of vertices and truss numbers of edges [37]. Definition 4. For any r-clique R ∈ R(G), the κs-index of R, denoted as κs(R), is the largest k value such that R is contained in a k-(r, s) nucleus. Core number of a vertex u is denoted by κ2(u) and the truss number of an edge e is denoted by κ3(e). We use the notion of k-(r, s) nucleus and κs-index to introduce our generic theorems and algorithms for any r, s values. The set of k-(r, s) nuclei is found by the peeling algorithm [37] (given in Algorithm 1). It is a generalization of the k-core and k- truss decomposition algorithms, and finds the κs indices of r-cliques in non-decreasing order. The following lemma is standard in the k-core literature and we prove the analogue for k-(r, s) nucleus. It is a con- venient characterization of the κs indices. 3333333321312 02222221222222012012efcabdh21gefcabdh10g1 Algorithm 1: Peeling(G, r, s) Input: G: graph, r < s: positive integers Output: κs(·): array of κs indices for r-cliques Enumerate all r-cliques in G For every r-clique R, set ds(R) (S-degrees) Mark every r-clique as unprocessed for each unprocessed r-clique R with minimum ds(R) do κs(R) = ds(R) Find set S of s-cliques containing R for each C ∈ S do if any R ⊂ C is processed then continue for each r-clique R(cid:48) ⊂ C, R(cid:48) (cid:54)= R do if ds(R(cid:48)) > ds(R) then ds(R(cid:48)) = ds(R(cid:48)) − 1 Mark R as processed return array κs(·) Lemma 1. ∀ R ∈ R(G), κs(R) = maxR(G(cid:48))(cid:51)Rδr,s(G(cid:48)), where G(cid:48) ⊆ G. Proof. Let T be the κs(R)-(r, s) nucleus containing R. By definition, δr,s(T ) = κs(R), so maxG(cid:48) δr,s(G(cid:48)) ≥ κs(R). Assume the contrary that there exists some subgraph T (cid:48) (cid:51) R such that δr,s(T (cid:48)) > κs(R) (WLOG, we can assume T (cid:48) is connected; otherwise, we denote T (cid:48) to be the component containing R). There must exist some maximal connected T (cid:48)(cid:48) ⊇ T (cid:48) that is a δr,s(T (cid:48))-nucleus. This would imply that κs(R) ≥ δr,s(T (cid:48)) > κs(R), a contradiction. 2.2 h-index computation The main idea in our work is the iterative h-index com- putation on the S-degrees of r-cliques. h-index metric is introduced to measure the impact and productivity of re- searchers by the citation counts [17]. A researcher has an h-index of k if she has at least k papers and each paper is cited at least k times such that there is no k(cid:48) > k that satis- fies these conditions. We define the function H to compute the h-index as follows: Definition 5. Given a set K of natural numbers, H(K) is the largest k ∈ N such that ≥ k elements of K are ≥ k. Core number of a vertex can be defined as the largest k such that it has at least k neighbors whose core numbers are also at least k. In the following section, we formalize this obser- vation, and build on it to design algorithms to compute not only core decompositions but also truss or nucleus decom- position for any r and s values. 3. FROM THE h-INDEX TO THE κs-INDEX Our main theoretical contribution is two-fold. First, we in- troduce a generic formulation to compute the k-(r, s) nucleus by an iterated h-index computation on r-cliques. Secondly, we prove convergence bounds on the number of iterations. We define the update operator U. This takes a function τ : R → N and returns another function Uτ : R → N, where R is the set of r-cliques in the graph. Definition 6. The update U is applied on the r-cliques (cid:54)=R τ (R(cid:48)). in a graph G such that for each r-clique R ∈ R(G): 1. For each s-clique S ⊃ R, set ρ(S, R) = minR(cid:48) ⊂S,R(cid:48) 2. Set Uτ (R) = H({ρ(S, R)}S⊃R). Observe that Uτ can be computed in parallel over all r- cliques in R(G). It is convenient to think of the S-degrees (ds) and κs indices as functions R → N. We initialize τ0 = ds, and set τt+1 = Uτt. The results of Lu et al. [26] prove that, for the k-core case (r = 1, s = 2), there is a sufficiently large t such that τt = κ2 (core number). We generalize this result for any nucleus decomposition. Moreover, we prove the first convergence bounds for U. The core idea of [26] is to prove that the τt(·) values never increase (monotonicity) and are always lower bounded by core numbers. We generalize their proof for any (r, s) nu- cleus decomposition. ⊂S,R(cid:48) Theorem 1. For all t and all r-cliques R: • (Monotonicity) τt+1(R) ≤ τt(R). • (Lower bound) τt(R) ≥ κs(R). Proof. (Monotonicity) We prove by induction on t. Con- sider the base case t = 0. Note that for all R, τ1(R) = Uds(R) ≤ ds(R). This is because in Step ?, the H operator acts on a set of ds(R), and this is largest possible value it can return. Now for induction (assume the property is true up to t). Fix an r-clique R, and s-clique S ⊃ R. For τt(R), one computes the value ρ(S, R) = minR(cid:48) (cid:54)=R τt−1(R). By the induction hypothesis, the values ρ(S, R) computed for τt+1 is at most the value computed for τt. Note that the H operator is monotone; if one decreases values in a set K, then H(K) cannot increase. Since the ρ values cannot increase, τt+1(R) ≤ τt(R). (Lower bound) We will prove that for any G(cid:48) ⊆ G, R(G(cid:48)) (cid:51) R, τt(R) ≥ δr,s(G(cid:48)). Lemma 1 completes the proof. We prove the above by induction on t. For the base case, τ0(R) = dsG(R) ≥ dsG(cid:48) (R) ≥ δr,s(G(cid:48)). Now for induc- tion. By the induction hypothesis, ∀ R ∈ R(G(cid:48)), τt(R) ≥ δr,s(G(cid:48)). Consider the computation of τt+1(R), and the val- ues ρ(S, R) computed in Step ?. For every s-clique S, note (cid:54)=R τt(R(cid:48)). By the induction hy- that ρ(S, R) = minR(cid:48) pothesis, this is at least δr,s(G(cid:48)). By definition of δr,s(G(cid:48)), dsG(cid:48) (R) ≥ δr,s(G(cid:48)). Thus, in Step ?, H returns at least δr,s(G(cid:48)). ⊂S,R(cid:48) Note that this is an intermediate result and we will present our final result in Lemma 2 at the end. 3.1 Convergence bounds by the degree levels A trivial upper bound for convergence is the number of r- cliques in the graph, R(G), because after n iterations n r- cliques with the lowest κs indices will converge. We present a tighter bound for convergence. Our main insight is to de- fine the degree levels of r-cliques, and relate these to the convergence of τt to κs. We prove that the κs indices in the i-th level converge within i iterations of the update opera- tion. This gives quantitative bounds on the convergence. cliques. Definition 7. For a graph G, • C(G) = R(G) ∪ S(G), i.e., set of all r-cliques and s- • S ∈ C(G) if and only if R ∈ C(G),∀ R ⊂ S. • If R is removed from C(G), all S ⊃ R are also removed from C(G). • Degree levels are defined recursively as follows. The i-th level is the set Li. − L0 is the set of r-cliques that has the minimum S- − Li is the set of r-cliques that has the minimum S- degree in C. degree in C \ (cid:83) j<i Lj. Figure 4: Illustration of degree levels for the k-core decom- position. L0 = {a} since it has the minimum degree initially and the only such vertex. Its removal makes the b with the minimum degree, so L1 = {b}. After removing vertex b, there are two vertices with the least degree; L2 = {c, g}. Lastly, removing those leaves three vertices with the same degree and L3 = {d, e, f}. Figure 4 shows the degree levels for k-core decomposition on a toy graph. We first prove the κs indices cannot decrease as the level increases. The following proof is closely related to the fact the minimum degree removal algorithm (peeling) finds all cores/trusses/nuclei. Theorem 2. Let i ≤ j. For any Ri ∈ Li and Rj ∈ Lj, Proof. Let L(cid:48) = (cid:83) κs(Ri) ≤ κs(Rj). r≥i Lr, the union of all levels i and above, and G(cid:48) is the graph such that L(cid:48) = R(G(cid:48)). By def- inition of the levels, dsG(cid:48) (Ri) = δr,s(G(cid:48)) and dsG(cid:48) (Rj) ≥ dsG(cid:48) (Ri). There exists some κs(Ri)-nucleus T containing Ri. We split into two cases. Case 1: R(T ) ⊆ L(cid:48). Thus, κs(Ri) = δr,s(T ) ≤ δr,s(G(cid:48)) = dsG(cid:48) (Ri). Note that κs(Rj) = minP(cid:51)Rj δr,s(P ), so κs(Rj) ≥ δr,s(G(cid:48)). Hence, κs(Ri) ≤ κs(Rj). Case 2: R(T ) \ L(cid:48) (cid:54)= ∅. Thus, there exists some r-clique R(cid:48) ∈ R(T )∩ Lb, where b < i. Choose the R(cid:48) that minimizes this value of b. Since T is a κs(Ri)-nucleus, dsT (R(cid:48)) ≥ r≥b Lr. Note that R(T ) ⊆ M , since we chose R(cid:48) to minimize b. Let Q is the graph such that M = R(Q). We have dsQ(R(cid:48)) ≥ dsT (R(cid:48)) ≥ κs(Ri). Since R(cid:48) ∈ Lb, dsQ(R(cid:48)) = δr,s(Q). Since j > b and Rj ∈ M , κs(Rj) ≥ δr,s(Q). Combining the above, we deduce κs(Ri) ≤ κs(Rj). κs(Ri). Consider M = (cid:83) The main convergence theorem is the following. As ex- plained earlier, it shows that the i-th level converges within i iterations. Theorem 3. Fix level Li. For all t ≥ i and R ∈ Li, τt(R) = κs(R). (cid:83) κs(R). Select arbitrary Ra ∈ Li+1, and set L(cid:48) =(cid:83) Proof. We prove by induction on i. For the base case i = 0; note that for any R of minimum S-degree in G, κs(R) = dsG(R) = τ0(R). For induction, assume the theorem is true up to level i. Thus, for t ≥ i and ∀ R ∈ j≤i Lj, τt(R) = j≥i+1 Lj. We partition the s-cliques containing Ra into the "low" set S(cid:96) and "high" set Sh. s-cliques in S(cid:96) contain some r-clique outside L(cid:48), and those in Sh are contained in L(cid:48). For every s- clique S ∈ S(cid:96), there is a Rb ⊂ S such that Rb ∈ Lk for k≤ i. By the inductive hypothesis, τt(Rb) = κs(Rb). By Theorem 2 applied to Rb ∈ Lk and Ra∈ Li+1, κs(Rb)≤ κs(Ra). Now we focus on the computation of τt+1(Ra), which starts with computing ρ(S, Ra) in Step ? of Definition 6. For every S ∈ S(cid:96), by the previous argument, there is some r-clique Rb ⊂ S, Rb (cid:54)= Ra, such that τt(Rb)≤ κs(Ra). Thus, ∀ S ∈ S(cid:96), ρ(S, Ra) ≤ κs(Ra). This crucially uses the min in the setting of ρ(S, Ra), and is a key insight into the general- ization of iterated H-indices for any nucleus decomposition. The number of edges in Sh is exactly dsG(cid:48) (Ra) = δr,s(G(cid:48)). Applying Lemma 1 to Ra ∈ L(cid:48), we deduce κs(Ra) ≥ dsG(cid:48) (Ra). All in all, for all S ∈ S(cid:96), ρ(S, Ra) is at most κs(Ra). On the other hand, there are at most κs(Ra) s-cliques in Sh. The application of the H function in Step ? yields τt+1(Ra) ≤ κs(Ra). But the lower bound of Theorem 1 asserts τt+1(Ra) ≥ κs(Ra), and hence, these are equal. This completes the in- duction. We have the following lemma to show that convergence is guaranteed in a finite number of iterations. Lemma 2. Given a graph G let l be the maximum i, such that Ll (cid:54)= ∅ and τl(R) ≥ κs(R) for all r-cliques (e.g., τ0 = ds) and set τt+1 = Uτt. For some t ≤ l, τt(R) = κs(R), for all r-cliques. 4. LOCAL ALGORITHMS We introduce generalized local algorithms to find the κs in- dices of r-cliques for any (r, s) nucleus decomposition. For each r-clique, we iteratively apply h-index computation. Our local algorithms are parallel thanks to the independent na- ture of the h-index computations. We also explore time and quality trade-offs by using the iterative nature. We first present the deterministic synchronous algorithm which does not depend on the order of processing the r-cliques. It im- plements the U operator in Definition 6. Then we adapt our algorithm to work in an asynchronous manner that con- verges faster and uses less space. For those familiar with lin- ear algebra, the synchronous and asynchronous algorithms are analogous to Jacobi and Gauss-Seidel iterations for it- erative solvers. At the end, we discuss some heuristics and key implementation details for shared-memory parallelism in OpenMP. 4.1 Synchronous Nucleus Decomposition (Snd) We use the update operator U to compute the k-(r, s) nuclei of a graph G in a synchronous way. Algorithm 2 (Snd) implements the Definition 6 for functions τ0 = ds and τt+1 = Uτt to find the κs indices of r-cliques in graph G. Snd algorithm iterates until no further updates occur for any τ index, which means all the τ indices converged to κs. Computation is performed synchronously on all the r- cliques and at each iteration i, τi indices are found for all r-cliques. We declare two arrays, τ (·) and τ p(·), to store the indices being computed and the indices that were computed in the previous iteration, respectively (Lines 1 and 4). τ (·) are initialized to the S-degrees of the r-cliques since τ0 = ds (Line 2). At each iteration, newly computed τ (·) indices are backed up in τ p(·) (Line 7), and the new τ (·) indices are computed. During the iterative process, convergence is checked by the flag F (Line 5), which is initially set to true (Line 3) and stays true as long as there is an update on a τ index (Lines 6, 13, and 14). Computation of the new τ (·) indices for each r-clique can be performed in parallel (Lines 8 to 15). For each r-clique R, we apply the two step process in the Definition 6. First, for each s-clique S that contains R, we compute the ρ values that is the minimum τ p index of an r-clique R(cid:48) ⊂ S (R(cid:48) (cid:54)= R) and collect them in a set L (Lines 10 to 12). Then, we assign the h-index of the set L as the new τ index of the r-clique (Line 15). The algorithm continues until there are no updates on the τ index ' (Lines 13 and 14). Once the dgcebfaL0L1L2L3abcgdef Algorithm 2: Snd: Synchronous Nucleus Decomp Algorithm 3: And: Asynchronous Nucleus Decomp. 6 7 8 9 10 11 12 13 14 15 16 17 Input: G: graph, r, s: positive integers (r < s) Output: κs(·): array of κs indices for r-cliques 1 τ (·) ← indices ∀ R ∈ R(G) // current iteration 2 τ (R) ← ds(R) ∀ R ∈ R(G) // set to the S-degrees 3 F ← true // stays true if any τ (R) is updated 4 τ p(·) ← backup indices ∀ R ∈ R(G) // prev. iter. 5 while F do 6 7 8 9 10 11 12 F ← false τ p(R) ← τ (R) ∀ R ∈ R(G) for each R ∈ R(G) in parallel do L ← empty set for each s-clique S ⊃ R do ∈Ns(R) τ p(R(cid:48)) ρ ← minR(cid:48) L . add (ρ) 15 13 14 if τ p(R) (cid:54)= H(L) then F ← true τ (R) ← H(L) 16 κs(·) ← τ (·) 17 return array κs(·) τ indices converge, we assign them to κs indices and finish (Lines 16 and 17). Time complexity: Snd algorithm starts with enumer- ating the r-cliques (not shown in the pseudocode) and its runtime is denoted by RTr(G) (this part can be parallelized as well, but we ignore that for now). Then, each itera- tion (Lines 5 to 15) is performed t times until convergence where t is the total number of iterations for which we pro- vided bounds in Section 3.1. In each iteration, each r-clique R ∈ R is processed once, which is parallelizable. Suppose R has vertices v1, v2,··· , vr . We can find all s-cliques con- taining R by looking at all (s − r)-tuples in each of the neighborhoods of vi (Indeed, it suffices to look at just one v∈R d(v)s−r)/p = v∈V dR(v)d(v)s−r)/p time if p threads are used for parallelism. Note that the h-index computation can be done incrementally without storing all ρ values in set L (see Section 4.4). Overall, the time com- plexity of Snd using p threads is: such neighborhood). This takes ((cid:80) ((cid:80) R(cid:51)v d(v)s−r)/p = ((cid:80) (cid:80) (cid:80) v∈V R Figure 5: Snd (Algorithm 2) for the k-truss decomposition (r = 2, s = 3). We find the κ3 indices. Triangle counts of all the edges are computed (d3) and set as their τ0 val- ues (blue). For each edge, we first compute τ1 indices (red) based on the τ0 indices. The bc edge, for instance, has three triangles and for each of those we find the neighbor with the minimum τ0 index and compute the h-index. So, τ1(bc) = H{min(τ0(ba), τ0(ca)), min(τ0(bd), τ0(cd)), min(τ0(be), τ0(ce))} = H{3, 2, 2} = 2. No updates happen in the sec- ond iteration (green), so convergence is obtained in a single iteration. Input: G: graph, r, s: positive integers (r < s) Output: κs(·): array of κs indices for r-cliques 1 τ (·) ← indices ∀ R ∈ R(G) // current iteration 2 τ (R) ← ds(R) ∀ R ∈ R(G) // set to the S-degrees 3 F ← true // stays true if any τ (R) is updated 4 c(R) ← true ∀ R ∈ R(G) 5 while F do F ← false for each R ∈ R(G) in parallel do if c(R) is false then cont. else c(R) ← false L ← empty set for each s-clique S ⊃ R do ∈Ns(R) τ (R(cid:48)) ρ ← minR(cid:48) L . add (ρ) if τ (R) (cid:54)= H(L) then F ← true, c(R) ← true for each R(cid:48) ∈ Ns(R) do if H(L) ≤ τ (R(cid:48)) then c(R(cid:48)) ← true 18 τ (R) ← H(L) 19 κs(·) ← τ (·) 20 return array κs(·) (cid:16) RTr(G) + t(cid:0)(cid:88) dR(v)d(v)s−r(cid:1)/p (cid:17) (1) O v∈V When t = p, complexity is same as the sequential peeling algorithm's (Algorithm 1) and Snd is work-efficient. Space complexity: In addition to the space that is needed to store r-cliques (taking O(r R(G))), we need to store τ indices for the current and the previous iterations, which takes O(R(G)) space, i.e., number of r-cliques. ρ values are not need to be stored in set L since the h-index computation can be done incrementally. So, the total space complexity is O(R(G)) (since r = O(1)). Figure 5 illustrates the Snd algorithm for k-truss decom- position (r = 2, s = 3) on a toy graph, where the partici- pations of edges (2-cliques) in triangles (3-cliques) are ex- amined. Triangle counts of all the edges (d3) are computed and set as their τ0 values (in blue). For each edge, first we compute τ1 indices (in red) based on the τ0 indices (Lines 5 to 15). For instance, the ae edge has four triangles and for each of those we find the neighbor with minimum τ0 index (Lines 10 to 12); thus L = {(min(τ0(eb), τ0(ab)), min(τ0(ec), τ0(ac)), min(τ0(eg) , τ0(ag)), min(τ0(ef ), τ0(af ))} = {2, 2, 1, 1} and τ1(ae) = H(L) = 2 (Line 15). Since the τ in- dex is updated, we set flag F true to continue iterations. In the second iteration (τ2 indices), no update occurs, i.e., τ2(e) = τ1(e) for all edges, thus the algorithm termnates. So, one iteration is enough for the convergence and we have κ3 = τ1 for all the edges. 4.2 Asynchronous Nucleus Decomposition (And) In the Snd algorithm, updates on the τ indices are syn- chronous and all the r-cliques are processed by using the same snapshot of τ indices. However, when an r-clique R is being processed in iteration i, a neighbor r-clique R(cid:48) ∈ Ns(R) might have already completed its computation in that iteration and updated its τ index. By Theorem 1, we know that the τ index can only decrease as the algorithm pro- ceeds. Lower τ (R(cid:48)) indices in set L can decrease H(L), and becdagf2 2 21 1 12 1 11 1 12 2 23 2 23 2 22 2 22 2 24 2 23 2 23 2 21 1 11 1 1becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure5:Trussexampleplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d33⌧0⌧1d22Figure5illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9MHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausAndalgorithmconvergeswhennoneofther-cliquesup-datetheir⌧indicesanymore.Consequently,computationsareperformedforallther-cliquesevenwhenonlyoneup-dateoccurs.Figure5showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecomposition(r=2,s=3).Therearewideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.When⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbyonlywatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d3322cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16t indicesnumber of iterationsFigure3:ChangesasdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.01020304050607080900246810121416⌧indicesnumberofiterations4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.Additional22cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16truss valuesnumber of iterationsFigure3:asdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheotherFigure5:Changesinthe⌧indicesofsomeedgesinfacebookgraphduringthek-trussdecomposition(r=2,s=3).Notethattherearewideplateausduringtheconvergence,especiallyattheend,whereedgesdonotchangetheir⌧indices.Plateauscanbealsoobservedinthemiddleofthecomputationlikethetoptwolines.⌧0⌧1d22Figure2illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].OurSND : triangle count :truss number : toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausAndalgorithmconvergeswhennoneofther-cliquesup-datetheir⌧indicesanymore.Consequently,computationsareperformedforallther-cliquesevenwhenonlyoneup-dateoccurs.Figure5showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecomposition(r=2,s=3).Therearewideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.When⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbyonlywatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d3322cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16t indicesnumber of iterationsFigure3:ChangesasdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.01020304050607080900246810121416⌧indicesnumberofiterations4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.Additional22cdbfea1132211222112222degree (d2) 1 in SND & AND alph. ordercore number ( 2)22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexample22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:Weapplythek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).Sndalgorithmconvergesintwoiterations(⌧1sinred,⌧2=2singreen).SamehappenswhenweuseAndalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,Andconvergesinasingleiteration.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedintheprevi-ousiterationanditisexactlytheSNDalgorithm.ErdemSAYS:Iactuallybelievethatprocessingtheverticesinnon-increasingorderoftheirindiceswillgivetheworstcaseforAndalgorithm.It'sjustanintuitionbasedonthebestcasetheorem,notsureifIcanprove.Ifyoucanprove,Icanincludesomeworstcasenumbersinexp.sectionFigure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1. 0 10 20 30 40 50 60 70 80 90 0 2 4 6 8 10 12 14 16truss valuesnumber of iterationsFigure3:asdIfwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2value.Weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,thusconvergeintwoiterations.4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)indicesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheotherFigure5:Changesinthe⌧indicesofsomeedgesinfacebookgraphduringthek-trussdecomposition(r=2,s=3).Notethattherearewideplateausduringtheconvergence,especiallyattheend,whereedgesdonotchangetheir⌧indices.Plateauscanbealsoobservedinthemiddleofthecomputationlikethetoptwolines.⌧0⌧1d22Figure2illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourcdbfea1 1 1 1SND & AND {a,b,c,d,e,f} : AND {f,e,a,b,d,c} :degree, core number : becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.2 1 1 12 2 1 13 2 2 22 2 2 22 2 2 2becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.Figure3:Wedothek-coredecomposition(r=1,s=2).So,weneedtofind2(edgeis2-clique)indicesofvertices.⌧0indicesareinitializedtothedegrees(d2sinblue).SNDalgorithmconvergesintwoit-erations(⌧1sinred,⌧2singreen).SamehappenswhenweusetheANDalgorithmandprocesstheverticesinthealphabeticalorder.However,ifwechoose{f,e,a,b,c,d}order,whichisactuallyanon-decreasingorderon2indices,ANDconvergesinasingleiteration.So,setL={(min(⌧0(eb),⌧0(ab)),min(⌧0(ec),⌧0(ac)),min(⌧0(eg),⌧0(ag)),min(⌧0(ef),⌧0(af))}={2,2,1,1}and⌧1(ae)=H(L)=2(line14).Sincethe⌧indexisupdated,wesetflagFtruetocontinueiterations.Af-tercompleting⌧1computations,wegofor⌧2indices(ingreen)andobservethatthereisnoupdateinanyedge,i.e.,⌧2(e)=⌧1(e)foralledges,thuscompletingthealgorithm.Oneiterationisenoughfortheconvergenceandwehave3=⌧1foralledges.4.2AsynchronousNucleusDecomposition(AND)InSndalgorithm,updatesonthe⌧indicesaresynchronousandallther-cliquesareprocessedbasedonthesamesnap-shotof⌧indices.However,whenanr-cliqueRisbeingprocessediniterationi,anotherr-cliqueR0participatinginthesames-cliquewithR(i.e.,S3R^R02S)mighthavealreadycompleteditscomputationinthatiterationandup-datedits⌧index.ByTheorem1,weknowthatthe⌧indexcanonlydecreasebythetime.Lower⌧(R0)indicesinsetLmightdecreaseH(L),anditcanhelp⌧(R)toconverges(R)faster.So,itisbettertousetheup-to-date⌧indicesforfasterconvergence.Inaddition,therewouldbenoneedtostorethe⌧indicescomputedinthepreviousiteration,savingR(G)space.WeintroduceAndalgorithm(Algorithm3)toleveragetheup-to-date⌧indicesforfasterconvergence(Orangelinescanbeignoredfornow).Ateachiteration,weproposetousethelatestavailableinformationaroundanr-clique.Re-movingthegreenlinesinSndalgorithmandputtingthebluelinesinAndalgorithmaresucienttoswitchfromsynchronoustoasynchronouscomputation.Wedonotneedtousethe⌧p(·)tobackuptheindicesinthepreviousitera-tionanymore,solines4and7inAlgorithm2areremoved.Computationisdoneonthelatest⌧indices,soweadjustthelines11and13(inAlgorithm2and3)accordingly,tousetheup-to-date⌧indices.Inthesameiteration,eachr-cliquecanhaveadi↵erentviewofthe⌧(·)andupdatesaredoneasynchronouslyinsomeorder.Theconvergencelength,Lr,s(G),dependsonthecomputationorderofther-cliques,whichisusedinline7inAlgorithm3.Consideringthesequentialcomputation,wehavethefollowingtheoremregardingthebestorderingthatwillresultinconvergence.Theorem4.InAndalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧indicesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure3illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(de-grees).WefirstapplySnd.Vertexdegreesaresetas⌧0indices(blue).Foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'de-grees,(red).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainsincesomeupdateshappenedin⌧indices.⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1andcontinueiterations.Noupdateisobservedin⌧3indices(yellow),whichmeanss=⌧2forallverticesandSndconvergesintwoitera-tions.RegardingtheAndalgorithm,saywechoosetofol-lowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisorderenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,3})=1.However,ifwechoosetoprocesstheverticesinthealphabeticalorder,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,3})=2,andneedmoreiteration(s)toconverge.Indeed,aistheonlyvertexthathasnotreachedits2valueattheendoffirstiteration.Intheseconditeration,weget⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1,anupdate,thuscontinueiterat-ing.Thirditerationdoesnotchangethe⌧indices,soAndwith{a,b,c,d,e,f}orderconvergesintwoiterations,sameasSnd.(3)4.2.1SkippingtheplateausSndandAndalgorithmsconvergewhennoneofther-cliquesupdatetheir⌧indicesanymore.Consequently,com-putationscontinuetobeperformedforallther-cliquesevenwhenonlyoneupdateoccursandwealsoneedanextraitera-tiontoinfertheconvergence.Figure4showsthe⌧indicesofsomeedgesinthefacebookgraphduringthek-trussdecom-position(r=2,s=3).Thereareplentyofwideplateauswhere⌧indicesstayconstant.However,thosecomputationsareredundant.Forexample,when⌧(R)convergestos(R)foranr-cliqueR,nomorecomputationsareneededforRanymore.Butwedonotknowifthe⌧(R)hasconvergedornotbylookingattherepeating⌧indicesorwatchingtheplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Inordertoinfertheconvergenceecientlyandskipany Figure 6: Snd (Algorithm 2) and And (Algorithm 3, w/o orange lines) for the k-core decomposition (r = 1, s = 2). We find the κ2 indices (core numbers) of vertices (edge is 2- clique). τ0 indices are initialized to the degrees (d2 in blue). Snd algorithm uses the τi−1 indices to compute the τi indices and converges in two iterations (τ1 in red, τ2 in green, τ3 in orange). Same happens when we use And and follow the {a,b,c,d,e,f} order to process the vertices. On the other hand, if we choose the order by degree levels, {f,e,a,b,c,d}, convergence is obtained in a single iteration. it can help τ (R) to converge faster. So, it is better to use the up-to-date τ indices for faster convergence. In addition, there would be no need to store the τ indices computed in the previous iteration, saving R(G) space. We introduce the And algorithm (Algorithm 3) to lever- age the up-to-date τ indices for faster convergence (ignore the orange lines for now). At each iteration, we propose to use the latest available information in the neighborhood of an r-clique. Removing the green lines in the Snd algo- rithm and inserting the blue lines in the And algorithm are sufficient to switch from synchronous to asynchronous com- putation. We do not need to use the τp(·) to back up the indices in the previous iteration anymore, so Lines 4 and 7 in Algorithm 2 are removed. Computation is done on the latest τ indices, so we adjust the Lines 11 and 13 in Algorithm 2 accordingly, to use the up-to-date τ indices. In the same iteration, each r-clique can have a different view of the τ (·) and updates are done asynchronously in an arbitrary order. Number of iterations for convergence depends on the processing order (Line 7 in Algorithm 3) and never more than the Snd algorithm. Time complexity: The worst case for And happens when all the r-cliques see the τ indices of their neighbors that are computed in the previous iteration, which exactly corresponds to the Snd algorithm. Thus the time complex- ity of And is same as Snd's (Equation (1)). However, in practice we expect fewer iterations. Space complexity: The only difference with Snd is that we do not need to store the τ values in the previous iteration anymore. So, it is still O(R(G)). Figure 6 illustrates And algorithm with two different or- derings and the Snd algorithm on the k-core case (r = 1, s = 2). Focus is on vertices (1-cliques) and their edge (2-clique) counts (degrees). We start with Snd. Vertex de- grees are set as τ0 indices (blue). For each vertex u we compute the τ1(u) = H({τ0(v) : v ∈ N2(u)} (red), i.e., h-index of its neighbors' degrees. For instance, vertex a has two neighbors, e and b, with degrees 2 and 3. Since H({2, 3}) = 2, we get τ1(a) = 2. For vertex b, we get τ1(b) = H({2, 2, 2}) = 2. After computing all the τ1 indices, τ values of vertices e and b are updated, thus we compute the τ2 indices, shown in green. We observe an update for the vertex a; τ2(a) = H({τ1(e), τ1(b)}) = H({1, 2}) = 1 and Figure 7: Changes in τ indices of randomly selected edges in facebook graph during the k-truss decomposition. Wide plateaus appear during the convergence, especially at the end. continue computation. For τ3 indices (orange), no update is observed which means that κs = τ2, and Snd converges in two iterations. Regarding the And algorithm, say we choose to follow the increasing order of degree levels (noted in pur- ple) where L0 = {f}, L1 = {e}, L2 = {a}, L3 = {b,c,d}. Computing the τ1 indices on this order enables us to reach the convergence in a single iteration. For instance, τ1(a) = H({τ1(e), τ0(b)}) = H({1, 3}) = 1. However, if we choose to process the vertices in a different order than the degree lev- els, say {a,b,c,d,e,f}, we have τ1(a) = H({τ0(e), τ0(b)}) = H({2, 3}) = 2, and need more iteration(s) to converge. In- deed, a is the only updated vertex. In the second itera- tion, we get τ2(a) = H({τ1(e), τ1(b)}) = H({1, 2}) = 1, an update, thus continue iterating. Third iteration does not change the τ indices, so And with {a,b,c,d,e,f} order con- verges in two iterations, just as the Snd. 4.3 Avoiding redundant work by notifications Snd and And algorithms converge when no r-clique updates its τ index anymore. Consequently, update on all r-cliques continue even when only one update occurs and we need an extra iteration to detect convergence. Figure 7 shows the τ indices of randomly selected edges in the facebook graph during k-truss decomposition (r = 2, s = 3). There are plenty of wide plateaus where τ indices stay constant, which implies redundant computations. How can we avoid this re- dundancy? Observe that repeating τ indices or plateaus are not sufficient, because an update can still occur after main- taining the same τ index for a number of iterations, creating a plateau. In order to efficiently detect the convergence and skip any plateaus during the computation, we introduce a notification mechanism where an r-clique is notified to re- compute its τ index, if any of its neighbors has an update. Orange lines in Algorithm 3 present the notification mech- anism added to And. c(·) array is declared in (Line 4) to track whether an R ∈ R(G) has updated its τ index. c(R) = false means R did not update its τ index, it is an idle r-clique, and there is no need to recompute its τ value for that iteration (Line 8). A non-idle r-clique is called ac- tive. Thus, all c(·) is set to true at the beginning to initiate the computations for all r-cliques. Each r-clique marks itself idle at the beginning of an iteration (Line 8) and waits for an update in a neighbor. When the τ (R) is updated, τ in- dices of some neighbor r-cliques in Ns(R) might be affected and they should be notified. If R(cid:48) ∈ Ns(R), if τ (R(cid:48)) < H(L) (new τ (R)) then τ (R(cid:48)) ≤ τ (R) already in the previous iter- ation (Theorem 1), and thus no change can happen in the h-index computation. Therefore, we only need to notify the neighbors that have τ indices greater than or equal to H(L) (Lines 15 to 17). This version of our algorithm requires an additional O(R(G)) space for c(·) array and does not of- fer a theoretical improvement in time-complexity. However, cdbfea1 1 1 1SND & AND {a,b,c,d,e,f} : AND {f,e,a,b,d,c} :degree, core number : becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.2 1 1 12 2 1 13 2 2 22 2 2 22 2 2 2becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure4:Trussexample⌧0⌧1⌧2⌧3⌧0⌧1⌧2⌧0⌧1d22Figure4illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Mleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.AllexperimentsareperformedonaLinuxoperatingsys-temrunningonamachinewithIntelIvyBridgeprocessorat2.4GHzwith64GBDDR31866MHzmemory.Therearetwosocketsonthemachineandeachhastwelvecores,mak-ing24coresintotal.AlgorithmsareimplementedinC++andcompiledusinggcc6.1.0at-O2optimizationlevel.WeusedOpenMPv4.5fortheshared-memoryparallelization.Westartwithcomparingthenumberofiterationsthatoursynchronous(Algorithm??)andasynchronous(Algo-rithm??)algorithmsneedtoconverge.Then,weinvesti-gatehowmuchthe⌧indicescanapproachtoindicesateachiteration.Regardingtheperformance,wecomparetheruntimesofouralgorithmswithrespecttothepeeling,andalsodiscussthescalabilityofourimplementations.L0L1L2L3 0 20 40 60 80 0 2 4 6 8 10 12 14 16tau indicesnumber of iterations Figure 8: k-core decomposition (r = 1, s = 2) by And (Al- gorithm 3) that uses the notification mechanism. After the first iteration, the only active vertex is a. In the second it- eration, computation updates τ (a) and thus notifies vertices b and e. In the third iteration, their τ indices are recom- puted and no update happens. All the vertices become idle, thus convergence is obtained. 9 τ computations performed in 3 iterations by And with notification mechanism, while 24 τ computations are done in 4 iterations if notification mechanism is not used (Figure 6). avoiding redundant computations yields faster runtimes in practice. Figure 8 illustrates the notification mechanism on the graph in Figure 6, processing the vertices in the a,b,c,d,e,f order. Again, vertex degrees are set as τ0 indices (blue) and we compute τ1(u) = H({τ0(v) : v ∈ N2(u)}, i.e., h- index of its neighbors' degrees, (red) for each vertex u. No update happens for vertex a and no vertices are notified. τ (b) is updated as 2 and we check if any neighbors of b has a τ index ≥ 2 (Line 16). All its neighbors have such τ indices, thus all are notified: a, c, d. Vertices c and d do not update their τ indices. Then, τ (e) is updated as 1 and since τ0(e) ≥ τ1(a) > τ1(e), vertices a and f are noti- fied for recomputing its τ index. At that instant, vertices a and f are active. Next, vertex f is processed and does not change its τ index, so all the vertices except a are idle now. In the second iteration, we only process a and com- pute τ2(a) = H{τ1(e), τ1(b)} = H{1, 2} = 1. Update in τ (a) notifies vertices b and e since both have ≥ τ indices. In the third iteration, we recompute τ indices for b and e, but there is no update. So all the vertices become idle, implying convergence. Overall, it takes 9 τ computations and 3 iterations for the And with notification mechanism, while 24 τ computations and 4 iterations are needed without the notification mechanism (Figure 6). So the notification mechanism is helpful to avoid redundant computations. PartialAnd on a set of r-cliques: Local nature of the And algorithm enables selection of a set of r-cliques and its application only to this set until convergence. This is useful in query-driven scenarios where the focus is on a single (or a few) vertex/edge. We define PartialAnd as the application of And algorithm on a set of given r-cliques, say P . We only modify the orange lines in Algorithm 3 where c of an r-clique is re-computed only if it is in set P . This way we just limit the And computation on a small set. We give an application of PartialAnd in Section 5.3 where the computation is limited on a given r-clique and its neighbors. 4.4 Heuristics and implementation We introduce key implementation details for the shared- memory parallelism and heuristics for efficient h-index com- putation. We used OpenMP [7] to utilize the shared-memory architectures. The loops, annotated as parallel in Algo- rithms 2 and 3, are shared among the threads, and each Table 2: Statistics about our dataset; number of vertices, edges, triangles and four-cliques (K4). V E (cid:52) 65.6M 4K 88.2K 1.8B as-skitter (ask) facebook (fb) friendster (fri) soc-LiveJournal (slj) soc-orkut (ork) K4 1.7M 11.1M 28.8M 148.8M 1.6M 30.0M 8.9B 4.1B 9.9B 4.8M 68.5M 285.7M 2.9M 106.3M 524.6M 2.4B soc-sign-epinions (sse) 131.8K 711.2K 4.9M 58.6M soc-twitter-higgs (hg) 456.6K 12.5M 83.0M 429.7M 1.3M 13.1M 104.9M 4.3M 13.4M 39.9M 1.1M 8.9M 231.9M 3.1M 37.0M 88.8M 162.9M twitter (tw) 81.3K web-Google (wgo) 916.4K web-NotreDame (wnd) 325.7K wiki-200611 (wiki) thread is responsible for its partition of r-cliques. No syn- chronization or atomic operation is needed. Default schedul- ing policy in OpenMP is static and it distributes the iter- ations of the loop to the threads in chunks, i.e., for two threads, one takes the first half and the other takes the sec- ond. This approach does not work well for our algorithms, since the notification mechanism may result in significant load imbalance among threads. If most of the idle r-cliques are assigned to a certain thread, this thread quickly finishes, and remains idle until the iteration ends. To prevent this, we adopted the dynamic scheduling where each thread is given a new workload once it idle. We set chunk size to 100 and observed no significant difference for other values. No thread stays idle this way, improving parallel efficiency. h-index computation for a list of numbers is traditionally done by sorting the numbers in the non-increasing order and checking the values starting from the head of the list to find the largest h value for which at least h items exist with at least h value. Main bottleneck in this routine is the sorting operation which takes O(nlogn) time for n numbers. We use a linear time algorithm that uses a hashmap and does not include sorting to compute the h-index. h is initialized as zero and we iterate over the items in the list. At each step, we attempt to increase the current h value based on the inspected item. For the present h value in a step, we keep track of the number of items examined so far that have value equal to h. We use a hashmap to keep track of the number of items that has at least h value, and ignore values smaller than h. This enables the computation of the h- index in linear time and provides a trade-off between time and space. In addition, after the initialization, we check to see if the current τ index can be preserved. Once we see at least τ items with index at least τ , no more checks needed. 5. EXPERIMENTS We evaluate our algorithms on three instances of the (r, s) nucleus decomposition: k-core ((1, 2)), k-truss ((2, 3)), and (3, 4) nucleus, which are shown to be the practical and ef- fective [37, 38]. We do not store the s-cliques during the computation for better scalability in terms of the mem- ory space. Instead, we find the participations of the r- cliques in the s-cliques on-the-fly [37]. Our dataset con- tains a diverse set of real-world networks from SNAP [25] and Network Repository [32] (see Table 2), such as internet topology network (as-skitter), social networks (facebook, friendster, soc-LiveJournal, soc-orkut), trust network (soc- sign-epinions), Twitter follower-followee networks (soc-twitter -higgs, twitter), web networks (web-Google, web- NotreDame), and a network of wiki pages (wiki-200611). cdbfea1 1 12 1 12 2 13 2 22 2 22 2 2AND with notification {a,b,c,d,e,f} becdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexampleaidfbhceg2 2 23 2 24 3 22 2 22 2 14 2 24 3 21 1 12 1 10 1 2(d2)( 2)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure4:Coreexample⌧⌧⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and4Wepresenttwoexamplestoillustratethedi↵erencesbetweenSndandAndalgorithms.Figure4presentsthek-coredecompositionprocessonatoygraph.4.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsobecdaghif2 2 22 2 22 2 22 2 22 2 22 2 21 1 11 1 11 1 11 1 12 2 23 2 24 2 23 2 23 2 23 2 24 2 24 3 23 2 2⌧⌧⌧4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsoaidfbhceg122424324211233221st2nd3rdstepstepstepFigure4:CoreexampleToDo:putallstepnumbers,changelegendfortausTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeebecdaghif4323433111122342222322222222Figure5:Trussexample0 1 2(d3)( 3)22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure5:TrussexampleTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9Museahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom-parisonbetweentwoapproachesaregivenin[25].Ourdatasetincludesdi↵erenttypesofreal-worldnetworks,suchasaninternettopologynetwork(as-skitter),onlinesocialnetworks(facebook,soc-LiveJournal,soc-orkut),who-trust-whomnetwork(soc-sign-epinions),follower-followeeTwitternetworks(soc-twitter-higgs,twitter),webnet-works(web-Google,web-NotreDame),andanetworkofwikipediapages(wikipedia-200611).Numberofvertices,edges,trianglesandfour-cliquesinthosegraphsaregiveninTable3.22cdbfea1132211222112222degrees 1 indices in SNDcore numbers22cdbfea1132211222112222degreescore numbers2nd step in lex. orderFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesthedi↵erencebetweenSndandAndalgorithms(withdi↵erentorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheirre-lationswithedges(2-cliques).WefirstapplySnd.First,vertexdegreesarecalculatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednum-bers).⌧Forinstance,ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheaidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:CoreexampleFigure2:AsyncexampleTheorem4.InANDalgorithm,ifther-cliquesarepro-cessedinthenon-decreasingorderoftheirfinalsindices,convergenceisobtainedinasingleiteration.Proof.Says(R)=tforanr-cliqueR.Forthesakeofcontradiction,assumethatittakesmorethanoneiterationfords(R)toconverges(R).So,⌧0(R)=ds(R)and⌧0(R)⌧1(R)>s(R).So,whenRisbeingprocessed,H(L)>tforL={⇢(S):S3R}.Thatmeansthereareatleastt+1s-cliqueswhereeachhas⇢valueofatleastt+1.However,thisimpliesthatRisapartof(t+1)-(r,s)nucleus,whichcontradictswiththeinitialassumption.Theworstcasehappenswhenallther-cliquesseethe⌧valuesoftheirneighborsthatarecomputedinthepreviousiterationanditisexactlytheSNDalgorithm.Figure2illustratesSndandAndalgorithms(withdi↵er-entorderings)onthek-corecase(r=1,s=2).Ourfocusisonvertices(1-cliques)andtheiredge(2-clique)counts(degrees).WefirstapplySnd.First,vertexdegreesarecal-culatedas⌧0indices(bluenumbers).Then,foreachvertexuwecomputethe⌧1(u)=H({⌧0(v):v2N2(u)},i.e.,h-indexofitsneighbors'degrees(rednumbers).Forinstance,vertexahastwoneighbors,eandb,withdegrees2and3.SinceH({2,3})=2,weget⌧1(a)=2.Forvertexb,weget⌧1(b)=H({2,2,2})=2.Oncewecomputeall⌧1indices,weiterateagainbecausetherewerechangesin⌧indices,e.g,.⌧1(e)6=⌧0(e)(Line13inAlgorithm2).⌧2indicesareshowningreen.Weobserveanupdateonlyforthevertexa;⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1.Whenweiterateagain,noupdateisobservedin⌧indices,whichmeanss=⌧2forallvertices.RegardingAndalgo-rithm,wechoosetofollowthenon-decreasingorderofsindices;{f,e,a,b,c,d}.Computingthe⌧1indicesonthisor-derenablesustoreachtheconvergenceinasingleiteration.Forinstance,⌧1(a)=H({⌧1(e),⌧0(b)})=H({1,2})=1.Ifwechoosetoprocesstheverticesinthealphabeticalor-der,{a,b,c,d,e,f},wehave⌧1(a)=H({⌧0(e),⌧0(b)})=H({2,2})=2,whichimpliesthatweneedmoreiteration(s)toconverge.Indeed⌧2(a)=H({⌧1(e),⌧1(b)})=H({1,2})=1⌧1ToDo:shouldIincludesomenumbersinexp,boundspart4.2.1SkippingtheplateausToDo:figfortauchangesandplatosOurcomputationsconvergewhennoneoftheverticesupdatetheir⌧indicesanymore.Thisimpliesthatcomputationsareperformedforalltheverticesevenwhenonlyasingleupdateoccurs.Thosecomputationsareredundant.When⌧(v)converges(v)foravertexv,nomorecomputationsareneededforvinthefollowingiterations.Also,avertexcanpossiblymaintainthesame⌧indexforanumberofiterations,reachestoaplateau,andthenupdatesit.So,itisnotpossibletodeducewhether⌧(v)hasconvergedto(v)byjustlookingat⌧(v)valuesofanyvertexv.Inordertoskiptheintermediateorfinalplateausduringtheconvergenceof⌧(v)to(v),weintroduceanotificationmechanismwhereavertexnotifiesitsneighborswhenits⌧indexisupdated.BrownlinesinAlgorithm??summarizesthenotificationmechanismweplugintotheasynchronouscomputation.Theonlychangesareinlines??,??,??and??.AdditionalC(·)arraytrackswhetheravertexv2Vhasupdatedits⌧indexornot.Itissettotrueatthebeginningtoinitiatethecomputationsforallvertices.OnceC(v)becomesfalse,i.e.,maintainsits⌧index,weavoidthecomputation.Notethat,avertexrestartsitscomputationonlywhenaneighborvertexhasanupdate(Line??).Onceavertexcompletesthecomputation,itissettobenot-updated(line??)sothatnocomputationoccursuntilanotificationisreceivedfromaneighbor.4.3IllustrativeexamplesToDo:explainfig3and44.4HeuristicsandimplementationHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-aidfbhceg122424324211233221st2nd3rdstepstepstepFigure3:Coreexampled3 0 1 2 31 2 3 4AND (lex. order) : no notification :degree, core number : 1 2 3 4 with notification :Figure5:Trussexampleplateaus.Becauseitcanmaintainthesame⌧indexforanumberofiterations,creatingaplateau,andthenupdate.Thus,itisnotpossibletodeducewhether⌧(R)hascon-vergedto(R)byjustlookingatconsecutive⌧(R)indices.Inordertoskiptheintermediateorfinalplateausduringtheconvergence,weintroduceanotificationmechanismwhereanr-cliquenotifiesitsneighborswhenits⌧indexisupdated.OrangelinesinAlgorithm3presentsthenotificationmech-anismweplugintotheasynchronouscomputation.c(·)arrayisdeclaredinline4totrackwhetheranR2R(G)hasupdatedits⌧indexornot.c(R)=falsemeansthatRisanidler-cliqueandthereisnoneedtorecomputeits⌧value,asshowninline8.Thus,allc(·)issettotrueatthebeginningtoinitiatethecomputationsforallther-cliques.Eachr-cliquemarksitselfidleattheendofaniteration(line17)andwaitsuntilanupdatehappensinthe⌧in-dexofaneighbor.Wheneverthe⌧indexofanr-cliqueisupdated,allitsneighborsarenotifiedandwokenupsincetheir⌧indicesmightbea↵ected(line15).Notethatsomeneighborsmightalreadybeactiveatthattimeandmissesthenewupdate,butitisoksincethefollowingiterationswillhandleit -- intheworstcaseitwillbeasynchronouscomputation.⌧0⌧1⌧2⌧3⌧0⌧1⌧2d33⌧0⌧1d22Figure5illustratesthek-trussdecomposition(r=2,s=3)onatoygraph.Wefollowthelexicographicalorderoftheedges(vertexpairs).Trianglecounts(d3)ofedgesaregiveninblue,whichareusedtoinitialize⌧0indices.Wefirstprocessedgeab.Ithasfourtriangles,abc,abd,abe,abi.⇢valueofeachtriangleiscalculatedbytakingtheminimum⌧0valueoftheneighboredgesofab(Line11).Setof⇢valuesis{min(⌧0(ac),⌧0(bc)),min(⌧0(ad),⌧0(bd)),min(⌧0(ae),⌧0(be)),min(⌧0(ai),⌧0(bi))},whichisL={4,3,3,2}and⌧1(ab)=H(L)=3.Aftercomputing⌧1indicesofalltheedgesinlexicographicalorder(eiedgeislast),4.3HeuristicsandimplementationTable3:DatasetstatisticsVE4K4as-skitter(ask)1.7M11.1M28.8M148.8Mfacebook(fb)4K88.2K1.6M30.0Msoc-LiveJournal(slj)4.8M68.5M285.7M9.9Bsoc-orkut(ork)2.9M106.3M524.6M2.4Bsoc-sign-epinions(sse)131.8K711.2K4.9M58.6Msoc-twitter-higgs(hg)456.6K12.5M83.0M429.7Mtwitter(tw)81.3K1.3M13.1M104.9Mweb-Google(wgo)916.4K4.3M13.4M39.9Mweb-NotreDame(wnd)325.7K1.1M8.9M231.9Mwikipedia-200611(wiki)3.1M37.0M88.8M162.9MHereweintroduceanimportantschedulingdecisionfortheparallelizationinouralgorithms,andaheuristictocom-putetheh-indexofasetinlineartime.WeimplementedouralgorithmsbyusingOpenMP[6]toutilizetheshared-memoryarchitectures.Theloops,anno-tatedasparallelinAlgorithm??,aresharedamongthreads,andeachthreadisresponsibleforitspartitionofvertices.DefaultschedulingpolicyinOpenMPisstaticanditdis-tributestheiterationsofthelooptothethreadsinchunks,i.e.,fortwothreads,onetakesthefirsthalfandtheothertakesthesecond.Althoughthispolicyisusefulformanyap-plications,itwillnotworkwellforouralgorithms.Theno-tificationmechanismtoavoidtheredundantcomputationscanresultinsignificantloadimbalancebetweenthreads.Ifmostoftheconvergedverticesresideinacertainpart,thenthethreadthatisresponsibleforthatpartbecomesidleun-tiltheendofcomputation.Topreventthis,weembracedthedynamicschedulingwhereeachthreadisgivenanewworkloadonceitisdone.Nothreadstaysidlethisway,andtheoverallcomputationisparallelizedmoreeciently.h-indexcomputationofalistisdonebysortingtheitemsinnon-increasingorderandcheckingthevaluesfromthebeginningofthelisttofindthelargesthvalueforwhichatleasthitemsexistwithatleasthvalue.MainbottleneckisthesortingoperationwhichtakesO(n.logn)time.However,h-indexcanbecomputedwithoutsorting.Weinitializehaszeroanditerateovertheitemsinthelist.Ateachtime,weattempttoincreasethecurrenthvaluebasedontheinspecteditem.Forthecurrenthvalue,wekeeptrackofthenumberofitemsthathaveequalvaluetoh.Wealsouseahashmaptokeeptrackoftheitemsthataregreaterthanthecurrenthvalue,andwesimplyignoretheitemsthataresmallerthanh.Thisenablesthecomputationoftheh-indexinlineartime.Inaddition,forthenon-initialiterationsoftheconvergenceprocess,wesimplychecktheitemsifthecurrent⌧indexcanbepreserved.Oncewesee⌧itemswithatleast⌧index,nomorechecksneeded.5.EXPERIMENTSWeevaluateouralgorithmsonthreeinstancesofthenu-cleusdecomposition:k-core(or(1,2)),k-truss(or(2,3)),and(3,4).Constructingthehypergraphsrequirestostoreallthes-cliques,whichisinfeasibleforlargenetworks.Thuswedonotconstructtheactualhypergraphstocomputetheindices.Instead,wefindtheparticipationsofther-cliquesins-cliqueson-the-fly.Detailsaboutthecom- Table 3: Number of iterations for the theoretical upper bound, Degree Levels (DL)(Section 3.1), Snd, and And al- gorithms. 21 11 23 14 slj ork ask DL 1195 63 Snd And 33 DL 1605 118 Snd And 58 fb 352 3479 5165 1713 73 37 859 5401 4031 2215 101 53 DL 1734 1171 7426 3757 2360 Snd 109 51 And hg wgo wiki 384 2026 55 30 254 2824 562 410 157 1559 122 107 33 19 38 23 20 11 11 6 99 51 86 44 123 73 147 73 207 103 196 116 k-core k-truss (3, 4) 72 41 All experiments are performed on a Linux operating sys- tem running on a machine with Intel Ivy Bridge processor at 2.4 GHz with 64 GB DDR3 1866 MHz memory. There are two sockets on the machine and each has 12 cores, making 24 cores in total. Algorithms are implemented in C++ and compiled using gcc 6.1.0 at the -O2 level. We used OpenMP v4.5 for the shared-memory parallelization. Code is avail- able at http://sariyuce.com/pnd.tar. We first investigate the convergence characteristics of our new algorithms in Section 5.1. We compare the number of iterations that our algorithms need for the convergence and also examine the convergence rates for the κ values. In ad- dition, we investigate how the densest subgraphs evolve and present a metric that can be monitored to determine the "good-enough" decompositions so that trade-offs between quality and runtime can be enjoyed. Then, we evaluate the runtime performance in Section 5.2. In particular, we exam- ine the impact of notification mechanism (Section 4.3) on the And algorithm, show the scalability for our best performing method, and compare it with respect to the partially par- allel peeling algorithms. We also examine the runtime and accuracy trade-off for our algorithms. Last, but not least, we highlight a query-driven scenario in Section 5.3 where our algorithms are used on a subset of vertices/edges to estimate the core and truss numbers. 5.1 Convergence Analysis Here we study the following questions: How quickly do they approach to the κ values? • How does the number of iterations change between asyn- chronous computation (And) and synchronous (Snd)? How do they relate to our theoretical bounds of Section 3.1? • What is the rate of convergence regarding the τ values? • How is the evolution of the important subgraphs (with • Is there a generic way to infer the "good-enough" decom- positions so that the computation can be halted for trade- off between runtime and quality? high density) during the convergence? 5.1.1 Number of iterations As described in Section 4.2, the number of iterations for convergence can (only) be decreased by the asynchronous algorithm And. We compare Snd (Algorithm 2) and And (Algorithm 3) for three nucleus decompositions. All runs are performed in sequential, and for And we use the natural ordering of the r-cliques in datasets that is the order of ver- tices/edges/triangles given or computed based on the ids in the data files. Note that, we also checked And with random (a) k-core (b) (3, 4) nucleus Figure 9: Convergence rates for five graphs in our dataset. Kendall-Tau similarity score compares the τ values in a given iteration with the exact decomposition (κ values); be- comes 1.0 when they are equal. Our algorithms compute almost-exact decompositions in around 10 iterations for k- core, k-truss (in Figure 1), and (3, 4) nucleus decomposi- tions. r-clique orderings and did not observe significant differences. We also compute the number of degree levels (Definition 7) that we prove as an upper bound in Section 3.1. Table 3 presents the results for k-core, k-truss, and (3, 4) nucleus decompositions. Number of degree levels gives much tighter bounds than the obvious limits -- number of r-cliques. We observe that both algorithms converge in far fewer iter- ations than our upper bounds -- Snd converges in 5% of the bounds given for all decompositions, on average. Regarding the comparison, And algorithm converges in 50% fewer iter- ations than the Snd for k-core and k-truss decompositions and 35% fewer iterations for (3, 4) nucleus decomposition. Overall, we see the clear benefit of asynchronous computa- tion on all the decompositions, thus use And algorithm in the following experiments. 5.1.2 Convergence rates for the τ values In the previous section, we studied the number of itera- tions required for exact solutions. Now we will investigate how fast our estimates, τ values converge to the exact, κ values. We use Kendall-Tau similarity score to compare the τ and κ values for each iteration, which becomes 1, when they are equal. Figure 9 and Figure 1 present the results for five representative graphs in our dataset. We observe that our local algorithms compute almost exact decompositions in less than 10 iterations for all decompositions, and we need 5, 9, and 6 iterations to achieve 0.90 similarity for k-core, k-truss, and (3, 4) nucleus decompositions, respectively. 5.1.3 Evolution of the densest regions In the hierarchy of dense subgraphs computed by our algo- rithms, the leaves are the most important part (see Figure 2 and Figure 3), since those subgraphs have the highest edge (cid:1)), pointing to the significant regions. Note density (E/(cid:0)V 2 that the r-cliques in a leaf subgraph have same κ values and they are the local maximals, i.e., have greater-or-equal κ value than all their neighbors. For this reason, we mon- itor how the nodes/edges in the leaf subgraphs form their 0.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI0.00.51.0 0 5 10 15 20 25 30Kendall Taunumber of iterationsFBSSETWWNWIKI (a) k-core on fb (b) k-core on wnd (c) k-truss on fb (d) k-truss on sse Figure 10: Evolution of densest subgraphs (leaves). Each line shows the evolution of a leaf. We limit to subgraphs with at least 10 vertices to filter out the trivial ones. Almost all leaves are captured in the first few iterations. leaf L in iteration i, i.e.,(cid:80) max-cores/max-trusses during the convergence process. In the k-core decomposition; for a given leaf subgraph L, we find the max-cores, M i v, of all v ∈ L at each iteration i with respect to the τi values. Then we measure the F1 score between each M i v and L, and report the averages for each v/L. We follow a similar way for the k-truss case; find the max-trusses for all edges in each leaf, track their F1 scores during convergence with respect to the leaf, and report the averages. v∈L M i Figure 10 presents the results for a representative set of graphs (similar trends observed for other graphs). Each line shows the evolution of a leaf subgraph during the conver- gence process and we only considered the subgraphs with at least 10 vertices to filter out the trivial ones. We observe that almost all leaves are captured in the first few itera- tions. Regarding the facebook network, it has 3 leaves in the k-core case and all can be found in 7 iterations, and 5 iterations are enough to identify 28 of 33 leaves in k-truss decomposition. This trend is also observed for the other graphs; 5 iterations find 78 of the 85 leaves in k-core de- composition of web-NotreDame, and 39 of the 42 leaves in k-truss decomposition of soc-sign-epinions. 5.1.4 Predicting Convergence Number of iterations for convergence depends on the graph structure, as shown in Table 3. We cannot know whether a particular r-clique has converged by tracking the stability of its τ index since there can be temporary plateaus (see Figure 7). However, we know which r-cliques are active or idle in each iteration thanks to the notification mechanism in And algorithm. We propose using the ratio of active r-cliques as an indicator. Table 4: Impact of the notification mechanism. And-nn does not use notifications. Using 24 threads, notification mechanism yields speedups up to 3.98 and 3.16 for k-truss and (3, 4) cases. (seconds) Graphs And-nn And Speedup And-nn And Speedup 1.55 3.00 2.13 1.53 3.16 34.4 178.7 105.5 25.7 220.5 1.29 1.74 1.72 2.52 3.98 0.45 3.89 2.50 3.15 2.38 (3, 4) 22.2 59.6 49.6 16.9 69.8 fb tw sse wgo wnd k-truss 0.35 2.23 1.46 1.25 0.60 We examine the relation between the ratio of active r- cliques and the accuracy ratios of the r-cliques. Figure 11 presents the results for a set of graphs on all decompositions. We observe that when the ratio of active r-cliques goes below 40% during the computation, 91%, 89%, and 92% accurate results are obtained for k-core, k-truss, and (3, 4) nucleus de- compositions, on average. When the ratio goes below 10%, over 98% accuracy is achieved in all decompositions. The results show the ratio of active r-cliques is a helpful guide to find almost-exact results can be obtained faster. Watch- ing for 10 or 40% of active r-cliques yields nice trade-offs between runtime and quality. Watching the 40% threshold provides 3.67, 4.71, and 4.98 speedups with respect to full computation in k-core, k-truss, and (3, 4) nucleus decompo- sitions, respectively, and the speedups for 10% threshold are 2.26, 2.81, and 3.25 (more details in Section 5.2.3). 5.2 Runtime performance We evaluate the performance of our algorithms and seek to answer the following questions: tion 4.3) on And algorithm? • What is the impact of the notification mechanism (in Sec- • How does the And algorithm scale with more threads? • What speedups are achieved when a certain amount of How does it compare to sequential peeling? accuracy is sacrificed? Impact of the notification mechanism 5.2.1 We check the impact of the notification mechanism for k-truss and (3, 4) cases. We use 24 threads and Table 4 presents the results where And is the entire Algorithm 3 with notification mechanism and And-nn does not have the notifications -- missing the orange lines in Algorithm 3. We observe that Algorithm 3 brings great improvements, reach- ing up to 3.98 and 3.16 over speedups over And-nn for k- truss and (3, 4) cases. We use And algorithm (with notifi- cation mechanism) in the rest of the experiments. (a) as-skitter (b) soc-LiveJournal (c) soc-orkut (d) web-Google (e) wiki-200611 Figure 11: Changes in the ratio of active r-cliques and the accuracy of τ indices during the computation, When the ratio of active r-cliques goes below 40%, τ indices provide 91%, 89% and 92% accurate results on average for k-core, k-truss and (3, 4) nucleus decompositions, respectively. If the ratio is below 10%, more than 98% accuracy is achieved in all decompositions. 0.00.20.40.60.81.0 0 2 4 6 8 10 12 14F1 scorenumber of iterations0.00.20.40.60.81.0 0 5 10 15 20 25 30F1 scorenumber of iterations0.00.20.40.60.81.0 0 2 4 6 8 10 12 14 16 18F1 scorenumber of iterations0.00.20.40.60.81.0 0 5 10 15 20 25F1 scorenumber of iterations 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 5 10 15 20 25 30 0 10 20 30 40 50 60 70 80 90 100accuracy (dashed)% active r-cliquesnumber of iterationsk-corek-truss(3,4) (a) k-core (b) (3, 4) Scalability and comparison with peeling Figure 12: Speedups of the parallel computations with re- spect to the peeling computations (with 24 threads) for the k-core and (3, 4) nucleus decompositions. We used 4, 6, 12, and 24 threads where each thread is assigned to a single core. On average, k-core computations are performed 3.83x faster when the number of threads goes from 4 to 24. This increase is 4.7x for (3, 4) case. Runtimes with 24 threads are anno- tated for some graphs. Speedup numbers increase with more threads and faster solutions are possible with more cores. 5.2.2 Given the benefit of notification mechanism, we now com- pare the runtime performances of And (Algorithm 3) and the peeling process (Algorithm 1) on three decompositions. Our machine has 24 cores in total (12 in each socket) and we perform full computations until convergence with 4, 6, 12, and 24 threads. Note that our implementations for the baseline peeling algorithms are efficient; for instance [46] computes the truss decomposition of as-skitter graph in 281 secs where we can do it in 74 secs, without any paral- lelization. In addition, for soc-orkut and soc-LiveJournal graphs, we compute the truss decompositions in 352 and 81 secs whereas [18] needs 2291 and 1176 secs (testbeds in [46] and [18] are similar to ours). For the k-truss and (3, 4) nucleus decompositions, triangle counts per edge and four-clique counts per triangle need to be computed and we parallelize these parts for both the peeling algorithms and And, for a fair comparison. Rest of the peeling computation is sequential. Figure 12 and Figure 1 present the speedups by And algorithm over the (partially parallel) peeling com- putation with 24 threads on k-core, k-truss, and (3, 4) nucleus decompositions. For all, And with 24 threads ob- tains significant speedups over the peeling computation. In particular, with 24 threads And is 8.77x faster for the k-core case on the soc-LiveJournal, 6.3x faster for the k-truss de- composition on as-skitter, and 4.3x faster for the (3, 4) nu- cleus case on wiki-200611 graph. In addition, our speedup numbers increase by more threads. On average, k-core com- putations are performed 3.83x faster when the number of threads are increased from 4 to 24. This increase is 4.8x and 4.7x for k-truss and (3, 4) cases. Our speedup numbers increase with more threads and faster solutions are possible with more cores. Recent results: There is a couple recent studies, concur- rent to our work, that introduced new efficient parallel algo- rithms for k-core [8] and k-truss [41, 45, 22] decompositions. Dhulipala et al. [8] have a new parallel bucket data structure for k-core decomposition that enables work-efficient paral- lelism, which is not possible with our algorithms. They present speedups to 23.6x on friendster graph with 72 threads. Regarding the k-truss decomposition, the HPEC challenge [35] attracted interesting studies that parallelize (a) k-truss (b) (3, 4)-nucleus Figure 13: Runtime/accuracy tradeoff. We show the poten- tial for speedups with respect to the peeling computations for the k-truss and (3, 4) nucleus decompositions. Speedups at full accuracy correspond to the speedups with 24 threads in Figure 12. Number of iterations (and accuracy) decrease on the x-axis. We reach up to 15x and 9x speedups on k-truss and (3, 4) cases when 0.8 accuracy is allowed. the computation [41, 45, 22]. In particular, Shaden et al. [41] reports competitive results with respect to the earlier version of our work [36]. Note that our main focus in this work is a generic framework that enables local computa- tion for k-core, k-truss, and (3, 4) nucleus decomposi- tions, which has not been discussed in the previous works. Although our algorithms are not work-efficient and more specialized solutions can give better speedups, our local al- gorithms are more generally applicable, enable trade-offs be- tween runtime and accuracy, and also enable query-driven scenarios that can be used to analyze smaller subgraphs. 5.2.3 Runtime and accuracy trade-off We check the speedups for the approximate decomposi- tions in the intermediate steps during the convergence. We show how the speedups (with respect to peeling algorithm with 24 threads) change when a certain amount of accuracy in κs indices is sacrificed. Figure 13 presents the behavior for k-truss and (3, 4) nucleus decompositions on some repre- sentative graphs. We observe that speedups for the k-truss decomposition can reach up to 15x when 0.8 accuracy is al- lowed. For (3, 4) nucleus decomposition, up to 9x speedups are observed for the same accuracy score. Overall, our local algorithms are enable to enjoy different trade-offs between the runtime and accuracy. 5.3 PartialAnd to estimate κ2 and κ3 values So far, we have studied the performance of our algorithms on the full graph. Now, we will look at how we can apply sim- ilar ideas to a portion of the graph using the PartialAnd algorithm described at end of Section 4.3. We will apply PartialAnd to the ego networks and show that it can be used to estimate κ2 values (core number) of vertices and κ3 values (truss number) of edges. Ego network of a vertex u is defined as the induced subgraph among u and its neighbors. It has been shown that ego networks in real-world networks exhibit low conductance [15] and also can be used for friend suggestion in online social networks [11]. Accurate and fast estimation of core numbers [29] is important in the context of network experiments (A/B testing) [43] where a random subset of vertices are exposed to a treatment and responses are analyzed to measure the impact of a new feature in on- line social networks. For the core number estimation of a vertex u, we apply PartialAnd on u and its neighbor vertices, i.e., u ∪ N2(u), 0.01.02.03.04.05.06.07.08.09.0 4 6 12 24speedupnumber of threadsASKFRIHGORKSLJWIKIPeeling-24t1.31s0.84s223s0.01.02.03.04.05.0 4 6 12 24speedupnumber of threadsASKHGORKSLJWIKIPeeling-24t706s147s9923s 1 10 100 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1speedupaccuracy 1 10 100 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1speedupaccuracyASKHGORKSLJWIKI (a) Core number estimations for wgo and ask (b) Truss number estimations for tw and hg Figure 14: Accuracy of core and truss number estimations by PartialAnd. Top two charts present the core number estimations by PartialAnd and degree with respect to the ground-truth (green line) on web-Google and as-skitter. Bottom two present the truss number estimations for twitter and soc-twitter-higgs (green line is the ground-truth). PartialAnd estimates the core and truss numbers accurately for a wide range. Results for other graphs are similar and omitted for brevity. and report κ2(u). Indeed, the application of PartialAnd on ego-network for core number estimation is the same as the propagating estimator in [29] for distance-1 neighbor- hood. Here we generalize the same concept to estimate truss numbers of edges. Regarding the truss number estimations, we define the ego network of an edge e as the set of neigh- bor edges that participates in a common triangle (N3(e)). Thus, we apply PartialAnd on e ∪ N3(e) and report κ3(e) as a truss number estimate. Figures 14a and 14b present the results for core and truss number estimations. We selected vertices/edges with varying core/truss numbers (on the x- axis) and check the accuracy of PartialAnd estimations. Ground-truth values are shown with green lines (note that y-axes in Figure 14a are log-scale). We also show the de- grees/triangle counts of the vertices/edges in red as a base- line. Overall, PartialAnd yields almost exact estimations for a wide range of core/truss numbers. On the other hand, degree of a vertex gives a close approximation to the core number for smaller degrees, but it fails for large values. This trend is similar for the truss numbers and triangle counts. Regarding the runtime, PartialAnd on ego networks only takes a fraction of a second -- way more efficient than com- puting the entire core/truss decomposition. For instance, it takes only 0.23 secs on average to estimate the core number of any vertex in the soc-orkut network whereas the full k- core decomposition needs 11.4 secs. It is even better in the k-truss case; PartialAnd takes 0.017 secs on average to estimate a truss number of an edge in soc-twitter-higgs network where the full k-truss computation takes 73 secs. 6. RELATED WORK Previous attempts to find the approximate core numbers (or k-cores) focus on the neighborhood of a vertex within a cer- tain radius [29]. It is reported that if the radius is at least half of the diameter, close approximations can be obtained. However, given the small-world nature of the real-world net- works, the local graph within a distance of half the diameter is too large to compute. In our work, we approximate the k- core, k-truss, and (r, s) nucleus decompositions in a rigorous and efficient way that does not depend on the diameter. Most related study is done by Lu et al. [26], where they show that iterative h-index computation on vertices result in the core numbers. Their experiments on smaller graphs also show that h-index computation provides nice trade-offs for time and quality of the solutions. In our work, we gen- eralized the iterative h-index computation approach for any nucleus decomposition that subsumes the k-core and k-truss algorithms. Furthermore, we give provable upper bounds on the number of iterations for convergence. Apart from that work, Govindan et al. [16] use the iterative h-index com- putation to design space-efficient algorithms for estimating core numbers. Distributed algorithms in [28] and out-of-core approaches in [23, 47, 5] also make use of similar ideas, but only for core decomposition. Montresor et al. [28] present a bound for the number of iterations, which is basically V −1, much looser than ours. Regarding the parallel computations, Jiang et al. [20] in- troduced parallel algorithms to find the number of iterations needed to find the empty k-core in random hypergraphs. Their work relies on the assumption that the edge density is below a certain threshold and the focus is on the number of iterations only. Our local algorithms present an alterna- tive formulation for the peeling process, and work for any k value. For the k-truss decomposition, Quick et al. [31] introduced algorithms for vertex-centric distributed graph processing systems. For the same setup, Shao et al. [40] proposed faster algorithms that can compute k-trusses in a distributed graph processing system. Both papers make use of the peeling-based algorithms for computation. Our focus is on the local computation where the each edge has access to only its neighbors and no global graph information is necessary, thus promise better scalability. 7. CONCLUSION We introduced a generalization of the iterative h-index com- putations to identify any nucleus decomposition and prove convergence bounds. Our local algorithms are highly paral- lel and can provide fast approximations to explore time and quality trade-offs. Experimental evaluation on real-world networks exhibits the efficiency, scalability, and effectiveness of our algorithms for three decompositions. We believe that our local algorithms will be beneficial for many real-world applications that work in challenging setups. For example, shared-nothing systems can leverage the local computation. 100101102103104 0 5 10 15 20 25 30 35 40 45estimationcore numberPartialANDdegree100101102103104105 0 20 40 60 80 100 120estimationcore numberPartialANDdegree 0 20 40 60 80 100 120 0 10 20 30 40 50 60 70 80estimationtruss numberPartialANDtriangle count 0 50 100 150 200 250 0 10 20 30 40 50 60 70estimationtruss numberPartialANDtriangle count 8. REFERENCES [1] N. K. Ahmed, J. Neville, R. A. Rossi, and N. G. Duffield. Efficient graphlet counting for large networks. In IEEE International Conference on Data Mining, ICDM, pages 1 -- 10, 2015. [2] A. Angel, N. Sarkas, N. Koudas, and D. Srivastava. Dense subgraph maintenance under streaming edge weight updates for real-time story identification. PVLDB, 5(6):574 -- 585, 2012. [3] V. Batagelj and M. Zaversnik. An o (m) algorithm for cores decomposition of networks. arXiv preprint cs/0310049, 2003. [4] A. R. Benson, D. F. Gleich, and J. Leskovec. Higher-order organization of complex networks. Science, 353(6295):163 -- 166, 2016. [5] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient core decomposition in massive networks. In IEEE International Conference on Data Engineering , ICDE, pages 51 -- 62, 2011. [6] J. Cohen. Trusses: Cohesive subgraphs for social network analysis. Technical report, National Security Agency Technical Report, Fort Meade, MD, 2008. [7] L. Dagum and R. Menon. Openmp: an industry standard api for shared-memory programming. Computational Science & Engineering, IEEE, 5(1):46 -- 55, 1998. [8] L. Dhulipala, G. Blelloch, and J. Shun. Julienne: A framework for parallel graph algorithms using work-efficient bucketing. In ACM Symposium on Parallelism in Algorithms and Architectures ,SPAA, pages 293 -- 304, 2017. memory algorithm for estimating core numbers. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pages 207 -- 214, 2016. [17] J. E. Hirsch. An index to quantify an individual's scientific research output. Proceedings of the National Academy of Sciences of the United States of America, 102(46):16569 -- 16572, 2005. [18] X. Huang, H. Cheng, L. Qin, W. Tian, and J. X. Yu. Querying k-truss community in large and dynamic graphs. In ACM SIGMOD International Conference on Management of Data, pages 1311 -- 1322, 2014. [19] M. Jha, C. Seshadhri, and A. Pinar. Path sampling: A fast and provable method for estimating 4-vertex subgraph counts. In International Conference on World Wide Web, WWW, pages 495 -- 505, 2015. [20] J. Jiang, M. Mitzenmacher, and J. Thaler. Parallel peeling algorithms. In ACM Symposium on Parallelism in Algorithms and Architectures, SPAA, pages 319 -- 330, 2014. [21] R. Jin, Y. Xiang, N. Ruan, and D. Fuhry. 3-hop: a high-compression indexing scheme for reachability query. In ACM SIGMOD International Conference on Management of Data, pages 813 -- 826, 2009. [22] H. Kabir and K. Madduri. Shared-memory graph truss decomposition. In IEEE International Conference on High Performance Computing, HiPC, pages 13 -- 22, 2017. [23] W. Khaouid, M. Barsky, S. Venkatesh, and A. Thomo. K-core decomposition of large networks on a single PC. PVLDB, 9(1):13 -- 23, 2015. [9] Y. Dourisboure, F. Geraci, and M. Pellegrini. [24] R. Kumar, P. Raghavan, S. Rajagopalan, and Extraction and classification of dense communities in the web. In International Conference on World Wide Web, WWW, pages 461 -- 470, 2007. [10] X. Du, R. Jin, L. Ding, V. E. Lee, and J. H. T. Jr. Migration motif: a spatial-temporal pattern mining approach for financial markets. In ACM SIGKDD International Conf. on Knowledge Discovery and Data Mining, pages 1135 -- 1144, 2009. [11] A. Epasto, S. Lattanzi, V. Mirrokni, I. O. Sebe, A. Taei, and S. Verma. Ego-net community mining applied to friend suggestion. PVLDB, 9(4):324 -- 335, 2015. [12] E. Fratkin, B. T. Naughton, D. L. Brutlag, and S. Batzoglou. Motifcut: regulatory motifs finding with maximum density subgraphs. Bioinformatics, 22(14):e150 -- e157, 2006. [13] D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense subgraphs in massive graphs. In International Conference on Very Large Data Bases, VLDB, pages 721 -- 732, 2005. [14] A. Gionis, F. Junqueira, V. Leroy, M. Serafini, and I. Weber. Piggybacking on social networks. PVLDB, 6(6):409 -- 420, 2013. [15] D. F. Gleich and C. Seshadhri. Vertex neighborhoods, low conductance cuts, and good seeds for local community methods. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 597 -- 605, 2012. [16] P. Govindan, S. Soundarajan, T. Eliassi-Rad, and C. Faloutsos. Nimblecore: A space-efficient external A. Tomkins. Trawling the web for emerging cyber-communities. In International Conference on World Wide Web, WWW, pages 1481 -- 1493, 1999. [25] J. Leskovec and A. Krevl. SNAP Datasets, June 2014. [26] L. Lu, T. Zhou, Q.-m. Zhang, and H. E. Stanley. The h-index of a network node and its relation to degree and coreness. Nature Communications, 7:10168, 2016. [27] D. W. Matula and L. L. Beck. Smallest-last ordering and clustering and graph coloring algorithms. Journal of the ACM, 30(3):417 -- 427, July 1983. [28] A. Montresor, F. D. Pellegrini, and D. Miorandi. Distributed k-core decomposition. IEEE Transactions on Parallel and Distributed Systems, 24(2):288 -- 300, 2013. [29] M. P. O'Brien and B. D. Sullivan. Locally estimating core numbers. In IEEE International Conference on Data Mining, ICDM, pages 460 -- 469, 2014. [30] A. Pinar, C. Seshadhri, and V. Vishal. Escape: Efficiently counting all 5-vertex subgraphs. In International Conference on World Wide Web, WWW, pages 1431 -- 1440, 2017. [31] L. Quick, P. Wilkinson, and D. Hardcastle. Using pregel-like large scale graph processing frameworks for social network analysis. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM, pages 457 -- 463, 2012. [32] R. A. Rossi and N. K. Ahmed. The network data repository with interactive graph analytics and visualization. In AAAI Conference on Artificial Intelligence, pages 4292 -- 4293, 2015. [41] S. Smith, X. Liu, N. K. Ahmed, A. S. Tom, F. Petrini, [33] R. A. Rossi, R. Zhou, and N. K. Ahmed. Estimation of graphlet statistics. CoRR, abs/1701.01772, 2017. [34] K. Saito and T. Yamada. Extracting communities from complex networks by the k-dense method. In IEEE International Conference on Data Mining Workshops, ICDMW, pages 300 -- 304, 2006. [35] S. Samsi, V. Gadepally, M. Hurley, M. Jones, E. Kao, S. Mohindra, P. Monticciolo, A. Reuther, S. Smith, W. Song, D. Staheli, and J. Kepner. Static graph challenge: Subgraph isomorphism. In IEEE High Performance Extreme Computing Conference, HPEC, 2017. [36] A. E. Sariyuce, C. Seshadhri, and A. Pinar. Parallel local algorithms for core, truss, and nucleus decompositions. CoRR, abs/1704.00386, 2017. [37] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V. C¸ atalyurek. Finding the hierarchy of dense subgraphs using nucleus decompositions. In International Conference on World Wide Web, WWW, pages 927 -- 937, 2015. [38] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V. C¸ atalyurek. Nucleus decompositions for identifying hierarchy of dense subgraphs. ACM Transactions on Web, 11(3):16:1 -- 16:27, 2017. [39] S. B. Seidman. Network structure and minimum degree. Social Networks, 5(3):269 -- 287, 1983. [40] Y. Shao, L. Chen, and B. Cui. Efficient cohesive subgraphs detection in parallel. In ACM SIGMOD International Conference on Management of Data, pages 613 -- 624, 2014. and G. Karypis. Truss decomposition on shared-memory parallel systems. In IEEE High Performance Extreme Computing Conference, HPEC, pages 1 -- 6, 2017. [42] C. Tsourakakis. The k-clique densest subgraph problem. In International Conference on World Wide Web, WWW, pages 1122 -- 1132, 2015. [43] J. Ugander, B. Karrer, L. Backstrom, and J. Kleinberg. Graph cluster randomization: Network exposure to multiple universes. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 329 -- 337, 2013. [44] A. Verma and S. Butenko. Network clustering via clique relaxations: A community based. Graph Partitioning and Graph Clustering, 588:129, 2013. [45] C. Voegele, Y. Lu, S. Pai, and K. Pingali. Parallel triangle counting and k-truss identification using graph-centric methods. In IEEE High Performance Extreme Computing Conference, HPEC, pages 1 -- 7, 2017. [46] J. Wang and J. Cheng. Truss decomposition in massive networks. PVLDB, 5(9):812 -- 823, 2012. [47] D. Wen, L. Qin, Y. Zhang, X. Lin, and J. Yu. I/o efficient core graph decomposition at web scale. In IEEE International Conference on Data Engineering, ICDE, pages 133 -- 144, 2016. [48] Y. Zhang and S. Parthasarathy. Extracting analyzing and visualizing triangle k-core motifs within networks. In IEEE International Conference on Data Engineering, ICDE, pages 1049 -- 1060, 2012.
1201.4145
2
1201
2012-02-28T00:35:56
The Role of Social Networks in Information Diffusion
[ "cs.SI", "physics.soc-ph" ]
Online social networking technologies enable individuals to simultaneously share information with any number of peers. Quantifying the causal effect of these technologies on the dissemination of information requires not only identification of who influences whom, but also of whether individuals would still propagate information in the absence of social signals about that information. We examine the role of social networks in online information diffusion with a large-scale field experiment that randomizes exposure to signals about friends' information sharing among 253 million subjects in situ. Those who are exposed are significantly more likely to spread information, and do so sooner than those who are not exposed. We further examine the relative role of strong and weak ties in information propagation. We show that, although stronger ties are individually more influential, it is the more abundant weak ties who are responsible for the propagation of novel information. This suggests that weak ties may play a more dominant role in the dissemination of information online than currently believed.
cs.SI
cs
The Role of Social Networks in Information Diffusion Eytan Bakshy∗ Facebook 1601 Willow Rd. Menlo Park, CA 94025 [email protected] Cameron Marlow Facebook 1601 Willow Rd. Menlo Park, CA 94025 [email protected] Itamar Rosenn Facebook 1601 Willow Rd. Menlo Park, CA 94025 [email protected] Lada Adamic University of Michigan 105 S. State St. Ann Arbor, MI 48104 [email protected] ABSTRACT Online social networking technologies enable individuals to simultaneously share information with any number of peers. Quantifying the causal effect of these mediums on the dis- semination of information requires not only identification of who influences whom, but also of whether individuals would still propagate information in the absence of social sig- nals about that information. We examine the role of social networks in online information diffusion with a large-scale field experiment that randomizes exposure to signals about friends’ information sharing among 253 million sub jects in situ. Those who are exposed are significantly more likely to spread information, and do so sooner than those who are not exposed. We further examine the relative role of strong and weak ties in information propagation. We show that, although stronger ties are individually more influential, it is the more abundant weak ties who are responsible for the propagation of novel information. This suggests that weak ties may play a more dominant role in the dissemination of information online than currently believed. Categories and Subject Descriptors H.1.2 [Models and Principles]: User/Machine Systems; J.4 [Social and Behavioral Sciences]: Sociology General Terms Experimentation, Measurement, Human Factors Keywords social influence, tie strength, causality 1. INTRODUCTION Social influence can play a crucial role in a range of behav- ioral phenomena, from the dissemination of information, to the adoption of political opinions and technologies [23, 42], which are increasingly mediated through online systems [17, ∗Part of this research was performed while the author was a student at the University of Michigan. Preprint version. Copyright is held by the International World Wide Web Conference Committee (IW3C2). Distribution of these papers is limited to classroom use, and personal use by others. WWW 2012, April 16–20, 2012, Lyon, France. ACM 978-1-4503-1229-5/12/04. 38]. Despite the wide availability of data from online social networks, identifying influence remains a challenge. Indi- viduals tend to engage in similar activities as their peers, so it is often impossible to determine from observational data whether a correlation between two individuals’ behaviors ex- ists because they are similar or because one person’s behav- ior has influenced the other [5, 32, 39]. In the context of information diffusion, two people may disseminate the same information as each other because they possess the same in- formation sources, such as web sites or television, that they consume regularly [3, 38]. Moreover, homophily – the tendency of individuals with similar characteristics to associate with one another [1, 28, 34] – creates difficulties for measuring the relative role of strong and weak ties in information diffusion, since peo- ple are more similar to those with whom they interact of- ten [22, 34]. On one hand, pairs of individuals who interact more often have greater opportunity to influence one an- other and have more aligned interests, increasing the chances of contagion [11, 27]. However, this commonality ampli- fies the potential for confounds: those who interact more often are more likely to have increasingly similar informa- tion sources. As a result, inferences made from observa- tional data may overstate the importance of strong ties in information spread. Conversely, individuals who interact infrequently have more diverse social networks that provide access to novel information [12, 22]. But because contact between such ties is intermittent, and the individuals tend to be dissimilar, any particular piece of information is less likely to flow across weak ties [14, 37]. Historical attempts to collect data on how often pairs of individuals communicate and where they get their information have been prone to biases [10, 33], further obscuring the empirical relationship between tie strength and diffusion. Confounding factors related to homophily can be addressed using controlled experiments, but experimental work has thus far been confined to the spread of highly specific in- formation within limited populations [6, 13]. In order to understand how information spreads in a real-world envi- ronment, we wish to examine a setting where a large pop- ulation of individuals frequently exchange information with their peers. Facebook is the most widely used social net- working service in the world, with over 800 million people using the service each month. For example, in the United States, 54% of adult Internet users are on Facebook [26]. Those American users on average maintain 48% of their real world contacts on the site [26], and many of these individuals regularly exchange news items with their contacts [38]. In addition, interaction among users is well correlated with self- reported intimacy [18]. Thus, Facebook represents a broad online population of individuals whose online personal net- works reflect their real-world connections, making it an ideal environment to study information contagion. We use an experimental approach on Facebook to mea- sure the spread of information sharing behaviors. The ex- periment randomizes whether individuals are exposed via Facebook to information about their friends’ sharing behav- ior, thereby devising two worlds under which information spreads: one in which certain information can only be ac- quired external to Facebook, and another in which informa- tion can be acquired within or external to Facebook. By comparing the behavior of individuals within these two con- ditions, we can determine the causal effect of the medium on information sharing. The remainder of this paper is organized as follows. We further motivate our study with additional related work in Section 2. Our experimental design is described in Section 3. Then, in Section 4 we discuss the causal effect of exposure to content on the newsfeed, and how friends’ sharing behav- ior is correlated in time, irrespective of social influence via the newsfeed. Furthermore, we show that multiple sharing friends are predictive of sharing behavior regardless of expo- sure on the feed, and that additional friends do indeed have an increasing causal effect on the propensity to share. In Section 5 we discuss how tie strength relates to influence and information diffusion. We show that users are more likely to have the same information sources as their close friends, and that simultaneously, these close friends are more likely to influence sub jects. Using the empirical distribution of tie strength in the network, we go on to compute the overall effect of strong and weak ties on the spread of information in the network. Finally, we discuss the implications of our work in Section 6. 2. RELATED WORK Online networks are focused on sharing information, and as such, have been studied extensively in the context of in- formation diffusion. Diffusion and influence have been mod- eled in blogs [2, 20, 25], email [31], and sites such as Twitter, Digg, and Flickr [8, 21, 29]. One particularly salient charac- teristic of diffusion behavior is the correlation between the number of friends engaging in a behavior and the proba- bility of adopting the behavior. This relationship has been observed in many online contexts, from the joining of Live- Journal groups [7], to the bookmarking of photos [15], and the adoption of user-created content [9]. However, as Anag- nostopoulos, et al. [4] point out, individuals may be more likely to exhibit the same behavior as their friends because of homophily rather than as a result of peer influence. Sta- tistical techniques such as permutation tests and matched sampling [5] help control for confounds, but ultimately can- not resolve this fundamental problem [39]. Not all diffusion studies must infer whether one individ- ual influenced another. For example, Leskovec et al. [30] study the explicit graph of product recommendations, Sun et al. [41] study cascading in page fanning, and Bakshy et al. [9] examine the exchange of user-created content. How- ever, in all these studies, even if the source of a particular contagion event is a friend, such data does not tell us about the relative importance of social networks in information dif- fusion. For example, consider the spread of news. In Bradley Greenberg’s classsic study of media contagion [24], 50% of respondents learned about the Kennedy assassination via interpersonal ties. Despite the substantial word-of-mouth spread, it is clear that all of the respondents would have gotten the news at a slightly later point in time (perhaps from the very same media outlets as their contacts), had they not communicated with their peers. Therefore, a com- plete understanding of the importance of social networks in information diffusion not only requires us to identify sources of interpersonal contagion, but also requires a counterfactual understanding of what would happen if certain interactions did not take place. Figure 1: explain that relationships Causal diffusion-like phenomena. Information presented in users’ news feeds and other sharing behavior on facebook.com are observed. External events that cause users to be exposed to information outside of Facebook cannot be observed and may explain their sharing behavior. Our experiment blocks the causal relationship (dashed arrow) between the Facebook newsfeed and user visitation by randomly removing stories about friends’ sharing behavior in sub jects’ feeds. Thus, our experiment allows us to compare situations where both influence via the feed and ex- ternal correlations exist (the feed condition), to situ- ations in which only external correlations exist (the no feed condition). 3. EXPERIMENTAL DESIGN AND DATA Facebook users primarily interact with information through an aggregated history of their friends’ recent activity (sto- ries), called the News Feed, or simply feed for short. Some of these stories contain links to content on the Web, uniquely identified by URLs. Our experiment evaluates how much exposure to a URL on the feed increases an individual’s propensity to share that URL, beyond correlations that one might expect among Facebook friends. For example, friends with whom a user interacts more often may be more likely to visit sites that the user also visits. As a result, those friends may be more likely to share the same URL as the Facebook FeedStory 1Story 2...Story linking to page X...External CorrelationRegular visitation to web sitesE-Mail...User visits page X User shares page X on Facebook ObservableUnobservableInstant Messaging (a) (b) Figure 2: An example of the Facebook News Feed interface for a hypothetical sub ject who has a link (high- lighted in red) assigned to the (a) feed or (b) no feed condition. user before she has the opportunity to share that content herself. Additional unobserved correlations may arise due to external influence via e-mail, instant messaging, and other social networking sites. These causal relationships are illus- trated in Figure 1. From the figure, one can see that all unobservable correlations can be identified by blocking the causal relationship between the Facebook feed and sharing. Our experiment therefore randomizes sub jects with respect to whether they receive social signals about friends’ sharing behavior of certain Web pages via the Facebook feed. 3.1 Assignment Procedure Sub ject-URL pairs are randomly assigned at the time of display to either the no feed or the feed condition. Stories that contain links to a URL assigned to the no feed condi- tion for the sub ject are never displayed in the sub ject’s feed. Those assigned to the feed condition are not removed from the feed, and appear in the sub ject’s feed as normal (Fig- ure 2). Pairs are deterministically assigned to a condition at the time of display, so any subsequent share of the same URL by any of a sub ject’s friends is also assigned to the same con- dition. To improve the statistical power of our results, twice as many pairs were assigned to the no feed condition. Be- cause removal from the feed occurs on a sub ject-URL basis, and we include only a small fraction of sub ject-URL pairs in the no feed condition, a shared URL is on average delivered to over 99% of its potential targets. All activity relating to sub ject-URL pairs assigned to ei- ther experimental condition is logged, including feed expo- sures, censored exposures, and clicks to the URL (from the feed or other sources, like messaging). Directed shares, such as a link that is included in a private Facebook message or explicitly posted on a friend’s wall, are not affected by the assignment procedure. If a sub ject-URL pair is assigned to an experimental condition, and the sub ject clicks on con- tent containing that URL in any interface other than the feed, that sub ject-URL pair is removed from the experiment. Our experiment, which took place over the span of seven weeks, includes 253,238,367 sub jects, 75,888,466 URLs, and 1,168,633,941 unique sub ject-URL pairs. 3.2 Ensuring Data Quality Threats to data quality include using content that was or may have been previously seen by sub jects on Facebook prior to the experiment, content that sub jects may have seen through interfaces on Facebook other than feed, spam, and malicious content. We address these issues in a number of ways. First, we only consider content that was shared by the sub jects’ friends only after the start of the experiment. This enables our experiment to accurately capture the first time a sub ject is exposed to a link in the feed, and ensures Demographic Feature (% of sub jects) Gender Female Male Unspecified Age 17 or younger 18-25 26-35 36-45 46 or older Country (top 10 & other) United States Turkey Great Britain Italy France Canada Indonesia Philippines Germany Mexico 226 Others feed no feed 51.6% 51.4% 46.7% 47.0% 1.5% 1.5% 12.8% 13.1% 36.4% 36.1% 27.2% 26.9% 13.0% 12.9% 10.6% 10.9% 28.9% 29.1% 6.1% 5.8% 5.1% 5.2% 4.2% 4.1% 3.8% 3.9% 3.7% 3.8% 3.7% 3.5% 2.1% 2.3% 2.3% 2.3% 2.0% 2.1% 37.5% 37.7% Table 1: Summary of demographic features of sub- jects assigned to the feed (N = 160, 688, 092) and no feed (N = 218, 743, 932) condition. Some sub jects may appear in both columns. that URLs in our experiment more accurately reflect content that is primarily being shared contemporaneously with the timing of the experiment. We also exclude potential sub ject- URL pairs where the sub ject had previously clicked on the URL via any interface on the site at any time up to two months prior to exposure, or any interface other than the feed for content assigned to the no feed condition. Finally, we use the Facebook’s site integrity system [40] to classify and remove URLs that may not reflect ordinary users’ purposeful intentions of distributing content to their friends. 3.3 Population The experimental population consists of a random sample of all Facebook users who visited the site between August 14th to October 4th 2010, and had at least one friend sharing a link. At the time of the experiment, there were approxi- mately 500 million Facebook users logging in at least once a month. Our sample consists of approximately 253 million of these users. All Facebook users report their age and gender, and a user’s country of residence can be inferred from the IP address with which she accesses the site. In our sample, the median and average age of sub jects is 26 and 29.3, respec- tively. Sub jects originate from 236 countries and territories, 44 of which have one million or more sub jects. Additional summary statistics are given in Table 1, and show that sub- jects are assigned to the conditions in a balanced fashion. 3.4 Evaluating Outcomes The assignment procedure allows us to directly compare the overall probability that sub jects share links they were or were not exposed to on the feed. The causal effect of exposure via the Facebook feed on sharing is simply the ex- pected probability of sharing in the feed condition minus the expected probability in the no feed condition. This quantity, known as the average treatment effect on the treated (or al- ternatively, the absolute risk increase), can vary when con- ditioning on other variables, including the number of friends and tie strength, which are analyzed in Sections 4 and 5. Al- ternatively, the difference in probabilities can be viewed as a ratio (the relative risk ratio), which quantifies how many times more likely an individual is to share as a result of being exposed to content on the feed. Although the assignment is completely random, sub jects and URLs may differ in ways that impact our measurements. For example, certain users may be highly active on Face- book, so that they are assigned to experimental conditions more often than other users. If these users were to vary sig- nificantly in terms of their information sharing propensities, such as sharing or re-sharing greater or fewer links than oth- ers, the disproportionate inclusion of these users may bias our measurements and threaten the population validity of our findings. Similarly, very popular URLs may also intro- duce biases; they may be more or less likely to be re-shared because of their inherent appeal or more likely to be dis- covered independently of Facebook because of their relative popularity amongst friends. To provide control for these biases, we use bootstrapped averages clustered by the sub ject or URL. We find that in all of our analyses, clustering by the URL rather than the sub- ject yields nearly identical probability estimates that have marginally wider confidence intervals, so we have chosen to present our results using means and 95% confidence inter- vals clustered by URL. Risk ratios are obtained using the 95% bootstrapped confidence intervals of likelihood of shar- ing in the feed and no feed conditions. To compute the lower bound of the ratio, we divide the lower bound of the prob- ability of sharing in the feed condition by the upper bound for the no feed condition. The upper bound of the ratio is computed by dividing the upper bound in the feed condition by the lower bound of the no feed condition. The additive analog of the same procedure is used to obtain confidence intervals for probability differences. 4. HOW EXPOSURE TO SOCIAL SIGNALS AFFECTS DIFFUSION We find that sub jects who are exposed to signals about friends’ sharing behavior are several times more likely to share that same information, and share sooner than those who are not exposed. To measure the relative increase in sharing due to exposure, we compute the risk ratio: the like- lihood of sharing in the feed condition (0.191%) divided by the likelihood of sharing in the no feed condition (0.025%), and find that individuals in the feed condition are 7.37 times more likely share (95% C I = [7.23, 7.72]). Although the probability of sharing upon exposure may appear small, it is important to note that individuals have hundreds of con- tacts online who may see their link, and that on average one out of every 12.5 URLs that are clicked on in the feed condition are subsequently re-shared. 4.1 Temporal Clustering Contemporaneous behavior among connected individuals is commonly used as evidence for social influence processes (e.g. [4, 9, 8, 15, 16, 19, 20, 25, 29, 36, 43]). We find that sub jects who share the same link as their friends typically do so within a time that is proximate to their friends’ sharing To evaluate how exposure on the Facebook feed relates to the speed at which URLs appear to diffuse, we consider URLs that were assigned to both the feed and no feed condi- tion. We first match the share time of each URL in the feed condition with a share time of the URL in the no feed con- dition, sampling URLs in proportion to their relative abun- dances in the data. From this set of contrasts, we find that the median sharing latency after a friend has already shared the content is 6 hours in the feed condition, compared to 20 hours when assigned to the no feed condition (Wilcoxon rank-sum test, p < 10−16 ). The presence of strong tempo- ral clustering in both experimental conditions illustrates the problem with inferring influence processes from observations of temporally proximate behavior among connected individ- uals: regardless of access to social signals within a particular online medium, individuals can still acquire and share the same information as their friends, albeit at a slightly later point in time. 4.2 Effect of Multiple Sharing Friends Classic models of social and biological contagion (e.g. [23, 35]) predict that the likelihood of “infection” increases with the number of infected contacts. Observational studies of online contagion [4, 9, 15, 30] not only find evidence of tem- poral clustering, but also observe a similar relationship be- tween the likelihood of contagion and the number of infected contacts. However, it is important to note that this corre- lation can have multiple causes that are unrelated to social influence processes. For example, if a website is popular among friends, then a particularly interesting page is more likely to be shared by a users’ friends independent of one another. The positive relationship between the number of sharing friends and likelihood of sharing may therefore sim- ply reflect heterogeneity in the “interestingness” of the con- tent, which is clustered along the network: the more popular a page is for a group of friends, the more likely it is that one would observe multiple friends sharing it. We first show that, consistent with prior observational studies, the probability of sharing a link in the feed condi- tion increases with the number of contacts who have already shared the link (solid line, Figure 4a). But the presence of a similar relationship in the no feed condition (grey line, Fig- ure 4a) shows that an individual is more likely to exhibit the sharing behavior when multiple friends share, even if she does not necessarily observe her friends’ behavior. There- fore, when using observational data, the naıve conditional probability (which is equivalent to the probability of shar- ing in the feed condition) does not directly give the proba- bility increase due to influence via multiple sharing friends. Rather, such an estimate reflects a mixture of internal influ- ence effects and external correlation. Our experiment allows us to directly measure the effect of the feed relative to external factors, computed as either the difference or ratio between the probability of sharing in the feed and no feed conditions (Figure 4bc). While the differ- ence in sharing likelihood grows with the number of sharing friends, the relative risk ratio falls. This contrast suggests that social information in the feed is most likely to influence a user to share a link that many of her friends have shared, but the relative impact of that influence is highest for con- tent that few friends are sharing. The decreasing relative effect is consistent with the hypothesis that having multi- ple sharing friends is associated with greater redundancy in (a) (b) Figure 3: Temporal clustering in sharing the same link as a friend in the feed and no feed conditions. (a) The difference in sharing time between a sub ject and their first sharing friend. (b) The difference between the time at which a sub ject was first to exposed (or was to be exposed) to the link and the time at which they shared. Vertical lines indicate one day and one week. time, even when no exposure occurs on Facebook. Figure 3 illustrates the cumulative distribution of information lags between the sub ject and their first sharing friend, among sub jects who had shared a URL after their friends. The top panel shows the latency in sharing times between the sub ject and their friend for users in the feed and no feed condition. While a larger proportion of users in the feed condition share a link within the first hour of their friends, the distribution of sharing times is strikingly similar. The bottom panel shows the differences in time between when sub jects shared and when they were (or would have been) first exposed to their friends’ sharing behavior on the Facebook feed. The horizontal axis is negative when a sub ject had shared a link after a friend but had not yet seen that link on the feed. From this comparison, it is easy to see that users in the feed condition are most likely to share a link immediately upon exposure, while those who share it without seeing it in their feed will do so over a slightly longer period of time. share time − alter's share time (days)cumulative density0.00.20.40.60.81.0051015202530feedno feedshare time − exposure time (days)cumulative density0.00.20.40.60.81.0−5051015202530feedno feed (a) (b) (c) Figure 4: Users with more friends sharing a Web link are themselves more likely to share. (a) The probability of sharing for sub jects that were (feed) and were not (no feed) exposed to content increases as a function of the number sharing friends. (b) The causal effect of the feed is greater when sub jects have more sharing friends (c) The multiplicative impact of the feed is greatest when few friends are sharing. Error bars represent the 95% bootstrapped confidence intervals clustered on the URL. information exposure, which may either be caused by ho- mophily in visitation and sharing tendencies, or external influence. 5. TIE STRENGTH AND INFLUENCE Next, we examine the relationship between tie strength, influence, and information diversity by combining the ex- perimental data with users’ online and offline interactions. Following arguments originally proposed by Mark Granovet- ter’s seminal 1973 paper, The Strength of Weak Ties [22], empirical work linking tie strength and diffusion often uti- lize the number of mutual contacts as proxies of interaction frequency. Rather than using the number of mutual con- tacts, which can be large for pairs of individuals who no longer communicate (e.g. former classmates), we directly measure the strength of tie between a sub ject and her friend in terms of four types of interactions: (i) the frequency of private online communication between the two users in the form of Facebook messages1 ; (ii) the frequency of public on- line interaction in the form of comments left by one user on another user’s posts; (iii) the number of real-world coin- cidences captured on Facebook in terms of both users be- ing labeled by users as appearing in the same photograph; and (iv) the number of online coincidences in terms of both users responding to the same Facebook post with a com- ment. Frequencies are computed using data from the three months directly prior to the experiment. The distribution of tie strengths among sub jects and their sharing friends can be seen in Figure 5. 5.1 Effect of Tie Strength We measure how the difference in the likelihood of sharing a URL in the feed versus no feed conditions varies according 1We quantify message and comment interactions as the number of communication events the sub ject received from their friend. The number of messages and comments sent, and the geometric mean of communications sent and re- ceived, yielded qualitatively similar results, so we plot only the single directed measurement for the sake of clarity. Figure 5: Tie strength distribution among friends displayed in sub jects’ feeds using the four measure- ments. Points are plotted up to the 99.9th percentile. Note that the vertical axis is collapsed. to tie strength. To simplify our estimate of the effect of tie strength, we restrict our analysis to sub jects with exactly one friend who had previously shared the link. In both con- ditions, a sub ject is more likely to share a link when her sharing friend is a strong tie (Figure 6a). For example, sub- jects who were exposed to a link shared by a friend from whom the sub ject received three comments are 2.83 times more likely to share than sub jects exposed to a link shared by a friend from whom they received no comments. For those who were not exposed, the same comparison shows that sub jects are 3.84 times more likely to share a link that was previously shared by the stronger tie. The larger ef- number of sharing friends probability of sharing0.0000.0050.0100.0150.0200.0250.030123456conditionfeedno feed number of sharing friendspfeed−pno feed0.0000.0050.0100.0150.0200.0250.030123456 number of sharing friendspfeedpno feed0246810123456tie strength cumulative fraction of ties in feed0.880.900.920.940.960.981.0001020304050typecomments receivedmessages receivedphoto coincidencesthread coincidences (a) (b) Figure 6: Strong ties are more influential, and weak ties expose friends to information they would not have otherwise shared. (a) The increasing relationship between tie strength and the probability of sharing a link that a friend shared in the feed and no feed conditions. (b) The multiplicative effect of feed diminishes with tie strength, suggesting that exposure through strong ties may be redundant with external exposure, while weak ties carry information one might otherwise not have been exposed to. fect in the no feed condition suggests that tie strength is a stronger predictor of externally correlated activity than it is for influence on feed. From Figure 6a, it is also clear that individuals are more likely to be influenced by their stronger ties via the feed to share content that they would not have otherwise spread. Furthermore, our results extend Granovetter’s hypothesis that weak ties disseminate novel information into the con- text of media contagion. Figure 6b shows that the risk ratio of sharing between the feed and no feed conditions is highest for content shared by weak ties. This suggests that weak ties consume and transmit information that one is unlikely to be exposed to otherwise, thereby increasing the diversity of information propagated within the network. 5.2 Collective Impact of Ties Strong ties may be individually more influential, but how much diffusion occurs in aggregate through these ties de- pends on the underlying distribution of tie strength (i.e. Figure 5). Using the experimental data, we can estimate the amount of contagion on the feed generated by strong and weak ties. The causal effect of exposure to information shared by friends with tie strength k is given by the average treatment effect on the treated: ATET(k) = p(k , feed) − p(k , no feed) To determine the collective impact of ties of strength k , we multiply this quantity by the fraction of links displayed in all users’ feeds posted by friends of tie strength k , denoted by f (k). In order to compare the impact of weak and strong ties, we must set a cutoff value for the minimum amount of interaction required between two individuals in order to consider that tie strong. Setting the cutoff at k = 1 (a single interaction) provides the most generous classification of strong ties while preserving some meaningful distinction between strong and weak ties, thereby giving the most in- fluence credit to strong ties. Under this categorization of strong and weak ties, the esti- mated total fraction of sharing events that can be attributed to weak and strong ties is the average treatment effect on the treated weighted by the proportion of URL exposures from each tie type: Tweak = ATET(0) ∗ f (0) N(cid:88) ATET(i) ∗ f (i) i=1 Tstrong = We illustrate this comparison in Figure 7, and show that by a wide margin, the ma jority of influence is generated by weak ties2 . Although we have shown that strong ties are individually more influential, the effect of strong ties is not large enough to match the sheer abundance of weak ties. 6. DISCUSSION Social networks may influence an individual’s behavior, but they also reflect the individual’s own activities, inter- ests, and opinions. These commonalities make it nearly im- possible to determine from observational data whether any particular interaction, mode of communication, or social en- 2Note that for the purposes of this study, it is not neces- sary to model the effect of tie strength for users with multi- ple sharing friends, since stories of this kind only constitute 4.2% of links in the newsfeed, and their inclusion would not dramatically alter the balance of aggregate influence by tie strength. comments received probability of sharing0.0000.0020.0040.0060.008024681012conditionfeedno feed messages received probability of sharing0.0000.0020.0040.0060.00801234567 photo coincidences probability of sharing0.0000.0020.0040.0060.00801234 thread coincidences probability of sharing0.0000.0020.0040.0060.00802468101214 comments receivedpfeedpno feed0246810024681012 messages receivedpfeedpno feed024681001234567 photo coincidencespfeedpno feed024681001234 thread coincidencespfeedpno feed024681002468101214 propensities, diffuse novel information that would not have otherwise spread. Although weak ties can serve a critical bridging func- tion [22, 37], the influence that weak ties exert has never before been measured empirically at a systemic level. We find that the ma jority of influence results from exposure to individual weak ties, which indicates that most information diffusion on Facebook is driven by simple contagion. This stands in contrast to prior studies of influence on the adop- tion of products, behaviors or opinions, which center around the effect of having multiple or densely connected contacts who have adopted [6, 7, 14, 13]. Our results suggest that in large online environments, the low cost of disseminating in- formation fosters diffusion dynamics that are different from situations where adoption is sub ject to positive externalities or carries a high cost. Because we are unable to observe interactions that occur outside of Facebook, a limitation of our study is that we can only fully identify causal effects within the site. Cor- related sharing in the no feed condition may occur because friends independently visit and share the same page as one another, or because one user is influenced to share via an ex- ternal communication channel. Although we are not able to directly evaluate the relative contribution of these two po- tential causes, our results allow us to obtain a bound on the effect on sharing behavior within the site. The probability of sharing in the no feed condition, which is a combination of similarity and external influence, is an upper bound on how much sharing occurs because of homophily-related effects. Likewise, the difference in the probability of sharing within the feed and no feed condition gives a lower bound on how much on-site sharing is due to interpersonal influence along any communication medium. The mass adoption of online social networking systems has the potential to dramatically alter an individual’s ex- posure to new information. By applying an experimental approach to measuring diffusion outcomes within one of the largest human communication networks, we are able to rig- orously quantify the effect of social networks on information spread. The present work sheds light on aggregate trends over a large population; future studies may investigate how properties of the individual, such as age, gender, and nation- ality, or features of content, such as popularity and breadth of appeal, relate to the influence and its confounds. 7. ACKNOWLEDGMENTS We would like to thank Michael D. Cohen, Dean Eckles, Emily Falk, James Fowler, and Brian Karrer for their discus- sions and feedback on this work. This work was supported in part by NSF IIS-0746646. 8. REFERENCES [1] L. A. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25:211–230, 2001. [2] E. Adar and A. Adamic, Lada. Tracking information epidemics in blogspace. In 2005 IEEE/WIC/ACM International Conference on Web Intel ligence, Compiegne University of Technology, France, 2005. [3] E. Adar, J. Teevan, and S. T. Dumais. Resonance on the web: web dynamics and revisitation patterns. In Proceedings of the 27th International Conference on Human factors in Computing Systems, CHI ’09, pages 1381–1390, New York, NY, USA, 2009. ACM Press. Figure 7: Weak ties are collectively more influen- tial than strong ties. Panels show the percentage of information spread by strong and weak ties for all four measurements of tie strength. Although the probability of influence is significantly higher for those that interact frequently, most contagion occurs along weak ties, which are more abundant. vironment is responsible for the apparent spread of a behav- ior through a network. In the context of our study, there are three possible mechanisms that may explain diffusion-like phenomena: (1) An individual shares a link on Facebook, and exposure to this information on the feed causes a friend to re-share that same link. (2) Friends visit the same web page and share a link to that web page on Facebook, inde- pendently of one another. (3) An individual shares a link within and external to Facebook, and exposure to the ex- ternally shared information causes a friend to share the link on Facebook. Our experiment determines the causal effect of the feed on the spread of sharing behaviors by comparing the likelihood of sharing under the feed condition (possible causes 1-3) with the likelihood under the no feed condition (possible causes 2-3). Our experiment generalizes Mark Granovetter’s predic- tions about the strength of weak ties [22] to the spread of everyday information. Weak ties are argued to have access to more diverse information because they are expected to have fewer mutual contacts; each individual has access to information that the other does not. For information that is almost exclusively embedded within few individuals, like job openings or future strategic plans, weak ties play a nec- essarily role in facilitating information flow. This reason- ing, however, does not necessarily apply to the spread of widely available information, and the relationship between tie strength and information access is not immediately obvi- ous. Our experiment sheds light on how tie strength relates to information access within a broader context, and sug- gests that weak ties, defined directly in terms of interaction % influence on feed tie strength strong weak strong weak strong weak strong weak020406080commentsmessagesphotosthreads [4] A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation in social networks. In Proceedings of the 14th Internal Conference on Know ledge Discover & Data Mining, pages 7–15, New York, NY, USA, 2008. ACM Press. [5] S. Aral, L. Muchnik, and A. Sundarara jan. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc. Natl. Acad. Sci., 106(51):21544–21549, December 2009. [6] S. Aral and D. Walker. Creating social contagion through viral product design: A randomized trial of peer influence in networks. Management Science, 57(9):1623–1639, Aug. 2011. [7] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD ’06: Proceedings of the 12th ACM SIGKDD international conference on Know ledge discovery and data mining, pages 44–54, New York, NY, USA, 2006. ACM. [8] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone’s an influencer: Quantifying influence on twitter. In 3rd ACM Conference on Web Search and Data Mining, Hong Kong, 2011. ACM Press. [9] E. Bakshy, B. Karrer, and L. Adamic. Social influence and the diffusion of user-created content. In Proceedings of the tenth ACM conference on Electronic commerce, pages 325–334. ACM, 2009. [10] H. R. Bernard, P. Killworth, D. Kronenfeld, and L. Sailer. The problem of informant accuracy: The validity of retrospective data. Annu. Rev. Anthropol., 13:495–517, 1984. [11] J. J. Brown and P. H. Reingen. Social ties and word-of-mouth referral behavior. J. Consumer Research, 14(3):pp. 350–362, 1987. [12] R. S. Burt. Structural holes: The social structure of competition. Harvard University Press, Cambridge, MA, 1992. [13] D. Centola. The Spread of Behavior in an Online Social Network Experiment. Science, 329(5996):1194–1197, September 2010. [14] D. Centola and M. Macy. Complex contagions and the weakness of long ties. Am. J. Sociol., 113(3):702–734, Nov. 2007. [15] M. Cha, A. Mislove, and K. P. Gummadi. A measurement-driven analysis of information propagation in the flickr social network. In Proceedings of the 18th international conference on World wide web, WWW ’09, pages 721–730, New York, NY, USA, 2009. ACM. [16] N. A. A. Christakis and J. H. H. Fowler. The spread of obesity in a large social network over 32 years. N. Engl. J. Med., 357(4):370–379, July 2007. [17] S. Fox. The social life of health information. Technical report, Pew Internet & American Life Pro ject, 2011. [18] E. Gilbert and K. Karahalios. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI ’09, pages 211–220, New York, NY, USA, 2009. ACM. [19] M. Gladwell. The Tipping Point: How Little Things Can Make a Big Difference. Little Brown, New York, 2000. [20] M. Gomez Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD international conference on Know ledge discovery and data mining, KDD ’10, pages 1019–1028, New York, NY, USA, 2010. ACM. [21] A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In Proceedings of the third ACM international conference on Web search and data mining, WSDM ’10, pages 241–250, New York, NY, USA, 2010. ACM. [22] M. S. Granovetter. The strength of weak ties. Am. J. Sociol., 78(6):1360–1380, May 1973. [23] M. S. Granovetter. Threshold models of collective behavior. Am. J. Sociol., 83(6):1420–1443, 1978. [24] B. S. Greenberg. Person to person communication in the diffusion of news events. Journalism Quarterly, 41:489–494, 1964. [25] D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In Proceedings of the 13th international conference on World Wide Web, pages 491–501. ACM, 2004. [26] K. Hampton, L. S. Goulet, L. Rainie, and K. Purcell. Social networking sites and our lives. Technical report, Pew Internet & American Life Pro ject, 2011. [27] S. Hill, F. Provost, and C. Volinsky. Network-Based marketing: Identifying likely adopters via consumer networks. Stat. Sci., 21(2):256–276, May 2006. [28] G. Kossinets and D. J. Watts. Origins of homophily in an evolving social network. Am. J. Sociol., 115(2):405–450, September 2009. [29] K. Lerman and R. Ghosh. Information contagion: An empirical study of the spread of news on digg and twitter social networks. In Proceedings of 4th International Conference on Weblogs and Social Media (ICWSM), 2010. [30] J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. In EC ’06: Proceedings of the 7th ACM conference on Electronic commerce, pages 228–237, New York, NY, USA, 2006. ACM. [31] D. Liben-Nowell and J. Kleinberg. Tracing information flow on a global scale using internet chain-letter data. Proceedings of the National Academy of Sciences, 105(12):4633, 2008. [32] C. F. Manski. Identification of endogenous social effects: The reflection problem. Rev. Econ. Stud., 60(3):531–42, July 1993. [33] A. Marin. Are respondents more likely to list alters with certain characteristics? Implications for name generator data. Social Networks, 26(4):289–307, Oct. 2004. [34] M. McPherson, L. S. Lovin, and J. M. Cook. Birds of a Feather: Homophily in Social Networks. Annu. Rev. Sociol., 27(1):415–444, 2001. [35] M. E. J. Newman. Spread of epidemic disease on networks. Phys. Rev. E, 66(1):016128, Jul 2002. [36] J.-P. Onnela and F. Reed-Tsochas. Spontaneous emergence of social influence in online systems. Proceedings of the National Academy of Sciences, 107(43):18375–18380, 2010. [37] J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szab´o, D. Lazer, K. Kaski, J. Kert´esz, and A. L. Barab´asi. Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences, 104(18):7332–7336, May 2007. [38] K. Purcell, L. Rainie, A. Mitchell, T. Rosenstiel, and K. Olmstead. Understanding the participatory news consumer. Technical report, Pew Internet & American Life Pro ject, 2010. [39] C. R. Shalizi and A. C. Thomas. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. Sociological Methods and Research, 27:211–239, 2011. [40] T. Stein, E. Chen, and K. Mangla. Facebook Immune System. In EuroSys Social Network Systems, 2011. [41] E. S. Sun, I. Rosenn, C. A. Marlow, and T. M. Lento. Gesundheit! modeling contagion through facebook news feed. In Proceedings of the 3rd Int’l AAAI Conference on Weblogs and Social Media, San Jose, CA, 2009. AAAI. [42] D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. Nature, 393(6684):440–442, June 1998. [43] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts. Who says what to whom on twitter. In ACM Conference on the World Wide Web, Hyderbad, India, 2011. ACM Press.
1703.08365
1
1703
2017-03-24T11:31:20
The Emergence of Crowdsourcing among Pok\'emon Go Players
[ "cs.SI", "cs.HC" ]
Since its launching, Pok{\'e}mon Go has been pointed as the largest gaming phenomenon of the smartphone age. As the game requires the user to walk in the real world to see and capture Pok{\'e}mons, a new wave of crowdsourcing apps have emerged to allow users to collaborate with each other, sharing where and when Pok{\'e}mons were found. In this paper we characterize one of such initiatives, called PokeCrew. Our analyses uncover a set of aspects of user behavior and system usage in such emerging crowdsourcing task, helping unveil some problems and benefits. We hope our effort can inspire the design of new crowdsourcing systems.
cs.SI
cs
The Emergence of Crowdsourcing among Pokémon Go Players∗ Priscila Martins UFMG, Brazil [email protected] Fabrício Benevenuto UFMG, Brazil [email protected] Manoel Miranda UFMG, Brazil [email protected] Jussara Almeida UFMG, Brazil [email protected] 7 1 0 2 r a M 4 2 ] I S . s c [ 1 v 5 6 3 8 0 . 3 0 7 1 : v i X r a ABSTRACT Since its launching, Pok´emon Go has been pointed as the largest gaming phenomenon of the smartphone age. As the game requires the user to walk in the real world to see and capture Pok´emons, a new wave of crowdsourcing apps have emerged to allow users to collaborate with each other, shar- ing where and when Pok´emons were found. In this paper we characterize one of such initiatives, called PokeCrew. Our analyses uncover a set of aspects of user behavior and system usage in such emerging crowdsourcing task, helping unveil some problems and benefits. We hope our effort can inspire the design of new crowdsourcing systems. 1. INTRODUCTION The mobile games industry experienced an exponential growth in the past decade, motivated mainly by (i) an ever increasing worldwide penetration of smartphones and mobile devices, (ii) the ability of such devices to deliver quality audio and video; and (iii) the increasing capacity of network transmissions of these devices, allowing users to download larger and more complex games [Soh and Tan 2008]. The largest gaming phenomenon of the smartphone age so far has been the augmented reality game Pok´emon Go. It was launched in July 2016, firstly in Australia, New Zeland, and USA. Yet, in one week after launching, it had already reached seven million users, accounting for three to six times more downloads of the most popular games in history at that time [Makuch ]. The game makes use of GPS, camera, and position sensors of smartphones which allow its users to capture, battle and train virtual creatures called Pok´emons. These creatures appear on the phone screen as if they were in the real world. The set of technologies that allow this kind of experience support the so-called augmented reality, a field that has received a lot of attention after the game success. ∗This is a preprint of an article submitted to a conference. ACM ISBN 978-1-4503-2138-9. DOI: 10.1145/1235 There has been a number of recent studies exploiting behavioral changes among Pok´emon Go players. Nigg et al. [Nigg et al. 2017] suggest that Pok´emon Go may in- crease physical activity and decrease sedentary behaviors. Other efforts [Tateno et al. 2016, Dorward et al. 2016, de Oliveira Roque 2016] argue that the game may represent a new shift in perspective: players tend to socialize more while playing as they tend to concentrate in popular areas of the game, often called Pok´eStops. Since the game requires the user to walk in the real world to see and capture the Pok´emons nearby, a new wave of supporting apps has emerged. In these apps, players can collaborate with each other, sharing where and when Pok´e- mons were found. They represent the emergence of a crowd- sourcing effort of the game players to find rare and valuable Pok´emons. PokeCrew1, one such app of great popularity, is a crowdsourced Pok´emon Go map. It shows reports of lo- cations of Pok´emon posted by players in real time in a map and it became quite popular among the most active users. For example, this website was ranked among the top 15000 domains in the Web, according to Alexa.com [ale ] and its IOS and android versions had hundreds of thousands down- loads. In this paper, we characterize the crowdsourcing effort of Pok´emon Players through PokeCrew. Crowdsourcing sys- tems enlist a multitude of humans to help solve a wide va- riety of problems. Over the past decade, numerous such systems have appeared on the Web. Prime examples in- clude Wikipedia, Yahoo! Answers, Mechanical Turk-based systems, and many more [Howe 2006]. Our effort consists in characterizing an emerging type of crowdsourcing sys- tem, identifying many interesting technical and social chal- lenges. To that end, we obtained a near two-month log of reports from the game players, containing 39,895,181 reports of Pok´emon locations. Our analyses uncover a set of aspects of user behavior and system usage in an emerging crowd- sourcing task. We hope our effort can inspire the design of emerging crowdsourcing systems. In the following, we first describe the data used in our study and then analyze how users collaboratively help each other within the Pokecrew platform. We finish this paper with our conclusions and possible directions for future work. 2. DATASET With the increasing popularity of Pok´emon Go in the 1https://www.pokecrew.com/ whole world, many applications emerged with the purpose of enhancing the players experience with the game. Among the most popular ones are Pokecrew2, PokeRadar3, and Poke- Vision4. The idea is to share Pok´emon maps and their loca- tions in a crowdsourced way: after finding Pok´emons in the game itself users may report them in the supporting app, making the creatures visible to other players that are not in that specific location and time. This can be very useful to players, since, in the game, it is not possible to see Pok´emons far from where the player is currently physically located. We have obtained data from Pokecrew, a popular app that offers to users a map containing the location of Pok´emons reported by other users. The application can be found in the PlayStore, AppStore, as well as on the Web. Our dataset contains 39,895,181 reports, from July 12th to August 24th 2016. Each report contains several information fields, in- cluding: a report id, reported Pok´emon id, geographic co- ordinates, time when the report was created and, in some registers, a username. Our results show that most reports in our dataset (98.7%) do not include a valid username, since the app does not re- quire the user to identify itself in order to create reports. Thus, although we report general statistics computed over the whole dataset in the next section, we focus on the subset of reports with valid usernames to study user behavior. We note that, despite the small percentage, there is still a con- siderable amount of identifiable reports (over 500k) on which we can perform such analysis. Finally, we also note that the spatial information in our dataset refers to geographic coor- dinates of the reports. 3. REPORTED POKÉMONS AND THEIR LOCATIONS We start our characterization by analyzing which Pok´e- mons are the most reported ones and where they were re- ported. We then discuss the application adoption on specific locations. 3.1 Most Reported Pokémons Table 1 shows the top-10 most reported Pok´emons in our dataset. We note that these Pok´emons are evolutions or difficult to find in the game. An evolution of a given Pok´e- mon consists of a similar monster but with a higher power, which is very important to battle with other Pok´emons in the so called 'gyms', popular places across the world where a user (a Pok´emon master) battles with other users in or- der to take control of that gym. Besides that, having these evolutions contributes to the user's Pokedex, which is a list containing detailed stats for every creature from the Pok´e- mon games. The more Pok´emons a user has in her list, more experience she has on the game, which is also important to battle with other players at the gyms. Capturing an evo- lution is attractive to players because the only alternative way to obtain them is to use an egg, which is earned as the player progress in the game. With this egg, the Pok´emon master can put it to crash, which is achieved by walking. The distance required to crash an egg may vary (2, 5 or 10 kilometers). The higher the distance, the more valuable the Pok´emon that comes out of the egg is. Thus, it is much 2www.pokecrew.com 3https://www.Pokemonradargo.com/ 4www.pokevision.com more convenient to catch the evolved Pok´emon right away than it is to walk waiting for the egg to crack and, luckily, be rewarded with a powerful Pok´emon. This observation shows the great contribution of Poke- crew to Pok´emon players: the interest in rare Pok´emons or evolutions is what drive players to appeal to these crowd- sourced apps. These Pok´emons are more valuable than the most commonly found, which normally have less power to battle. Pok´emon's Name Number of Reports 4,957,913 Fearow Raichu 3,910,515 2,395,383 Slowbro 2,150,770 Golduck 2,051,487 Pidgeot 1,507,741 Nidoran Tentacool 1,199,451 1,044,395 Nidoqueen 938,829 Magnemite Clefable 928,105 Table 1: Top 10 reported Pok´emons 3.2 Pokémon Location We note that our dataset contains only geographic coor- dinates of the reports. In order to characterize the location where these reports were made, we first converted the co- ordinates to the cities and countries where the reports are made. Our approach to do that consisted of using a reliable Python library, namely geopy5, which allows us to retrieve the nearest town/city for a given latitude/longitude coordi- nate. Most of the reports (almost 34%) come from the U.S, fol- lowed by Singapore and Malyasia. We also noticed that three American cities -- New York City, San Francisco and Santa Monica -- are included in the top 10 cities. 3.3 Crowdsourcing Adoption In this kind of application, the initial stage of its lifespan can be unattractive to the users due to the lack of data in the system. In PokeCrew and other competing apps, this aspect is even more critical, since the adoption of Pok´emon GO was fast and user engagement was very strong. In an applica- tion like Pokecrew, if the user does not encounter Pok´emon reports, it is very likely she will not be motivated to use the system and therefore won't be encouraged to create new reports. To assess whether the previous presence of Pok´emons in the application influences the user to create new reports, we compared the amount of reports in a popular area among the days. To that end, we focused on the reports in the city of New York, which concentrates most part of reports. The city geographic area was first divided into 800 regions of approximately 500m2 , and for each region we counted the total number of reports created on each day. Besides that, we considered the period from August 14th to 26th, which concentrates a larger number of reports. It is possible to see in Figure 1, most of the reports made in New York City, were created in the Central Park area, a very popular place in the game itself. Figure 2 shows a heat map correlating 5https://pypi.python.org/pypi/geopy/ engagement within this crowdsourced system. The dataset collected presents 39,895,181 reports, but only 452,359 (1.3%) are registered users (non-anonymous). We focus the next analysis on the behavior of this identified group of users. 4.1 User Engagement Analyzing the reports made by registered users, we can notice that some of them, mostly users who contributed with the largest amounts of reports, reported a large num- ber of sightings in just one day. For example, the top 1 user reported 184,615 times, being her reports concentrated be- tween July 21st and 24th. Specifically, reported 13,007 times on July 21st and 75,574 on July 22nd, which are very expres- sive numbers. Similarly, 31,656 reports made by the second most active user, which corresponds to almost 99.7% of his contribution to the Pokecrew system, were concentrated on a single day, August 12th. The 10 most active users in the Pokecrew system, in terms of reports of Pok´emon sightings, are shown in Table 2. We note that some users have re- ported far many sightings than others, especially the 4 most active ones. Given the large amount of reports associated with these users, and the short time interval during which they were made, we speculate that these reported sightings may not have been made by "legitimate" Pokecrew users. Based on the amount of reports that the top 5 have made, and the fact that these reports are, in general, concentrated in a few set of days, we've disregarded this data for some analysis. Just a few number of users have reported from 30 to 261 times. Most of users have reported from 1 to 20 times. We have categorized users who have reported from 1 to 5 times as less active users, representing 80% of the database. Given that for each report we have the information about the time when it was created and its location, we can cal- culate for each pair of reports of a single user the speed in which he would have to dislocate in order to make both re- ports. Calculating the speed for each pair of user's report, we obtained a set of speeds from the identified user's re- ports. The chart bellow shows the speed distribution across the total identifiable users: As we can see in the plot above, a considerable number of reports made by the users in the system reveal that they would have to move at abnormally high speeds for this kind of game. Even if we consider the case where a user report a Pok´emon in one place, go on an airplane trip and then report another in the destination, which although maybe uncom- mon, is possible, some speeds are not feasible to achieve. The problem is that, even though the PokeCrew app uses Counting reports 184615 31766 609 413 270 261 255 239 236 235 User name yay1199 hi mongrelo luchocadaingles maestroPok´emonbelloto rooty srdandrea crescenttough ceryatec guantoresp Table 2: Top 10 users and their counting reports Figure 1: Geographical Location of Top 20 regions from NY the number of reports in each region showed in Figure 1 in each date. Figure 2: Heat Map of Top 20 regions from NY 4. USER BEHAVIOR Next, we provide a characterization of the crowdsourced Pokecrew data, exploring aspects of user behavior and their This paper explores one out of a new wave of applications that rely on collaborative databases in the mobile gaming environment. Pok´emon Go was a huge phenomenon in this area and motivated the creation of innumerable initiatives to help gamers with the task of catching, training and battling Pok´emons across the city. Since the game requires the user to walk and visit places in order to succeed at being a Pok´e- mon master, this kind of support showed to be extremely useful to players, because they could go straight to the ex- act location where a desired Pok´emon is located instead of randomly walk hoping to find some valuable monster, as we could see with the most reported Pok´emons. One important aspect in this work was to show how vulnerable such systems are to spoofed data. Inconsistent locations over time for some users and the noticeably high amount of reports these users pushed to the system certainly had a negative impact over the legit final user experience, who could encounter fake reports on the map. Although the app lacks mechanisms to prevent these fake reports, the establishment of a trustful relation with the user is difficult to achieve 6. ACKNOWLEDGMENTS We would like to thank Pokecrew for kindly sharing its data with our research group. This work is supported by author's individual grants from Capes, Fapemig, and CNPq. F. Benevenuto is also supported by Humboldt Foundation. 7. REFERENCES [ale ] Pokecrew Traffic Statistics. (2017). http://www.alexa.com/siteinfo/pokecrew.com Available at http://www.alexa.com/siteinfo/pokecrew.com. [de Oliveira Roque 2016] Fabio de Oliveira Roque. 2016. Field studies: Could Pokemon Go boost birding? Nature 537, 7618 (2016), 34 -- 34. [Dorward et al. 2016] Leejiah J Dorward, John C Mittermeier, Chris Sandbrook, and Fiona Spooner. 2016. Pok´emon Go: Benefits, Costs, and Lessons for the Conservation Movement. Conservation Letters (2016). [Howe 2006] Jeff Howe. 2006. The rise of crowdsourcing. Wired magazine 14, 6 (2006), 1 -- 4. [Makuch ] Eddie Makuch. Pokemon Go Reaches $600 Million, Faster Than Any Mobile Game in History - Report. (2016). http://www.gamespot.com/articles/ pokemon-go-reaches-600-million-faster-than-any-mob/ 1100-6444687/ Available at http://www.gamespot.com/articles/pokemon-go- reaches-600-million-faster-than-any-mob/1100- 6444687. [Nigg et al. 2017] Claudio R Nigg, Desiree Joi Mateo, and Jiyoung An. 2017. Pok´emon Go may increase physical activity and decrease sedentary behaviors. (2017). [Soh and Tan 2008] Jason O. B. Soh and Bernard C. Y. Tan. 2008. Mobile Gaming. Commun. ACM 51, 3 (March 2008), 35 -- 39. DOI: https://doi.org/10.1145/1325555.1325563 [Tateno et al. 2016] Masaru Tateno, Norbert Skokauskas, Takahiro A Kato, Alan R Teo, and Anthony PS Guerrero. 2016. New game software (Pok´emon Go) Figure 3: Speed distribution across identified users the GPS data from the smartphone and places the map in the user current location, the player has the ability to move the map to any place in the world and therefore report a sighting from anywhere. There is no validation in the app if the report being created is trustful. This opens a serious flaw in the system, because malicious users and even bots could create fake sightings to spoof the system and degrade the legit user experience. Even if the user could not change the location in the map, it would still be possible to report a Pok´emon that does not exist in the game itself at that given time and location. This kind of validation is a key problem in collaborative systems, and can be very challenging due to the lack of mechanisms to control whether the information being supplied to the database is true or not. 4.2 Temporal Analysis The created at field represents the date when the the sight- ing was reported by a user. The chart below shows an anal- yse about how many reports were made in each day. From July 12th, when Pokecrew was created, to August 7th there were not many users contributing to the system. This sce- nario changes after August 8th, with a peak of reports on August 21st. Figure 4: Amount of reports per date 5. CONCLUDING DISCUSSION may help youth with severe social withdrawal, hikikomori. Psychiatry Research (2016).
1804.02101
2
1804
2018-04-10T21:41:16
Modeling Popularity in Asynchronous Social Media Streams with Recurrent Neural Networks
[ "cs.SI", "stat.ML" ]
Understanding and predicting the popularity of online items is an important open problem in social media analysis. Considerable progress has been made recently in data-driven predictions, and in linking popularity to external promotions. However, the existing methods typically focus on a single source of external influence, whereas for many types of online content such as YouTube videos or news articles, attention is driven by multiple heterogeneous sources simultaneously - e.g. microblogs or traditional media coverage. Here, we propose RNN-MAS, a recurrent neural network for modeling asynchronous streams. It is a sequence generator that connects multiple streams of different granularity via joint inference. We show RNN-MAS not only to outperform the current state-of-the-art Youtube popularity prediction system by 17%, but also to capture complex dynamics, such as seasonal trends of unseen influence. We define two new metrics: promotion score quantifies the gain in popularity from one unit of promotion for a Youtube video; the loudness level captures the effects of a particular user tweeting about the video. We use the loudness level to compare the effects of a video being promoted by a single highly-followed user (in the top 1% most followed users) against being promoted by a group of mid-followed users. We find that results depend on the type of content being promoted: superusers are more successful in promoting Howto and Gaming videos, whereas the cohort of regular users are more influential for Activism videos. This work provides more accurate and explainable popularity predictions, as well as computational tools for content producers and marketers to allocate resources for promotion campaigns.
cs.SI
cs
Modeling Popularity in Asynchronous Social Media Streams with Recurrent Neural Networks Swapnil Mishra, Marian-Andrei Rizoiu and Lexing Xie The Australian National University, Data 61, CSIRO, Australia {swapnil.mishra,marian-andrei.rizoiu,lexing.xie}@anu.edu.au Abstract Understanding and predicting the popularity of online items is an important open problem in social media analysis. Con- siderable progress has been made recently in data-driven pre- dictions, and in linking popularity to external promotions. However, the existing methods typically focus on a single source of external influence, whereas for many types of on- line content such as YouTube videos or news articles, atten- tion is driven by multiple heterogeneous sources simultane- ously – e.g. microblogs or traditional media coverage. Here, we propose RNN-MAS, a recurrent neural network for mod- eling asynchronous streams. It is a sequence generator that connects multiple streams of different granularity via joint in- ference. We show RNN-MAS not only outperforms the cur- rent state-of-the-art Youtube popularity prediction system by 17%, but also captures complex dynamics, such as seasonal trends of unseen influence. We define two new metrics: the promotion score quantifies the gain in popularity from one unit of promotion for a Youtube video; the loudness level cap- tures the effects of a particular user tweeting about the video. We use the loudness level to compare the effects of a video being promoted by a single highly-followed user (in the top 1% most followed users) against being promoted by a group of mid-followed users. We find that results depend on the type of content being promoted: superusers are more successful in promoting Howto and Gaming videos, whereas the cohort of regular users are more influential for Activism videos. This work provides more accurate and explainable popularity pre- dictions, as well as computational tools for content producers and marketers to allocate resources for promotion campaigns. 1 Introduction Popularity refers to the total attention that a digital item receives. Understanding popularity has been an important problem since the early days of social media research. Im- portant open questions include explaining observed popu- larity, predicting popularity in the future, and being able to reason about the cause and effect of intervention from indi- viduals and groups. Insights into popularity dynamics can help content producers to better prioritize production and schedule promotions, and help content providers to allocate resources for hosting and advertising. Copyright c(cid:13) 2018, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Successful recent models of popularity fall into two cat- egories. The first describes individual user actions, or dis- crete events in continuous time (e.g. tweets) (Du et al. 2016; 2013; Mishra, Rizoiu, and Xie 2016; Shen et al. 2014; Yu et al. 2016; Zhao et al. 2015). The second is based on aggregate metrics of user actions (Cheng et al. 2014; Martin et al. 2016) or aggregated event volumes (e.g. the number of daily views) (Szabo and Huberman 2010; Pinto, Almeida, and Gonc¸alves 2013; Rizoiu et al. 2017; Yu, Xie, and Sanner 2015). Each of these models specialise in a distinct data type, but it is common to observe data of different types for the same online item. It is desirable to develop a model that accounts for multiple heterogeneous series. Furthermore, many popularity models provide black-box predictions (Zhao et al. 2015; Martin et al. 2016; Mishra, Rizoiu, and Xie 2016). In practice one often demands simu- lations on various what-if scenarios, such as to quantify the effect of a unit amount of promotions, to capture seasonality or the response to outliers, to name a few. Lastly, the influ- ence users have on popularity has been subject to constant debate in this research area. The view that one or a few in- fluential champions can make or break a cascade (Budak, Agrawal, and El Abbadi 2011) contrasts with the view that popularity largely results from a large number of moderately influential users (Bakshy et al. 2011). It is desirable to have one model on which the future effect of different users can be comparably studied. This work aims to explain and predict the popularity of an online item under the influence of multiple external sources, in different temporal resolutions – such as both promotion events (e.g. tweets) and volumes (e.g. number of shares per day). In particular, we propose RNN-MAS1 (Recurrent Neu- ral Networks for Multiple Asynchronous Streams), a flexi- ble class of models learnable from social cascades that can describe heterogeneous information streams, explain pre- dictions, and compare user effects for both individuals and groups. Recurrent neural network is an effective tool for sequence modeling in natural language and multiple other domains (Elman 1990; Graves 2013; Sutskever, Vinyals, and Le 2014). We link multiple recurrent neural networks by allowing them to exchange information across different 1Download data and code here: https://git.io/vx7Tk. asynchronous streams. This is an extension to the recent RMTPP (Du et al. 2016) for a single social event sequence. We illustrate the effectiveness of this model for predicting popularity of YouTube videos under the influence of both tweeting events and sharing volumes – improving state of the art prediction by 17%. We propose several new ways to interpret and simulate popularity, and implement them for RNN-MAS. The first is a unit promotion response metric, measures the gain in pop- ularity per unit of promotion. Measured at different times and promotion scales, it can describe the time-varying and nonlinear effect of online promotions. The second measure, unseen response, captures the effect of unobserved external influence. Since neural nets is a flexible function approxi- mator, we show that this measure can successfully capture seasonal effects. To understand the influence of users, we compute a new metric, loudness level, as the log-ratio of marginal gain from users. It is used to quantify the popu- larity gain from powerful users and moderately influential groups of users for each video. We observe that for supe- rusers are more effective in a minority (37%) of Nonprofit and activism videos, whereas superusers dominate in other video categories such as HowTo & style and Gaming. The main contributions of this paper include: • RNN-MAS, a new and flexible model that links multiple asynchronous streams for predicting online popularity. • New measures, unseen response and promotion score, to quantify content virality and explain different factors that affect popularity. • A method for quantifying Twitter user influence on dis- seminating content on YouTube, proposing a new loud- ness metric and a set of observations across diverse con- tent types on the relative influence of superusers versus everyday users. 2 Background Our proposal is at intersection of three distinct bodies of literature: Hawkes process (Hawkes 1971), Hawkes inten- sity process (Rizoiu et al. 2017) and Recurrent neural net- works (Elman 1990; Hochreiter and Schmidhuber 1997; Graves 2013) . Hawkes Process. (Hawkes and Oakes 1974) Self-exciting point processes are a special case of point processes (Da- ley and Vere-Jones 2008) where the arrival of an event in- creases the probability of observing future events. A well known self-exciting process is the Hawkes process (Hawkes 1971) where the intensity of arrival of new events – the event rateλ (t) –, depends explicitly on all past events as: λ(t) = µ(t) +Xti<t φ(t − ti) , (1) where µ(t) is the rate of arrival of external events (indepen- dent of the arrival of past events). Each previous event ob- served at time ti affects the rate of future events through the kernel φ(t − ti), making the process self-exciting. This kernel is known as the memory kernel. Previous literature mainly uses three families of functions as memory ker- nels: power-law functions φp(τ ) = (τ + c)−(1+θ), used in geophysics (Helmstetter and Sornette 2002) and social net- works (Crane and Sornette 2008; Zhao et al. 2015; Mishra, Rizoiu, and Xie 2016) ; exponential functions φe(τ ) = e−θτ , used in financial data (Filimonov and Sornette 2013); 2 θτ 2, used in epidemiol- Rayleigh functions φr(τ ) = e− 1 ogy (Wallinga and Teunis 2004). All three families of ker- nels ensure that more recent events have higher influence on the current event rate at time t – the kernels are known as time-decaying. One of the limitations of employing Hawkes point pro- cesses to model popularity is the parametric design of the kernel function. For real-world data, the kernel function is unknown and it needs to be approximated in a bottom-up approach based on prior and intuition. The model proposed in Section 3.1 can non- parametrically learn the event rate function from observed data. Hawkes Intensity Processes (HIP) (Rizoiu et al. 2017) de- scribes the volume of attention series ξ[t] as a self-consistent equation: t X τ =1 ξ[t] = u[t] + αs[t] + C ξ[t − τ ](τ + c)−(1+θ) (2) where s [t] and u [t] are respectively the external promotion and the unseen influence series at time t; α is the sensitivity to exogenous promotions; θ modulated the power-law mem- ory kernel, C scales with content quality and c is a thresh- old parameter to keep the power-law kernel bounded when τ ' 0. HIP describes the volumes of attention over fixed time intervals (e.g. daily). Modeling popularity with HIP has two drawbacks. First, analogous to the Hawkes process, HIP also requires speci- fying a parametric kernel. Second, HIP models volumes of data over fixed time intervals, even when detailed informa- tion about individual external promotion events is available – e.g. which and when an user tweeted a video. The mod- els we propose in Section 3.2 and Section 3.3 tackle these challenges via joint inference of the volume series and point process series. Recurrent Neural Networks (RNN) (Elman 1990) are common sequence models where the same feed forward structure is replicated at each time step. They have additional connections from the output of previous the time step to the input of the current time step – therefore creating a recur- rent structure. Their hidden state vector ht can be defined recursively as: ht = f (xt, ht−1) where f is the feed forward network, xt is the current in- put, ht−1 is the output from previous time step. Long short- term memory (LSTM) (Hochreiter and Schmidhuber 1997; Graves 2013) units are essentially recurrent networks with additional gated structure, defined as: it = σ (Wixt + Uiht−1 + Vict−1 + bi) ft = σ (Wf xt + Uf ht−1 + Vf ct−1 + bf ) ct = ftct−1 (cid:12) tanh (Wcxt + Ucht−1 + bc) ot = σ (Woxt + Uoht−1 + Voct + bo) ht = ot (cid:12) tanh (ct) (3) (a) (b) (c) Figure 1: Recurrent models for events and volumes. (a) RPP, (b) VolRNN-S/TS and (c) RNN-MAS. Top row: output series; middle: block diagram for recurrent network, each circle refers to an LSTM unit; bottom: input series. where xt is input at time t, σ is the logistic sigmoid function and (cid:12) denotes element-wise multiplication. The notations it, ft, ct, ot and ht stand for the input, forget, cell-state, output and hidden state at time t. We use the following short- hand notation for the LSTM set of equations in Equation 3: (4) (ht, ct) = LST M (xt, ht−1, ct−1) LSTM and its variants have been successfully used for modeling time series and predicting sequence, due to their ability to capture the effects of past data in their hid- den state (Hochreiter and Schmidhuber 1997; Graves 2013; Chung et al. 2014). We build on this intuition to construct based on LSTM the models proposed in Section 3. 3 RNN for Volume and Point Processes In the following section we first introduce a recurrent model for modeling event series in Section 3.1, followed by a re- current model for a volume series in Section 3.2. Finally we present a joint model for predicting attention volumes in Section 3.3. Our notations for all the model are sumarized in Table 1. 3.1 Recurrent Point Process (RPP) We present a model to frame events data as point processes in Figure 1a, where the influence of history on future events is learned as parameters of LSTM unit. The equation for event rate at time t for the model is writ- ten as: (5) such that ht is : hP o hP λ (t) = exp(cid:0)W P t = LST M(cid:0)(mi, ti) , hP t + α (t − ti)(cid:1) ti , cti(cid:1) (6) where ti is the time for last event before time t, mi is the magnitude of last event. In point process literature magni- tude of an event is generally referred to as mark of an event, where mark represent attributes of the event, e.g. magnitude of the earthquake, or the type of a trade - bond or stock. In our work for modeling tweets we consider mark as the magnitude (#followers) of user tweeting. hti and cti denotes hidden and cell state respectively at time ti, and α is a scalar that modulates effect of current time on intensity. Our model is similar to the one proposed by (Du et al. 2016). In their work they assume discrete values of marks as they model different event types rather than magnitude. Table 1: Summary of notations for RNN models Event Data Volume Data Symbol Quantity ei = (mi, ti) λ(ti) sd ith event at time ti of magnitude mi Intensity at ith event Exogenous stimulus at fixed inter- val d Attention Volume at fixed interval d Vd We generalize their model to work for continuous marks by modeling mark generation separately from history, as done in (Rizoiu et al. 2017; Mishra, Rizoiu, and Xie 2016). 3.2 Volume RNN RNN can also model volume streams. HIP can be seen as generalization of autoregressive models, with a history size as long as the sequence itself. Intuitively in HIP, the current value of volume intensity can be seen as a convolution of a memory kernel with its past values. Hence we formulate a LSTM model in Figure 1b, for predicting attention volume series as follows, using Equation (4): Vd = W V ol o hd such that, hd = LST M (sd, hd−1, cd−1) (7) (8) where Vd is the attention volume at time d , hd is the hidden state time d and input to the system is sd at time d, where sd is the exogenous stimuli for the attention volume at time d. For volume RNN model we have time points as discrete values, spread over fixed time intervals (e.g. daily, hourly). 3.3 RNN-MAS for asynchronous streams In real world scenarios, we have multiple streams of data promoting a single attention series. For example, being tweeted and being shared both lead to more views on a YouTube video. In this section we present a combined model to take into account the volume promotions and individual events for predicting an attention volume series. RNN-MAS model is shown in the Figure 1c. It has two components: a volume RNN model as shown in Figure 1b predicting the desired attention volume series at fixed time Intensity Event Series Output Model Input Volume Series Promotion Series Volume Series Intensity Promotion Series Event Series both models, we calculate the hidden state from RPP model for day d using Equation 6 and hidden state for volume RNN at day d is calculated using Equation 8. Now the combined model is trained using RMSE for the attention volume series. For all models, we jointly learn network parameters over 500 random sequences from Active+tweets Dataset described in Section 5. Now for individual fittings we use the jointly learned parameters as the initialization point. We ob- serve faster convergence and better prediction results when compared to running with random initializations. For more details, see supplement (Mishra, Rizoiu, and Xie 2018). 4 Popularity Metrics RNN-MAS describes popularity under influence of hetero- geneous streams of shares and tweets. We propose two met- rics based on RNN-MAS to quantify average response to unit promotion, and the relative influence among users of different fame. We also utilize the model to estimate a re- sponse series to unseen influence for a video. d d Simulation We can use our learned volume prediction models to sim- ulate a series of views V P (·) from d = 1 to d = T days, where V P (·) stands for views on dth day under a promotion function P (·). For computing views we evolve hidden states as per the Equation 6 and Equation 8 for our models, where the input parameter is defined by the value of function P (·) at various time steps. At the end of each time step, views are computed as per Equation 9 and Equation 7 for RNN-MAS and Volume RNN respectively. We define, ν (P (·)), the cu- mulative views generated by promotion function P (·) from d = 1 to d = T days as: ν (P (·)) = V P (·) d (13) T X d=1 For all our simulations we choose T = 10, 000 days, as this represents ≈ 27 years, longer than lifetime of any YouTube video. 4.1 Response to unseen influence Despite taking into account multiple sources of external in- fluence, there are influence signals that our models, RNN- MAS and volume RNN, do not capture explicitly. Examples include seasonality, or discussions in forums that are known to be an important factor for gaming videos - widely pro- moted on forum www.minecraftforum.net. For understanding this response to unseen influence we set the promotion function P (·) = 0 in our simulation setup described in Section 4 and obtain a series of V P (·)=0 The response series to unseen influence here generalizes previous definitions. In HIP (Rizoiu et al. 2017) external in- fluence u[t], is assumed to be an initial impulse plus a con- stant (Equation 5 in Section 2.4). In this work the shape of response series to latent promotions is unconstrained. In Section 6.1 we present various case studies to illustrate how the response series to unseen influence for our models is able to capture richer temporal trends, such as seasonality. . d Vd = W M AS o (cid:2)hd, hP d(cid:3) (9) intervals by taking into account the promotional volume se- ries; a second component as RPP model as shown in Fig- ure 1a, responsible for modeling the individual promotion series. Intuitively we would like RPP to modulate the re- sponse of volume RNN, to make better predictions for at- tention series. We achieve it by combining the hidden states for individual models just before making the prediction for attention series. We combine individual models as follows: where, hd and hP d are the hidden state for volume RNN and RPP on day d, calculated as per Equation 8 and Equation 6 respectively, shown with arrows coming from RPP model towards the volume RNN model at regular intervals in Fig- ure 1c. We note another plausible setup for joint modeling is at- tention volumes affecting the event rate of RPP. As our main concern is predicting popularity under promotion we do not utilize this setting. 3.4 Model Learning RPP: For fitting our model to a sequence of events S = {ei} where, ei is the ith event such that mi and ti stands for magnitude and time of the ith event, we maximize the log- likelihood of the observed sequence. Using Equation 5 and Equation 6, we can write log-likelihood for sequence as: (10) o hP ti(cid:1) exp(cid:0)W P ti + cτi(cid:1)(cid:21) 1 c o hP exp(cid:0)W P 1 c − λ (τ ) dτ log (λ (ti)) −Z tS SXi=1(cid:20)W P o hP 0 ti + cτi + LL (S) = SXi=1 =⇒ LL (S) = For predicting the time for the next event in sequence we can utilize the relationship between conditional density function of time, f (t), and conditional intensity function (event rate), λ (t) (Daley and Vere-Jones 2008): f (t) = λ (t) exp(cid:18)−Z t ti λ (τ ) dτ(cid:19) (11) In order to predict the next time step,ti+1, where ti is event time for the last observed event, we take the expec- tation in Equation 11 as follows: =⇒ ti+1 =Z ∞ ti t · f (t) dt (12) Volume RNN: For training volume models, we use RMSE as the loss function and each fixed interval data is considered as separate time steps of the given variables. This can be seen as modeling a time-series regression with LSTM. RNN-MAS: For training the joint model, we first train both RPP and volume RNN models independently. After fitting 4.2 Response to unit promotion. In linear time variant (LTI) systems such as HIP, the total gain per unit promotion, ν,is well defined. It's calculated by computing the impulse response (Rizoiu and Xie 2017) of the system. In our models, RNN-MAS and volume RNN, the notion of impulse response does not readily apply as it's a non-linear time variant system. We compute the average response to unit impulse in three steps: compute response of our models to p units of pro- motion to volume RNN at d = 0 days; subtract response to unseen influences, calculated as per Section 4.1; normal- ize it by p. Response to p units of promotion is calculated using function P (d) = p1[d] in simulation setup of Sec- tion 4, where 1[d] takes a value of 1 at d = 0, and 0 oth- erwise. The average response to unit promotion from pro- motion P (d) = p1[d],  (p) named as promotion score, is calculated as:  (p) = ν(p1[d]) − ν(0) p (14) In this definition, promotion score can be negative, captur- ing cases where being promoted decreases popularity (e.g. spam or paid tweets). Also note that (p) is a function of p, i.e. for different simulation parameter p, the average re- sponse to unit promotion is different. This allows us to de- scribe phenomena of diminishing returns in may real-world marketing scenarios (Jones 1990). We examine the effect of p in Section 6.2 and found that (p) tend to decrease as p grows. 4.3 Loudness level Using simulation metrics similar to ϑ and (p), we can mea- sure the influence of an individual or a group of users by the responses generated by their tweeting events. Loudness level is a relative measure of total influence for one or a group of users. It is measured in decibels (dB). It is computed as log-ratio of the response of the target group ψ(S) versus that of a comparison value ψ0. We compute ψ(S) in two steps: calculate ν(P (·)) such that P (·) = {si} in simulation setup of Section 4, where {si} is the set of tweets generated by user group S; subtract response to unseen influences, calculated as per Section 4.1. It can be written as: ψ(S) = ν(si) − ν(0) =⇒ ψdB(S) = log10(cid:18) ψ(S) ψ0 (cid:19) dB (15) where ψ0, the comparison value, is set to 1 for experiments in Section 6.3. As loudness level accounts for all activity generated by a user group, it can be used to compare the relative effects of promotion between users of different fame in Twitter. 5 Predictive Evaluation In this section, we evaluate the performances of predicting the attention that videos receive in the future using RNN- MAS and its variants, against a number of baselines. modeling event data with recurrent point processes. Overview of methods Event prediction. We compare several approaches for pre- dicting either the next event time in a series of events, or the likelihood of a series of future (holdout) events: • RMTPP (Du et al. 2016): State of the art system for • RPP: Our model detailed in Section 3.1, modeling event • PL (Mishra, Rizoiu, and Xie 2016): State of the art model for events data utilizing Hawkes processes. • Exp: variant of PL, that uses an exponential kernel. • Seismic (Zhao et al. 2015): Seminal model based on self exciting processes for predicting event data in social networks. data with LSTM. Volume prediction. We use the following approaches to predict the series of volume of attention that a video receives during the next time-frames: • HIP (Rizoiu et al. 2017): State of the art system for predicting views of video by using daily shares as pro- motions, outperforms linear regression baselines (Pinto, Almeida, and Gonc¸alves 2013) and (Szabo and Huber- man 2010). • VoRNN-S: Our model detailed in Section 3.2 which like • VoRNN-TS: A version of our model detailed in Sec- tion 3.2, using both daily shares and tweets as promo- tions, where tweets are aggregated daily to make it syn- chronous to views and shares series. • RNN-MAS: Our dual RNN model described in Sec- tion 3.3 that combines daily shares with the event series of tweets, modeled as point process by RPP, to make pre- dictions. HIP, uses only daily shares for prediction. Dataset We use three different datasets in our experiments. RMTPP-Syn: synthetic data simulated with same pa- rameters as (Du et al. 2016). It has 100,000 events from an unmarked Hawkes process (Hawkes and Oakes 1974). The conditional intensity for simulated data is given by λ (t) = λo + αPti<t exp(cid:18)− t − ti σ (cid:19) where λo = 0.2, α = 0.8 and σ = 1.0. We use 90% of events for training and rest for testing. Tweet1MO: a real world tweets dataset released by (Zhao et al. 2015), containing all tweets between October 7 to November 7, 2011. Active+tweets: The YouTube videos dataset released by (Rizoiu et al. 2017) containing 13,738 videos. All videos in this dataset were uploaded between 2014-05-29 to 2014- 08-09 and have at least 100 views, 100 shares and 100 tweets. We augment each video with corresponding individ- ual tweets data, emitted during same period. There are in to- tal 30.2 million tweets in the dataset. On average each video is tweeted 2151 times, median video was tweeted 327 times. 5.1 Event Data Results Table 2 lists two prediction tasks, next event time and hold- out likelihood, against competing methods for the task. We (a) (b) (c) Figure 2: (a) Error in estimated next event time for various models on RMTPP-Syn. (b) Absolute Percentile Error(APE) for different approaches on Active dataset. All approaches use shares as promotion, VoRNN-TS and RNN-MAS use extra informa- tion about tweets. (c) two sample fittings where error(APE) for RNN-MAS is 2.01 and 0.13 and error for HIP is 2.3 and 5.1 for videos 'WKJoBeeSWhc' and 'dwM2XFmLEP0' respectively. Table 2: Summary of methods and prediction tasks for event data modelling. Method RMTPP Seismic PL EXP RPP Prediction Type Next Event (RMTPP-Syn) hold-out likelihood (Tweet1MO)           present results for next event time prediction on RMTPP- Syn as Tweet1MO has continuous marks which RMTPP can not model. Seismic can not predict next event time hence we compare performance for hold-out likelihood on Tweet1MO. We make prediction for next event time for RMTPP, PL, Exp and RPP using Equation 12. Figure 2a reports error in prediction as absolute error. We report error for an oracle process that is set to the ground truth parameters generat- ing data. Error for oracle process is difference between the expected values and simulated values. We observe that RPP has lower mean and median error than RMTPP. RPP shows similar mean and median as EXP, indicating RPP is flexible enough to capture influence of past events on future. We compare the negative log-likelihood on hold-out data for RPP and alternatives, lower is better. We vary the fraction of observed events to report results on Tweet1MO in Table 3. We observe RPP performs better than PL and Seismic for all observed fractions. More importantly performance of RPP increases consistently with increase in observed frac- tion, indicating better generalization towards data. Table 3: Results showing mean(median) of negative log- likelihood per event for holdout set for Tweet1MO after ob- serving a part of the cascade. Observed Fraction 0.40 0.50 0.80 PL 8.54(7.87) 8.38(7.96) 9.22(9.29) Seismic 7.62(6.98) 7.44(6.44) 8.02(7.3) RPP 7.46(6.47) 7.26(6.39) 6.97(6.14) 5.2 Volume Prediction Setup. We evaluate our volume prediction approaches in the same a temporal holdout setup employed by (Rizoiu et al. 2017), on the Active+tweets dataset. Four data streams are available for each video in this dataset: the views volume se- ries, the shares volume series, the tweets volume series and the tweet event data series. Each of the models listed in Ta- ble 4 inputs one or several promotion streams (shares and tweets) and predicts the views series stream. First, we train each model using the streams data in the first 90 days, for each video. Next, we forecast the views series during the next 30 days (from day 91 to 120) assuming known the pro- motions streams. Finally, we compute the gained popularity by summing up the views series during the test period. We evaluate performances using the Absolute Percentile Error (APE), computed as in (Rizoiu et al. 2017). Note that out of the approaches in Table 4, RNN-MAS is the only model that can leverage the tweet event data stream for forecasting the futures views series. Figure for Active+tweets Dataset. We observe that VoRNN- TS, outperforms HIP by 7% and 3% for median and mean error, respectively. RNN-MAS performs best with an improvement of 11% and 17% for median and mean error respectively over HIP. We observe an increase in Results. results 2b shows the 2Not used as performance decreases 3.355 2.314 4.338 2.322 4.886 4.937 2.581 2.608 4.377 2.338 Oracle Exp PL RMTPP RPP 14 12 10 02468 Absolute Error 4.09 2.73 4.58 2.75 4.78 2.87 4.95 3.09 RNN-MAS VoRNN-S VoRNN-TS HIP 14 12 10 02468 Absolute Percentile Error Number of shares 80 60 40 0 02 30 20 0 01 WKJoBeeSWhc observed #views #share #tweets RNN-MAS fit HIP fit 0 20 40 60 video age (day) dwM2XFmLEP0 80 100 120 4000 3000 2000 1000 0 Number of views 200000 100000 0 Table 4: Summary of methods used in the volume evalua- tion, and type of promotion data that each approach can use. Method HIP VoRNN-S VoRNN-TS RNN-MAS Type of Promotion Shares Tweets (daily) (daily) Tweets (events)         2   3 performance of RNN-MAS when compared with VoRNN-S whereas for VoRNN-TS performance decreases, despite both models utilizing additional tweets data over shares in VoRNN-S. We are modeling this extra information in VoRNN-TS as volume of tweets wherein in RNN-MAS we utilize the timing (and magnitude) of individual tweets. Results show that timing of events appears to contain information useful for predicting views, hence necessitating a model to jointly model event and volume data. Figure 2c shows two sample fittings, for videos WKJoBeeSWhc and dwM2XFmLEP0 where error(APE) for RNN-MAS is 2.01 and 0.13 and error for HIP is 2.3 and 5.1 respectively. The vertical dashed line divides data into training and testing set of 90 and 30 days respectively. The dashed line shows the real view series where blues line shows the fit by RNN-MAS and magenta shows the fit for HIP. For video WKJoBeeSWhc you could see two different phases, one before 90 days where view series (shown with dashed black line) is showing an inherent upward trend and one after 90 days where this inherent tendency has died. Fit- ting for RNN-MAS (shown in blue) is able to capture this change wherein HIP (shown in magenta) fails. For video dwM2XFmLEP0 performance of HIP is even worse as it is not able to model the view series in accordance with shares (shown in red) and RNN-MAS ably models the response. One explanation is that RNN-MAS captures latent influence better, as shown in Section 6.1. 6 Explaining Popularity In this section, we exemplify how the response series to un- seen influence, and how the metrics promotion score and loudness level described in Section 4 can be used to analyze the popularity of online videos. 6.1 Understanding unseen influence We present case studies on real and simulated data to illus- trate the complex dynamics captured by the response series to unseen influence for our models when compared to HIP. Real data fittings. We show sample fittings for two videos WKJoBeeSWhc and 1hTDORFb5SE in the top row of Fig- ure 3a and Figure 3b respectively. The bottom row of both figures shows the response series to unseen influ- ence for RNN-MAS and HIP. Visibly, RNN-MAS can cap- ture complex dynamics that HIP cannot explain: video WKJoBeeSWhc (Figure 3a) exhibits a delayed response, 3Not used, theoretically it can while 1hTDORFb5SE (Figure 3b) features a seasonal trend. Part of the fitting performance gain of RNN-MAS can be at- tributed to its modeling of the response to unseen influence. Synthetic data. We further investigate on synthetic data the ability of volume RNN models and HIP to uncover seasonal trends. We simulate two sources of promotion for 120 days: the first series has a weekly cyclic component, with a maxi- mum amplitude of 24 units of promotion (shown in the bot- tom row of Figure 4a); the second series contains random promotions with the same maximum amplitude (shown in the middle row of Figure 4a). Using these two promotion series, we simulate the view series using HIP (shown in the top row of Figure 4a). Next, we use the fitting procedure de- scribed in Section 5.2 to train the HIP and the VoRNN-S models on the simulated view series, using only the ran- dom promotion as the external stimulus series. More de- tails on the simulation can be found in the online supple- ment (Mishra, Rizoiu, and Xie 2018). The top row of Figure 4b shows the fitting results for both models. Visibly, the series fitted by VoRNN-S (blue line) fol- lows the simulated views (dashed black lines) more closely than the series fitted by HIP (magenta line). The bottom row of Figure 4b shows the response to unseen promotions, as estimated by VoRNN-S (in blue) and HIP (magenta). We see that VoRNN-S uncovers a cyclic response compatible in phase with the unobserved promotion series. The response of HIP shows a sharp drop followed by a near-zero constant response, due to its simplistic external influence modeling. 6.2 Average unit promotion score HIP was used in (Rizoiu and Xie 2017) to quantify the to- tal amount of attention generated by a single unit of pro- motion – dubbed the virality score ν – for an online pro- motion application. In Figure 3c, we compare the promo- tion score (p) of our models against ν for all the videos in the Active+tweets Dataset. The x-axis shows the promotion score (p) with p = 5, split into 20 percentile bins. The y-axis shows ν in percentiles, summarized us- ing boxplots for each bin. Overall, we observe a strong agreement between (p) and ν – the boxplots are placed around the main diagonal – signifying that RNN-MAS can capture online promotability as well as HIP does. Further- more, we observe a decrease in the value of (p) as p in- creases: the median values are (1) = 263, (5) = 260, (10) = 259. This suggests that, unlike HIP, our models can capture the complex phenomenon of diminishing returns in promotion (Jones 1990). 6.3 User Influence Setup. Bakshy et al (Bakshy et al. 2011) showed that for promoting content on Twitter, the most reliable and cost- effective method is to utilize a group of individuals who have average or even less number of followers. We evaluate the influence of a super user against a cohort of small users. Figure 5a shows the rank versus the number of followers in Active+tweets Dataset. We define a super user as having 21,368 followers, or top 1% of all users; a small user as the median user with 120 followers. The cohort has 178 small users, as the sum total of their followers is comparable (a) (b) (c) Figure 3: (a)(b) Fittings for the attention series (top row) and the response to unseen influence (bottom row) using RNN-MAS and HIP, for two sample videos WKJoBeeSWhc (a) and 1hTDORFb5SE (b). (c) Comparison of HIP's virality score ν (x-axis) against the promotion response of RNN-MAS (p = 5) (y-axis). (a) (b) Figure 4: (a) Simulating a views series with known unobserved influence. A view series (top row) simulated by HIP with two sources of external stimuli: a series of random promotions (middle row) and a cyclic promotion series with weekly spikes (bottom row). (b) Retrieving the reaction to unknown influence through fitting. The simulated views series in (a, top row) is fitted using VoRNN-S and HIP (shown in the top row) using only the observed influence series (middle row). The reaction to unobserved influence (bottom row) is shown for HIP (magenta) and VoRNN-S (blue). (a) (b) (c) Figure 5: (a) Quantile rank versus number of followers of an user on Active+tweets Dataset. The median user has 120 followers whereas a user with 21368 followers is in top 1%. (b) ψdb(super) versus ψdb(small) scatter plot for Nonprofits & Activism videos. For 37% of the videos, super users have greater influence than the small user cohort. (c) View and tweet series for video 6Ga0V1mrZDo,with ψdb(super) = 3.3 and ψdb(small) = 1.3. See Sec 6.3 for discussions. Number of shares 80 60 40 0 02 observed #views #share RNN-MAS fit HIP fit Fitting for WKJoBeeSWhc 20 40 60 video age (day) 80 100 Response series to unseen influence for WKJoBeeSWhc RNN-MAS HIP 20 40 60 Time 80 100 0 0 4000 3000 2000 1000 0 Number of views 750 500 250 0 Views Number of shares 400 300 200 00 01 150000 100000 50000 Fitting for 1hTDORFb5SE observed #views #share RNN-MAS fit HIP fit 0 0 20 40 60 video age (day) 80 100 100000 75000 50000 25000 0 RNN-MAS HIP Response series to unseen influence for 1hTDORFb5SE 0 20 40 60 Time 80 100 Number of views Views 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 Percentile of Promotion Score((5)) with promotion = 5 100 95 90 85 80 75 70 65 60 55 50 45 40 35 30 25 20 15 10 5 PercentileofViralityScore(ν)asgivenbyHIP 200 0 20 0 20 0 0 0 0 simulated #views 20 40 60 80 100 120 observed #promotions 20 40 60 80 100 120 unobserved #promotions 20 40 60 video age (day) 80 100 120 200 0 20 0 200 0 0 20 40 60 80 simulated #views VoRNN-S fit HIP fit 100 120 observed #promotions 0 0 20 20 40 60 video age (day) 80 100 120 VoRNN-S Unseen Response HIP Unseen Response 40 60 video age (day) 80 100 120 Top 1% #followers = 21368.0 median #followers = 120.0 0.4 Quantile Rank of User 0.6 0.8 1.0 0.2 107 106 105 104 103 102 101 #followers Nonprofits & Activism 4.0 3.5 3.0 2.5 2.0 1.5 1.0 0.5 0.0 1.3 1.5 2.0 2.5 3.0 3.5 4.0 Number of tweets 80 60 40 0 02 120 100 0 0 5 10 20 15 25 video age (day) 30 35 40 observed #views #tweets 160 140 6Ga0V1mrZDo 6000 5000 4000 3000 2000 1000 Number of views to a super user. For each video and each user group we gen- erate a series of tweets from the trained RPP model of the video. This series of tweets act as promotions by each user group. The effect for tweet series promotion is captured by metric ψdB for each group as described in Section 4.3. Setup details are described in the supplement (Mishra, Rizoiu, and Xie 2018). Results. Figure 5b shows the value of ψdB for super user against a cohort of small users on all videos in Nonprofits & Activism category. Plots for all categories are in the supple- ment (Mishra, Rizoiu, and Xie 2018). We observe type of content greatly affects the promoting capabilities of the su- per user. For example 37% of Nonprofits & Activism videos (above the green line) have ψdB of super user greater than ψdB of cohort of small users. Whereas for categories HowTo & Style and Gaming more than 50% of videos have a greater ψdB for super user when compared to ψdB for a cohort of small users. We present an example video (6Ga0V1mrZDo) from Non- profits & Activism category in Figure 5c, where ψdB(super) is 3.3 and ψdB(small) is 1.3. The video here is uploaded by PETA, talking about deaths of pigs in slaughter houses. In Figure 5c, not all peaks in tweets corresponds towards the in- crease in views of the video. On examining the data we find that peaks where views and tweets correlates are the points where a super user is part of the tweets. In first peak around day 3, there is a user with 494851 followers. In the third peak around day 12, there is a user with 23561 followers. At two other tweeting peaks, there are cohorts of small users (all with less than 4000 followers) tweeting about the video, but no view count pikes. Presence of super users around peaks in view series corroborates the loudness estimate for this video. 7 Related Work Modeling and predicting popularity using generative models. Popularity modeling (Crane and Sornette 2008; Yu et al. 2016) and prediction (Shen et al. 2014; Zhao et al. 2015; Mishra, Rizoiu, and Xie 2016) has been a partic- ularly fertile field for point-process based generative mod- els. In their seminal work, Crane and Sornette (Crane and Sornette 2008) showed how a Hawkes point-process can ac- count for popularity bursts and decays. Afterwards, more sophisticated models have been proposed to model and sim- ulate popularity in microblogs (Yu et al. 2016). These ap- proaches successfully account for the social phenomena which modulate online diffusion: the "rich-get-richer" phe- nomenon and social contagion. Certain models can output an estimate for the total size of a retweet cascade. Shen et al. (Shen et al. 2014) employed reinforced Poisson pro- cesses, modeling three phenomena: fitness of an item, a temporal relaxation function and a reinforcement mecha- nism. Zhao et al. (Zhao et al. 2015) proposed SEISMIC, which employs a double stochastic process, one account- ing for infectiousness and the other one for the arrival time of events. The model by (Mishra, Rizoiu, and Xie 2016) uses both hawkes process and feature driven methods to pre- dict total tweets for a cascade. HIP (Rizoiu et al. 2017; Rizoiu and Xie 2017), current state of the art, uses volume point process to directly model views of a YouTube video and then extends it for promotion and marketing. (Wang et al. 2017a) recently proposed a method to link macro and micro events of a single time series to do macro prediction, they aggregate the micro time series to get the macro time series. RNN for time series. Recurrent Neural Networks (El- man 1990) in particular its variants LSTM (Hochreiter and Schmidhuber 1997; Graves 2013) and GRU (Chung et al. 2014) are the basic building block of our model. They are basically a sequence learning model that gener- ates the next output in a sequence depending upon its cur- rent input and previous state. They have shown state of the art results in sequence prediction/learning task in fields text (Sutskever, Vinyals, and Le 2014), image (Vinyals et al. 2015), video (Jain et al. 2016) and time-series data (Chandra and Zhang 2012). Recently people have also tried to model point processes (Du et al. 2016; Xiao et al. 2017; Wang et al. 2017b) with RNNs. Recent work by (Cao et al. 2017; Li et al. 2017) used RNNs for modeling end to end predic- tion of information cascades in presence of a single source of events. The main difference in our model with any existing work is the use of two different streams of data, one is volume and other is event series, about a single event. Although HIP (Ri- zoiu et al. 2017; Rizoiu and Xie 2017) uses two series but in- stead of using event series as it is they aggregate it and report worse performance then using only the macro series. Recent work by (Wang et al. 2017a) and (Xiao et al. 2017) com- bines asynchronous streams, but they aggregate exogenous individual events at fixed intervals rather than considering a separate exogenous volume stream. Influence of users of different fame. (Cha et al. 2010; Romero et al. 2011) showed in their work that influence dif- fers for users with topics and high number of followers is not related to high influence in a network. Work by (Bak- shy et al. 2011) has shown that a cohort of small users are as powerful as a big user in case of information diffusion on Twitter whereas work by (Budak, Agrawal, and El Abbadi 2011) has shown that in cases for limiting misinformation in network targeting big users is more beneficial. To the best of our knowledge there exists no prior work in estimating a user influence across network boundaries. Our proposed metric, loudness level, along with joint model, RNN-MAS, helps us to estimate the influence of a Twitter user in spreading content on YouTube. 8 Conclusion This paper proposed RNN-MAS, a model for predicting popularity under the influence of multiple heterogeneous asynchronous streams – namely tweets and volumes of shares for a YouTube video. With this model, we demon- strated superior performance on forecasting popularity on a large-scale YouTube video collection. We further design two new measures, to explain the viral potential of videos, an- other to uncover latent influences including seasonal trends. One important application of such model is to compare ef- fects of different kinds of promotions. We propose a new metric, dubbed loudness, to quantify the relative effective- ness of user groups. We show that superusers and grassroot are effective in different content types. While neural network are expressive function approxima- tors that can learn nonlinear relations between input and out- put series, RNN-MAS does not model temporal dynamics drifts or finite population effects. We hope to extend this work to allow different items to share parts of the model, and eventually make better predictions as early as possible in a digital item's lifetime. Acknowledgments This material is based on research sponsored by the Air Force Research Laboratory, under agreement number FA2386-15-1-4018. We thank the National Computational Infras- tructure (NCI) for providing computational resources, supported by the Australian Government. References Bakshy, E.; Hofman, J. M.; Mason, W. A.; and Watts, D. J. 2011. Everyone's an influencer. In WSDM '11. Budak, C.; Agrawal, D.; and El Abbadi, A. 2011. Limiting the spread of misinformation in social networks. In WWW '11. Cao, Q.; Shen, H.; Cen, K.; Ouyang, W.; and Cheng, X. 2017. Deephawkes: Bridging the gap between prediction and understand- ing of information cascades. In CIKM'17. Cha, M.; Haddadi, H.; Benevenuto, F.; and Gummadi, K. P. 2010. Measuring user influence in twitter: The million follower fallacy. In ICWSM '10. Chandra, R., and Zhang, M. 2012. Cooperative coevolution of elman recurrent neural networks for chaotic time series prediction. Neurocomputing. Cheng, J.; Adamic, L.; Dow, P. A.; Kleinberg, J. M.; and Leskovec, J. 2014. Can cascades be predicted? In WWW '14. Chung, J.; Gulcehre, C.; Cho, K.; and Bengio, Y. 2014. Empiri- cal Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. ArXiv e-prints. Crane, R., and Sornette, D. 2008. Robust dynamic classes revealed by measuring the response function of a social system. PNAS '08 105(41). Daley, D. J., and Vere-Jones, D. 2008. An introduction to the theory of point processes. Vol. I, volume I. Du, N.; Song, L.; Gomez Rodriguez, M.; and Zha, H. 2013. Scal- able influence estimation in continuous-time diffusion networks. In NIPS. Du, N.; Dai, H.; Trivedi, R.; Upadhyay, U.; Gomez-Rodriguez, M.; and Song, L. 2016. Recurrent marked temporal point processes: Embedding event history to vector. In KDD '16. Elman, J. L. 1990. Finding structure in time. COGNITIVE SCI- ENCE 14(2). Filimonov, V., and Sornette, D. 2013. Apparent criticality and calibration issues in the Hawkes self-excited point process model: application to high-frequency financial data. arXiv preprint. Graves, A. 2013. Generating Sequences With Recurrent Neural Networks. ArXiv e-prints. Hawkes, A. G., and Oakes, D. 1974. A Cluster Process Represen- tation of a Self-Exciting Process. J. Appl. Probab. '74 11(3). Hawkes, A. G. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika 58(1). Helmstetter, A., and Sornette, D. 2002. Subcritical and super- critical regimes in epidemic models of earthquake aftershocks. J GEOPHYS RES-SOL EA '02 107(B10). Hochreiter, S., and Schmidhuber, J. 1997. Long short-term mem- ory. Neural Comput. 9(8). Jain, A.; Singh, A.; Koppula, H. S.; Soh, S.; and Saxena, A. 2016. Recurrent neural networks for driver activity anticipation via sensory-fusion architecture. ICRA. Jones, J. 1990. The double jeopardy of sales promotions. Harvard business review 68(5):145152. Li, C.; Ma, J.; Guo, X.; and Mei, Q. 2017. Deepcas: An end-to-end predictor of information cascades. In WWW'17. Martin, T.; Hofman, J. M.; Sharma, A.; Anderson, A.; and Watts, D. J. 2016. Exploring limits to prediction in complex social sys- tems. In WWW '16. Mishra, S.; Rizoiu, M.-A.; and Xie, L. 2016. Feature Driven and Point Process Approaches for Popularity Prediction. In CIKM '16. Mishra, S.; Rizoiu, M.-A.; and Xie, L. 2018. Modeling popu- larity in asynchronous social media streams with recurrent neural networks. ArXiv e-prints. Pinto, H.; Almeida, J. M.; and Gonc¸alves, M. A. 2013. Using early view patterns to predict the popularity of youtube videos. In WSDM '13. ACM Press. Rizoiu, M.-A., and Xie, L. 2017. Online popularity under pro- motion: Viral potential, forecasting, and the economics of time. In ICWSM'17. Rizoiu, M.-A.; Xie, L.; Sanner, S.; Cebrian, M.; Yu, H.; and Van Hentenryck, P. 2017. Expecting to be HIP: Hawkes intensity pro- cesses for social media popularity. In WWW'17. Romero, D. M.; Galuba, W.; Asur, S.; and Huberman, B. A. 2011. Influence and passivity in social media. In WWW'11. Shen, H.-W.; Wang, D.; Song, C.; and Barab´asi, A.-L. 2014. Mod- eling and Predicting Popularity Dynamics via Reinforced Poisson Processes. In AAAI '14. Sutskever, I.; Vinyals, O.; and Le, Q. V. 2014. Sequence to se- quence learning with neural networks. In NIPS'14. Szabo, G., and Huberman, B. A. 2010. Predicting the popularity of online content. Communicat. of the ACM 53(8). Vinyals, O.; Toshev, A.; Bengio, S.; and Erhan, D. 2015. Show and tell: A neural image caption generator. CVPR'15. Wallinga, J., and Teunis, P. 2004. Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control measures. Am J Epidemiol '04 160(6). Wang, Y.; Ye, X.; Zhou, H.; Zha, H.; and Song, L. 2017a. Linking Micro Event History to Macro Prediction in Point Process Models. In AISTATS'17. Wang, Y.; Liu, S.; Shen, H.; Gao, J.; and Cheng, X. 2017b. Marked temporal dynamics modeling based on recurrent neural network. PAKDD'17. Xiao, S.; Yan, J.; Yang, X.; Zha, H.; and Chu, S. M. 2017. Mod- eling the Intensity Function of Point Process Via Recurrent Neural Networks. AAAI'17. Yu, L.; Cui, P.; Wang, F.; Song, C.; and Yang, S. 2016. Uncovering and predicting the dynamic process of information cascades with survival model. Know. and Inf. Syst. Yu, H.; Xie, L.; and Sanner, S. 2015. The lifecyle of a youtube video: Phases, content and popularity. In ICWSM'15. Zhao, Q.; Erdogdu, M. A.; He, H. Y.; Rajaraman, A.; and Leskovec, J. 2015. SEISMIC: A Self-Exciting Point Process Model for Pre- dicting Tweet Popularity. In KDD '15.
1910.09114
1
1910
2019-10-21T02:13:18
Using machine learning and information visualisation for discovering latent topics in Twitter news
[ "cs.SI", "cs.IR" ]
We propose a method to discover latent topics and visualise large collections of tweets for easy identification and interpretation of topics, and exemplify its use with tweets from a Colombian mass media giant in the period 2014--2019. The latent topic analysis is performed in two ways: with the training of a Latent Dirichlet Allocation model, and with the combination of the FastText unsupervised model to represent tweets as vectors and the implementation of K-means clustering to group tweets into topics. Using a classification task, we found that people respond differently according to the various news topics. The classification tasks consists of the following: given a reply to a news tweet, we train a supervised algorithm to predict the topic of the news tweet solely from the reply. Furthermore, we show how the Colombian peace treaty has had a profound impact on the Colombian society, as it is the topic in which most people engage to show their opinions.
cs.SI
cs
Using machine learning and information visualisation for discovering latent topics in Twitter news Vladimir Vargas-Calder´on1[0000−0001−5476−3300], Marlon Steibeck Dominguez2, N. Parra-A.1[0000−0002−1829−4399], Herbert Vinck-Posada1, and Jorge E. Camargo3 1 Grupo de Superconductividad y Nanotecnolog´ıa, Departamento de F´ısica, Universidad Nacional de Colombia, AA 055051, Bogot´a, Colombia {vvargasc, nparraa, hvicnkp}@unal.edu.co 2 Facultad de Ingenier´ıa, Unipanamericana Fundaci´on Universitaria, 111321, Bogot´a, Colombia [email protected] 3 Departamento de Ingenier´ıa de Sistemas e Industrial, Universidad Nacional de Colombia, AA 055051, Bogot´a, Colombia [email protected] Abstract. We propose a method to discover latent topics and visualise large collections of tweets for easy identification and interpretation of topics, and exemplify its use with tweets from a Colombian mass media giant in the period 2014 -- 2019. The latent topic analysis is performed in two ways: with the training of a Latent Dirichlet Allocation model, and with the combination of the FastText unsupervised model to represent tweets as vectors and the implementation of K-means clustering to group tweets into topics. Using a classification task, we found that people re- spond differently according to the various news topics. The classification tasks consists on the following: given a reply to a news tweet, we train a supervised algorithm to predict the topic of the news tweet solely from the reply. Furthermore, we show how the Colombian peace treaty has had a profound impact on the Colombian society, as it is the topic in which most people engage to show their opinions. Keywords: latent topic analysis · text mining · information visualisa- tion · machine learning. 1 Introduction Social interaction on social networks has been a central research topic during the last decade. It has applications in modernisation of government's Twitter- based networking strategies [7,22,23,11,21], e-commerce [13,16,27] and business performance [5,9]. Of particular interest is the study of how people respond to a stimulus, forming either strong collective responses or weak, isolated responses. For example, [4,19], studied users' influence in microblogging networks, where implementing the InfluenceRank Algorithm for identifying people with high so- cial media influence can be of great commercial value. An interesting area within 2 V. Vargas-Calder´on et al. the stimulus -- response field in social networks is the response of people to the news. In the case of Twitter, it has been identified since its early days as a news-spreading social network [12] where mass media are central actors. Pre- vious work in this area is typically focused on topics such as sports, politics, health, education, travel, business, and so on [14,28,1,6]. In this work, we inquire on the recognition of the semantic structure of peo- ple's response to news tweets by one of the largest Colombian news mass media, Radio Cadena Nacional (RCN), with (7,7 million followers by August 2019). If there is a distinction between how people respond to different kinds of news, then state of the art natural language processing and machine learning tech- niques should be able to detect this difference. Therefore, we propose a two- stage pipeline to investigate the claimed differences. During the first stage, topic analysis is performed over the tweets by RCN, showing the main latent topics that they tweet about. In the second stage, we take the comments by regular users to those tweets and ask ourselves if it is possible to predict which is the topic of the tweet they are responding to. Our research is two-folded. On the one hand, we investigate the characterisation of how people respond to news from different topics. On the other hand, we pay particular attention to one of the most critical social phenomena of the past decade worldwide: the response by Colombian population to the peace treaty between the Colombian government and the Colombian Revolutionary Armed Forces guerrilla (FARC) [25]. These two entities were in a war for over 50 years, a conflict responsible for hundreds of thousands of deaths and millions of people forced from their homes, and being one of the largest human tragedies of modern times [3]. This paper is divided as follows: in Section 2 we describe in detail the dataset that we used to carry out our study as well as the workflow of the proposed method. In Section 3, we present the results and analysis of the research. Finally, the main conclusions and future work are presented in Section 4. 2 Method and Materials In this section, we describe in detail the two stages of our research: a topic modelling and a topic prediction stage. The work pipeline is shown in Fig 1. We collected tweets from the Twitter account @NoticiasRCN from 2014 to the present using the Twitter API. During this period, the mass media giant published 258,848 tweets, having 1,447,440 comments from their public. Then, we proceeded to pre-process our tweet database. We removed punctuation, links, hashtags and mentions from all the tweets. We further lemmatised the text in lowercase. With the pre-processed data, we trained topic modelling algorithms in order to discover topics in the tweet corpus. Particularly we used the Latent Dirich- let Allocation (LDA) model [8] and a combination of unsupervised FastText model [2,10] and K-Means clustering [15]. LDA assigns K probabilities to a tweet of belonging to K different classes. The classes are learnt in an unsupervised fashion from the co-occurrence of words A visual analytic model for news in Twitter 3 Fig. 1: Overview of the proposed method. We crawl tweets from @NoticiasRCN Twitter account. Then, pre-processing is made over this set of tweets. After that, two different unsupervised topic models are trained, from which visualisations of the tweets only from @NoticiasRCN can be built. We use the discovered latent topics to label comments to @NoticiasRCN tweets. Finally, we train a supervised FastText model to predict the topics of the comments. within the tweets of the corpus. Each of the classes is called a latent topic. Therefore, the K probabilities assigned to a tweet by LDA can be interpreted as a vector of K components, where the k-th one shows the content percentage of the k-th topic in a tweet. The number of latent topics K is a parameter that one provides to the model. In principle, each latent topic corresponds to a topic a human would understand. However, if a low number of latent topics is provided, each latent topic may contain several real topics. On the other hand, if a high number of latent topics is provided, many latent topics may refer to the same real topic. To keep a good correspondence between latent topics and human-understandable topics or real topics, the number of latent topics should be carefully selected. Refs. [20,24] have shown that the best way to pick the number of latent topics is by measuring the CV coherence, which has shown a large correlation with human judgements of the interpretability of the topics 4 V. Vargas-Calder´on et al. extracted by LDA. For the @NoticiasRCN tweets, the optimum number of latent topics is 12, as it is shown in Fig 2. Fig. 2: CV coherence as a function of number of topics for an LDA model trained with tweets from @NoticiasRCN. For each number of topics, a total of 20 LDA training runs were performed, and bars indicate a standard deviation of the corresponding 20 measured CV coherences. The other topic modelling algorithm consisted of training an unsupervised FastText model and performing K-means clustering on the unsupervised learnt vector representations for the tweets in the corpus. FastText is a memory-efficient and fast vector embedding algorithm based on the ideas of Word2Vec [18]. An important remark is that FastText uses sub-word information to enrich word vectors. This is particularly useful in a language such as Spanish, because it is largely inflected. What vector embedding algorithms do is to represent text as vectors of N components. Again, based on the co-occurrence of words or se- quences of characters, FastText assigns N -dimensional vectors to each tweet. Here, the components do not have a human interpretation, as they embody ab- stract semantic features of the tweets. Once the embedded vectors for each tweet are learnt from FastText, the K-means clustering algorithm is used to group vectors in the embedded vector space. This combination of a vector embedding algorithm and a clustering algorithm has been used before with excellent results in unsupervised community detection models [26]. In order to compare both topic modelling algorithms (LDA and FastText + K-means), we used K-means to form 12 clusters, where each one represents a latent topic. After that, we labelled the comments to the news tweets. Let t(i) N be a news tweet from @NoticiasRCN indexed by i, which runs from 1 to M , the total number of news tweets. Let t(ji) C be a comment made by some Twitter user to the news tweet t(i) , where N (i) is the total number of comments to the i-th news tweet t(i) N . Then, we created a labelled comment dataset for each of the two considered topic modelling algorithms as N indexed by ji, which runs from 1i to N (i) i 234567891011121314151617181920212223242526272829Number of topics0.150.200.250.300.35CV coherence A visual analytic model for news in Twitter 5 follows,(cid:26)(cid:16) (cid:16) (cid:17) , (cid:96)1, t(21) C (cid:17) , . . . , (cid:96)1, t(11) C (cid:18) (cid:96)1, t(N (1) 1 ) C (cid:19) (cid:18) , . . . , (cid:96)M , t(N (M ) M ) C (cid:19)(cid:27) , (1) where (cid:96)i is the latent topic (from either LDA or FastText + K-means) assigned to the i-th news tweet t(i) N . Recall that (cid:96)i is one of the 12 different latent topics. From the vector representation of the tweets built with the unsupervised FastText model, we generated visualisations of the tweets in a 2D map. To do this, we applied a state of the art dimensionality reduction model called the Uniform Manifold Approximation and Projection (UMAP) [17]. UMAP learns topological relations between the FastText vectors of N components and finds representative projections of the data onto a two-dimensional vector space. Finally, a supervised FastText model is trained to learn to predict the labels (cid:96)i (provided by the two topic modelling algorithms) from the vector representations of the tweets t(ji) C , which are efficiently learnt by FastText. 3 Results and Discussion After performing an LDA analysis on the news tweets, each news tweet was assigned a 12 component probability vector. We built the visualisation of such tweets by selecting the tweets that better represented each latent topic. To do this, we imposed a probability threshold on the LDA probability vectors. Tweets whose maximum LDA probability for some topic is above this threshold are called representative tweets for the corresponding latent topic. For a threshold of 0.8, Fig 3 shows an annotated visualisation of the most representative tweets. A couple of clusters are not annotated since their topic is not unique or simply not clear. Concerning the FastText and K-means combination, a different selection mechanism for representative tweets was taken into account. K-means groups news tweets geometrically, building 12 vectors called the cluster centroids. We define the most representative tweets of each cluster as the set of tweets grouped in a cluster nearest to its corresponding centroid. Therefore, after defining a max- imum distance threshold, we can visualise the clusters and their corresponding representative tweets. Note that this threshold does not have a probabilistic in- terpretation, and is in general different for different datasets, depending on the mean distance between the data points. In our case, the visualisation is shown in Fig. 4. Topics were easier to identify, and the visualisation shows clear clus- ters well-separated from the others. In terms of visualisation, the FastText + K-means technique is superior for our case study. Now, we focus on the second stage of our research, where we predict the topic of a news tweet from a comment to that tweet. The precision and recall at k = 1, . . . , 10 are shown in Fig. 5. From the results at k = 1 it is clear that for both LDA and FastText + K-means, the precision and recall are well-above the expected result of a random classifier. Again, FastText + K-means performs better. Of course, as k gets larger, recall increases and precision decreases. 6 V. Vargas-Calder´on et al. Fig. 3: Visualisation of topics discovered with LDA. Fig. 4: Visualisation of topics discovered with the combination of unsupervised FastText and K-means clustering. Remarkably, having a 40% precision and recall at 1 means that there is a difference between how people respond to different topics. This result is quite good considering that topics were discovered with unsupervised learning, and that documents for classification are single tweets. This difference in response can be further examined with a histogram of the impact caused in the public by each latent topic. We do so only considering the FastText + K-means method, Venezuela/Peace treatyCorruptionSports (cycling)AdvertisementSports (football)Organised/commoncrimeExtreme violenceAccidents/NaturaldissastersInternationalEconomySportsArt/CelebritiesAdvertisementInternational(USA and Venezuela)Peace treaty politicsColombian Armed ConflictEconomy/CommerceExtreme violenceOrganised/commoncrimeAccidents/InternationaldissastersNatural/provokeddissastersPolitics A visual analytic model for news in Twitter 7 (a) LDA (b) FastText + K-means Fig. 5: Precision and Recall at k = 1, . . . , 10 for the LDA and FastText + K- means topic modelling algorithms. as it has consistently shown to yield better results. Fig. 6 shows that the topic identified as peace treaty politics is by far the more engaging one, having the most number of likes, retweets and replies per news tweet related to that topic. Therefore, our analysis confirms that the peace treaty has been the phenomenon with the largest impact on Colombian society. 4 Conclusions and Future Work We presented two methods to automatically detect latent topics in news tweets and assess how significant were the differences between the response from the public to tweets from different topics. The first method consisted on discovering latent topics using the widely used LDA model. The second method consisted on generating embedded vectors with FastText and performing K-means clustering on those vectors. We visualised the most representative tweets for each latent topic using both methods and showed that the FastText + K-means method was superior both in the visualisation and in the interpretability of the topics. Also, using the comments to the news tweets, we trained a supervised Fast- Text method to predict the topic of a news tweet from a comment of that tweet. Again, the better results were obtained with the FastText + K-means method, yielding 40% precision and recall at 1 in a 12-class classification problem. The examination of the impact of each topic on the news Twitter account followers revealed that the topic identified as peace treaty politics was the most relevant topic, having the most number of likes, retweets and replies per news tweet, compared to the other topics. We intend in the future to perform a sentiment analysis on the followers response in order to measure controversiality of topics as well as study which topics evoke positive/negative sentiment in the public. 246810k0.20.40.60.8Precision@[email protected]@kRecall@k 8 V. Vargas-Calder´on et al. Fig. 6: Bar plot of number of likes, replies and retweets for the set of all news tweets belonging to each latent topic discovered by the FastText + K-means method. References 1. Almutairi, N., Alhabash, S., Hellmueller, L., Willis, E.: The effects of twit- ter users' gender and weight on viral behavioral intentions toward obesity- related news. Journal of Health Communication 23(3), 233 -- 243 (2018). https://doi.org/10.1080/10810730.2018.1423648, pMID: 29388884 2. Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. arXiv preprint arXiv:1607.04606 (2016) 3. Cely, D.M.F.: Grupo de memoria hist´orica,¡ basta ya! colombia: Memorias de guerra y dignidad (bogot´a: Imprenta nacional, 2013), 431 pp. 1. Historia y so- ciedad (26), 274 -- 281 (2014) 4. Chen, W., Cheng, S., He, X., Jiang, F.: Influencerank: An efficient social in- fluence measurement for millions of users in microblog. In: 2012 Second In- AdvertisementPeace treaty politicsPoliticsColombian Armed ConflictSportsArt/CelebritiesAccidents/InternationaldissastersExtreme violenceInternational(Usa and Venezuela)Natural/provoked dissastersOrganised/common crimeEconomy/CommerceCluster0510152025ValueVariableLikes Replies Retweets A visual analytic model for news in Twitter 9 ternational Conference on Cloud and Green Computing. pp. 563 -- 570 (2012). https://doi.org/10.1109/CGC.2012.31 5. Culnan, M.J., McHugh, P.J., Zubillaga, J.I.: How large u.s. companies can use twitter and other social media to gain business value. MIS Quarterly Executive 9 (2010) 6. Garrett, R.K.: tions https://doi.org/10.1371/journal.pone.0213500 political mispercep- in u.s. presidential elections. PLOS ONE 14(3), 1 -- 16 (03 2019). Social media's contribution to 7. Golbeck, J., Grimes, J.M., Rogers, A.: Twitter use by the u.s. congress. Journal of the American Society for Information Science and Technology 61(8), 1612 -- 1621 (2010). https://doi.org/10.1002/asi.21344 8. Hoffman, M.D., Blei, D.M., Bach, F.: Online learning for latent dirichlet allocation. In: Proceedings of the 23rd International Conference on Neural Information Pro- cessing Systems - Volume 1. pp. 856 -- 864. NIPS'10, Curran Associates Inc., USA (2010) 9. Ioanid, A., Scarlat, C.: Factors influencing social networks use for business: Twitter and youtube analysis. Procedia Engineering 181, 977 -- 983 (2017). https://doi.org/https://doi.org/10.1016/j.proeng.2017.02.496, 10th International Conference Interdisciplinarity in Engineering, INTER-ENG 2016, 6-7 October 2016, Tirgu Mures, Romania 10. Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759 (2016) 11. Kim, S.K., Park, M.J., Rho, J.J.: Effect of the government's use of social media on the reliability of the government: Focus on twitter. Public Management Review 17(3), 328 -- 355 (2015). https://doi.org/10.1080/14719037.2013.822530 12. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. pp. 591 -- 600. WWW '10, ACM, New York, NY, USA (2010). https://doi.org/10.1145/1772690.1772751 13. ling Lai, L.S.: Social commerce -- e-commerce in social media context (2010) 14. Lee, K., Palsetia, D., Narayanan, R., Patwary, M.M.A., Agrawal, A., Choud- hary, A.: Twitter trending topic classification. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops. pp. 251 -- 258. ICDMW '11, IEEE Computer Society, Washington, DC, USA (2011). https://doi.org/10.1109/ICDMW.2011.171 15. Lloyd, S.: Least squares quantization in pcm. IEEE transactions on information theory 28(2), 129 -- 137 (1982) 16. Mata, F.J., Quesada, A.: Web 2.0, social networks and e-commerce as marketing tools. Journal of theoretical and applied electronic commerce research 9, 56 -- 69 (2014) 17. McInnes, L., Healy, J., Melville, J.: UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. ArXiv e-prints (Feb 2018) 18. Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed repre- sentations of words and phrases and their compositionality. In: Advances in neural information processing systems. pp. 3111 -- 3119 (2013) 19. Nargundkar, A., Rao, Y.S.: to measure influence of on Recent Trends https://doi.org/10.1109/ICRTIT.2016.7569535 Influencerank: A machine learning approach In: 2016 International Conference in Information Technology (ICRTIT). pp. 1 -- 6 (2016). twitter users. 10 V. Vargas-Calder´on et al. 20. Roder, M., Both, A., Hinneburg, A.: Exploring the space of topic coherence mea- sures. In: Proceedings of the Eighth ACM International Conference on Web Search and Data Mining. pp. 399 -- 408. WSDM '15, ACM, New York, NY, USA (2015). https://doi.org/10.1145/2684822.2685324 21. de Rosario, A.H., S´aez-Mart´ın, A., del Carmen Caba-P´erez, M.: Using social media to enhance citizen engagement with local government: Twitter or facebook? New Media & Society 20(1), 29 -- 49 (2018). https://doi.org/10.1177/1461444816645652 22. Small, T.A.: e-government in the age of social media: An analysis of the cana- dian government's use of twitter. Policy & Internet 4(3-4), 91 -- 111 (2012). https://doi.org/10.1002/poi3.12 23. Sobaci, M.Z., Karkin, N.: The use of twitter by mayors in turkey: Tweets for better public services? Government Information Quarterly 30(4), 417 -- 425 (2013). https://doi.org/https://doi.org/10.1016/j.giq.2013.05.014 24. Syed, S., Spruit, M.: Full-text or abstract? examining topic coherence scores using latent dirichlet allocation. In: 2017 IEEE International Conference on Data Science and Advanced Analytics (DSAA). pp. 165 -- 174 (Oct 2017). https://doi.org/10.1109/DSAA.2017.61 25. Tellez, J.F.: Peace agreement design and public support for peace: Evidence from colombia. Journal of Peace Research 0(0), 0022343319853603 (2019). https://doi.org/10.1177/0022343319853603 26. Vargas-Calder´on, V., Camargo, J.E.: Characterization of citizens using word2vec and latent topic analysis in a large set of tweets. Cities 92, 187 -- 196 (2019) 27. Zhao, W.X., Li, S., He, Y., Chang, E.Y., Wen, J., Li, X.: Connecting social media to e-commerce: Cold-start product recommendation using microblogging information. IEEE Transactions on Knowledge and Data Engineering 28(5), 1147 -- 1159 (2016). https://doi.org/10.1109/TKDE.2015.2508816 28. Zhao, W.X., Jiang, J., Weng, J., He, J., Lim, E.P., Yan, H., Li, X.: Comparing twitter and traditional media using topic models. In: Clough, P., Foley, C., Gurrin, C., Jones, G.J.F., Kraaij, W., Lee, H., Mudoch, V. (eds.) Advances in Information Retrieval. pp. 338 -- 349. Springer Berlin Heidelberg, Berlin, Heidelberg (2011)
1508.05044
1
1508
2015-08-20T16:55:42
Cultures in Community Question Answering
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
CQA services are collaborative platforms where users ask and answer questions. We investigate the influence of national culture on people's online questioning and answering behavior. For this, we analyzed a sample of 200 thousand users in Yahoo Answers from 67 countries. We measure empirically a set of cultural metrics defined in Geert Hofstede's cultural dimensions and Robert Levine's Pace of Life and show that behavioral cultural differences exist in community question answering platforms. We find that national cultures differ in Yahoo Answers along a number of dimensions such as temporal predictability of activities, contribution-related behavioral patterns, privacy concerns, and power inequality.
cs.SI
cs
Cultures in Community Question Answering [Please cite the Hypertext’15 version of this paper] Imrul Kayes University of South Florida Tampa FL, USA [email protected] Nicolas Kourtellis Telefonica Research Barcelona, Spain [email protected] Daniele Quercia University of Cambridge Cambridge, United Kingdom [email protected] Adriana Iamnitchi University of South Florida Tampa FL, USA [email protected] Francesco Bonchi Yahoo Labs Barcelona, Spain [email protected] ABSTRACT CQA services are collaborative platforms where users ask and answer questions. We investigate the influence of na- tional culture on people’s online questioning and answering behavior. For this, we analyzed a sample of 200 thousand users in Yahoo Answers from 67 countries. We measure em- pirically a set of cultural metrics defined in Geert Hofstede’s cultural dimensions and Robert Levine’s Pace of Life and show that behavioral cultural differences exist in community question answering platforms. We find that national cul- tures differ in Yahoo Answers along a number of dimensions such as temporal predictability of activities, contribution- related behavioral patterns, privacy concerns, and power in- equality. Categories and Subject Descriptors K.4.0 [Computers and Society]: General; J.4 [Social and Behavioural Sciences]: Sociology Keywords Community question answering; cultures; crowdsourcing 1. INTRODUCTION Cultural differences exist in almost all aspects of social interactions. For example, in some cultures in Asia it may be considered disrespectful for people to express their opinions or ask questions to authority figures (e.g., teachers, elders). In other cultures (such as USA or Canada) asking questions is expected or even encouraged. Cross-country cultural variations have been studied in the real world via small-scale experiments and opinion surveys. Geert Hofstede [13] administered opinion surveys to a large number of IBM employees from different countries in the 1960s and 1970s. He discovered five cultural dimensions (individualism, power distance, uncertainty avoidance, mas- culinity, and long term orientation), that can be attributed to the existence of cultural variations. Three of these di- mensions, individualism, power distance, and uncertainty avoidance, have been used to assess cultural differences in online contexts such as Twitter communication [8], emoticon usage [27] and online scheduling [30]. In brief, individual- ism reflects the extent to which an individual is integrated into a group (e.g., individualistic cultures like USA empha- sizes mostly on their individual goals, as opposed to col- lectivist cultures like China that emphasizes on group har- mony and loyalty). Power distance is the extent to which the less powerful members of an organization or society expect and accept that power is distributed unequally (e.g., in high power distance countries subordinates simply comply with their leaders). Uncertainty avoidance defines the extent to which society members feel uncomfortable with uncertainty and ambiguity (e.g., the stereotypical Swiss plans everything ahead supposedly to avoid uncertainty). Psychologist Robert V. Levine [21] proposed the Pace of Life metric based on the walking speed of city people over a distance of 60 feet, the service time for standard requests for stamps, and the clock accuracy of city banks. During the 1990s, Levine employed 19 experimenters in large cities from 31 countries and computed country-specific Pace of Life ranks. He found significant differences in Pace of Life across cultures and ranked the cultures based on that. Such cross-cultural variations that sociologists and psy- chologists already found in the offline world lead to our main research question: Does national culture determine how we participate in online Community Question Answer- ing (CQA) platforms? CQAs such as Yahoo Answers (YA), Quora and Stack Overflow have been popular in the last decade. These platforms are rich and mature repositories of user-contributed questions and answers. For example, YA, launched in December 2005, has more than one billion posted answers,1 and Quora, one of the fastest growing CQA sites has seen three times growth in 2013.2 National cross-cultural variations have been studied in a number of online contexts, including social networks (e.g., Twitter [10], Facebook [29]), location search and discov- ery (e.g., Foursquare [34]) and online scheduling (e.g., Doo- dle [30]). While CQA platforms have been intensively stud- ied [32, 6, 28, 16], to the best of our knowledge, there has been no study focusing on users’ cultural differences and how they shape asking, answering, or reporting abuses in CQA platforms. If cultural variations exist in CQA platforms, they could be used for more informed system design, includ- 1http://www.yanswersbloguk.com/b4/2010/05/04/1- billion-answers-served/ 2http://www.goo.gl/MfK83y ing question recommendation, follow recommendation, and targeted ads. To fill this gap, we analyzed about 200 thousand sam- pled YA users from 67 countries who were active between 2012 and 2013. We tested a number of hypotheses associ- ated with Hofstede’s cultural dimensions and Levine’s Pace of Life. Our results show that YA is not a homogeneous sub- cultural community: considerable behavioral differences ex- ist between the users from different countries. We find that users from individualistic countries provide more answers, have higher contribution than take away, and are more con- cerned about their privacy than those from collective cul- tures. Users from individualistic countries are also less likely to provide an answer that violates community norms. We also find that higher power distance countries show more indegree imbalance in following relationships compared to lower power distance countries. Finally, we find that users from higher Pace of Life and lower uncertainty avoidance countries have more temporally predictable activities. The rest of the paper is structured as follows. Section 2 discusses previous analysis of CQA platforms and the exist- ing body of work on online cultural variations. Section 3 presents the YA functionalities relevant to this study and the dataset used. We introduce the hypotheses and present the results relating to Levine’s Pace of Life and Hofstede’s cultural dimensions in YA in Section 4 and Section 5, respec- tively. We discuss the impact of these results in Section 6. 2. RELATED WORK Golder and Macy [10] studied collective mood in Twit- ter across countries from 509 million Twitter posts by 2.4 million users over a 2-year period. Despite having differ- ent cultures, geographies, and religions, all countries (USA, Canada, UK, Australia, India, and English-speaking Africa) in their study showed similar mood rhythms—people tended to be more positive on weekends and early in the morning. Park et al. [27] examined the variation of Twitter users’ emoticon usage patterns in cross cultures. They used Hofst- ede’s national culture scores of 78 countries and found that collectivist cultures favor vertical and eye-oriented emoti- cons, where people within individualistic cultures favor hor- izontal and mouth-oriented emoticons. Hofstede’s cultural dimensions have also been used to study whether culture of a country is associated with the way people use Twitter [9]. In another study on cross-country Twitter communication, Garcia et al. showed that cultural variables such as Hofst- ede’s indices, language and intolerance have an impact on Twitter communication volume [8]. Silva et al. [34] used food and drink check-ins in Foursquare to identify cultural boundaries and similarities across pop- ulations. They showed that online footprints of foods and drinks are good indicators of cultural similarities between users, e.g., lunch time is the perfect time for Brazilians to go for slow food places more often, whereas Americans and English people go for slow foods more at dinner time. Ex- tracted features like these allow them to apply simple clus- tering algorithms such as K-means to draw cultural bound- aries across the countries. Quercia [29] used Satisfaction With Life tests and mea- sured happiness of 32,787 Facebook users from 12 coun- tries (Australia, Canada, France, Germany, Ireland, Italy, New Zealand, Norway, Singapore, Sweden, UK, USA ). He found that despite comparative economic status, country- level happiness significantly varies across the countries and that it strongly correlates with official well-being scores. Reinecke et al. [30] used about 1.5 million Doodle polls from 211 countries and territories and studied the influence of national culture on people’s scheduling behavior. Using Hofstede’s cultural dimensions, they found that Doodle poll participants from collectivist countries find more consensus than those from predominantly individualist societies. CQA platforms have also attracted much research inter- est focusing on content, user behavior and applications. Re- search on CQA content has analyzed textual aspects of ques- tions and answers. Researchers have proposed algorithmic solutions to automatically determine the quality of ques- tions [23] and answers [32]. Research on CQA user behav- ior has been mostly about understanding why users con- tribute content: that is, why users ask questions (askers are failed searchers, in that, they use CQA sites when web search fails [24]); and why they don’t answer questions (e.g., they refrain from answering sensitive questions to avoid be- ing reported for abuse and potentially lose access to the community [6]). As for applications, researchers have pro- posed effective ways of recommending questions to the most appropriate answerers [28], automatically answering ques- tions based on past answers [33], and retrieving factual an- swers [1] or factual bits within an answer [39]. Our previous work [16] used user-provided rule violation reports and user social network features to detect the content abusers in YA. However, there has been no empirical cross-cultural anal- ysis of CQA platforms. This paper is a first step in this direction and it verifies whether cultural differences are man- ifested in one such platform, YA. 3. YAHOO ANSWERS After 9 years of activity, YA has 56M monthly visitors (U.S. only).3 The functionalities of the YA platform and the dataset used in this analysis are presented next. 3.1 The Platform YA is a CQA platform in which community members ask and answer questions on various topics. Users ask questions and assign them to categories selected from a predefined taxonomy, e.g., Business & Finance, Health, and Politics & Government. YA has about 1300 categories. Users can find questions by searching or browsing through this hierarchy of categories. A question has a title (typically, a short sum- mary of the question), and a body with additional details. A user can answer any question but can post only one answer per question. Questions remain open for four days for others to answer. However, the asker can select a best answer before the end of this 4-day period, which automat- ically resolves the question and archives it as a reference question. The best answer can also be rated between one to five, known as answer rating. If the asker does not choose a best answer, the community selects one through voting. The asker can extend the answering duration for an extra four days. The questions left unanswered after the allowed duration are deleted from the site. In addition to questions and answers, users can contribute comments to questions already answered and archived. 3http://www.listofsearchengines.org/qa-search-engines YA has a system of points and levels to encourage and reward participation.4 A user is penalized five points for posting a question, but if she chooses a best answer for her question, three points are given back. A user who posts an answer receives two points; a best answer is worth 10 points. A leaderboard, updated daily, ranks users based on the to- tal number of points they collected. Users are split into seven levels based on their acquired points (e.g., 1-249 points: level 1, 250-999 points: level 2, ..., 25000+ points: level 7). These levels are used to limit user actions, such as posting ques- tions, answers, comments, follows, and votes: e.g., first level users can ask 5 questions and provide 20 answers in a day. YA requires its users to follow the Community Guidelines that forbid users to post spam, insults, or rants, and the Yahoo Terms of Service that limit harm to minors, harass- ment, privacy invasion, impersonation and misrepresenta- tion, fraud and phishing. Users can flag content (questions, answers or comments) that violates the Community Guide- lines and Terms of Service using the “Report Abuse” func- tionality. Users click on a flag sign embedded with the con- tent and choose a reason between violation of the commu- nity guidelines and violation of the terms of service. Re- ported content is then verified by human inspectors before it is deleted from the platform. Users in YA can choose to follow other users, thus cre- ating a follower-followee relationship used for information dissemination. The followee’s actions (e.g., questions, an- swers, ratings, votes, best answer, awards) are automati- cally posted on the follower’s newsfeed. In addition, users can follow questions, in which case all responses are sent to the followers of that question. 3.2 Dataset We studied a random sample of about 200k users from YA who were active between 2012 and 2013. These users posted about 9 million questions (about 45 questions/user), 43 million answers (about 215 answers/user), and 4.5 million abuse reports (about 23 reports/user). They are connected via 490k follower-followee relationships in a social network. The indegree and outdegree distributions of the social net- work follow power-law distributions, with an exponential fit- ting parameter α of 1.83 and 1.85, respectively. In our dataset, we have users from 67 countries. Figure 1 shows the number of users in our dataset as a function of the number of Internet users taken from the World Bank.5 We find a linear relationship between the number of users per country in our YA dataset and the number of Internet users in the World Bank dataset for each country. It means that the YA users from our dataset are not skewed by country. Instead, they represent a sample of global Internet users. To investigate how sensitive this correlation is to the num- ber of users per country, we computed the Pearson correla- tion between the number of YA users in x countries and their respective internet population. The x countries were ranked based on the number of YA users found in the dataset, and x was varied from top 20 to all 67 countries. Figure 2 shows that there are several peaks in the correlation, but the values are high and between 0.5 and 0.7. We select as a threshold the second highest correlation peak and thus included in the study 41 countries which have at least 150 users per country. 4https://answers.yahoo.com/info/scoring system 5http://www.data.worldbank.org/indicator/IT.NET.USER.P2 Figure 1: The number of Internet users and YA users for 67 countries. The regression line and 95% confidence interval area are also shown. The countries are represented by a 2-letter country code based on ISO 3166. Figure 2: Number of top countries based on the number of YA users and correlation with their num- ber of Internet users. All correlations are statisti- cally significant with p-value<0.05. 4. LEVINE’S PACE OF LIFE In this section, we analyze Levine’s Pace of Life cultural dimension in the context of YA and show how it relates to user activities such as questioning, answering and reporting. In his book [20], psychologist Robert Levine defines Pace of Life as “the flow or movement of time that people experi- ence”. With the help of 19 experimenters, he collected and compared three indicators of the Pace of Life in 36 large cities from 31 countries around the world during a warm summer month between 1992 and 1995 [21]. The indicators are: • Walking speed: They measured walking speed of 35 men and 35 women over a distance of 60 feet in main downtown areas in each city. Measurements were done during prime business hours after controlling a number of variables such as sidewalks, crowd, effects of socialization. They found significant differences in pedestrians walking speed—for example, pedestrians in Rio de Janeiro, Brazil walked only two-thirds as fast as pedestrians in Zurich, Switzerland. ●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●DZARAUATBDBEBOBRCACLCNCOHRCZDKDOECFIFRDEGRGTINIDIRIEILITJPKELBMYMXNLNZNGNOPKPEPHPTROSGZAESLKSECHTHTRAEGBUS VEVN23478# Internet users (log scale)#YA users (log scale)●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0.500.550.600.650.702030405060Number of top x countriesCorrelation (# YA vs. # Internet users) • Postal speed: In each city, they measured the time it took postal workers to serve a standard request for stamps and considered this time as a proxy for work speed. They handed each clerk money and a note written in the local language requesting a common stamp. For example, in the United States, the clerk was handed a 5 dollar bill with a request for one 32- cent stamp. They found that overall Western Europe was the fastest to serve a standard request. • Clock accuracy: To quantitatively measure time con- cerns, the researchers checked the clock accuracy of randomly selected 15 downtown banks in each city. The reported times were then compared to those re- ported by the telephone company, which was consid- ered accurate. Levine combined these three scores into a country-specific Pace of Life score and concluded that “the Pace of Life was fastest in Japan and the countries of Western Europe and was slowest in economically undeveloped countries. The pace was significantly faster in colder climates, economically productive countries, and in individualistic cultures” [21]. Intuitively, to cope with the rigid perception of time, peo- ple from the higher Pace of Life countries have to be planned and organized in their daily activities. On the other hand, people from lower Pace of Life countries might allow some unstructured activities, as in those countries the expectation of following the ‘right’ time is more relaxed. Applying these findings to online communities such as CQA platforms, we expect that people from higher Pace of Life countries, such as the USA, will be less likely to ask or answer questions during busy hours of the day, e.g., office hours. From these ideas, we hypothesize the following in YA: [H1] Users from countries with a higher Pace of Life score show more temporally predictable activities. To test this hypothesis, we calculate how probable a coun- try’s users are in asking, answering and reporting at different times of day and correlate that with that country’s Pace of Life rank. For example, if a user only asks or answers ques- tions in the evening, he is temporally more predictable than a user who asks or answers in the morning, afternoon and night. In a Twitter study [10], Golder and Macy also find diurnal mood rhythms in different cultures. In order to calculate temporal predictability, we only con- sider working days, as weekends are less predictable. More specifically, similar to [9], we divide the working day in five time intervals: morning (6:00 - 8:59), office time (9:00- 17:59), evening (18:00-20:59), late night (21:00- 23:59), sleep- ing time (00:00 - 05:59). All the reported times are users’ local time. We use information entropy [3], a measure of disorder, to calculate the temporal predictability. For a given activity (asking, answering, or reporting) and C intervals, we can compute p(c), the probability of an ac- tivity belonging to interval c. We measure the normalized entropy for user u for all activities as: −(cid:80) Entropyu = c∈C p(c)log(p(c)) logC (1) We calculate users’ normalized entropies for all their ques- tions, answers and abuse reports and refer to them as ques- tion, answer and report entropy, respectively. In our dataset, each country has on average 134k questions, 642k answers and 67k abuse reports. Normalized entropy ranges from 0 to 1. A normalized question entropy close to 0 indicates that most of the questions the user asked are within one time interval of the day, whereas the closer to 1, the more likely is that the user asked questions during all intervals. Finally, the question/answer/report entropy for a country c, Entropyq/a/r,c, is defined as the geometric mean of all Entropyq/a/r,u computed for the users of that country: Entropyq/a/r,c = Entropyq/a/r,u (2) (cid:16)(cid:89) u∈Uc (cid:17) 1Uc where Uc is the set of users in country c. We use geometric mean to account for the skewed distribution of the entropy scores, something that the regular arithmetic mean cannot handle. Table 1 shows Pearson correlations between question, an- swer, report entropy and Pace of Life ranks, where lower ranks mean higher Pace of Life. For both questions and answers, the overall Pace of Life ranks have positive corre- lations with question and answer entropy with r = 0.67 and r = 0.37, respectively. These positive relationships are seen in the Figures 3 and 4. We find positive correlations between walking speed rank, post office service time rank, and clock accuracy time rank with question entropy with r = 0.48, r = 0.60 and r = 0.48, respectively. For answers, we find positive correlations between post office service time rank, and clock accuracy time rank with entropy with r = 0.38 and r = 0.29, respectively. However, we do not find any statistically significant relationships between report entropy and Pace of Life ranks. These results confirm that users from countries with a higher Pace of Life score show more temporally predictable asking and answering behavior in YA. Entropy Pace of Life Overall Walking speed Post office Clock accuracy Question Answer Report 0.67*** 0.48** 0.60** 0.48** 0.37* 0.18 0.38* 0.29* 0.18 0.06 0.19 0.21 Table 1: Pearson correlations between question, an- swer, report entropy and Pace of Life rank. Lower ranks mean higher Pace of Life. p-values are indi- cated as: p<0.005(***), p<0.05 (**), p<0.1 (*). 5. HOFSTEDE’S CULTURAL DIMENSIONS In this section, we analyze a number of cultural dimen- sions in YA proposed by Geert Hofstede. We show how three cultural dimensions defined by Hofstede—individualism, power distance and uncertainty avoidance are manifested in the ecosystem of YA. Hofstede’s cultural dimensions theory is a framework for analyzing cultural variability. In his original model [12], Hofstede proposed four primary dimensions by surveying in the 1960s and 1970s a large number of IBM employ- ees from 40 countries: power distance (PDI), individual- ism (IDV), uncertainty avoidance (UAI) and masculinity (MAS). Later [13], he added two more dimensions: long- term orientation (LTO) and indulgence versus restraint (IVR). Figure 3: Pace of Life overall rank vs. average ques- tion entropy per country. Countries shown are the ones in our dataset for which a Pace of Life rank has been published. Countries are ranked in decreasing order of their Pace of Life value. A regression line is also shown. Individualism and contribution. The usage of the Internet takes time from a number of daily activities in- cluding face-to-face socialization. In collectivist countries, people are expected to give a fair amount of time on socia- bility, hence traditionally they seem to spend less time on the Internet compared to the people from the individualistic cultures [5]. In YA we expect that users from individualistic countries spend more time online, hence they can provide more answers and eventually they can contribute more to the community than their direct benefits from the commu- nity. We hypothesize the following: [H2] Users from countries with higher individualism index provide more answers. [H3] Users from countries with higher individualism index contribute more to the community than what they take away from the community. We correlate the geometric mean of the number of answers posted by the users from a country with that country’s indi- vidualism index (a higher score means higher individuality). We use geometric mean as an average because of the skewed distributions of the number of answers. In the calculation of the geometric mean, we exclude the users who have not pro- vided any answers. We observe a positive correlation, shown in Figure 5, with r = 0.46, p < 0.005. This means that, on average, users from individualistic countries provide more answers. Figure 4: Pace of Life overall rank vs. average an- swer entropy per country. Countries shown are the ones in our dataset for which a Pace of Life rank has been published. Countries are ranked in decreasing order of their Pace of Life value. A regression line is also shown. Three of the dimensions, individualism, power distance, and uncertainty avoidance, have been used in a number of recent studies of online behavior [8, 27, 30]. We also use these three Hofstede’s cultural dimensions and relate them to a number of hypotheses in the context of YA. 5.1 Individualism (IDV) Individualism is the extent to which an individual is inte- grated into a group. In individualistic societies (high IDV) such as the USA and England, personal achievements and individual rights are emphasized; an individual is expected to take care of only himself and his immediate family. In col- lectivist countries such as those of India, China, and Japan, individuals are expected to place the family and group goals above those of self. In this work, we investigate how individ- ualism is related to users’ contribution, (un)ethical behavior and privacy settings in YA. Figure 5: Individualism index vs. the average num- ber of answers posted by users per country. A re- gression line is also shown. To quantify users’ contribution compared to their take away, we compute yielding scores of the users. The yielding score of a user is simply a difference between his contribu- tion and his take away. For yielding scores, we consider YA’s point system, which awards two points for an answer, ten points for a best answer, and penalizes five points for a question: Yieldingu = f (contribution) − f (takeaway) = 2.0 ∗ Au + 10.0 ∗ BAu − 5.0 ∗ Qu (3) where Qu is the number of questions posted by user u, Au is the number of answers posted by u, and BAu is the number of best answers posted by u. Finally, a country’s yielding score Y ieldingc is defined as the geometric mean of all Y ieldingu computed for the users ●●●●●●●●●●●●●●●●●●●ATBRCNCZSVFRDEGRIDIEITJPKEMXNLSGSECHUS 0.550.600.650.700102030Overall rank of Pace of LifeQuestion entropy●●●●●●●●●●●●●●●●●●●ATBRCNCZSVFRDEGRIDIEITJPKEMXNLSGSECHUS 0.550.600.650.700.750102030Overall rank of Pace of LifeAnswer entropy●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●ARAUATBEBRCLCNCOECSVFRDEINIDIEILITJPKEKWMYMXNLNGPKPEPHPTSGZAESSECHTHTRGBUS UYVE6.06.57.07.58.0255075Individualism indexAvg. answer (log scale) of each country c: Y ieldingc = (cid:17) 1Uc Y ieldingu (cid:16)(cid:89) u∈Uc (4) where Uc is the set of users in country c and we take only those users having yielding scores more than zero. We cor- relate a country’s geometric mean of the yielding score with the country’s individualism index and we obtain a positive correlation (Figure 6) with r = 0.37, p < 0.05. This result suggests that the more individualistic a country is, the more its users contribute to YA than what they take away from the community. that the countries with higher collectivist scores show the most corruption. Based on this online and offline user unethical behavior that is influenced by culture, our intuition is that we could observe a similar trend in YA. In CQA platforms, the expec- tation is that users would provide helpful answers to posted questions. As such, users are required to follow the Com- munity Guidelines and the Yahoo Terms of Service while answering. When users post bad answers, community mem- bers flag them. Later, human moderators check whether these flags are applied correctly or not. We expect that the more collective a culture is, the more probable the answers from its users will be flagged as abusive. Formally, we hy- pothesize that: [H4] Users from more collective (less individualis- tic) cultures have higher probability to violate CQA norms. To this end, for each user u, we first calculate pu, the probability that his answers violate community norms (and thus are correctly flagged by other users): pu = # correctly flagged answers from u # total answers from u (5) Figure 6: Individualism index vs. yielding score per country. A regression line is also shown. There might be multiple explanations about why users from individualistic countries contribute more to the com- munity as reflected by hypotheses H2 and H3. One expla- nation is that individualistic cultures have a more favorable collaborative environment [35], so individuals feel the urge to contribute to the community. Another explanation could be that users from individualistic cultures simply want more points than collectivist cultures. As points are awarded for contribution (e.g., an answer earns two points) and partic- ipation (e.g., each login earns one point), users might be tempted to contribute more. In fact, we obtain a positive and significant correlation (r = 0.42, p < 0.01) between a country’s points (calculated as geometric mean of the coun- try’s user points) and its individualism index. Finally, there might be other confounding factors (e.g., internet penetra- tion) that affect the contribution of a country’s users on the platform. Thus, it is difficult to confirm whether the users’ behavioral differences on contribution are due to their cul- tural differences. Individualism and (un)ethical behavior. The degree to which a culture is collectivist or individualistic has an im- plication on its users’ online (un)ethical behavior. For ex- ample, the more individualistic (less collectivistic) a culture, the lower the rate of software piracy [14] and online music piracy [19]. Personal rights are paramount in individualis- tic cultures, where people do not feel obligated to engage in group cooperation that involves conspiracy. Group co- operation and conspiracy are two key elements for the real world unethical behaviors such as corruption [26]. Trian- dis et al. [37] used Hofstede’s individualism index and found Finally, Pc, the geometric average of all pu probabilities computed for each country c: (cid:17) 1Uc (cid:16)(cid:89) u∈Uc Pc = pu (6) where Uc is the set of users in country c. The Pearson correlation r = −0.48, p < 0.05 shows that the probability of abuses in answers provided by the users from a particular country is negatively correlated with that country’s individualism index. Figure 7 indeed shows that the probability decreases with an increasing individualism index, meaning that if an answer comes from an individual- istic country, it is less probable to violate community rules. Figure 7: Individualism index vs. the probability that an answer from a country is correctly flagged. A regression line is also shown. Individualism and privacy concerns. Although on- line privacy concerns are global, the extent to which people perceive these concerns as real varies across cultures. For example, in the United States, privacy is a basic human right, endorsed by the American Bill of Rights, while Asian countries show little or no recognition on privacy in their ●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●ARAUATBEBRCLCNCOECSVFRDEINIDIEILITJPKEKWMYMXNLNGPKPEPHPTSGZAESSECHTHTRGBUS UYVE3.23.64.04.4255075Individualism indexAvg. yielding score (log scale)●●●●●●●●●●●●●●●●●●ARAUBRCLFRDEINIDIEITKEMXPKPEPHESGBUS 0.0050.0100.0150.020255075Individualism indexProb. of flagged answers legal systems [5]. A survey of 1261 Internet users from five big cities—Bangalore, Seoul, Singapore, Sydney and New York—shows that Internet users from individualistic cul- tures are more concerned about privacy than those in collec- tive cultures [2]. We expect that a similar trend also exists in CQA platforms. We hypothesize that: [H5] Users from higher individualism index countries exhibit higher level of concern about their privacy. We use the modifications of the privacy settings on users’ YA accounts as a proxy of privacy concern. In YA, pri- vacy settings are typically available for users to personalize for content (questions or answers) and follower-followee net- work. Intuitively, privacy-concerned users would take the opportunity to change the default privacy settings. So, we consider the fraction of public privacy profiles in a coun- try to draw a conclusion on how concerned its users are about their privacy. However, the default privacy in YA is public. It might be possible that many of the users in the public group are dormant: users who signed up, asked and answered some questions, and disappeared quickly. These users might skew the results of our study, thus, we only con- sider active users from our dataset— users who have asked and answered more than 10 questions during our observation interval. These active users are about 79% of our dataset. We note that our conclusions remain the same if we con- sider more active users by filtering users who have asked and answered more than 20 questions. Based on Hofstede’s Individualism index, the Hofstede Centre6 has tagged countries as individualistic or collec- tivist. In our study, we use this classification. Figure 8 shows the percentage of user profiles with public privacy set- tings in a country, as function of the country’s ranking in the collectivist and individualistic class. The figure shows that, on average, collectivist countries have a higher percentage of public profiles: collectivist countries such as Spain, Peru, Argentina, and Mexico have higher percentage of public pro- files than individualistic countries such as United Kingdom, United States, Australia or Italy. Figure 8: Percentage of public privacy settings vs. rank of collectivist and individualistic countries, re- spectively. Country ranks are based on the percent- age of public privacy settings and they are sepa- rately done for collectivist and individualistic coun- tries. 6http://geert-hofstede.com/countries.html 5.2 Power Distance Index (PDI) PDI is the extent to which the less powerful members of an organization or society expect and accept that power is distributed unequally. This dimension sheds light on how a society handles inequalities among its members. In coun- tries with high PDI, such as countries from Latin, Asian, African and Arab world, everybody has a place in the social hierarchy and people accept the situation without question- ing it. However, in Anglo and Germanic countries, which are low power distance countries, people seek distribution of power and ask for justifications of power inequality. PDI essentially measures the distribution of wealth and power between people in a country or culture. In YA, we can use the indegree (number of followers) as a proxy of wealth and power. For example, the larger the number of followers users have, the larger an audience they have for di- rect communication. Higher indegree users are also found to be more central (thus more retained [18]) across a number of network centrality metrics [17]. Moreover, these users’ questions are forwarded to more users, hence more likely to be getting an answer. A study [16] on YA shows that users receive more answers from close neighborhoods. Given the high number of questions that remain unanswered (42% in YA reported by a study [31]) in CQA platforms, bringing answers not only shows a user’s potential capability, but also makes the platform mature and informative. Taking ideas from the unequal distribution of wealth and power in higher power distance countries, we expect that in YA, users from those countries also have inequality in their indegrees. Garcia et al. [8] have found similar indegree inequality in Twitter. We hypothesize the following in YA: [H6] Users from higher power distance countries show a larger indegree imbalance in follow relationships. We correlate countries power distance index (higher in- dex means power distance is high) with their users’ inde- gree imbalance. A user’s indegree imbalance is calculated as the difference between her friends’ average indegree and her indegree. Finally, a country’s indegree imbalance is the geometric mean of the indegree imbalance of its users. For all countries, except Panama and Philippines, we ob- tained a positive indegree imbalance, meaning that for those countries, on average, a user’s contacts have more contacts than the user. This supports a well-known hypothesis friend- ship paradox in sociology. The friendship paradox states that your friends have on average more friends than you have, however, most people think that they have more friends than their friends have [7]. It has been shown that the para- dox holds for both Twitter [11] and Facebook [38]. Now we also show it for YA. Figure 9 shows the relation between PDI and indegree imbalance (excluding Panama and Philippines). The figure indeed shows a positive correlation. We obtained a positive correlation r = 0.65, p < 0.005 between indegree imbalance and PDI for all countries (including Panama and Philip- pines). This supports the hypothesis that users from coun- tries with higher PDI are more comfortable with indegree imbalance. 5.3 Uncertainty Avoidance Index (UAI) UAI is the extent to which people feel uncomfortable with uncertainty and ambiguity. Individuals from countries ex- ●●●●●●●●●●ARAUBRFRDEINIDITKEMXPKPEPHESGBUS 304050602.55.07.510.0Country rankPercentage of public privacy settings●CollectivistIndividualist Figure 9: Power distance index vs. indegree imbal- ance. A regression line is also shown. Figure 11: Answer entropy vs. uncertainty avoid- ance index. Only countries having more than 300 users are plotted. A regression line is also shown. hibiting strong UAI tend to minimize uncertainty and am- biguity by careful planning, and enforcing rules and regula- tions. On the other hand, low uncertainty avoidance cultures maintain a more relaxed attitude in unstructured situations. For example, Switzerland has a reasonably high uncer- tainty avoidance index (58) compared to countries such as Singapore (8) and Sweden (29). In fact, an online scheduling behavior study [30] on Doodle (http://doodle.com/) shows that Switzerland and Germany have a high advance plan- ning time of 28 days. In YA, our related hypothesis is: [H7] Users from countries with higher uncertainty avoidance index exhibit more temporally predictable activities. Figures 10, 11, 12 show the relationship between question, answer and abuse report entropy vs. uncertainty avoidance index, respectively. Note that a higher UAI means lower uncertainty and ambiguity. The negative relations in the figures indicate that users from countries with higher uncer- tainty avoidance index tend to have lower question, answer and abuse report entropies, thus they are more temporar- ily predictable. All the entropies have negative relation to uncertainty avoidance index: r = −0.43 for questions, r = −0.55 for answers, and r = −0.51 for abuse reports. All correlation values are statistically significant with p < 0.05. Figure 10: Question entropy vs. uncertainty avoid- ance index. Only countries having more than 300 users are plotted. A regression line is also shown. Figure 12: Report entropy vs. uncertainty avoid- ance index. Only countries having more than 300 users are plotted. A regression line is also shown. 6. SUMMARY AND DISCUSSION Observing the global spread of information and commu- nication technologies, researchers sometimes predicted that the online world would be converging into a “one-world cul- ture” [22]. With the advent of the large-scale online behav- ioral datasets in the past decade from online platforms like Twitter, Facebook and Foursquare, researchers showed that the Internet does not have a homogeneous culture. Instead, country-specific cultural variations do exist. We showed the same non-homogeneity, but in a very different online context—community question answering. In this work, we analyzed about 200 thousand sampled Yahoo Answers users from 67 countries. We studied users’ behavioral patterns such as temporal predictability of activ- ities, engagement, (un)ethical behavior, privacy concerns, and power inequality and how they compare with a number of cultural dimensions (Pace of Life, Individualism, Uncer- tainty Avoidance and Power Distance). We find that behav- ioral differences exist across cultures in YA. Table 2 shows a summary of all the hypotheses involving cultural indices and the results found. We acknowledge that our study is observational and lacks controlled experimental ground truth data. Therefore, we cannot draw causal conclusions whether cultures shape the ecosystem of YA. However, our results hint at the impor- tance of culture-aware CQA moderation. Note that CQA ●●●●●●●●●●●●●●●●●ARAUBRCLFRDEINIDIEITKEMXPKPEESGBUS 5101520304050607080Power distance indexIndegree imbalance●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEMXPKPEPHSGESGBUS VE0.500.550.600.650.70255075Uncertainty avoidance indexQuestion entropy●●●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEKWMXPKPEPHSGESGBUS UYVE0.500.550.600.650.700.75255075100Uncertainty avoidance indexAnswer entropy●●●●●●●●●●●●●●●●●●●●●ARAUBRCLCOFRDEINIDIEITKEMXPKPEPHSGESGBUS UY0.550.600.650.70255075100Uncertainty avoidance indexReport entropy Pace of Life Users from countries with a higher Pace of Life score show more temporally predictable activities (asking, answering and reporting) Individualism Users from higher individualism index countries provide more answers Users from countries with higher individualism index contribute more to the community than what they take away from the community Users from more collective (less individualistic) cultures have higher probability to violate CQA norms Users from higher individualism index countries exhibit higher level of concern about their privacy Power distance Users from higher power distance countries show larger indegree imbalance in follow relationships Uncertainty Avoidance Users from countries with higher uncertainty avoidance index exhibit more temporally predictable activities (asking, an- swering and reporting) Correlation rq = 0.67*** ra = 0.37** rr = 0.18 Correlation r = 0.46*** r = 0.37** r = −0.48** NA Correlation r = 0.65*** Correlation rq = −0.43** ra = −0.55** rr = −0.51** Table 2: Pearson correlation coefficients in hypotheses related to pace of life, individualism, uncertainty avoidance and power distance. p-values are indicated as: p<0.005(***), p<0.05 (**), p<0.1 (*). platforms like YA employ human moderators to evaluate reported abuses and determine the appropriate responses, from removing content to suspending user accounts. We find that collective cultures are more probable to provide bad answers. At a minimum, more attention of moderators are expected in these cultures to keep the environment clean. We find that individualistic cultures are more engaged in YA, e.g., by providing more answers and contributing more than their take away. These results confirm the generaliza- tion that individualistic cultures are highly attracted to the Internet. Researchers often attribute the egalitarian, demo- cratic nature of the Internet to this engagement [4]. The evidence of different engagement patterns and differ- ence in pace of life across cultures in CQA platforms imply that some core functionalities such as question recommenda- tion and follow recommendation could benefit from exploit- ing cultural factors. In question recommendation, questions are routed to the most appropriate answerers. To find out such answerers, factors such as followers, interests, question diversity and freshness [36] are considered. Our study sug- gests that including cultural variables such as individualism can be useful. For example, as users from collective cul- tures are less probable to answer, questions from those com- munities should be routed to a larger number of potential answerers. Another variable, Pace of Life, could also be a factor in question recommendation. Our results show that users from countries with a higher pace of life are temporally more pre- dictable. In those cultures, if questions are forwarded to answerers during the busy hours of the day (e.g., during of- fice hours), the questions are less likely to get an answer. Solutions could include routing questions to a larger num- ber of potential answerers, diversifying the set of answerers to include users from countries with a lower Pace of Life, or delaying routing for after work hours. In the follow recommendation, CQA platforms recommend which other users one can follow based on shared interests, common contacts, and other related factors. We find that in YA, lower power distance countries show less indegree imbal- ance in follow relationships. For follow recommendation in those countries, users to be followed may be recommended to a user with the same level of indegree as them. CQA platforms could also exploit cultural differentiations to improve targeted ads. Okazaki and Alonso [25] analyzed online advertising appeals such as “soft sell” appeal (that works by creating emotions and atmosphere via visuals and symbols) and “hard sell” appeal (that provides focus product features, explicit information, and competitive persuasion) across a number of cultures. They found individualistic cul- tures like the USA are more attracted to “hard sell” appeal, where collective cultures like Japan are attracted to “soft sell” appeal. Ju-Pak’s study [15] also confirms that fact- based appeal is dominant in the USA, but text-limited, vi- sual layouts are popular in collective cultures like South Ko- rea. Linguistic aspects in the ads might also be important. For example, focusing on ‘I’, ‘me’ in individualistic cultures and ‘us’ and ‘we’ in collective cultures. Finally, CQA sites could leverage cultural variations in their platforms by, for example, placing textual, informative feature ads to users from individualistic cultures and visual and symbolic ads to users from collective cultures. 7. ACKNOWLEDGMENTS The work was funded by the National Science Foundation under the grant CNS 0952420, and by the Yahoo’s Faculty Research and Engagement Program. 8. REFERENCES [1] J. Bian, Y. Liu, E. Agichtein, and H. Zha. Finding the right facts in the crowd: Factoid question answering over social media. In Proceedings of the 17th International Conference on World Wide Web, pages 467–476, 2008. [2] H. Cho, M. Rivera-S´anchez, and S. S. Lim. A multinational study on online privacy: global concerns and local responses. New media & society, 11(3):395–416, 2009. [3] T. M. Cover and J. A. Thomas. Elements of information theory 2nd edition. Willey-Interscience: NJ, 2006. [4] M. De Mooij. The future is predictable for international marketers: converging incomes lead to diverging consumer behaviour. International Marketing Review, 17(2):103–113, 2000. [5] M. De Mooij. Global marketing and advertising: Understanding cultural paradoxes. Sage Publications, 2013. [6] D. Dearman and K. N. Truong. Why users of yahoo!: [21] R. V. Levine and A. Norenzayan. The pace of life in Answers do not answer questions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 329–332, 2010. [7] S. L. Feld. Why your friends have more friends than you do. American Journal of Sociology, pages 1464–1477, 1991. [8] R. Garcia-Gavilanes, Y. Mejova, and D. Quercia. Twitter ain’t without frontiers: Economic, social, and cultural boundaries in international communication. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, pages 1511–1522, 2014. [9] R. Garcia-Gavilanes, D. Quercia, and A. Jaimes. Cultural dimensions in twitter: Time, individualism and power. Proceedings of the 7th International AAAI Conference on Weblogs and Social Media, 13, 2013. 31 countries. Journal of cross-cultural psychology, 30(2):178–205, 1999. [22] T. Levitt. The globalization of markets. International Business: Strategic management of multinationals, 3:18, 2002. [23] B. Li, T. Jin, M. R. Lyu, I. King, and B. Mak. Analyzing and predicting question quality in community question answering services. In Proceedings of the 21st International Conference Companion on World Wide Web, pages 775–782, 2012. [24] Q. Liu, E. Agichtein, G. Dror, Y. Maarek, and I. Szpektor. When web search fails, searchers become askers: Understanding the transition. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 801–810, 2012. [10] S. A. Golder and M. W. Macy. Diurnal and seasonal [25] S. Okazaki and J. Alonso. Right messages for the right mood vary with work, sleep, and day length across diverse cultures. Science, 333(6051):1878–1881, 2011. [11] N. O. Hodas, F. Kooti, and K. Lerman. Friendship site: on-line creative strategies by japanese multinational corporations. Journal of Marketing Communications, 9(4):221–239, 2003. paradox redux: Your friends are more interesting than you. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media, 2013. [26] H. Park. Determinants of corruption: A cross-national analysis. Multinational Business Review, 11(2):29–48, 2003. [12] G. Hofstede. National cultures in four dimensions: A [27] J. Park, Y. M. Baek, and M. Cha. Cross-cultural research-based theory of cultural differences among nations. International Studies of Management & Organization, pages 46–74, 1983. [13] G. Hoftede, G. J. Hofstede, and M. Minkov. Cultures and organizations: software of the mind: intercultural cooperation and its importance for survival. McGraw-Hill, 2010. [14] B. W. Husted. The impact of national culture on software piracy. Journal of Business Ethics, 26(3):197–211, 2000. [15] K.-H. Ju-Pak. Content dimensions of web advertising: a cross-national comparison. International Journal of Advertising, 18(2):207–231, 1999. [16] I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F. Bonchi. The social world of content abusers in community question answering. In Proceedings of the 24th International World Wide Web Conference, pages 570–580, 2015. [17] I. Kayes, X. Qian, J. Skvoretz, and A. Iamnitchi. How influential are you: Detecting influential bloggers in a blogging community. In Proceedings of the 4th international conference on Social Informatics, pages 29–42, 2012. [18] I. Kayes, X. Zuo, D. Wang, and C. Jacob. To blog or not to blog: Characterizing and predicting retention in community blogs. In Proceedings of the 7th ACM/ASE International Conference on Social Computing (SocialCom’14), 2014. [19] E.-J. Ki, B.-H. Chang, and H. Khang. Exploring influential factors on music piracy across countries. Journal of Communication, 56(2):406–426, 2006. [20] R. Levine. A Geography of Time: The Temporal Misadventures of a Social Psychologist or How Every Culture Keeps Time Just a Little Bit Differently. University Press, 2006. comparison of nonverbal cues in emoticons on twitter: Evidence from big data analysis. Journal of Communication, 64(2):333–354, 2014. [28] M. Qu, G. Qiu, X. He, C. Zhang, H. Wu, J. Bu, and C. Chen. Probabilistic question recommendation for question answering communities. In Proceedings of the 18th International Conference on World Wide Web, pages 1229–1230, 2009. [29] D. Quercia. Don’t worry, be happy: The geography of happiness on facebook. In Proceedings of the 5th Annual ACM Web Science Conference, pages 316–325, 2013. [30] K. Reinecke, M. K. Nguyen, A. Bernstein, M. Naf, and K. Z. Gajos. Doodle around the world: Online scheduling behavior reflects cultural differences in time perception and group decision-making. In Proceedings of the conference on Computer supported cooperative work, pages 45–54, 2013. [31] M. Richardson and R. W. White. Supporting synchronous social q&a throughout the question lifecycle. In Proceedings of the 20th international conference on World wide web, pages 755–764, 2011. [32] C. Shah and J. Pomerantz. Evaluating and predicting answer quality in community qa. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 411–418, 2010. [33] A. Shtok, G. Dror, Y. Maarek, and I. Szpektor. Learning from the past: Answering new questions with past answers. In Proceedings of the 21st International Conference on World Wide Web, pages 759–768, 2012. [34] T. H. Silva, P. O. Vaz de Melo, J. M. Almeida, M. Musolesi, and A. A. Loureiro. You are what you eat (and drink): Identifying cultural boundaries by analyzing food and drink habits in foursquare. In Proceedings of the 8th International AAAI Conference on Weblogs and Social Media, 2014. [35] J. J. Sosik and D. I. Jung. Work-group characteristics and performance in collectivistic and individualistic cultures. The Journal of social psychology, 142(1):5–23, 2002. [36] I. Szpektor, Y. Maarek, and D. Pelleg. When relevance is not enough: Promoting diversity and freshness in personalized question recommendation. In Proceedings of the 22Nd International Conference on World Wide Web, pages 1249–1260, 2013. [37] H. C. Triandis, P. Carnevale, M. Gelfand, C. Robert, A. Wasti, T. Probst, E. Kashima, T. Dragonas, D. Chan, X. Chen, et al. Culture, personality and deception: A multilevel approach. International Journal of Cross-Cultural Management, 1:73–90, 2001. [38] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the facebook social graph. arXiv preprint arXiv:1111.4503, 2011. [39] I. Weber, A. Ukkonen, and A. Gionis. Answers, not links: Extracting tips from yahoo! answers to address how-to web queries. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pages 613–622, 2012.
1509.00511
1
1509
2015-09-01T21:42:27
Pinterest Board Recommendation for Twitter Users
[ "cs.SI", "cs.MM" ]
Pinboard on Pinterest is an emerging media to engage online social media users, on which users post online images for specific topics. Regardless of its significance, there is little previous work specifically to facilitate information discovery based on pinboards. This paper proposes a novel pinboard recommendation system for Twitter users. In order to associate contents from the two social media platforms, we propose to use MultiLabel classification to map Twitter user followees to pinboard topics and visual diversification to recommend pinboards given user interested topics. A preliminary experiment on a dataset with 2000 users validated our proposed system.
cs.SI
cs
Pinterest Board Recommendation for Twitter Users Xitong Yang University of Rochester, Rochester, NY 14623 [email protected] Yuncheng Li University of Rochester, Rochester, NY 14623 [email protected] Jiebo Luo University of Rochester, Rochester, NY 14623 [email protected] 5 1 0 2 p e S 1 ] I S . s c [ 1 v 1 1 5 0 0 . 9 0 5 1 : v i X r a ABSTRACT Pinboard on Pinterest is an emerging media to engage on- line social media users, on which users post online images for specific topics. Regardless of its significance, there is little previous work specifically to facilitate information discov- ery based on pinboards. This paper proposes a novel pin- board recommendation system for Twitter users. In order to associate contents from the two social media platforms, we propose to use MultiLabel classification to map Twitter user followees to pinboard topics and visual diversification to recommend pinboards given user interested topics. A pre- liminary experiment on a dataset with 2000 users validated our proposed system. Categories and Subject Descriptors H.3.5 [Online Information Services]: We-based services General Terms Experimentation Keywords cross-network recommendation; multi-label classification 1. INTRODUCTION Socially Curation Service [3], on which people can share and reshare online content that they found interesting, is be- coming more and more popular. For example, Pinterest has successfully attracted more than 40 million monthly active users 1 to create pinboards and share online images. Social curation creates high quality contents for users to discover, search and follow what they are interested in. For example, Pinterest has already delivered better search results than Google for a number of segments, such as food recipes, fash- ion and DIY 2. Pinboard, on which people can put together 1eMarketer, Feb 2015 2http://goo.gl/PCWG3W Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. MM'15, October 26 -- 30, 2015, Brisbane, Australia. c(cid:13) 2015 ACM. ISBN 978-1-4503-3459-4/15/10 ...$15.00. DOI: http://dx.doi.org/10.1145/2733373.2806375. Figure 1: An illustrative example to recommend pinboards to a Twitter user "@xyz" online images for specific topics to share with others, is the key element for Pinterest to engage users. Different from traditional photo albums, such as those on Facebook and Flickr, pinboards are not yet another way for people to or- ganize images, but also encouraging users to carefully select images using their creativity. Also, in order to continuously attract followers, pinboard curators take efforts to keep up most recent contents, so pinboards give users a new way to follow most fresh updates on the topic they are interested in. As with other online systems, efficient information dis- covery is one of the major hurdles for continuous growth. In this paper, we propose a pinboard recommendation system to help users to discover interesting pinboards on Pinterest. As a relatively new social media platform, Pinterest is still in its young age. Therefore, how to keep new users is an important topic, but recommendation for new users suf- fers cold start problem for the lack of activity history. We propose to leverage 3rd party social media platforms, such as Twitter, to solve the cold start problem for new Pinter- est users. There are a number of reasons to use Twitter as an intermediate platform to recommend pinboards. First, Twitter is more mature and attracts even more active users, so it represents larger coverage for online users. Second, be- cause most contents on Twitter are text based, it is much easier to find out interesting topics on Twitter than on Pin- terest. Third, even though text based platform makes it easier to find interesting topics, image based pinboards, if ...Pinterest OntologyTwitter UserFolloweesTweets timelinePinboard Recommendation Figure 2: Overview of the proposed recommendation system. First, we align and filter the data from two different sources. After that, we collect multimedia contents, such as Pinboards and Pins information, and tweets from these active users. In the meanwhile, we build the pinboard topic ontology automatically, which is done by pruning an expert ontology such as Wikipedia. Second, we perform user modeling in two folds. For Pinterest, we obtain multi-label representation for each account by mapping their boards to the topics in Pinterest ontology. For Twitter, we extract both text feature and personality feature from user timeline. Third, we associate these two user models using multi-label classification, in which Twitter feature is used to predict the Pinterest category representation of each user. In the end, we recommend diverse Pinterest boards according to this prediction, where diversity is guaranteed by combining visual contents of the images in each board. well aligned with the interests, provide better content for users to digest. For these reasons, recommending pinboards based on Twitter activity history is a perfect match. We propose following procedure to recommend pinboards to Twitter users. (1) Given Twitter users, we extract their followees. We assume that the follower relationship rep- resents user interests. (2) Using the proposed association method, we map the followees to pinboards topics, which represent what kind of boards the Twitter users will be in- terested in. The noise of individual followee can be reduced by aggregating all mapping results. (3) We choose a number of pinboards from the selected topics, and recommend these pinboards to the Twitter users. Using the example in Fig. 1, we find that twitter user "@xyz" is following a twitter user "@love146". By collect- ing and classifying timeline of "@love146", we map the user "@love146" to one of the pinboard topics "anti human traf- ficking", so we assume that the target twitter user "@xyz" is interested in the boards about "anti human trafficking". Therefore, we select a number boards on this topic. We further improve the recommendation quality by a reranking method based on visual diversity analysis. Since the followees can be extracted trivially from Twitter API, we solve the following two key problems in this paper, as illustrated in Fig. 2 Map user timeline to pinboard topics is an example of cross network analysis [10], and we build the association by mining users who are active on both Pinterest and Twitter. We crawl the timeline and pinboards associated with users that are active on both platforms. The pinboards are then mapped onto a predefined topic ontology using text based matching. After that, the users are associated with a twit- ter timeline and a distribution of pinboard topics. Then we learn a multi-label classifier to map user timeline to the pin- board topics. Using this multi-label classifier, we can map twitter followees without Pinterest account to pinboard top- ics. Pinboard reranking is the process to recommend the best subset from the list of interested pinboards. We adapt a clustering based algorithm to perform this reranking, and the goal is to make sure that the recommended pinboards cover as much aspects as possible for the selected topics. We make following contributions in this paper, (1) We present and release a linked dataset that associate pinboards and Twitter users. This will be of interests to broader re- search than cross network recommendation. (2) We propose a cross network recommendation method based on multi- label classification. (3) We propose a visual reranking method to diversify pinboard recommendation. 2. RELATED WORK Our work is related to cross network analysis, user mod- eling and hierarchical multi-label classification. In this sec- tion, we highlight the novelty of our work by comparing with recent works on these related fields. Cross network analysis aims to merge social signals from different network to increase online social media platform engagement. For example, in [10], Yan et al. proposed to identify the best Twitter accounts to promote YouTube videos, by mining the associations between topics learning from user tweets and their favorite YouTube videos. User modeling is the foundation of personalized services, such as personalized recommendation, search engine rerank- ing and advertisements targeting. One component of our Pinterest board recommendation system is based on Pinter- est board ontology mapping, which is inspired from [2]. In this work, Geng et al. proposed a multi-task CNN to map pinterest images to fashion ontology and the classification re- sults were sorted as user profiles for image recommendation. We adapt the idea that user interests can be represented by multiple nodes on ontology and further extend the on- PinterestAccountsFilter non-twitteraccounts...Pinterest Ontology...Category 1Category 2Category N...Multi-labelRepresentationHashing FeaturePersonality FeatureMulti-labelClassification...Category aCategory bCategory nPinterestTwitterFilter inactiveaccountsPinboards / PinsInformationTweets # total nodes root nodes leaf nodes least/largest depth statistics 471 20 440 2 / 5 Table 1: Pinterest topic ontology Statistics tology domain to 20 categories, including "Fashion", "Food" and "Wedding". In addition, instead of single label classifi- cation on images and aggregating the classification results to form user profile, we perform hierarchical multi-label clas- sification on aggregated user tweets to figure out the user interests directly. Hierarchical MultiLabel Classification is the problem of classifying data instances to multiple labels or attributes, in which the labels are structured in a hierarchical taxon- omy. [7] proposed a hierarchical multi-label system to clas- sify short texts (e.g., tweets). In this work, Ren et al. pro- posed to use text expansion, e.g., entity linking, to deal with the shortness and concept drift problem in short text classi- fication. Our twitter user modeling is also based on hierar- chical multi-label classification. However, instead of single tweet classification, we deal with the entire timeline of users, so that each user is modeled by a large number of tweets. In this paper, we adapt Randomized Labelsets [8] to efficiently model the hierarchical dependency automatically. 3. PINBOARD VISUAL DIVERSIFICATION The goal of this stage is to recommend most relevant and diverse boards, given predicted categories and millions of board candidates sampled from Pinterest board pool. To guarantee the relevance, we map each board to the cate- gories onto the topic ontology with the method described in Experiments Section 4, and also sort the boards of each category according to their popularity (e.g. followers). We then chose top k boards for each category as its preliminary candidates (we set k = 10 in our experiment). To enhance diversity, we utilize the visual contents in Pin- terest, that is, for each category, we cluster all pin images that belong to its preliminary board candidates, and then chose the boards that can maximize the coverage of these clusters. Specifically, we use deep Convolutional Neural Net- work (CNN) to learn useful features for the pin images (fc7 layer of the AlexNet [4]). After that, Affinity Propagation algorithm [1] is applied to cluster 4096D image features. Af- ter obtaining the clusters and assignment for each pin image, we can build a cluster distribution for each board. Then the board selection problem can be formalize as follows. Denote the candidate set by B, its subset by B ⊂ B, a board in the subset by b ∈ B and the cluster assignment distribution of the board by Pb ∈ RC . C is the number of clusters for all images in the pinboard candidates. Then, we define the set level entropy by, (cid:18)(cid:80) (cid:19) b∈B Pb B T (B) = H , (1) in which H(x) is the entropy of a distribution x. Then, we select the best set of pinboards by argmax B T (B). We can prove that this is actually an NP-complete problem, so an approximation algorithm is needed, but in our experiments we just use brutal force to enumerate all possibilities by restricting the number of pinboard candidates B and the recommendation set B. 4. EXPERIMENTS 4.1 Data Collection 4.1.1 Pinterest ontology construction and refining Ontology is a natural way to model the hierarchical struc- ture of the categories in Pinterest, as is also used in [2] to organize items in fashion domain. To construct a full Pin- terest ontology, we first build a preliminary ontology based on Wikipedia Categories, where the root nodes of it are 20 manually selected categories according to the 38 original cat- egories given by Pinterest, such as "Fashion", "Food" and "Wedding". After that, we prune the ontology to adapt it to Pinterest user interest distribution. Basically, categories with low term frequency in board and pin information are removed. As board information and pin information share different weights for the ontology, we consider their pruning approaches separately, and the pruned ontology is obtained by uniting the results of two approaches. In addition, popu- larity metrics like the number of followers, likes, comments and repins are also considered as positive weighted metric while pruning. As a result, we obtain the refined Pinterest ontology and the statistics are shown in Table 1. 4.1.2 Map pinboards to topic ontology With the refined Pinterest ontology, we can model a user's Pinterest profile by topic distribution. As users have their own boards, we can obtain this representation by mapping their boards to the categories in the ontology. For each board, this mapping approach takes three steps. First, we match board information to the categories, which can get a few or even no matches (but more accurate), as the board information is always rare. Second, we match all pins infor- mation under the board. Third, concatenate the result of previous two steps. After obtaining the categories mapping for each board, we can get the representation for the users through the union of the categories of their own boards. 4.1.3 Twitter timeline features We extract two kinds of features to represent the tweets information for each user. First is the original text feature extraction, where feature hashing [9] and tf-idf term weight- ing are applied to reduce feature dimension and weight fea- ture appropriately. Second, we also compute 64 LIWC fea- tures (e.g., word categories such as "social" and "work") to model the personality of each user [5]. These features may potentially reflect the distribution of their interest and user- curated data (e.g., Pinterest boards). 4.1.4 Data Statistics and Thresholds In data preparation stage, we filter out those accounts that do not have twitter links or twitter activities are not active enough (number of tweets less than 200). Finally we get 2265 accounts from original 50000 sample Pinterest accounts. With these active accounts, we crawl 4.9 million tweets, 25.5 thousand boards and 2 million pins in total. In ontology pruning stage, we set the threshold of term frequency for pins information to be 200 and the threshold for board information to be 1/100 of it, as the number of boards is nearly 1/100 of that of pins. After that we get 471 nodes in the ontology, as illustrated in Table 1. In user modeling stage, for Pinterest data, we build up a multi-label representation for each user. Table 2 shows cer- Examples Attributes Labels Label Cardinality Label Density 2265 5000+64 471 16.02 0.034 Table 2: Data Statistics (a) F macro-ex. (b) F macro-label Figure 3: Experiment results varying key parameters in RAkEL algorithm [8]. tain standard multi-label statistics of these representation, such as the number of labels, the label cardinality and the label density [8]. Label cardinality (LC) is the average num- ber of labels per example, and label density is LC divided by the number of labels L. For Twitter data, we extract bag of words (BOW) text feature, and then apply feature hash- ing to get 5000 dimensional features. 64D LIWC feature is also extracted from the tweets via LIWC dictionary. 4.2 Preliminary Evaluation We use macro-F1, a macro-averaged version of F-measure to measure our approaches, which is widely used in multi- label classification tasks[6]. Formally, we represent an asso- ciation of labels v and its prediction v as two binary vec- tors {0, 1}T . Then F-measure (F1) can be used to measure the accuracy of the prediction, which is the harmonic mean of precision and recall and defined as follows: F 1(v, v) = (2 × precision × recall)/(precision + recall), where preci- sion is defined as v ∧ v/v, and recall is v ∧ v/v. For a multi-label classification task with N examples and L labels, we have two different ways to average the F1 scores: (1) F1 macro-ex. average F1 scores of N examples, which re- flects example based evaluation. (2) F1 macro-label: average F1 scores of L labels, which reflects label based evaluation. We compare two common multi-label classification meth- ods: Binary Relevance(BR) and Label Powerset(LP)[6]. BR considers the prediction of each label as an independent bi- nary classification task, while LP considers subset of labels as a single label to perform a multi-class classification task. For efficiency consideration, we adopt RAkEL[8] method, which is a variant of LP that ensemble different light LP classifiers trained by small random subsets of the set of la- bels. In order to evaluate the effect of personality features, i.e., LIWC feature, in this user-interest relevant task, we com- pare following three cases: Hashing feature only, LIWC fea- ture only and an early fusion of both features. 4.3 Experiment results and Conclusion Figure. 3 present the comparison between BR and RAkEL while tuning the parameters k and M in RAkEL method. Table 3 shows the full experiment results while comparing BR and LP using different kind of features. Through result above, we notice that LP based method can capture label dependencies and get better performance than BR method, especially when the subset size is large enough to contain sufficient labels. LIWC alone cannot get good result, which Hashing F1 macro-ex. F1 macro-label BR 0.114 LIWC 0.099 fusion 0.115 LP 0.143 0.086 0.142 BR 0.006 0.002 0.006 LP 0.021 0.002 0.021 Table 3: Experiment results, comparing different feature schemes. Note that the total number of labels is 471, so these results are significantly better than random guess. Figure 4: The recommended boards for the topic "Advertise- ment". Different kinds of advertisements are recommended, such as "commercial Ads", "creative" and "vintage". means that this personality feature cannot reflect one's in- terest distribution across different platforms. We show diversification results qualitatively in Figure. 4. The preliminary results qualitatively validate our proposed system, and further research will work on improving each components and perform user study to prove the efficiency and effectiveness of the system, and also on how to model the dynamic nature of the user interests. 5. REFERENCES [1] B. J. Frey and D. Dueck. Clustering by passing messages between data points. Science, 315:972 -- 976, 2007. [2] X. Geng, H. Zhang, Z. Song, Y. Yang, H. Luan, and T.-S. Chua. One of a kind: User profiling by social curation. MM'14. [3] A. Kimura, K. Ishiguro, M. Yamada, A. Marcos Alvarez, K. Kataoka, and K. Murasaki. Image context discovery from socially curated contents. MM '13. [4] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. NIPS '12. [5] J. Pennebaker, M. Francis, and R. Booth. Linguistic inquiry and word count [computer software]. Mahwah, NJ: Erlbaum Publishers, 2001. [6] J. Read. Scalable multi-label classification. 2010. [7] Z. Ren, M.-H. Peetz, S. Liang, W. van Dolen, and M. de Rijke. Hierarchical multi-label classification of social text streams. SIGIR '14. ACM. [8] G. Tsoumakas and I. Vlahavas. Random k-labelsets: An ensemble method for multilabel classification. In Machine Learning: ECML 2007. Springer Berlin Heidelberg, 2007. [9] K. Weinberger, A. Dasgupta, J. Langford, A. Smola, and J. Attenberg. Feature hashing for large scale multitask learning. ICML '09, New York, NY, USA. ACM. [10] M. Yan, J. Sang, and C. Xu. Mining cross-network association for youtube video promotion. MM '14. AdvertisementRecommended boardsRepresentative Pinsvintagecommercialcreative
1803.08251
1
1803
2018-03-22T07:42:58
Life in the "Matrix": Human Mobility Patterns in the Cyber Space
[ "cs.SI", "cs.CY" ]
With the wide adoption of the multi-community setting in many popular social media platforms, the increasing user engagements across multiple online communities warrant research attention. In this paper, we introduce a novel analogy between the movements in the cyber space and the physical space. This analogy implies a new way of studying human online activities by modelling the activities across online communities in a similar fashion as the movements among locations. First, we quantitatively validate the analogy by comparing several important properties of human online activities and physical movements. Our experiments reveal striking similarities between the cyber space and the physical space. Next, inspired by the established methodology on human mobility in the physical space, we propose a framework to study human "mobility" across online platforms. We discover three interesting patterns of user engagements in online communities. Furthermore, our experiments indicate that people with different mobility patterns also exhibit divergent preferences to online communities. This work not only attempts to achieve a better understanding of human online activities, but also intends to open a promising research direction with rich implications and applications.
cs.SI
cs
Life in the Matrix∗: Human Mobility Patterns in the Cyber Space Tianran Hu, Jiebo Luo Department of Computer Science University of Rochester {thu, jluo}@cs.rochester.edu Wei Liu AI Lab Tencent Inc. [email protected] 8 1 0 2 r a M 2 2 ] I S . s c [ 1 v 1 5 2 8 0 . 3 0 8 1 : v i X r a Abstract With the wide adoption of the multi-community setting in many popular social media platforms, the increasing user en- gagements across multiple online communities warrant re- search attention. In this paper, we introduce a novel analogy between the movements in the cyber space and the physical space. This analogy implies a new way of studying human on- line activities by modelling the activities across online com- munities in a similar fashion as the movements among loca- tions. First, we quantitatively validate the analogy by com- paring several important properties of human online activi- ties and physical movements. Our experiments reveal striking similarities between the cyber space and the physical space. Next, inspired by the established methodology on human mobility in the physical space, we propose a framework to study human "mobility" across online platforms. We discover three interesting patterns of user engagements in online com- munities. Furthermore, our experiments indicate that people with different mobility patterns also exhibit divergent prefer- ences to online communities. This work not only attempts to achieve a better understanding of human online activities, but also intends to open a promising research direction with rich implications and applications. Introduction Understanding human activities in online communities not only is the key to computational sociology research (Ren, Kraut, and Kiesler 2007; Zhu, Kraut, and Kittur 2014), but also can offer valuable guidance to the design of online systems (Kraut et al. 2012). Many popular platforms, such as Reddit, 4chan, and StackExchange, adopt the setting of multiple communities for user engagement. Much work has been done on human activities across communities, includ- ing user exploration and participation patterns in more than one community (Tan and Lee 2015; Zhang et al. 2017), and user loyalty under the multi-community setting (Hamilton et al. 2017). However, these studies usually focus on spe- cific aspects of online activities, while a comprehensive and general-purpose framework for studying multi-community activities is still lacking. To overcome the problem, we in- troduce a novel analogy between human online activities ∗A metaphor taken from the hit movie Matrix. The work is to appear at ICWSM 2018. Copyright c(cid:13) 2018, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. and offline physical movements in this paper. Given the rich body of research on human mobility patterns (Barbosa-Filho et al. 2017), such an analogy allows us to borrow the existing approaches and frameworks for analyzing movements in the physical space and apply them to online scenarios with nec- essary adaptation. In this work, we first validate this analogy, and design experiments to reveal striking quantitative simi- larities between human online activities and offline move- ments. We then propose a frameworks for studying users of online platforms, and uncover interesting activity patterns across communities. We draw a strong analogy between the cyber space (i.e. online multi-community platforms such as Reddit)1 and physical space. The communities on the online platforms is then treated as the locations in the cyber space. The intuition of the analogy arises from two aspects: • The activities in the cyber space resemble the movements in the physical space – people move from one commu- nity to another on the platforms, explore new communi- ties, and regularly visit communities with which they are familiar, as do they with physical locations. • The locations in the two spaces (i.e. communities and places) share important similarities – some locations are popular and thus gain large amounts of visitors; some are niche and attract specific groups of visitors; some are private where only authorized visitors have access (e.g. home and private subreddit). Without causing ambiguity, in this paper we may use the movements across locations in the cyber space to refer to the activities across online communities. We quantitatively validate our analogy by comparing the properties of movements in the cyber and physical spaces from three representative and progressive aspects: 1) at a coarse granularity, we first compare the overall visit distribu- tions in the two spaces; 2) at a fine granularity, we then study the visit behavior of individuals; and 3) considering time fac- tors, we further investigate the temporal properties of both cyber and physical movements. The results reveal striking similarities between the movements in the two spaces. For 1We use "cyber space" and "online multi-community plat- forms" interchangeably in this paper for the simplicity of narration. Please note that "cyber space", as sometimes used as a metaphor to the whole Internet, is a wider concept than online platforms. example, the number of visits to an online community is found to fall into the same distribution of the number vis- its to a physical location. Moreover, it is shown that individ- uals visit locations in both spaces following random-walk behavior. More strikingly, the Zipf's law of the movements in the physical space also applies to the movements in the cyber space. In terms of temporal property, we observe an al- most identical returning pattern in both spaces – people tend to return to specific communities/locations on a daily basis. Also, a temporally complementary relation between the two spaces is uncovered – human mobility level is high in the cyber space when the level is low in the physical space, and vice versa. The analogy implies a possibility of modelling the move- ments in the cyber space using the existing approaches for studying physical movements. However, one of the differ- ences between the two spaces is that distance is not univer- sally defined in the cyber space (Hessel, Tan, and Lee 2016; Pavalanathan et al. 2017). Instead of arbitrarily defining the distance concept, we focus on entropy-based approaches that do not require an explicit measurement of distance. En- tropy and its variants have been widely used for analyz- ing the randomness and predictability of individual mobil- ity (Song et al. 2010b), measuring diversity of visitors to a location (Cranshaw et al. 2010), and so on. Following this line of research, we study human mobility in the cyber space. We first study the randomness of human mobility in the cyber space. We discover that mobility randomness varies significantly across people. Some people evenly distribute their visits to many communities, and therefore exhibit high mobility randomness. In contrast, some people only visit a very limited number of communities, and exhibit very low mobility randomness. We then investigate if human mobil- ity in the cyber space evolves over time. By comparing dif- ferent stages of a user's online lifespan, our experiments re- veal three interesting mobility patterns in the cyber space: 1) concentrating on a limited number of communities through- out the whole lifespan; 2) exploring many communities in the early stage, but stopping exploring and concentrating on only a few later on; and 3) focusing on a few communities in the early stage, and starting to explore more and more communities later on. Furthermore, we observe that people of the concentrated pattern are more likely to visit commu- nities of specific topics and smaller sizes, while people of both two exploratory patterns prefer communities of general topics and larger sizes. The main contributions of this paper are threefold: • We introduce a novel analogy between the cyber space and the physical space. This work is intended to first achieve a better understanding of human online activities, and more importantly, initialize a promising new research direction. • We quantitatively examine the validity of the analogy be- tween the cyber space and the physical space. Our experi- ments reveal striking similarities between the two spaces. • We investigate the individual mobility patterns in the cy- ber space. Our results reveal three major patterns of online activities, as well as the different preferences to online communities by the people of the three patterns. Related Work Online Communities Rotman et al. suggest that users interact and share purpose in online groups, and therefore, form sociological commu- nities (Rotman, Golbeck, and Preece 2009). Since then there has been a rich literature studying online communities from various aspects, such as the styles and evolution of commu- nities (Tran and Ostendorf 2016; Lin et al. 2017), differences between communities (Hessel, Tan, and Lee 2016), and so on. The interaction between users and communities has also been investigated. For example, (Danescu-Niculescu-Mizil et al. 2013) studies the changes of linguistic style in online communities, and uncovers the interesting evolution of the interaction patterns between users and communities. Given the wide adoption of the multi-community set- ting on online platforms, more and more attention has been paid to human activities across online communities (Chan, Hayes, and Daly 2010; Pavlick and Tetreault 2016). Zhu et al. report that user participation in multiple communities benefits the survival of communities (Zhu, Kraut, and Kittur 2014). Ren et al. study the common identities within differ- ent communities, and suggest the "bonds" between online communities (Ren, Kraut, and Kiesler 2007). Furthermore, it is reported that community characteristics can affect the user engagement pattern in a community. (Hamilton et al. 2017). For example, a community with a distinctive and dy- namic identity is not only more likely to retain users, but also creates a larger "cultural" gap between senior members and newcomers (Zhang et al. 2017). Tan et al. study the involve- ments of users in more than one communities (Tan and Lee 2015). This work suggests that instead of gradually settling down in previously visited communities, online users keep exploring new but less popular communities. Human Physical Mobility Patterns Much research work has been devoted to human mobility in the physical space on various topics such as individual and group level mobility patterns (De Montjoye et al. 2013; Simini et al. 2012), the temporal-spatial properties of hu- man mobility (Hu et al. 2017), and the relation between in- dividual mobility and social connections (Cho, Myers, and Leskovec 2011). Many studies in modelling human mobil- ity suggest the relation between random-walk models and the movements in the physical space (Gonzalez, Hidalgo, and Barabasi 2008). For example, Song et al. model people in the physical space as randomly moving objects, and pro- pose methods to predict human mobility (Song et al. 2010a). Many interesting temporal patterns of human mobility have also been discovered in previous work. For example, (Cheng et al. 2011) indicates that people return to specific loca- tions on a daily basis, and (Noulas et al. 2011) reports the different mobility levels of people on weekdays and week- ends. Without modelling the distance in the space, a num- ber of entropy-based approaches are proposed to investigate the randomness of human mobility (Cranshaw et al. 2010; Smith et al. 2014). For example, Song et al. study human moving trajectories using entropy, and discover a high pre- dictability in human mobility (Song et al. 2010b). Data Collection and Preprocessing We collect our data from Reddit, which was launched in 2005 and is now one of the most visited websites in the world2. Due to its high popularity, long time span, and al- most complete data availability3, Reddit has been used as the data source in many previous studies (Hamilton et al. 2017; Zhang, Culbertson, and Paritosh 2017). Reddit is organized into thousands topic-based communities (subreddits), and users are allowed to join any communities at will (except for private subreddits). Such a multi-community setting makes Reddit ideal for our study. We download all the posts on Reddit from the website's inception on Dec 2005 to Dec 2016. The dataset contains 2.9 billion posts sent by 21 million users on 430 thousand sub- reddits. Besides text content, each post in the dataset is as- sociated with many other types of information, such as user ID, community ID, time stamp, and so on. We first filter out 0.3 billion posts sent by deleted users (denoted by a user ID of "[deleted]" in the data). We also remove the posts by non- human accounts. To detect non-human accounts (bots), we first collect the users that post with an abnormally high fre- quency (50 thousand+ posts), and take them as possible ex- amples of non-human accounts. We observe the user IDs of these accounts, and summarize a list of terms that frequently occur in these user IDs, such as "-bot", " transcriber", and "Moderator". We take the accounts that contain at least one of these terms in their IDs as non-human accounts, and re- move all the posts sent by these accounts. In total, we fil- ter out 35 million posts sent by 28 thousand user accounts of this kind. After the data cleaning, we further process the data to extract the visit history of each user. To be specific, the visit history of a user records all the communities the user has visited in the chronological order. In other words, visit histories are users' "trajectories" in the cyber space. Our work investigates the mobility patterns across commu- nities by focusing on user visit histories. Different slices of user visit histories may be used for facilitating the different problems studied in this paper. We will specify the data used for each problem in the corresponding section. Analogy between the Two Spaces We first validate the analogy between the cyber space and the physical space. To be specific, we study if the properties of human mobility discovered in the physical space still hold true in the cyber space. On the data collected from Reddit, we conduct the experiments that are originally designed for studying human physical mobility, and compare our results with the conclusions reported in the previous work. Most work on physical mobility is based on data collected in time spans of several months (Barbosa-Filho et al. 2017). To align with the previous work, we collect a data slice containing all the posts on Reddit from January to March 2016. This data 2www.en.wikipedia.org/wiki/Reddit 3Reddit data is made publicly available, and free for download at www.reddit.com/3bxlg7 slice contains 169 million posts sent by 4.6 million users on 161 thousand subreddits (after data cleaning). All the exper- iments in this section are conducted on this data slice. Distributions of Visits At a coarse granularity, we first compare the distributions of the number of visits in both spaces. (Noulas et al. 2011) reports the complementary cumulative distribution function (CCDF) of the number of visits to a physical location, as well as the CCDF of the number of visits per user. Both dis- tributions reportedly have heavy tails. Moreover, the trend of the number of visits to a physical location follows a power- law distribution (a straight line in log-log scale). We plot the CCDF of the number of visits to an online community, as well as the CCDF of the number of visits per user in Fig- ure 1 (a) ∼ (b). The plot shows that both distributions of visits in the cyber space exhibit the same trends as in the physical space. To be specific, both distributions computed from online data also have heavy tails. Moreover, the trend of the number of visits to an online community follows a power-law distribution (Figure 1 (a)). The same trends of the distributions in the two spaces imply the similarities between communities and physical locations, as well as the similarities between the activities across communities and the movements across locations. The heavy tailed distribution of the visit amount to an online community reveals that, similar to physical locations, only a few communities receive a large number of visits, and a higher number of communities have only few visits. Mean- while, the same distributions of visits per user suggest that, in both cyber and physical spaces, a small number of peo- ple contribute a large amount of visits, while the number of visits of most people is low. Human Visit Behavior At a fine granularity, we compare human visit behavior in the two spaces. Much work on human mobility in the physi- cal space suggests the relation between random-walk models and the physical movements of individuals (Gonzalez, Hi- dalgo, and Barabasi 2008; Castellano, Fortunato, and Loreto 2009). Human physical mobility reportedly exhibits two im- portant quantitative characteristics of random-walk behav- ior (Song et al. 2010a): 1) the number of distinct locations visited by a user, de- noted by S(t), follows S(t) ∼ tµ (1) where t is the time the user spent in the space. 2) the frequency fk of the kth most visited location of a user follows Zipf's law, and formally, fk ∼ k−ζ (2) The first characteristic describes the exploration of people in the physical space. The parameter µ is estimated to be smaller than 1 from physical mobility data, indicating a de- creasing tendency of the users to visit new locations through time. The second characteristic indicates that the visits of users are distributed very unevenly, with most visits paid Figure 1: (a) Complementary Cumulative Distribution Function (CCDF) of the number of visits to an online community. (b) CCDF of the number of visits per user. (c) Distribution of the number of visited distinct communities S(t). (d) Distributions of the frequency of the kth most visited community fk for different S values. to a few most visited locations. We follow the exact steps suggested in (Song et al. 2010a) to investigate if these two characteristics still apply to the cyber space. Distribution of Visited Locations For the first character- istic, we first extract the visit histories of all the users from the three month data slice. For a user, we split the visit his- tory into hours, and compute the number of distinct commu- nities visited by the end of each hour, denoted by s(t). Then S(t) is empirically computed as the average of s(t) of all the users. We plot the relation between S(t) and t in Figure 1 (c). The result reveals that in the cyber space the relation S(t) ∼ tµ also holds, suggesting a similar exploration pat- tern of people in the two spaces. Furthermore, the parameter µ is estimated to be 0.4 in our experiment, which is smaller than the estimation in the physical space (0.6 ± 0.02). This indicates that the tendency of user visiting new communities in the cyber space also decreases over time. Moreover, the decreasing tendency is faster in the cyber space than in the physical space. Zipf's Law We then validate the Zipf's law in the cyber space. From the data slice, we select the users who visited S unique communities. Different values of S are experimented as suggested in (Gonzalez, Hidalgo, and Barabasi 2008; Song et al. 2010a). We then sort the communities a user vis- ited according to their visit frequencies. The frequency fk is computed as the average of the visit frequencies to the kth most visited communities of all the users. Please note that k ranges from 1 (most visited) to S (least visited). The rela- tion between fk and k is plotted in Figure 1 (d). The result shows that the Zipf's law fk ∼ k−ζ also applies in the cy- ber space. More strikingly, the parameter ζ is estimated to be 1.12 from our data, which is very close to the results es- Figure 2: Distribution of the returning probability to online communities. timated on physical mobility data (1.2± 0.1). This indicates that people distribute their visits unevenly in a very similar fashion in both the cyber space and physical space. Our experiments reveal the two characteristics also apply to the movements in the cyber space. The results suggest that individuals' trajectories across online communities can also be described using random-walk models. This further implies the similarity between human mobility in the cyber space and the physical space. Temporal Properties Next, we validate our analogy for two well studied tempo- ral properties of human physical mobility: distribution of re- turning probability (Gonzalez, Hidalgo, and Barabasi 2008; Cheng et al. 2011) and hourly mobility levels (Noulas et al. 2011; Hu et al. 2016). Returning probability measures the periodic patterns of human mobility. To be specific, the re- turning probability is the probability that a user returns to a location that the user visited t hours before. In the phys- ical space, the distribution of the returning probability, al- though having an overall decreasing tendency over time, in- creases sharply every 24 hours. This indicates a daily pattern of human mobility – people return to specific locations on a daily basis. Zooming into the hourly level, previous work re- ports a high level of mobility during the daytime and a low level during the nighttime. Furthermore, researchers have observed two peaks in the mobility level around 9am and 7pm on weekdays, matching rush hours in the morning and happy hours in the evening, respectively. As for weekends, human mobility increases rapidly in the morning, and stays at a high level from 2pm to 9pm. Returning Probability We first compute the distribution of returning probability in the cyber space. For each com- munity a user visited, we record the time gap between ev- ery two consecutive visits to the community (i.e. returning time). We then collect the returning time of all the users, and compute the probability of returning to a community in the tth hour. The distribution is plotted in Figure 2. Quite interestingly, we observe an almost identical distribution of returning probability as in the physical space – the probabil- ity has an overall decreasing tendency, but increases sharply every 24 hours. It indicates that people return to specific on- line communities also on a daily basis. Hourly Mobility Level We then compute the mobility level in the cyber space. One of the requirements for com- puting the hourly mobility level is to know the clock time of each movement. However, time stamps on Reddit are recorded in UTC time while no time zone information is available. Fortunately, there are many subreddits on spe- cific cities (e.g. /r/nyc4). Since the topics in a city-specific subreddit are mostly related to the life in the city, we can assume that most posts in such subreddits are sent by the city residents. Therefore, given the time zone of a city, we are able to compute the local time for each post in the city specific subreddit. Following this idea, we first collect the posts from several popular city-specific subreddits such as /r/nyc, /r/boston, /r/LosAngeles, and so on. We then convert the time stamp of each post to the local time of the corre- sponding city. The mobility level of one hour in the cyber space is computed as the percentage of posts in the hour. The mobility levels on both weekdays and weekends in the cyber space are shown in Figure 3. We also plot the mobil- ity levels in the physical world as reported in (Noulas et al. 2011) for a better comparison. Similar to the physical space, we observe that the mobility level in the cyber space is much higher during the daytime than during the nighttime. Also, on weekdays the mobility level in the cyber space varies significantly during the day- time, while on weekends the tendency of the level appears to be relatively flat. More interestingly, Figure 3 shows a complementary relation between the two spaces – when the mobility level is high in the cyber space, the level is low in the physical space, and vice versa. For example, in the phys- ical space, the mobility level during the work hours (from 9am to 5pm) is relatively low on weekdays. On the con- 4On Reddit, a subreddit is denoted as "/r/" + an unique name. Figure 3: Mobility levels in the cyber space over weekdays (left) and weekends (right). Please note that the two subplots share the same y-axis for a better comparison between week- days and weekends. The values of frequency of visits in the physical space are learned from (Noulas et al. 2011). trary, the highest mobility level on weekdays in the cyber space occurs exactly in these hours, indicating that people are more likely to surf the Internet during work hours. The complementary relation can also be observed from the mo- bility level on weekends – in the afternoon when the mobil- ity level is high in the physical space, the mobility level in the cyber space decreases correspondingly. The temporal properties of human online mobility reveal several interesting relations between the cyber space and the physical space. On one hand, people exhibit the same daily returning pattern, and their mobility levels follow the same day-night cycle in both spaces. This suggests that, although in two different spaces, human circadian rhythm remains un- changed. On the other hand, we discover the complemen- tary relation between the two spaces. This makes sense intu- itively – although sometimes people can access online com- munities while in transportation, in most cases they cannot "move" in both spaces at the same time. Human Mobility in the Cyber Space The similarities between the cyber space and the physical spaces imply the possibility of applying the approaches orig- inally designed for human physical mobility to human on- line mobility. In this paper, we borrow the idea of entropy- based approaches (Song et al. 2010b), and study human on- line mobility from three aspects: 1) the randomness of hu- man online mobility, 2) online mobility patterns, and 3) the preferences to online communities by the people of differ- ent mobility patterns. We select entropy-based approaches because such approaches do not require a distance measure- ment, which is not universally defined in the cyber space. Randomness of Mobility in the Cyber Space Entropy is widely applied to measure the randomness of human mobility in the physical space (Smith et al. 2014; Cranshaw et al. 2010). Inspired by the previous work, we use the entropy of the visit histories of a user to measure the randomness of her mobility across online communities. For- mally, the entropy of the visit history of a user u, denoted by larger than 0.9. Please note that a max f rq = 0.9 indicates that the user direct 90% of all the visits to one community. In other words, although these users are active online, they al- most always devote their visits to only one community. The distribution of entropy echoes the finding by showing that over 13% users have an entropy value lower than 1. Mobility Patterns in the Cyber Space Given the diverse mobility randomness across people in the cyber space, a nature follow-up question is: does human on- line mobility change over time? Take the people with very low mobility randomness for an example. We wonder if they always focus on a specific community since they join the platform, or they explore many communities in the begin- ning and discover their favorites later. To study the prob- lem, we focus on the active users whose whole lifespans on the platform are available (Danescu-Niculescu-Mizil et al. 2013; Tan and Lee 2015). In other words, these users have been active on the platform, but left the platform eventually. Therefore, we select the users who used to be active before January 2016 and never post after the time. We apply the same constraints as in the task for choosing active users (i.e. n>2 and total visits>1000). There are around 69,000 users meeting the constraints. We collect the complete visit histo- ries of these users, and conduct our following experiments on this data slice. Methodology Since the total number of visits varies sig- nificantly across users, we first equally divide the lifespan of a user into 20 stages5 as suggested in (Danescu-Niculescu- Mizil et al. 2013). In other words, each stage of a user ac- counts for 5% of all the visits through the user's lifespan. By doing this, we are able to align the stages of all the users, and study the evolution of user mobility over different stages. We then quantify the mobility within each stage of a user. Entropy and max f rq are again used to measure mobility randomness in a stage. However, these two measurements do not quantify to what extent user explore unvisited com- munities over stages. For example, a user could visit two totally different sets of communities in two stages, but with the same mobility randomness. To measure the user explo- ration to new community in a stage, we design another mea- surement P (new comm) – the probability of a user visiting a new community that never has been visited in previous stages. Formally, for the ith stage of a user u, let Vu,i de- note the set of the visits of u in this stage. The set of the visits to the communities that are visited in the ith stage but never have been visited before is denoted as V new . There- fore, P (new comm) is computed as u,i P (new comm) = V new Vu,i u,i (5) For each user, we compute the entropy and max f rq for all the 20 stages in order. We also compute P (new comm) from the second stage to the last stage. We exclude the first stage because all the visits in this stage are directed to new communities, thus the value of P (new comm) of the 5We obtain similar results for other choices of number of stages. Figure 4: Distribution of the entropy of a user's visits to on- line communities (left). Distribution of the frequency of a user's most visited community max f rq (right). Please note that the two subplots share the same y-axis. En(u), is computed as: En(u) = −(cid:88) n pilog(pi), (3) where n denotes the number of unique communities the user visited, and pi is the probability of the user visiting the ith community. In general, entropy measures how precisely the next community a user will visit can be predicted given the visit history. The lower the entropy is, the lower the mobility randomness is. Another more intuitive measurement that de- scribes the randomness of a user's mobility is the frequency to the most visited community, denoted by max f rq(u). Formally, max f rq(u) is computed as max f rq(u) = maxn(pi) (4) Clearly, a larger value of max f rq indicates the user is more focused on a specific community, and therefore implies a lower user mobility randomness. To investigate the mobil- ity randomness in the cyber space, we compute both entropy and max f rq for each user. We conduct the experiments on the same data slice from January to March 2016 in this task, and apply the constraints suggested in (Song et al. 2010b) to remove inactive users (i.e. n>2 and total visits>1000). The distributions of the two measurements are plotted in Figure 4. We observe that mobility randomness varies significantly across users. Over 25% users have an entropy value larger than 4, suggesting that a high randomness of such users' on- line mobility. Please note that an entropy value of 4 indicates that the next community the user will visit could be found on the average in any of 24 = 16 communities. Similarly, over 30% users have a max f rq value lower than 0.3 indicat- ing that many users do not focus on specific communities. Meanwhile, the mobility randomness of a large portion of users in the cyber space is very low. From the distribution of max f rq, we observe that about 17% users have a max f rq value larger than 0.8, and nearly 10% users with a value Figure 5: Three mobility patterns in the cyber spaces extracted by NMF. For a better illustration, we plot the weights of entropy, max f rq, and P (new comm) separately. first stage is 1 for all the users. Using the three measure- ments, we quantify a user's mobility over 20 stages into a 59-dimensional vector. The first 20 dimensions are the en- tropy values of all the stages, the next 20 dimensions are the max f rq values, and the remaining 19 dimensions are the P (new comm) values of the 19 stages (the first stage is ex- cluded). The vectors of all users are then stacked to create a 59×69,000 matrix. This matrix records the mobility over time for all the users. We investigate the patterns of mobility evolution by decomposing the matrix. Since Non-negative Matrix Factorization (NMF) has been successfully used for mining interpretable temporal-spatial human mobility pat- terns (Lee and Seung 1999; Hu et al. 2017), we also apply NMF to complete the decomposition. Mobility Patterns By setting the number of component k to 3, NMF reveals three very interpretable mobility patterns in the cyber space: two exploratory patterns and one con- centrated pattern6. We plot the three patterns in Figure 5 by showing the tendency of the three measurements over stages. We summarize the patterns as follows: • Exploratory Pattern I: The people of this pattern concen- trate on a few communities in the early stages, but explore more and more new communities with high randomness in the late stages. The entropy value of these users is ini- tially low, and increases over stages. Correspondingly, the max f rq value starts at a high level, and decreases over stages. The tendencies of both entropy and max f rq in- dicate that the mobility randomness is low in the begin- ning, and goes up as time goes on. In other words, these user only focus on a limited number of communities at first, but gradually lose their concentrations later. Mean- while, the value of P (new comm) is low in the begin- ning, and increases over stages. This tendency indicates that the users start at a low level of interest in new commu- nities, but explore more and more unvisited communities 6With a k value larger than 3, the two exploratory patterns are further decomposed into smaller but less interpretable components, and the concentrated pattern is barely affected. Therefore, we set k to 3 in our experiments over stages. • Exploratory Pattern II: The people of this pattern is the opposite to the first pattern. They explore many new com- munities in the early stages, but only focus on a few com- munities later. The mobility randomness is initially high, as indicated by a high entropy value and low max f rq value. This suggests that these users do not concentrate on any communities in the beginning. As time goes on, the mobility randomness monotonously decreases, as in- dicated by the decreasing tendency of entropy and the increasing tendency of max f rq over stages. In other words, the users discover their interested communities, and pay more and more attention to these communities. Meanwhile, the decreasing tendency of P (new comm) also suggests that the users pay a large amount of visits to new communities in the early stages, but gradually stop exploring unvisited communities over stages. • Concentrated Pattern: The people of this pattern are very concentrated – they direct almost all their visits to a small and unchanged set of communities through the whole lifespan. In this pattern, both entropy value and P (new comm) value are low for all the stages. This sug- gests that these user only visit specific communities, and rarely explore unvisited communities. Correspondingly, the max f rq is high for all the stages, also indicating the low overall mobility randomness of this pattern. Exploratory Patterns vs. Concentrated Pattern Given the divergent mobility patterns people exhibit in the cyber space, we further investigate the relation between mo- bility pattern and online community preference. For exam- ple, we wonder if the concentrated type people also like to visit communities that the exploratory people usually visit, and if the people of the two exploratory patterns share sim- ilarities in their preferences to communities. We study this problem by converting it to a classification task. In this clas- sification task, we take the three mobility patterns of users as class labels, and attempt to distinguish the three classes only using the communities visited by the users as features. Precision Recall F-1 Score Exploratory I Exploratory II Concentrated avg / total 0.64 0.32 0.77 0.63 0.86 0.10 0.71 0.67 0.74 0.15 0.74 0.63 Table 1: Classification results among the three patterns. Classification among Three Mobility Patterns From the results of NMF, we find the mobility pattern to which a user is assigned the highest weight among the three patterns, and take the mobility pattern as the user's class label. By do- ing so, we obtain around 31,000 and 13,000 users of Ex- ploratory Pattern I and Pattern II, respectively. The around 25,000 remaining users are labelled as the Concentrated Pat- tern. The amounts of visits to different communities of a user are used as the classification features. To be specific, we first remove the unpopular communities that have less than 50 unique users, and obtain 7,526 unique communities. We collect the numbers of visits to the selected communities for each user. TF-IDF is then applied to weight the numbers of visits across all the users, and the weighted results are used as the classification features. We use 80% of the data for training, and the remaining 20% for testing. A logistic re- gression model is employed for the task. The classification results are reported in Table 1. The results show that people of the Concentrated Pattern can be distinguished from the people of Exploratory Pattern I and Pattern II, with a high precision of 0.77 and recall of 0.71. This indicates that concentrated people have different preferences to communities from exploratory people. How- ever, the classifier cannot distinguish people of Exploratory Pattern I and II. Because of the much larger user size of Ex- ploratory Pattern I, a large amount of users of Exploratory Pattern II are classified as Exploratory Pattern I. This leads to the low precision (0.32) and recall (0.1) for Exploratory Pattern II. Due to the same reason, Exploratory Pattern I re- ceives a high recall (0.86) but a low precision (0.64). The results imply that users of the two exploratory patterns share similarities in their community preferences, and therefore cannot be simply distinguished by only using the commu- nity features. Community Preference of Different Patterns From the trained logistic model, we can tell the features (communi- ties) assigned with the highest positive and negative coeffi- cients for distinguishing the users of the Concentrated Pat- tern. These communities are reported in Table 2. Clearly, the communities with the positive coefficients are preferred by the users of the Concentrated Pattern. In contrast, the com- munities with the negative coefficients are preferred by the users of either Exploratory Pattern I or Pattern II. We also report the values of the coefficients and the user sizes of the communities in the table. Two interesting differences can be observed from these two groups of communities. First, the communities preferred by the concentrated type people are much smaller than the communities preferred by the ex- ploratory type people. None of the top five positive com- munities has a user size larger than 100,000, and the small- Subreddit User Size Coefficient top five positive features (communities) top five negative features (communities) /r/stopdrinking /r/thinkpad /r/MinecraftCirclejerk /r/incremental games /r/autism 94,187 24,545 2,508 39,250 21,461 /r/bestof /r/reactiongifs /r/woahdude /r/comics /r/technology 4,841,958 1,260,843 1,571,722 836,383 5,866,352 0.013 0.012 0.011 0.011 0.011 -0.083 -0.064 -0.051 -0.050 -0.041 Table 2: Five top positive and negative features (communi- ties) for classifying the people of the Concentrated Pattern. We list the communities along with their user sizes and the values of the coefficients. est only has a user size of 2,500. In contrast, four of the top five negative communities have a user size larger than 1 million. Furthermore, the communities preferred by the concentrated type users are usually on specific topics. For example, in the top five positive communities, two com- munities are on specific games (/r/MinecraftCirclejerk and /r/incremental games), two communities are on personal is- sues (/r/stopdrinking and /r/autism), and one community is on a specific product (/r/thinkpad). In contrast, the top five negative communities are all on general topics such as /r/bestof and /r/reactiongifs. Conclusion & Future Work In this paper, we present a novel analogy between the cyber space and the physical space. We quantitatively validate the analogy from three representative and progressive aspects: visit distributions, individual visit behavior, and temporal properties. Our experiments on the three aspects all reveal striking the similarities between human mobility in the two spaces. Next, we study human online activities by treating the communities as locations in the cyber space, and ac- tivities across communities as movements across locations. By applying the framework originally designed for studying human physical mobility, we investigate the mobility pat- terns in the cyber space. It is observed that the randomness of online mobility varies significantly across users. Further- more, we study the evolution of human mobility in the cyber space, and discover three interesting exploration patterns of by users of online communities. Moreover, our experiments suggest divergent preferences to different online communi- ties across people of different patterns. Our work provides valuable insights into the human activities under the multi- community setting. More importantly, we uncover the in- teresting similarity between the two spaces, and suggest a promising research direction. In the future, we plan to build upon our work mainly from two aspects. First, we would like to quantify the "cost" of users moving among communities, i.e. the "distance" in the cyber space. Such a distance measurement would allow us to apply more well-established frameworks for modelling the physical movements to the online scenarios. Second, we would like to study online communities by borrowing the approaches developed for studying physical locations. Much previous work discusses the characteristics of physical loca- tions. It would be interesting to see if the locations in the cyber space exhibit similar characteristics. References Barbosa-Filho, H.; Barthelemy, M.; Ghoshal, G.; James, C. R.; Lenormand, M.; Louail, T.; Menezes, R.; Ramasco, J. J.; Simini, F.; and Tomasini, M. 2017. Human mobility: models and applications. arXiv preprint arXiv:1710.00004. Castellano, C.; Fortunato, S.; and Loreto, V. 2009. Statisti- cal physics of social dynamics. Reviews of modern physics 81(2):591. Chan, J.; Hayes, C.; and Daly, E. M. 2010. Decompos- ing discussion forums and boards using user roles. ICWSM 10:215–218. Cheng, Z.; Caverlee, J.; Lee, K.; and Sui, D. Z. 2011. Ex- ploring millions of footprints in location sharing services. ICWSM 2011:81–88. Cho, E.; Myers, S. A.; and Leskovec, J. 2011. Friendship and mobility: user movement in location-based social net- works. In Proceedings of the 17th ACM SIGKDD interna- tional conference on Knowledge discovery and data mining, 1082–1090. ACM. Cranshaw, J.; Toch, E.; Hong, J.; Kittur, A.; and Sadeh, N. 2010. Bridging the gap between physical location and on- In Proceedings of the 12th ACM in- line social networks. ternational conference on Ubiquitous computing, 119–128. ACM. Danescu-Niculescu-Mizil, C.; West, R.; Jurafsky, D.; Leskovec, J.; and Potts, C. 2013. No country for old mem- bers: User lifecycle and linguistic change in online commu- nities. In Proceedings of the 22nd international conference on World Wide Web, 307–318. ACM. De Montjoye, Y.-A.; Hidalgo, C. A.; Verleysen, M.; and Blondel, V. D. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3:1376. Gonzalez, M. C.; Hidalgo, C. A.; and Barabasi, A.-L. 2008. Understanding individual human mobility patterns. Nature 453(7196):779–782. Hamilton, W. L.; Zhang, J.; Danescu-Niculescu-Mizil, C.; Jurafsky, D.; and Leskovec, J. 2017. Loyalty in online com- munities. arXiv preprint arXiv:1703.03386. Hessel, J.; Tan, C.; and Lee, L. 2016. Science, askscience, and badscience: On the coexistence of highly related com- munities. In ICWSM, 171–180. Hu, T.-r.; Luo, J.-b.; Kautz, H.; and Sadilek, A. 2016. Home location inference from sparse and noisy data: models and applications. Frontiers of Information Technology & Elec- tronic Engineering 17(5):389–402. Hu, T.; Bigelow, E.; Luo, J.; and Kautz, H. 2017. Tales of two cities: Using social media to understand idiosyncratic lifestyles in distinctive metropolitan areas. IEEE Transac- tions on Big Data 3(1):55–66. Kraut, R. E.; Resnick, P.; Kiesler, S.; Burke, M.; Chen, Y.; Kittur, N.; Konstan, J.; Ren, Y.; and Riedl, J. 2012. Build- ing successful online communities: Evidence-based social design. Mit Press. Lee, D. D., and Seung, H. S. 1999. Learning the parts of objects by non-negative matrix factorization. Nature 401(6755):788–791. Lin, Z.; Salehi, N.; Yao, B.; Chen, Y.; and Bernstein, M. S. 2017. Better when it was smaller? community content and behavior after massive growth. In ICWSM, 132–141. Noulas, A.; Scellato, S.; Mascolo, C.; and Pontil, M. 2011. An empirical study of geographic user activity patterns in foursquare. ICWSM 11:70–573. Pavalanathan, U.; Fitzpatrick, J.; Kiesling, S.; and Eisen- stein, J. 2017. A multidimensional lexicon for interpersonal In Proceedings of the 55th Annual Meeting stancetaking. of the Association for Computational Linguistics (Volume 1: Long Papers), volume 1, 884–895. Pavlick, E., and Tetreault, J. 2016. An empirical analysis of formality in online communication. Transactions of the Association for Computational Linguistics 4:61–74. Ren, Y.; Kraut, R.; and Kiesler, S. 2007. Applying common identity and bond theory to design of online communities. Organization studies 28(3):377–408. Rotman, D.; Golbeck, J.; and Preece, J. 2009. The com- munity is where the rapport is–on sense and structure in the youtube community. In Proceedings of the fourth interna- tional conference on Communities and technologies, 41–50. ACM. Simini, F.; Gonz´alez, M. C.; Maritan, A.; and Barab´asi, A.- L. 2012. A universal model for mobility and migration pat- terns. Nature 484(7392):96–100. Smith, G.; Wieser, R.; Goulding, J.; and Barrack, D. 2014. A refined limit on the predictability of human mobility. In Pervasive Computing and Communications (PerCom), 2014 IEEE International Conference on, 88–94. IEEE. Song, C.; Koren, T.; Wang, P.; and Barab´asi, A.-L. 2010a. Modelling the scaling properties of human mobility. Nature Physics 6(10):818–823. Song, C.; Qu, Z.; Blumm, N.; and Barab´asi, A.-L. 2010b. Science Limits of predictability in human mobility. 327(5968):1018–1021. Tan, C., and Lee, L. 2015. All who wander: On the prevalence and characteristics of multi-community engage- ment. In Proceedings of the 24th International Conference on World Wide Web, 1056–1066. International World Wide Web Conferences Steering Committee. Tran, T., and Ostendorf, M. 2016. Characterizing the lan- guage of online communities and its relation to community reception. arXiv preprint arXiv:1609.04779. Zhang, J.; Hamilton, W. L.; Danescu-Niculescu-Mizil, C.; Jurafsky, D.; and Leskovec, J. 2017. Community iden- tity and user engagement in a multi-community landscape. arXiv preprint arXiv:1705.09665. Zhang, A. X.; Culbertson, B.; and Paritosh, P. 2017. Charac- terizing online discussion using coarse discourse sequences. Zhu, H.; Kraut, R. E.; and Kittur, A. 2014. The impact of membership overlap on the survival of online communities. In Proceedings of the SIGCHI Conference on Human Fac- tors in Computing Systems, 281–290. ACM.
1911.05464
1
1911
2019-11-04T17:19:39
Mining urban lifestyles: urban computing, human behavior and recommender systems
[ "cs.SI", "cs.CY", "cs.LG", "stat.ML" ]
In the last decade, the digital age has sharply redefined the way we study human behavior. With the advancement of data storage and sensing technologies, electronic records now encompass a diverse spectrum of human activity, ranging from location data, phone and email communication to Twitter activity and open-source contributions on Wikipedia and OpenStreetMap. In particular, the study of the shopping and mobility patterns of individual consumers has the potential to give deeper insight into the lifestyles and infrastructure of the region. Credit card records (CCRs) provide detailed insight into purchase behavior and have been found to have inherent regularity in consumer shopping patterns; call detail records (CDRs) present new opportunities to understand human mobility, analyze wealth, and model social network dynamics. In this chapter, we jointly model the lifestyles of individuals, a more challenging problem with higher variability when compared to the aggregated behavior of city regions. Using collective matrix factorization, we propose a unified dual view of lifestyles. Understanding these lifestyles will not only inform commercial opportunities, but also help policymakers and nonprofit organizations understand the characteristics and needs of the entire region, as well as of the individuals within that region. The applications of this range from targeted advertisements and promotions to the diffusion of digital financial services among low-income groups.
cs.SI
cs
Mining urban lifestyles: urban computing, human behavior and recommender systems Sharon Xu1, Riccardo Di Clemente2,3, and Marta C. Gonz´alez4,5* 1Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139, USA 2Centre for Advanced Spatial Analysis, University College London, London WC1E 6BT, GBR 3Department of Computer Science, University of Exeter, Exeter EX4 4PY, GBR 4Department of City and Regional Planning, UC Berkeley, 406 Wurster Hall, Berkeley, 94720, USA 3Lawrence Berkeley National Laboratory, Cyclotron Road, Berkeley, 94720, USA *[email protected] This is a postprint of the 5th chapter published in the book Big Data Recommender Systems - Volume 2: Application Paradigms and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library DOI: 10.1049/PBPC035G_ch5 In the last decade, the digital age has sharply redefined the way we study human behavior. With the advancement of data storage and sensing technologies, electronic records now encompass a diverse spectrum of human activity, ranging from location data1, 2, phone3, 4 and email communication5 to Twitter activity6 and open-source contributions on Wikipedia and OpenStreetMap7, 8. In particular, the study of the shopping and mobility patterns of individual consumers has the potential to give deeper insight into the lifestyles and infrastructure of the region. Credit card records (CCRs) provide detailed insight into purchase behavior and have been found to have inherent regularity in consumer shopping patterns9; call detail records (CDRs) present new opportunities to understand human mobility10, analyze wealth11, and model social network dynamics12. Regarding the analysis of CDR data, there exists a wide body of work characterizing human mobility patterns. As a notable example,10 describes the temporal and spatial regularity of human trajectories, showing that each individual can be described by a time independent travel distance and a high probability of returning to a small number of locations. Further, the authors are able to model individual travel patterns using a single spatial probability distribution. There has also been work at the intersection of similar datasets, such as the inference of friendships from mobile phone data13, or the analysis such data in relation to metrics on spending behavior such as diversity, engagement, and loyalty14. Recent work15 uses the Jaccard distance as a similarity measure on motifs among spending categories, then applies community detection algorithms to find clusters of users. These studies propose models for either mobility or spending behavior, but not in conjunction. The only known paper that incorporates both aspects16 frames its analysis only on an aggregate scale of city regions. However, the coupled collaborative filtering methods (also known as collective matrix factorization) used in16 have been successfully applied in a variety of urban computing applications for data fusion and prediction17 -- 19, from location-based activity recommendations20, 21 to travel speed estimation on road segments22. Recent work includes methods that use Laplacian regularization23 to leverage social network information, and use geometric deep learning matrix completion methods to model nonlinearities24. In this chapter, we jointly model the lifestyles of individuals, a more challenging problem with higher variability when compared to the aggregated behavior of city regions. Using collective matrix factorization, we propose a unified dual view of lifestyles. Understanding these lifestyles will not only inform commercial opportunities, but also help policymakers and nonprofit organizations understand the characteristics and needs of the entire region, as well as of the individuals within that region. The applications of this range from targeted advertisements and promotions to the diffusion of digital financial services among low-income groups. Mining Shopping and Mobility Patterns Location and transactional data offer valuable perspectives on the lifestyles of each user. For example, we may expect the shopping purchases of middle-aged parents to include groceries and fuel, while their mobility patterns may center around locali- ties near home and work locations, in addition to points of interest such as supermarket, laundry, and so on. We use mobility information to aid in the prediction of shopping behavior, connecting the two views using collective matrix factorization25. In 1 this way, we discover representative patterns relating shopping and mobility, characterizing behavior for a richer understanding into urban lifestyles and improved prediction of behavior. The high granularity of such digital records allows modeling at the level of the individual, providing a new framework in which to relate movement and spending. However, in using CDR data for data on individuals, we must deal with issues of sparsity and lack of contextual information on the user's activities. In proposing this dual view of lifestyles, our contributions can be summarised as follows: Prediction of Shopping Behavior with Data Sparsity There are many individuals for which we have no CDR data. To deal with this data sparsity issue, we construct a framework that uses mobility patterns as supplementary information in the prediction of shopping behavior. We connect the two perspectives on lifestyles using collective matrix factorization (collective matrix factorization). In comparison to modeling only shopping behavior, we find that incorporating mobility information in the prediction of shopping lifestyles leads to a significant reduction in root mean square error (RMSE). Adding Contextual Information to Location Data We transform mobility data using external data sources to better relate CCR to CDR Data. Although CCRs provide high granularity at the level of the individual user, spatial granularity can range from a radius of 200 - 1000 meters, and there is no contextual information for the user's activities within that region. Thus, there has been little previous work leveraging CCR data for prediction with CDR data. Multi-Perspective Lifestyles We describe the mappings between shopping and mobility patterns, connecting the two views to provide a novel understanding of consumer behavior in urban regions. Data The primary datasets used in this chapter consist of two sets of anonymised data for residents in Mexico throughout five months in 2015: • Call detail records (CDRs). CDRs are produced with each telephone exchange, These kocation records give the nearest cellular tower at the time of a placed call. There are 1192 cell towers throughout Mexico City -- as users tend to visit a small subset of these towers, this mobility data is extremely sparse. In a count matrix denoting user visits to towers, 98% of entries indicate zero visits. • Credit card records (CCRS). CCRs are recorded with each purchase and denote the purchase category, or Merchant Category Code (MCC), of the transaction as well as the amount spent. Each month, we have on the order of 10 million financial transactions and 200 million location records. Discovering Shopping Patterns Our spending habits reflect our lifestyles, capturing an essential aspect of our behavior. Within the computational social science community, the question remains whether pervasive trends exist among disparate groups at urban scale15. In this chapter, we use latent Dirichlet allocation (LDA)26 to identify topics (behavioral patterns) among individuals, representing each individual's spending lifestyle as a finite mixture of an underlying set of behaviors. Each behavioral pattern, in turn, is modeled as a mixture of a set of words (Merchant Category Codes, or MCCs). These topics are determined by co-occurrences of words within a document. For example, in an article database, we may uncover a topic containing the words "data", "processing", "computer", and so on because these words frequently appear in an article together. By putting a Dirichlet prior on the per-user behavior distribution and per-behavior MCC distribution, LDA controls the sparsity of the number of topics per document (the number of behaviors per individual), as well as the number of words per topic (the number of MCCs per behavioral pattern). In this way, each individual is represented by a small number of behaviors, and each behavior involves making a small set of purchase categories with high frequency. As a generative model, LDA allows us to calculate the probabilities (assignments to shopping behaviors) of previously unseen users. We train the model on 40% of the users, and generate the matrix S for the remaining 60%. In so doing, we set up the prediction of lifestyles for unseen users, assessing the LDA model itself in addition to the relation of shopping with mobility patterns. We experiment with the choice of number of behaviors to learn, as well as adding a categorical variable describing amount spent to each MCC. To maximise interpretability, we choose five topics while using MCCs as input only. 2/8 Figure 1. Our framework In Fig. 2 we plot the twenty most highly weighted MCCs of the five shopping behaviors. The first shopping behavior describes credit card usage that is centered on food-related purchases such as Grocery Stores, Misc. Food Stores and Restaurants. The second shopping behavior seems to be associated primarily with business purchases, with spending within MCCs such as Fax Services and Financial Institutions. The third shopping behavior is dominated by relative "luxuries" such as purchases in the Cable and Department Store categories, and is characterised by a relatively high proportion of Air Travel and Hotel Lodging MCCs. The fourth shopping behavior contains primarily purchases in Computer Network Services and Service Stations (gas stations). The third and fourth shopping behavior describe a slightly wealthier portion of the population, as only 35% of Mexicans owned a computer in 201027, and only 44.2% own a car28. Lastly, the fifth shopping behavior captures purchase primarily for toll fees and subscription services. Mobility Pattern Extraction Extracting Cellular Tower Location Types Within the CDR data, each tower is the site for a corresponding cell within the Voronoi diagram; i.e., it is the closest tower to any point within this cell. We define a "visit" to a cellular tower as a call placed within its corresponding cell. In order to relate cellular towers to spending behavior, for each tower we crawl Google's API for points of interest within a certain radius. To determine this radius, we use Delaunay triangulation, a widely used method in computational geometry. Delaunay triangulation gives the dual graph to the Voronoi diagram, maximizing the minimum angle among all the triangles within the triangulation, and connecting the sites in a nearest-neighbor fashion29. For each tower, we set the crawling radius to be half the average distance from the site to its neighbors. 3/8 Figure 2. The top weighted purchase categories of the five shopping behaviors learned from LDA. Treating each of the Voronoi cells as a document and the POI categories as words, we use latent Dirichlet allocation to discover underlying tower "classes" that will be more informative of shopping behavior. We remove from the vocabulary any POI categories that occur with over 25% frequency. These removed categories are uninformative classifications such as "point of interest" and "establishment". For purposes of interpretability, we learn the LDA model with twenty classes on the 1192 towers. In Fig. 3, we show a subset of tower classes highly weighted within our final lifestyles (see Section 6), and the corresponding points of interest with the highest probabilities. From the sample topics in Fig. 4, we see each tower class puts specific emphasis on related points of interest, such as "hospital" and "doctor", "car rental" and "car repair", or "book store" and "library". In this way, we cluster the towers in terms of nearby POI categories, obtaining contextual information more directly related to shopping. Baseline Methods Before introducing our model, we present the results of several baseline methods, illustrating the challenges of incorporating CDR data into the prediction of shopping patterns. Regression on Average Amount Spent Using the columns of the per tower count matrix W directly as features, we use regression with L1 regularization to predict the average amount spent by the user per week. As we increase regularization we increase the test R-squared, but due to a combination of sparsity and lack of signal achieve a maximum test R-squared of 0 as the coefficients shrink to 0. Classification of Primary Shopping Behavior For each user, we take as our outcome the highest weighted shopping behavior from the topic proportions learned from LDA. This is the user's primary behavior. Again using the columns of W as our features, we employ a range of classifiers including 4/8 Figure 3. The top weighted POI categories of a subset of tower classes learned from LDA. Figure 4. Sample topics from learned from LDA, treating each tower as a document and each POI as a word. SVM and AdaBoost to predict primary behavior. We find that the best classifier achieves only 21.6% accuracy, when already 21.9% of users fall into a single class. 5/8 Characterizing Mobility Patterns From the Voronoi diagram of the p cell tower locations, we construct a matrix W ∈ Rnxp where each entry wi j is the number of days individual i visited tower j throughout five months. We weight these counts using TF-IDF, a common method for text representation30. Using TF-IDF, we offset the tower counts by the frequency of the tower in the data, so that a user's visit to an uncommonly visited tower is assigned a higher weight. We now have a matrix W ∈ Rnxp that characterises users in terms of tower visits, and a matrix Cm ∈ Rpxd, where d is the chosen number of tower classes. We define our mobility pattern matrix as M = W T , achieving a significant dimensionality reduction with M ∈ Rnxd. In this manner, we obtain a representation of mobility more closely related to shopping behavior, as users are now characterised by their visits to tower classes defined by POI categories. Predicting Shopping Behavior For many users, we have access to data on mobility patterns (M) but not shopping patterns (S). In this section, we describe our methodology for incorporating mobility information in addition to shopping information for the matrix completion problem of predicting the shopping behavior of unseen users. Collective Matrix Factorization We denote S as the matrix of behavior proportions obtained from latent Dirichlet allocation, and M as the matrix of weighted visit frequencies to the different tower classes. Modeling each user's shopping and mobility behavior as two views of the same lifestyle, we assume that S and M are generated from a matrix Ul containing the latent lifestyle information of each user. s S ≈ UlV T M ≈ UlV T m Traditionally, the objective function under this model is represented as L (Ul,Vs,Vm) = S−UlV T s 2 +M −UlV T m 2 + λ1Ul2 + λ2Vs2 + λ3Vm2 In this chapter, we use group-wise sparse collective matrix factorization31, which puts group-sparse priors following N (0,σ 2 k ) on the columns of matrices Vs and Vm, where the columns are the groups indexed by k and σ 2 k is small. This allows the matrix to learn private factors for the relation between latent lifestyles (Ul) and the shopping aspect (Vs), and correspondingly between latent lifestyles (Ul) and the mobility aspect (Vm). More specifically, if the kth column of Vm is null, then the kth factor impacts only the shopping pattern matrix S. Results Prediction In our problem, credit card data is unknown for many users, but we would like to use mobility information to predict their shopping behavior; i.e., S contains many empty rows. Thus, to test the performance within this setting, we remove rows from the shopping behavior S to predict the shopping behavior of users for which we have no credit card information. We use 10-fold cross validation and compare our collective matrix factorization predictions with the actual values. We use the popular metric root mean square error (RMSE) to evaluate our model. (cid:115) 1 T ∑ i, j RMSE = (Si, j − Si, j)2 Using cross-validation to determine the rank (number of lifestyles), we find that the inclusion of mobility data leads to a 1.3% decrease in RMSE and obtain a test error of 21.6%. Dual Lifestyles Using collective matrix factorization, we also obtain both the dual shopping and mobility views of these latent lifestyles, in Vs and Vm respectively. Lifestyle 1 is connected with wealthier shopping behavior typical common to urban white collars. The top weighted shopping patterns indicate spending on cable, air travel, hotels and at department stores as well as gas stations and computer network services (Fig. 2: behaviors 3 and 4, respectively). This suggests that people who can afford to spend on relative luxuries tend to 6/8 have vehicles and thus higher mobility, visiting a wider range of tower classes. The mobility patterns of this lifestyle focus on areas with points of interest such as universities, accounting, electronics, bakeries and car repair (Fig. 3: tower classes 6, 7, 12, 17 and 20). Lifestyle 2 is extremely food-oriented, with high weight on shopping behavior 1. Mobility patterns suggest visits to cafes, gyms and convenience stores. Lifestyle 3 primarily captures the transportation aspect of lifestyles. Top weighted mobility patterns indicate visits to areas with car rental and car repair (tower classes 10 and 12), while shopping patterns include gas stations in behavior 4 and food in behavior 1. Discussion In this study, we relate the shopping and mobility patterns of consumers on an individual level for the first time. Viewing these as aspects of the same underlying lifestyle, we set up a framework to incorporate CDR data in the prediction of shopping patterns for unseen users. We achieve a significant increase in prediction and recover interesting relationships between shopping and mobility. There are many directions for future work. In terms of modeling formulation, it would be interesting to introduce a temporal dimension into the task of shopping prediction, as human behavior and needs vary over time. There is also the opportunity to include social regularization in the collective matrix factorization formulation, constraining each user to be similar to his or her neighborhood. In addition, stronger prediction methods may be achieved by modeling nonlinear relationships using geometric deep learning methods described by24. Acknowledgements We thank Grandata for supplying the data. (For contractual and privacy reasons, the raw data cannot be provided.) References 1. Song, C., Qu, Z., Blumm, N. & Barabási, A. L. Limits of predictability in human mobility. Science 327, 1018 -- 1021, DOI: 10.1126/science.1177170 (2010). 2. Hasan, S., Schneider, C. M., Ukkusuri, S. V. & González, M. C. Spatiotemporal Patterns of Urban Human Mobility. J. Stat. Phys. 151, 304 -- 318, DOI: 10.1007/s10955-012-0645-0 (2013). 3. Jo, H.-H., Karsai, M., Kertész, J. & Kaski, K. Circadian pattern and burstiness in mobile phone communication. New J. Phys. 14, 013055xw, DOI: 10.1088/1367-2630/14/1/013055 (2012). 4. Aledavood, T. et al. Daily rhythms in mobile telephone communication. PLoS ONE 10, e0138098, DOI: 10.1371/journal. pone.0138098 (2015). 5. Malmgren, R. D., Stouffer, D. B., Motter, A. E. & Amaral, L. A. A Poissonian explanation for heavy tails in e-mail communication. Proc. Natl. Acad. Sci. United States Am. 105, 18153 -- 18158, DOI: 10.1073/pnas.0800332105 (2008). 6. ten Thij, M., Bhulai, S. & Kampstra, P. Circadian patterns in twitter. Data Anal. 2014 12 -- 17 (2014). 7. Yasseri, T., Sumi, R. & Kertész, J. Circadian patterns of wikipedia editorial activity: A demographic analysis. PLoS ONE 7, e30091, DOI: 10.1371/journal.pone.0030091 (2012). 8. Yasseri, T., Quattrone, G. & Mashhadi, A. Temporal analysis of activity patterns of editors in collaborative mapping project of openstreetmap. In Proceedings of the 9th International Symposium on Open Collaboration, WikiSym + OpenSym 2013, 13, DOI: 10.1145/2491055.2491068 (ACM, 2013). 9. Krumme, C., Llorente, A., Cebrian, M., Pentland, A. & Moro, E. The predictability of consumer visitation patterns. Sci. Reports 3, DOI: 10.1038/srep01645 (2013). 10. González, M. C., Hidalgo, C. A. & Barabási, A. L. Understanding individual human mobility patterns (Nature (2008) 453, (779-782)). Nature 458, 238, DOI: 10.1038/nature07850 (2009). 11. Blumenstock, J., Cadamuro, G. & On, R. Predicting poverty and wealth from mobile phone metadata. Science 350, 1073 -- 1076, DOI: 10.1126/science.aac4420 (2015). 7/8 12. Morse, S., Gonzalez, M. C. & Markuzon, N. Persistent cascades: Measuring fundamental communication structure in social networks. Proc. - 2016 IEEE Int. Conf. on Big Data, Big Data 2016 969 -- 975, DOI: 10.1109/BigData.2016.7840695 (2016). 13. Eagle, N., Pentland, A. & Lazer, D. Inferring friendship network structure by using mobile phone data. Proc. Natl. Acad. Sci. United States Am. 106, 15274 -- 15278, DOI: 10.1073/pnas.0900282106 (2009). 14. Singh, V. K., Freeman, L., Lepri, B. & Pentland, A. S. Predicting Spending Behavior Using Socio-mobile Features. In 2013 International Conference on Social Computing, SOCIALCOM '13, 174 -- 179, DOI: 10.1109/SocialCom.2013.33 (IEEE, Washington, DC, USA, 2013). 15. Di Clemente, R. et al. Sequences of purchases in credit card data reveal lifestyles in urban populations. Nat. Commun. 9, DOI: 10.1038/s41467-018-05690-8 (2018). 16. Hu, T., Song, R., Wang, Y., Xie, X. & Luo, J. Mining shopping patterns for divergent urban regions by incorporating mobility data. In International Conference on Information and Knowledge Management, Proceedings, vol. 24-28-Octo, 569 -- 578, DOI: 10.1145/2983323.2983803 (ACM, 2016). 17. Zheng, Y. Methodologies for Cross-Domain Data Fusion: An Overview. IEEE Transactions on Big Data 1, 16 -- 34, DOI: 10.1109/tbdata.2015.2465959 (2015). 18. Zheng, Y., Capra, L., Wolfson, O. & Yang, H. Urban computing: concepts, methodologies, and applications. ACM Transactions on Intell. Syst. Technol. (TIST) 5, 38, DOI: 10.1145/2629592 (2014). 19. Zheng, Y. Trajectory data mining: An overview. ACM Transactions on Intell. Syst. Technol. 6, 29, DOI: 10.1145/2743025 (2015). 20. Zheng, V. W., Zheng, Y., Xie, X. & Yang, Q. Collaborative location and activity recommendations with GPS history data. In Proceedings of the 19th International Conference on World Wide Web, WWW '10, 1029 -- 1038, DOI: 10.1145/1772690. 1772795 (ACM, 2010). 21. Zheng, V. W., Cao, B., Zheng, Y., Xie, X. & Yang, Q. Collaborative filtering meets mobile recommendation: A user-centered approach. In Proceedings of the National Conference on Artificial Intelligence, vol. 1, 236 -- 241 (2010). 22. Shang, J., Zheng, Y., Tong, W., Chang, E. & Yu, Y. Inferring gas consumption and pollution emission of vehicles throughout a city. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1027 -- 1036, DOI: 10.1145/2623330.2623653 (ACM, 2014). 23. Leng, C., Zhang, H., Cai, G., Cheng, I. & Basu, A. Graph regularized Lp smooth non-negative matrix factorization for data representation. IEEE/CAA J. Autom. Sinica 6, 584 -- 595, DOI: 10.1109/JAS.2019.1911417 (2019). 24. Bronstein, M. M., Bruna, J., Lecun, Y., Szlam, A. & Vandergheynst, P. Geometric Deep Learning: Going beyond Euclidean data. IEEE Signal Process. Mag. 34, 18 -- 42, DOI: 10.1109/MSP.2017.2693418 (2017). 25. Singh, A. P. & Gordon, G. J. Relational learning via collective matrix factorization. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '08, 650 -- 658, DOI: 10.1145/1401890.1401969 (ACM, New York, NY, USA, 2008). 26. Blei, D. M., Ng, A. Y. & Jordan, M. I. Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993 -- 1022, DOI: 10.1016/ b978-0-12-411519-4.00006-9 (2003). 27. Villagram, L. For most Mexicans, the digital age is still out of reach, vol. 16 (Dallas News, 2012). 28. Morales, S. E., Cosart, T. & Holben, W. E. Bacterial gene abundances as indicators of greenhouse gas emission in soils. The ISME J. 4, 799 -- 808, DOI: 10.1038/ismej.2010.8 (2010). 29. Aurenhammer, F. Voronoi diagrams -- a survey of a fundamental geometric data structure. ACM Comput. Surv. (CSUR) 23, 345 -- 405, DOI: 10.1145/116873.116880 (1991). 30. Zhang, W., Yoshida, T. & Tang, X. A comparative study of TF*IDF, LSI and multi-words for text classification. Expert. Syst. with Appl. 38, 2758 -- 2765, DOI: 10.1016/j.eswa.2010.08.066 (2011). 31. Klami, A., Bouchard, G. & Tripathi, A. Group-sparse embeddings in collective matrix factorization. 2nd Int. Conf. on Learn. Represent. ICLR 2014 - Conf. Track Proc. (2014). 1312.5921. 8/8
1503.00322
2
1503
2015-12-11T12:50:57
Seeded PageRank Solution Paths
[ "cs.SI" ]
We study the behavior of network diffusions based on the PageRank random walk from a set of seed nodes. These diffusions are known to reveal small, localized clusters (or communities) and also large macro-scale clusters by varying a parameter that has a dual-interpretation as an accuracy bound and as a regularization level. We propose a new method that quickly approximates the result of the diffusion for all values of this parameter. Our method efficiently generates an approximate $\textit{solution path}$ or $\textit{regularization path}$ associated with a PageRank diffusion, and it reveals cluster structures at multiple size-scales between small and large. We formally prove a runtime bound on this method that is independent of the size of the network, and we investigate multiple optimizations to our method that can be more practical in some settings. We demonstrate that these methods identify refined clustering structure on a number of real-world networks with up to 2 billion edges.
cs.SI
cs
1 Seeded PageRank Solution Paths D. F. Gleich 1, and K. Kloster 2 1 Department of Computer Science, Purdue University, West Lafayette IN, USA 2 Department of Mathematics, Purdue University, West Lafayette IN, USA email: [email protected] email: [email protected] We study the behavior of network diffusions based on the PageRank random walk from a set of seed nodes. These diffusions are known to reveal small, localized clusters (or communities) and also large macro-scale clusters by varying a parameter that has a dual-interpretation as an accuracy bound and as a regularization level. We propose a new method that quickly approximates the result of the diffusion for all values of this parameter. Our method efficiently generates an approximate solution path or regularization path associated with a PageRank diffusion, and it reveals cluster structures at multiple size-scales between small and large. We formally prove a runtime bound on this method that is independent of the size of the network, and we investigate multiple optimizations to our method that can be more practical in some settings. We demonstrate that these methods identify refined clustering structure on a number of real-world networks with up to 2 billion edges. Key Words: 05C81 Random walks on graphs; 05C50 Graphs and linear algebra (matrices, eigenvalues, etc.); 90C35 Programming involving graphs or networks; 91D30 Social networks; 05C82 Small world graphs, complex networks 1 Introduction Networks describing complex technological and social systems display many types of structure. One of the most important types of structure is clustering because it reveals the modules of technological systems and communities within social systems. A tremendous number of methods and objectives have been proposed for this task (survey articles include refs. [26, 30]). The vast majority of these methods seek large regions of the graph that display evidence of local structure. For the case of modularity clustering, methods seek statistically anomalous regions; for the case of conductance clustering, methods seek dense regions that are weakly connected to the rest of the graph. All of the objective functions designed for these clustering approaches implicitly or explicitly navigate a trade-off between cluster size and the underlying clustering signal. For example, large sets tend to be more anomalous than small sets. Note that these trade-offs are essential to multi-objective optimization, and the choices in the majority of methods are natural. Nevertheless, directly optimizing the objective makes it difficult to study these structures 2 D. F. Gleich and K. Kloster as they vary in size from small to large because of these implicit or explicit biases. This intermediate regime represents the meso-scale structure of the network. In this manuscript, we seek to study structures in this meso-scale regime by analyzing the behavior of seeded graph diffusions. Seeded graph diffusions model the behavior of a quantity of "dye" that is continuously injected at a small set of vertices called the seeds and distributed along the edges of the graph. These seeded diffusions can reveal multi-scale features of a graph through their dynamics. The class we study can be represented in terms of a column-stochastic distribution operator P: x =(cid:80)∞ k=0 γkPs where γk are a set of diffusion coefficients that reflect the behavior of the dye k steps away from the seed, and s is a sparse, stochastic vector representing the seed nodes. More specifically, we study the PageRank diffusions x =(cid:80)∞ k=0(1 − α)αkPs. The PageRank diffusion is equivalent to the stationary distribution of a random walk that (i) with probability α, follows an edge in the graph and (ii) with probability (1 − α) jumps back to a seed vertex (see Section 2 more detail on this connection). PageRank itself has been used for a broad range of applications including data mining, machine learning, biology, chemistry, and neuroscience; see our recent survey [11]. Among all the uses of PageRank, the seeded variation is frequently used to localize the PageRank vector within a subset of the network; this is also known as personalized PageRank due to its origins on the web, or localized PageRank because of its behavior.(We will use these terms: seeded PageRank, personalized PageRank, and localized PageRank interchangeably and use the standard acronym PPR to refer to them.) Perhaps the most important justification for this use is presented in [2], where the authors determined a relationship between seeded PageRank vectors and low-conductance sets that allowed them to create a type of graph partitioning method that does not need to see the entire graph. Their PageRank-based clustering method, called the push method, has been used for a number of important insights into communities in large social and information networks [17, 21]. Our focus is a novel application of this push method for meso-scale structural analysis of networks. Push, which we'll describe formally in Section 3, depends on an accuracy parameter ε. As we vary ε, the result of the push method for approximating the PageRank diffusion reveals different structures of the network. We illustrate three PageRank vectors as we vary ε for Newman's network science collaboration graph [25] in Figure 1. There, we see that the solution vectors for PageRank that result from push have only a few non-zeros for large values of ε. (Aside: There is a subtle inaccuracy in this statement. As we shall see shortly, we actually are describing degree normalized PageRank values. This difference does not affect the non-zero components or the intuition behind the discussion.) This is interesting because an accurate PageRank vector is mathematically non-zero everywhere in the graph. Push, with large values of ε, then produces sparse approximations to the PageRank vector. This connection is formal, and the parameter ε has a dual interpretation as a sparsity regularization parameter [12] (reviewed in Section 3.2). The solution path or regularization path for a parameter is the set of trajectories that 3 (a) ε = 10−2 (b) ε = 10−3 (c) ε = 10−4 Figure 1. Nodes colored by their degree-normalized PageRank values as ε varies: dark red is large, yellow is small. The hidden nodes are mathematically zero. As ε decreases, more nodes become non-zero. the components of the solution trace out as the parameter varies [9]. We present new algorithms based on the push procedure that allow us to approximate the solution path trajectories as a function of ε. We use our solution path approximation to explore the properties of graphs at many size-scales in Section 4. In our technical description, we show that the solution path remains localized in the graph (Theorem 5.1). Experiments show that it runs on real-world networks with millions of nodes in less than a second (Section 6). The push method has become a frequently-used graph mining primitive because of the sparsity of the vectors that result from when push is used to approximate the seeded PageRank diffusion, along with the speed at which they can be computed. The method is typically used to identify sets of low-conductance in a graph as part of a community or cluster analysis [10, 13, 14, 17, 21, 28]. In these cases, the insights provided by the solution paths are unlikely to be necessary. Rather, what is needed is a faster way to compute these diffusions for many values of ε. We describe a data structure called a shelf that we demonstrate can use 40 times as many values of ε in only 7 times the runtime (Section 6.3). We plan to make our computational codes available in the spirit of reproducible research. 2 Technical Preliminaries We first fix our notation and review the Andersen-Chung-Lang procedure, which forms the basis for many of our contributions. We denote a graph by G = (V, E), where V is the set of nodes and E the set of edges. All graphs we consider are simple, connected, and undirected. Let G have n = V nodes and fix a labeling of the graph nodes using the numbers 1, 2, . . . , n. We refer to a node by its label. For each node j we denote its degree by dj. The adjacency matrix of the graph G, which we denote by A, is the n × n matrix having Ai,j = 1 if nodes i and j are connected by an edge, and 0 otherwise. Since G is simple and undirected, A is symmetric with 0s on the diagonal. The matrix D denotes the diagonal matrix with entry (i, i) equal to the degree of node i, di. Since G is connected, D is invertible, and we can define the random walk transition matrix P := AD−1. 4 D. F. Gleich and K. Kloster We denote by ej the standard basis vector of appropriate dimensions with a 1 in entry j, and by e the vector of all 1s. In general, we use subscripts on matrices and vectors to denote entries, e.g. Ai,j is entry (i, j) of matrix A; the notation for standard basis vectors, ej, is an exception. Superscripts refer to vectors in a sequence of vectors, e.g. x(k) is the kth vector in a sequence. For any set of nodes, S ⊆ V , we define the volume of S to be the sum of the degrees of j∈S dj. Next, define the boundary of S ⊆ V to be the set of edges that have one endpoint inside S and the other endpoint outside S, denoted ∂(S). Finally, the conductance of S, denoted φ(S), is defined by the nodes in S, denoted vol(S) =(cid:80) φ(S) := ∂(S) min{vol(S), vol(V − S)} . Conductance can be thought of as measuring the extent to which a set is more connected to itself than the rest of the graph and is one of the most commonly used community detection objectives [26]. 2.1 PageRank and Andersen-Chung-Lang Method The Andersen-Chung-Lang method uses PageRank vectors to identify a set of small conductance focused around a small set of starting nodes [2]. We call such starting nodes seed sets and the resulting communities, local communities. We now briefly review this method starting with PageRank. For a stochastic matrix P, a stochastic vector v, and a parameter α ∈ (0, 1) we define the PageRank diffusion as the solution x to the linear system (I − αP)x = (1 − α)v. (2.1) Note that when α ∈ (0, 1) the system in (2.1) can be solved via a Neumann series expansion, and so the solution x to this linear system is equivalent to the PageRank diffusion vector described in Section 1. When v = (1/S)eS, i.e. the indicator vector for a seed set S, normalized to be stochastic, then we say the PageRank vector has been seeded on the set S (or personalized on the set S). Given PageRank diffusion scores x, the Andersen-Chung-Lang procedure uses the values xj/dj to determine an order for a sweep-cut procedure (described below) that identifies a set of good conductance. Thus, we would like to bound the error in approximating the values xj/dj. Specifically (for their theory) we need our approximate solution x to satisfy or equivalently, (2.2) x ≥ x, and (cid:107)D−1(x − x)(cid:107)∞ < ε. 0 ≤ xj − xj < εdj Once a PPR diffusion x is computed to this accuracy, a near-optimal conductance set located nearby the seed nodes is generated from the following a sweep cut procedure. Rank the nodes in descending order by their scaled diffusion scores xj/dj , with large scores ranking the highest. Denote the set of nodes ranked 1 through m by S(m). Iteratively compute the conductance of the sets S(m) for m = 2, 3, . . . , until xm/dm = 0. Return the set S(t) with the minimal conductance. This returned set is related to the optimal set of minimum conductance nearby the seed set through a localized Cheeger inequality [2]. The value of ε relates to the possible size of the set. 5 3 The push procedure The push procedure is an iterative algorithm to compute a PageRank vector to satisfy the approximation (2.2). The distinguishing feature is that it can accomplish this goal with a sparse solution vector, which it can usually generate without ever looking at the entire graph or matrix. This procedure allows the Andersen-Chung-Lang procedure to run without ever looking at the entire graph. As we discussed in the introduction, this idea and method are at the heart of our contributions and so we present the method in some depth. At each step, push updates only a single coordinate of the approximate solution like a coordinate relaxation method. We'll describe its behavior in terms of a general linear system of equations. Let Mx = b be a square linear system with 1s on the diagonal, i.e. Mi,i = 1 for all i. Consider an iterative approximation x(k) ≈ x after k steps. The corresponding residual is r(k) = b − Mx(k). Let j be a row index where we want to relax, i.e. locally solve, the equation, and let r be the residual value there, r = r(k) . We update the solution by adding r to the corresponding entry of the solution vector, x(k+1) = x(k) + rej, in order to guarantee r(k+1) = 0. The residual can be efficiently updated in this case. Thus, the push method involves the operations: j j x(k+1) = x(k) + rej r(k+1) = r(k) − rMej. (3.1) Note that the iteration requires updating just one entry of x(k) and accessing only a single column of the matrix M. It is this local update that enables push to solve the seeded PageRank diffusion especially efficiently. 3.1 The Andersen-Chung-Lang Push Procedure for PageRank The full algorithm for the push method applied to the PageRank linear system to compute a solution that satifies (2.2) for a seed set S is: 1. Initialize x = 0, r = (1 − α)eS using sparse data structures such as a hash-table. 2. Add any coordinate i of r where ri ≥ εdi to a queue Q. 3. While Q is not empty 4. 5. 6. 7. 8. 9. 10. Let j be the coordinate at the front of the queue and pop this element. Set xj = xj + rj Set δ = αrj/dj Set rj = 0 For all neighbors u of node j Set ru = ru + δ If ru exceeds εdu after this change, add u to Q. The queue maintains a list of all coordinates (or nodes) where the residual is larger than εdj. We choose coordinates to relax from this queue. Then we execute the push procedure to update the solution and residual. The residual update operates on only the nodes that neighbor the updated coordinate j. Once elements in the residual exceed the threshold, they are entered into the queue. We present the convergence theory for this method in the description of our new algorithms (Section 5). 6 D. F. Gleich and K. Kloster We have presented the push method so far from a linear solver perspective. To instead view the method from a graph diffusion perspective, think of the solution vector as tracking where "dye" has concentrated in the graph and the residual as tracking where "dye" is still spreading. At each step of the method, we find a node with a sufficiently large amount of dye left (Step 4), concentrate it at that node (Step 5), then update the amount of dye that is left in the system as a result of concentrating this quantity of dye (Lines 6-10). The name push comes from the pattern of concentrating dye and pushing newly unprocessed dye to the adjacent residual entries. Note that the value of ε plays a critical role in this method as it determines the entries that enter the queue. When ε is large, only a small number of coordinates or nodes will ever enter the queue. This will result in a sparse solution. As ε → 0, there will be substantially more entries that enter the queue. 3.2 Implicit regularization from Push To understand the sparsity that results from the push method, we introduce a slight variation on the standard push procedure. Rather than using the full update xj + rj and pushing αrj/dj to the adjacent residuals, we consider a method that takes a partial update. The form we assume is that we will leave εdjρ "dye" remaining at node j. For ρ = 0, this correspond to the push procedure described above. For ρ = 1, this update will remove node j from the queue, but push as little mass as possible to the adjacent nodes such that the dye at node j will remain below εdj. The change is just at steps 5-7: 5'. 6'. 7'. Set xj = xj + (rj − εdjρ) Set δ = α(rj − εdjρ)/dj Set rj = εdjρ In previous work [12, Theorem 3], we showed that ρ = 1 produces a solution vector x that exactly solves a related 1-norm regularized optimization problem. The form of the problem that x solves is most cleanly stated as a quadratic optimization problem in z, a degree-based rescaling of the solution variable x: minimize subject to z ≥ 0 1 2 zT Qz − zT g + Cε(cid:107)Dz(cid:107)1 (3.2) The terms of the normalization x vs. z and the equivalence Q, g, C are tedious to state exactly and uninformative to our purposes in this work. The important point is that ε can also be interpreted as a regularization parameter that governs the sparsity of the solution vector x. Large values of ε increase the magnitude of the 1-norm regularizer and thus cause the solutions to be sparser. Moreover, the resulting solutions are unique as the above problem is strongly convex. In this work, we seek algorithms to compute the solution paths or regularization paths that result from trying to use all values of ε to fully study the behavior of the diffusion. In the next section we explore some potential utilities of these paths before presenting our algorithms for computing them in Section 5. 7 4 Personalized PageRank paths In this section we aim to show the types of insights that our solution path methodology can provide. We should remark that these are primarily designed for human interpretation. Our vision is that they would be used by an analyst that was studying a network and needed to better understand the "region" around a target node. These solution paths would then be combined with something like a graph layout framework to study these patterns in the graph. Thus, much of the analysis here will be qualitative. We demonstrate quantative advantages to the path methodology in subsequent sections. 4.1 Exact paths and fast path approximations The exact solution path for the seeded PageRank diffusion results from solving the regularized optimization problem (3.2) itself for all values of ε. This could be accomplished by using ideas similar to those used to compute solution paths for the Lasso regularizer [9]. Our algorithms and subsequent analysis evaluate approximate solution paths that result from using our push-based algorithm with ρ = 0.9 (Section 5.2). In this section, we compare these approximate paths to the exact paths. We find that, while the precise numbers change, the qualitative properties are no different. Figure 2 shows the results of such a comparison on Newman's netscience dataset (379 nodes, 914 edges [25]). Each curve or line in the plot represents the value of a non-zero entry of an approximate PageRank vector xε as ε varies (horizontal axis). As ε approaches 0 (and 1/ε approaches ∞), each approximate PageRank entry approaches its exact value in a monotonic manner. Alternatively, we can think of each line as the diffusion value of a node as the diffusion process spreads across the graph. One of the plots was computed by solving for the optimality conditions of (3.2); the other plot was computed using the PPR path algorithm from Section 5.2. The values of ε are automatically determined by the algorithm itself. The plots show that for the two sets of paths have essentially identical qualitative features. For example, they reveal the same bends and inflections in individual node trajectories, as well as large gaps in PageRank values. The maximum difference between the two paths never exceeds 1.1 · 10−4. These results were essentially unchanged for a variety of other sample diffusions we considered, and so we decided that using ρ = 0.9 was an acceptable compromise between speed and exactness. Thus, all path plots in this paper were created with ρ = 0.9, unless noted otherwise. (For analysis of the differences of the exact paths and ρ-paths, and in particular the behavior of the ρ-approximate paths as ρ varies, see Figure 7 below.) 4.2 The Seeded PageRank Solution Path Plot We now wish to introduce a specific variation on the solution path plot that shows helpful contextual information. In the course of computation, our solution path algorithm identifies a small set of values of ε (somewhere between a few hundred to a few thousand) where it satisfies the solution criteria (5.2). At these values, we perform a sweep-cut procedure to identify the set of best conductance induced by the current solution. In the solution path plot, we display the cut-point identified by this procedure as a thick black line. All the nodes whose trajectories are above the dark black line at a particular value 8 D. F. Gleich and K. Kloster Figure 2. (Left) The solution paths for a PageRank diffusion on Newman's netscience dataset from a single seed node computed by exactly solving the regularized problem. (Right) The approximate solution paths computed by our push-based solution path algorithm with ρ = 0.9. Each line traces a value xj as ε varies. The maximum infinity- norm distance between the two paths is 1.1 · 10−4, showing that ρ = 0.9 provides a good qualitative approximation. Moreover, the two plots highlight identical qualitative features-for example, the large gaps between paths, and the strange bend in the paths near ε = 10−3. The coloring of the lines is based on the values at the smallest value of ε. The values of ε used were generated by the approximate algorithm itself and we computed the exact solution at these same values for comparision. of ε are contained in the set of best conductance at that value of ε. This line allows us to follow the trajectory of the minimum conductance set as we vary ε. Another property of our algorithm is that the smallest possible non-zero diffusion value in the solution is (1 − ρ)ε. Thus, we plot this as a thin, diagonal, black line that acts as a pseudo-origin for all of the node trajectories. The vertical blue lines in the bottom left of the plot mark the values of ε where we detect a significant new set of best conductance. Representative conductance values are shown when there is room in the plot. The solution path plot that corresponds to Figure 2 is shown in Figure 3. This plot illustrates all of the features we discussed in this section. 4.3 Nested communities in netscience and Facebook We now discuss some of the insights that arise from the solution path plot. In Figure 3, we show the seeded PageRank solution path plot for around 21, 000 values of ε computed via our algorithm for the network science collaboration network. This computation runs in less than a second. Here, we see that large gaps in the degree normalized PageRank vector indicate cutoffs for sets of good conductance. This behavior is known to occur when sets of really good conductance emerge [1]. We can now see how they evolve and how the procedure quickly jumps between them. In particular, the path plots reveal multiple communities (good conductance sets) nested within one another through the gaps between the trajectories. 9 Figure 3. An example of the seeded PageRank solution path plot on Newman's netscience dataset. Each colored line represents the value of a single node as the diffusion progresses from large ε to small ε. Because of our ρ-approximation to the true paths, the smallest value any node obtains is (1 − ρ)ε and we plot this as a dark diagonal line. The thick black line traces out the boundary of the set of best conductance found at each distinct value of ε as determined by a sweep-cut procedure. The blue lines indicate significant changes to the set of minimum conductance, and they are labelled with the conductance value. The coloring of the trajectory lines is based on the values at the smallest value of ε. We discuss implications of the plot in Section 4.3. On a crawl of a Facebook network from 2009 where edges between nodes correspond to observed interactions [29] (see Table 1, fb-one, for the statistics), we are able to find a large, low conductance set using our solution path method. (Again, this takes about a second of computation.) Pictured in Figure 4, this diffusion shows no sharp drops in the PageRank values like in the network science data, yet we still find good conductance cuts. Note the few stray "orange" nodes in the sea of yellow. These nodes quickly grow in PageRank and break into the set of smallest conductance. Finding these nodes is likely to be important to understand the boundaries of communities in social networks; these trajectories could also indicate anomalous nodes. Furthermore, this example also shows evidence of multiple nested communities. These are illustrated with the manual annotations A, B, C. 4.4 Core and periphery structure in the US Senate The authors in [17] analyzed voting patterns across the first 110 US-Senates by comparing senators in particular terms. We form a graph from this US Senate data where each senator is represented by a single node. For each term of the senate, we connect senators in that session to their 3 nearest neighbors measured by voting similarities. This graph 10 D. F. Gleich and K. Kloster Figure 4. The seeded PageRank solution path for a crawl of observed Facebook network activity for one year (fb-one from Table 1) shows large, good cuts do not need to have large drops in the PageRank values. Nodes enter the solution and then quickly break into the best conductance set, showing that the frontier of the diffusion should be an interesting set in this graph. Furthermore, this path plot shows evidence of multiple nested communities (A, B, and C), which were manually annotated. The set A is only a few nodes, but has a small conductance score of 0.11; set B grows and improves this to a conductance of 0.1, and finally set C achieves a conductance of 0.07, which is an unusually small conductance value in a large social network. has a substantial temporal structure as a senator from 100 years ago cannot have any direct links to a senator serving 10 years ago. We show how our solution paths display markedly different characteristics when seeded on a node near the core of the network compared with a node near the periphery. This example is especially interesting because both diffusions lead to on closely related cuts. Figure 5 displays solution paths seeded on a senator on the periphery of the network (top right) and a senator connected to the core of the network (top left). Here are some qualitative insights from the solution path plots. The peripheral seed is a senator who served a single term; the diffusion spreads across the graph slowly because the seed is poorly connected to the network outside the seed senator's own senate term. As the diffusion spreads outside the seed's particular term, the paths identify multiple nested communities that essentially reflect previous and successive terms of the Senate. In contrast, the core node is a senator who served eight terms. The core node's paths skip over such smaller-scale community structures (i.e. individual senate terms) as the diffusion spreads to each of those terms nearly simultaneously. Instead, the paths of the core node identify only one good cut: the cut separating all of the seed's terms from the remainder of the network. This example demonstrates the paths' potential ability to shed light on a seed's 11 (a) Core seed (b) Periphery seed (c) Core, ε = 3 · 10−4 (d) Core, ε = 10−4 (e) Core, ε = 3 · 10−5 (f) Periphery, ε = 3 · 10−4 (g) Periphery, ε = 10−4 (h) Periphery, ε = 3 · 10−5 Figure 5. (Top.) The solution paths on the US-Senate graph for a senator in the core (who served multiple terms and is centrally located in a graph layout) and for a senator in the periphery (who served a single term and is located on the boundary of the graph layout). (Bottom.) The diffusions for each of these senators are shown as heat-plots on the graph layout. Red indicates nodes with the largest values and yellow the smallest. The seed nodes are circled in these layouts. The solution paths for a peripheral node indicate multiple nested communities, visible in the images of the diffusion on the whole graph and marked A, B, C, D, E. These sets are strongly correlated with successive terms of the Senate. In contrast, the core node diffusion only indicates one good cut. For the core node, we can see the diffusion essentially spreads across multiple dense regions simultaneously, without settling in one easily separated region until ε is small enough that the diffusion has spread to the entire left side of the graph. The sets A and F are also almost the same. 12 D. F. Gleich and K. Kloster relationship to the network's core and periphery, as well as the seed's relationship to many communities. 4.5 Cluster boundaries in handwritten digit graphs Finally, we use the solution paths to study the behavior of a diffusion for a semi-supervised learning task. The USPS hand-written digits dataset consists of roughly 10,000 images of the digits 0 through 9 in human hand-writing [32]. Each digit appears in roughly 1,000 of the images, and each image is labelled accordingly. From this data we construct a 3-nearest-neighbors graph, and carry out our analysis as follows. Pick one digit, and select 4 seed nodes uniformly at random from the set of nodes labelled with this digit. Then compute the PageRank solution paths from these seeds. Figure 6 shows the path plots with labels (right) and without (left). In the labelled plot, the correct labels are red and the incorrect labels are green. We can use the best conductance set determined by the PPR vector to capture a number of other nodes sharing the seeds' label. However, this straight-forward usage of a PageRank vector results in a number of false positives. Figure 6 (right) shows that a number of nodes with incorrect labels are included in the set of best conductance (curves that are not colored red do not share the seed's label). Looking at the solution-paths for this PageRank vector (Figure 6, left) we can see that a number of these false positives can be identified as the erratic lighter-orange paths cutting across the red paths. Furthermore, the solution paths display earlier sets of best conductance (left of the black spikes near ε = 10−3) that would cut out almost all false positives. This demonstrates that the solution paths can be used to identify "stable" sets of best conductance that are likely to yield higher precision labeling results. Consequently, these results hint that a smaller, but more precise, set lurks inside of the set of best conductance. This information would be valuable when determining additional labels or trying to study new data that is not as well characterized as the USPS digits dataset. 4.6 Discussion Overall, these seeded PageRank solution path plots reveal information about the clusters and sets near the seeds. Some of the features we've seen include nested community structure and core-periphery structure. They all provide refined information about the boundary of a community containing the seed, and suggest nodes with seemingly anomalous connections to the seed. For instance, some nodes enter the diffusion early but have only a slow-growing value indicating a weak connection to the seed; other nodes are delayed in entering the diffusion but quickly grow in magnitude and end up being significant members of the cluster. Each of these features offers refined insights over the standard single-shot diffusion computation. Here we present two novel algorithms for analyzing a PPR diffusion across a variety of accuracy parameter settings by computing the diffusion only a single time. Our first 5 Algorithms 13 Figure 6. Seeded PageRank solution path plots for diffusions in the USPS digit dataset. The seeds are chosen to be images of handwritten digits with the same label. (At left.) The solution paths reveal a number of anomalous node trajectories near the set of best conductance. Nodes entering the set of best conductance after the black line erratically oscillates are most likely to be false positives near the boundary. (At right.) Here, we have colored the solution path lines based on the true-class label. Red shows a correct label and green shows an incorrect label. algorithm (Section 5.2) computes the best-conductance set from the ρ-approximate solution paths described in Section 3.2. This effectively finds the best-conductance set from PPR diffusions for every accuracy satisfied in an interval [εmin, εmax], where εmin min(1− α)−2(1− ρ)−2), and εmax are inputs. We prove the total runtime is bounded by O(ε−2 though we believe improvements can be made to this bound. In addition to identifying the best-conductance set taken from the different approximations, the algorithm enables us to study the solution paths of PageRank, i.e. how the PPR diffusion scores change as the diffusion's accuracy varies. Hence, we call this method ppr-path. We describe a second algorithm optimized for speed (Section 5.3) in finding sets of low conductance, as the exhaustive nature of our first method generates too much intermediate data for stricter values of ε. Instead of computing the full solution paths, the second method searches for good-conductance sets over an approximate solution for each accuracy parameter taken from a grid of parameter values. The spacing of the accuracy parameters values on the grid is an additional input parameter. For this reason, we call the algorithm ppr-grid. For a log-spaced grid of values ε0 > ε1 > ··· > εN , we locate the best-conductance set taken from a sweep over each εk-approximation. The work required N (1 − α)−1); we show this yields a constant to compute the diffusions is bounded by O(ε−1 factor speedup over the practice of computing each diffusion separately. However, our method requires the same amount of work for performing the sweeps over each different diffusion. We begin by describing a modification to the PageRank linear system that will simplify our notation and the exposition of our algorithm. 14 D. F. Gleich and K. Kloster 5.1 A modified PageRank linear system for the push procedure Recall that the goal is to solve the PageRank linear system (2.1) to the accuracy condi- tion (2.2) and then sort by the elements xj/dj. If we multiply Equation (2.1) by D−1, then after some manipulation we obtain (I − αPT )D−1x = (1 − α)D−1v. Note this transformation relies on A being symmetric so that PT = (AD−1)T = D−1A = D−1PD. To avoid writing D−1 repeatedly, we make the change of variables y = (1/(1 − α))D−1x and b = D−1v. The modified system is then (I − αPT )y = b (5.1) and we set x(k) = (1 − α)Dy(k). Next we use this connection between x and y enables us to establish a convergence criterion for our algorithms that will guarantee we obtain an approximation with the kind of accuracy typically desired for methods related to the push operation, e.g. (2.2). More concretely, to guarantee (cid:107)D−1(x − x)(cid:107)∞ < 1−α so it suffices for our purposes to bound the error of the system (5.1). ε , it suffices to guarantee (cid:107)y − y(cid:107)∞ < ε, The accuracy requirement has two components: nonnegativity, and error. We relate the solution to its residual as the first step toward proving both of these. Left-multiplying the residual vector for (5.1) by (I − αPT )−1 and substituting y = (I − αPT )−1b, we get (cid:32) ∞(cid:88) PT(cid:17)m(cid:33) αm(cid:16) r(k), y − y(k) = m=0 where the right-hand side replaces (I − αPT )−1 with its Neumann series. Note here that, if the right-hand side consists of all nonnegative entries, then it is guaranteed that y − y(k) ≥ 0 holds. Recall from Section 3.1 that the residual update involved in the push procedure consists of adding nonnegative components to the residual, and so the residual must be nonnegative. Then, since (1 − α)y(k) = D−1x(k), this implies x ≥ x(k), proving one component of the accuracy criteria (2.2) is satisfied. Next we bound the error in y in terms of its residual, and then control the residual's norm. Using the triangle inequality and sub-multiplicativity of the infinity norm allows us to bound (cid:107)y − y(k)(cid:107)∞, which implies (2.2), with the following m=0 m=0 ≤ (cid:32) ∞(cid:88) αm(cid:13)(cid:13)(cid:13)PT(cid:13)(cid:13)(cid:13)m αm(cid:13)(cid:13)(cid:13)(cid:16) r(k)(cid:13)(cid:13)(cid:13)∞ PT(cid:17)m ∞(cid:88) tuting this and noting that(cid:80)∞ (cid:13)(cid:13)(cid:13)D−1x − D−1x(k)(cid:13)(cid:13)(cid:13)∞ = (cid:13)(cid:13)(cid:13)y − y(k)(cid:13)(cid:13)(cid:13)∞ (cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ < ε 1 1−α ∞ (cid:33)(cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ . (cid:13)(cid:13)(cid:13)r(k)(cid:13)(cid:13)(cid:13)∞ . ≤ 1 1−α m=0 αm = 1/(1 − α) allows us to bound Finally, since P is column stochastic, PT is row-stochastic, and so (cid:107)PT(cid:107)∞ = 1. Substi- So to guarantee x satisfies the desired accuracy, it is enough to guarantee that (5.2) holds, where r(k) = b − (I − αPT )y(k) and x(k) = (1 − α)Dy(k). Thus, for our algorithms to converge to the desired accuracy, it suffices to iterate until the residual norm satisfies the bound (5.2). With this terminating condition established, we can now describe our algorithm for computing the solution paths of xε as ε varies. 15 5.2 PageRank solution paths Recall that our goal is computing the solution paths of seeded PageRank with respect to the parameter ε. That is, we want an approximation xε of PageRank for all ε values inside some region. Let P be a stochastic matrix, choose α satisfying 0 < α < 1, let v be a stochastic vector, and set b = D−1v. Fix input parameters εmin and εmax. Then for each value εcur ∈ [εmin, εmax] (εcur denotes "the value of ε currently being considered"), we want an approximation y of the solution to (I− αPT )y = b that satisfies (cid:107)y− y(cid:107)∞ < εcur 1−α . (Or rather, we want a computable approximation to this information.) As discussed in Section 3.2, we also use the approximation parameter ρ ∈ [0, 1) in the push step. Given initial solution y(0) = 0 and residual r(0) = b, proceed as follows. Maintain a priority queue, Q(r), of all entries of the residual that do not satisfy the convergence criterion rj < εmin. We store the entries of Q(r) using a max-heap so that we can quickly determine (cid:107)r(cid:107)∞ at every step. Each time the value (cid:107)r(cid:107)∞ reaches a new minimum, we consider the resulting solution vector to satisfy a new "current" accuracy, which we denote εcur. For each such εcur achieved, we want to perform a sweep over the solution vector. Because the sweep operation requires a sorted solution vector, we keep y in a sorted array, L(y). By re-sorting the solution vector each time a single entry yj is updated, we avoid having to do a full sweep for each "new" εcur-approximation. The local sorting operation is a bubblesort on a single entry; the local sweep update we describe below. With the residual and solution vector organized in this way, we can quickly perform each step of the above iterative update. Then, iterating until (cid:107)r(cid:107)∞ < εmin guarantees convergence to the desired accuracy. Next we present the iteration in full detail. PPR path algorithm The ppr-path algorithm performs the following iteration until the maximum entry in Q(r) is below the smallest parameter desired, εmin. 1. Pop the max of Q(r), say entry j with value r, then set rj = ρεcur and reheap Q(r). 2. Add r − ρεcur to yj. 3. Bubblesort entry yj in L(y). 4. If L(y) changes, perform a local sweep update. 5. Add (r − ρεcur)αPT ej to r. 6. For each entry i of r that was updated, if it does not satisfy ri < εmin, then insert 7. If (cid:107)r(cid:107)∞ < εcur, record the sweep information, then set εcur = (cid:107)r(cid:107)∞. When the max-heap Q(r) is empty, this signals that all entries of r satisfy the conver- gence criterion rj < εmin, and so our diffusion score approximations satisfy the accuracy requirement (2.2). (or update) that entry in Q(r) and re-heap. 16 D. F. Gleich and K. Kloster Sweep update The standard sweep operation over a solution vector involves sorting the entire solution vector and iteratively computing the conductance of each consecutive sweep set. Here, we re-sort the solution vector after each update by making only the local changes necessary to move entry yj to the correct ranking in L(y). This is accomplished by bubblesorting the updated entry yj up the rankings in L(y). Note that if y(k) has Tk nonzero entries, then this step can take at most Tk operations. We believe this loose upperbound can be improved. We could determine the new rank of node yj in work log Tk via a binary insert. However, since we must update the rank and sweep information of each node that node yj surpasses, the asymptotic complexity would not change. Once the node ranks have been corrected, the conductance score update proceeds as follows. Denote by S(k−1)(m) the set of nodes that have rankings 1, 2,··· , m during step k − 1. Assuming we have the cut-set (cut and volume) information for each of these sets, then we can update that information for the sets S(k)(m) as follows. Suppose the node that changed rankings was promoted from rank j to rank j − ∆k. Observe that the sets S(k)(m) and their cut-set information remain the same for any set S(k)(m) lying inside the rankings [1,··· , j − ∆k − 1], because the change in rankings happened entirely in the interval [j − ∆k,··· , j]. This occurs for m < j − ∆k. Similarly, any set S(k)(m) with m > j would already contain all of the nodes whose rank changed – altering the ordering within the set does not alter the conductance of that set, and so this cut-set information also need not be changed. Hence, we need to update the cut-set information for only the intermediate sets. Now we update the cut-set information for those intermediate sets. We refer to the node that changed rank as node L(j). Its old rank was j, and its new rank is j − ∆k. Note that the cut-set information for the set S(k)(j − t) (for t = 0,··· , ∆k) is the exact same as that of set S(k−1)(j − t − 1) ∪ {L(j)}. In words, we introduce the node L(j) to the set S(k−1)(j − t − 1) from the previous iteration, and then compute the cut-set information for the new iteration's set, S(k)(j − t), by looking at just the neighborhood of node L(j) a single time. This provides a great savings over simply reperforming the sweep procedure over the entire solution vector up to the index where the rankings changed. If the node being operated on, L(j), has degree d, then this process requires work O(d + ∆k). As discussed above, we can upperbound ∆k with the total number of iterations the algorithm performs Tk. Theorem 5.1 Given a random walk transition matrix P = AD−1, stochastic vector v, and input parameters α ∈ (0, 1), ρ ∈ [0, 1), and εmax > εmin > 0, our ppr-path algorithm outputs the best-conductance set found from sweeps over εcur-accurate degree-normalized, ρ-approximate solution vectors x to (I−αP)x = (1−α)v, for all values εcur ∈ [εmin, εmax]. The total work required is bounded by O(cid:0) (cid:1). 1 min(1−α)2(1−ρ)2 ε2 Proof We carry out the proof in two stages. First, we show that the basic iterative min(1 − α)−1(1 − ρ)−1). Then, we show that the additional update converges in work O(ε−1 min(1− α)−2(1− ρ)−2). work of sorting the solution vector and sweeping is bounded by O(ε−2 Push work. We count the work on just the residual r(k) and solution vector y(k). The work required to maintain the heap Q and sorted array L is accounted for below. 17 Each step, the push operation acts on a single entry in the residual that satisfies rj ≥ εmin. The step consists of a constant number of operations to update the residual and solution vectors (namely, updating a single entry in each). The actual amount that is removed from the residual node is (rj −ρεmin); then we add (rj −ρεmin) to the appropriate entry of the solution, and (rj − ρεmin)α/dj to r(k) for each neighbor i of node j. Since j has dj such neighbors, the total work in one step is bounded by O (dj). If T steps of the push operation are performed, then the amount of work required to obtain an accuracy t=0 dj, where j = j(t) is the index of the residual operated on in of εmin is bounded by(cid:80)T i step t, r(t) j . Next we bound this expression for the work done in these "push" steps. Since all (cid:80)T entries of the solution and residual vectors are nonnegative at all times, the sum of the values (rt − ρεmin) pushed at each step exactly equals the sum of the values y(k), i.e. t=0(rt − ρεmin) = eT y(k). Since y(k) = (1/(1 − α))D−1x(k), we then have that the sum degree and (1 − α), i.e. eT x(k) = (1 − α)(cid:80)T of entries in (1/(1 − α))x(k) equals the sum of values pushed from the residual scaled by t=0(rt − ρεmin) · dj(t), where j(t) is the node get from the previous equation that (1 − α)(cid:80)T pushed in step t. We claim that the sum eT x(k) ≤ 1. Assuming this for the moment, we t=0(rt − ρεmin) · dj(t) = eT x(k) ≤ 1. Since each step of ppr-path operates on a residual value satisfying rt ≥ εmin, we know that (rt − ρεmin) ≥ εmin(1 − ρ), and so T(cid:88) (1 − α) T(cid:88) min(1 − α)−1(1 − ρ)−1(cid:1). t=0 εmin(1 − ρ) · dj(t) < (1 − α) rt · dj(t) ≤ 1. Dividing by εmin(1−α)(1−ρ) completes the proof that the expression for work,(cid:80)T is bounded by O(cid:0)ε−1 t=0 dj(t), Lastly, we justify the claim eT x(k) ≤ 1. Left-multiplying the equations in (5.1) by t=0 (De)T and using stochasticity of v gives eT (I − αP)Dy(k) = eT Db − eT Dr(k) (1−α) x(k) = eT v − eT Dr(k) (1 − α)eT eT x(k) = 1 − eT Dr(k). 1 (5.3) As noted above, all entries of the residual and iterative solution vector are nonnegative at all times. The sum eT x(k) cannot exceed 1, then, because that would imply that the residual summed to a negative number, contradicting nonnegativity of the residual vector. Hence, eT x(k) ≤ 1. Sorting and sweeping work. Here we account for the work performed each step in maintaining the residual heap Q(r), re-sorting the solution vector L(y), and updating the sweep information for L(y). To ease the process, we first fix some notation: denote the number of entries in the residual heap Q(r) by Q, and the number of non-zero entries in the sorted solution vector L(y) by L. We will bound both of these quantities later on. We continue to use ∆t to denote the number of rank positions changed in L(y) in 18 D. F. Gleich and K. Kloster step t. Finally, recall that T denotes the number of iterations of the algorithm required to terminate. The work bounds we will prove, listed in the order in which the ppr-path algorithm performs them, are as follows: Operation actual work upperbound Find max(r) Delete max(r) Bubblesort L(yj) Re-sweep L(y) Update r + rαPT ej Re-heap Q(r) 1 log(Q) ∆t dj + ∆t dj dj log(Q) 1 εmin(1−α)(1−ρ) ) 1 log( T dj + T dj dj log( 1 εmin(1−α)(1−ρ) ) The residual heap operations for deleting max Q(r) and re-heaping the updated entries each require O(log(Q)) work, where Q is the size of the heap, i.e. the number of nonzero entries in the residual. We can upperbound this number using the total number of pushes performed (since a nonzero in the residual can exist only via a push operation placing it min(1 − α)−1(1 − ρ)−1), then. We remark that this is quite there). We bound Q by O(ε−1 loose, as values of ρ near 1 actually force the solution and residual to be sparser, so the min(1− α)−1), though we do not yet have a proof heap size should still be bounded by O(ε−1 of this. Re-sorting the solution vector via a bubblesort can involve no more operations than the length of the solution vector. Since a nonzero in entry yj can exist only if a step of the algorithm operates on an entry rj, the number of nonzeros in y is bounded by the number of steps of the algorithm, i.e. L ≤ T . We believe this bound to be loose, but cannot currently tighten it. Note that the work required in updating sweep information also requires ∆t work, which we again upperbound by T . The dj term in updating sweep information is from accessing the neighbors of the entry yj, the node changing its rank. The dominant terms in the above expression for work are the re-heap updates and the bubblesort and re-sweep operations, which require a total of O(dj log(Q)+L) work each step. Summing this over all T steps of the algorithm, we can majorize work by O(log(Q)· . Finally, substituting in our loose upperbounds for T , Q, and L mentioned above completes the proof: εmin(1−α)(1−ρ) log(Q) + T · L(cid:17) (cid:17) (cid:17) ≤ O (cid:80)T t=0 dj) + O((cid:80)T (cid:16) t=0 L), which is upperbounded by O (cid:16) 1 εmin(1−α)(1−ρ) log( 1 εmin(1−α)(1−ρ) ) + 1 min(1−α)2(1−ρ)2 ε2 (cid:16) 1 min(1−α)2(1−ρ)2 ε2 . 1 O 5.3 Fast multi-parameter PPR Here we present a fast framework for computing ε-approximations of a push-based PPR diffusion without computing a new diffusion for each ε. This enables us to identify the optimal output that would result from multiple diffusion computations for different ε values, but without having to do the work of computing a new diffusion for each different ε. This algorithmic framework does not admit the parameter ρ as easily, because 19 of implementation details surrounding the data structures used to handle sorting and updating the residual. The framework is compatible with every set of parameter choices for ε that allows for constant-time bin look-ups. More precisely, the set of parameters ε0, ε1, . . . , εN must have an efficient method for determining the index k such that, given a value r, we have εk−1 > r ≥ εk. We focus on a set of ε values that are taken from a log-spaced grid: that is, the parameters are of the form εk = ε0θk for constants 0 < ε0, θ < 1. Because we assume our ε parameters are taken from such a grid, we call our method ppr-grid. Another possibly useful case is choosing εk values taken from a grid formed from Chebyshev-like nodes, allowing for constant-time shelf-placement via cos−1 evaluations. We emphasize that the underlying algorithm we use to compute the PageRank diffusion is closely related to the push method discussed in Section 3 as implemented by [2]; in the case that only a single accuracy parameter is used, the algorithms are identical. When more than one accuracy setting is used, we employ a special data structure, which we call a shelf. The shelf structure The main difference between our algorithm ppr-grid and previous implementations of the push method lies in our data structure replacing the priority queue, Q, discussed in ppr-path. Instead of inserting residual entries in a heap as in ppr-path, we organize them in a system of arrays. Each array holds entries between consecutive values of εk, so that each array holds entries larger than the shelf below it. For this reason, we call this system of arrays a "max-shelf", H, and refer to each individual array as a "shelf", Hk. The process is effectively a bucket sort: each shelf (or bucket) of H holds entries of the residual lying between consecutive values of εk in the parameter grid. For parameters ε0, ε1, . . . , εN , shelf Hk holds residual values r satisfying εk−1 > r ≥ εk. Residual entries smaller than εN are omitted from H (since convergence does not require operating on them). Residual entries with values greater than ε0 are simply placed in shelf H0. PPR on a grid of ε parameters During the iterative step of ppr-grid, then, rather than place a residual entry at the back of Q, we instead place the entry at the back of the appropriate shelf, Hk. Once all shelves Hm(r) are cleared for m ≤ k, then the residual has no entries larger than εk, and so we have arrived at an approximation vector satisfying convergence criterion (2.2) with accuracy εk. At this point, we perform a sweep procedure using the εk-solution. We then repeat the process until the next shelf is cleared, and a new εk+1-solution is produced. PPR grid algorithm. The iterative step is as follows: 1. Determine the top-most non-empty shelf, Hk. 2. While H contains an entry in shelf k or above, do the following: 3. 4. 5. 6. Pop an entry on or above shelf Hk, say value r in entry rj, and set rj = 0. Add r to xj. Add rαPT ej to r. For each entry of r that was updated, move that node to the correct shelf, Hm, 20 where εm−1 > r ≥ εm. If an entry is placed on a shelf higher than k, record the new top-shelf. D. F. Gleich and K. Kloster 7. Shelves 0 through k are cleared, so the εk-solution is done; perform a sweep. Once all shelves are empty, the approximation with strictest accuracy, εN , has been attained, and a final sweep procedure is performed. Shelf computation. In each iteration of ppr-grid we must place multiple entries into their respective "shelves". Here we show that computing the correct shelf where a value r will be placed can be accomplished in constant time. Let εk = ε0θk for a fixed value of θ ∈ (0, 1). We want a value r satisfying εk−1 > r ≥ εk to be placed on shelf k. If r ≥ ε0, then we place r into shelf 0. Otherwise, making the substitution εk = ε0θk and performing some algebra yields k − 1 < log(r/ε0) log(θ) ≤ k, so k can be computed by taking the ceiling of log(r/ε0)/ log(θ), which is a constant time operation. Note that this process requires that 0 < εk < 1 holds for all k, that θ ∈ (0, 1), and that r > 0. Top shelf. Each step of ppr-grid also requires determining the top non-empty shelf. This can be done in constant time by tracking what the top shelf is during each residual update. If k is the top shelf immediately prior to step (2.4), then k will still be the top shelf after the residual update is complete, unless one of the updates in step (6.) moves an entry to a shelf l < k. By checking for this event during the update of each individual residual entry in step (6.), we will have knowledge of the top non-empty shelf at the beginning of each step, with only constant work per step. Once the current working shelf is emptied, then it is possible that the next non-empty shelf is many shelves down, i.e. shelves Hk and higher are emptied and the next non-empty shelf is Hk+c for some large number c. Then determining k + c takes O(c) operations. However, this operation is performed every time the algorithm switches from one value of εk to the next. If there are N values of εk, then the total work in all calls of this top-shelf computation is bounded by O(N ). Theorem 5.2 Given a random walk transition matrix P = AD−1, stochastic vector v, and input parameters α, θ ∈ (0, 1) and εk = ε0θk, our ppr-grid algorithm outputs the best-conductance set found from sweeps over εk-accurate degree-normalized solution vectors x to (I − αP)x = (1 − α)v, for all values εk for k = 0 through N . The work εN (1−α) ). This improves on the method of in computing the diffusions is bounded by O( computing the N diffusions separately, which is bounded by O(cid:0) 1 εN (1−α)(1−θ) (1 − θN +1)(cid:1). 1 The two methods perform the same amount of sweep-cut work. Proof. Note that the amount of push-work required to produce a diffusion with smallest accuracy εN is exactly the same as the push-work performed in computing an εN solution via ppr-path; The only difference is in how we organize the residual and solution vectors. N (1 − α)−1). Updating the shelf Hence, the push-work for ppr-grid is bounded by O(ε−1 structure for ppr-grid requires only a constant number of operations in each iteration, 21 Table 1. Datasets Graph itdk0304 dblp youtube fb-one fbA ljournal hollywood twitter friendster V 190,914 226,413 1,134,890 1,138,557 3,097,165 5,363,260 1,139,905 41,652,230 65,608,366 E 607,610 716,460 2,987,624 4,404,989 23,667,394 49,514,271 56,375,711 2,041,892,992 1,806,067,135 dave 6.37 6.33 5.27 3.9 15.3 18.5 98.9 98 55.1 and so the dominating operation in one step of ppr-grid is the residual push work. Thus, the push-work bound for ppr-grid is O(ε−1 N (1 − α)−1). with parameters εk and α requires push-work O(ε−1 values of εk gives (cid:80)N place of εk, we see this sum is simply a scaled partial geometric series, (cid:80)N Push-work for N separate diffusions. As noted above, computing a diffusion k (1 − α)−1). Summing this over all k=0(1/εk). Substituting ε0θk in k = k (1 − α)−1 = (1 − α)−1(cid:80)N k=0 ε−1 N(cid:88) 0 θ−N (1 − θN +1)/(1 − θ). Simplifying gives ε−1 k=0 ε−1 1 εk(1−α) = 1 εN (1−α)(1−θ) (cid:0)1 − θN +1(cid:1) , k=0 proving the bound on the push-work. For our choices ε0 = 10−1, εN = 10−6/3, and θ = 0.66 (which correponds to using N = 32 diffusions), this quantity is roughly 2.9 times greater than computing only one diffusion, as our method does. Sweep work. The number of operations required in computing the diffusion is bounded N (1− α)−1), but this does not include the work done in sweeping over the various by O(ε−1 εk-approximation vectors. The sweep operation requires sorting the solution vector. As noted in the proof of work for ppr-path, the number of nonzeros in the solution vector is N (1−α)−1)). bounded by O(ε−1 This implies that sorting is the dominant subroutine of the algorithm. In practice the bound on the number of nonzeros in the solution is loose, and the push operations comprise most of the labor. N (1−α)−1), and so the sorting work is O(ε−1 N (1−α)−1 log(ε−1 6 Experimental Results on Finding Small Conductance Sets We have presented two frameworks for computing a single personalized PageRank diffusion across multiple parameter settings. Here we analyze their performance on a set of real- world social and information networks with varying sizes and edge-densities with the goal of identifying sets of small conductance. All datasets were altered to be symmetric and have 0s on their diagonals; this is done by deleting any self-edges and making all directed edges undirected. In addition to versions of the Facebook dataset analyzed in Section 4, we test our algorithms on graphs including twitter-2010 from [19], friendster and youtube from [24, 31], dblp-2010 and hollywood-2009 in [3, 4], idk0304 from [27], and ljournal-2008 in [7]. See Table 1 for a summary of their properties. 22 D. F. Gleich and K. Kloster 6.1 The effect of ρ on conductance Our first experimental study regards the selection of the parameter ρ for finding sets of small conductance. We already established that ρ = 0.9 yielded qualitatively accurate solution path plots. However, for the specific problem of identifying small conductance sets, we find a curious behavior and get the best results with small values of ρ. We'll explain why this is shortly, but consider the results in Figure 7. In the left subplot, we see the maximum difference between the minimum conductance found for any value of ρ over a series of trials. It can be large, for instance, 0.7 for one trial on the LiveJournal graph, where large ρ shows worse results. In that same figure, we show the runtime scaling. It seems to scale with 1/(1 − ρ), which is slightly better than expected from the bound in Theorem 5.1. Figure 7. Here we display the behavior of the solution paths as ρ scales from 0 to 1. At left, we display the gap between φ(ρ), the best conductance found at that value of ρ, and φmin, the minimum conductance found over all values of ρ. The lines depict the maximum difference over 100 trials of the quantity φ(ρ) − φmin. This plot shows that the best conductance found becomes worse as ρ approaches 1. At right, the runtime appears to scale with 1/(1 − ρ), which is better than the 1/(1 − ρ)2 predicted by our theory. The greatest difference between the best conductance found for any value of ρ and the worst conductance found for any ρ occurs in the livejournal graph, with a gap of nearly 0.7. We discovered that the cause for this disparity is that large values of ρ delay the propagation of the diffusion, and so the ρ = 0.9 paths at ε = 10−5 did not spread far enough to find a set of conductance near 0.07. In contrast, all paths with ρ < 0.5 did diffuse deep enough into the graph to identify this good conductance set. Thus, it is possible that many of the differences in conductance performance between paths with different values of ρ might in fact be caused by the size of the region to which the diffusion spreads for a given value of ε. Figure 8 illustrates this finding. Our conclusion from these experiments is that, for the goal of finding sets of small conductance, we should use small values of ρ near zero. While it sometimes happens that ρ > 0 slightly improves conductance, this is not a reliable observation, and so for the rho00.20.40.60.81Conductance gap00.10.20.30.40.50.60.7youtubetwitterljournalhollywoodfriendsterfbAdblprho00.20.40.60.81Runtime (sec)10-310-210-1100101102 23 Figure 8. At left, the ρ = 0 paths identify mostly poor conductance sets φ ≈ 0.8, and locate a set of low conductance, φ = 0.0788, only toward the end of the diffusion. At right we see that the ρ = 0.9 paths cannot find this set with ε = 10−5. With a slightly smaller accuracy (ε = 5 · 10−6 instead of ε = 10−5), the diffusion is able to spread far enough to locate the good conductance set. remaining experiments on conductance, we set ρ = 0. (This has the helpful side effect of making it easier to compare with our ppr-grid.) 6.2 Runtime and conductance: ppr-path Our first method, ppr-path, is aimed at studying how PPR diffusions vary with the pa- rameter ε. Toward this, Table 2 emphasizes the shear volume of distinct ε-approximations that ppr-path explores. We also want to highlight both the efficiency of our method over the naıve approach for computing the solution paths, and the additional information that the solution paths provide compared to a single diffusion. With this in mind, our experiment proceeds as follows. On each data set, we selected 100 distinct nodes uniformly at random, and ran three personalized PageRank algorithms from that node, with the settings α = 0.99 and ε = 10−5. Table 2 displays results for our solution paths algorithm ("path" in the table) compared with two other algorithms chosen to emphasize the runtime and the performance of ppr-path. To show how ppr-path scales compared to the runtime of a single diffusion, and to emphasize that the solution paths can locate better conductance sets in some cases, we compare our solution paths method with a standard implementation for computing a single PPR diffusion ("single" in Table 2). Column 3 in the table gives the median runtime, taken over 100 trials, of the single diffusion. To compare, column 4 gives the median ratio of "path" time to "single" time. Although ppr-path is slower on the small graphs, on the larger graphs we see the runtime is nearly the same as for a single PPR diffusion. At the same time, column 2 shows that "path" computes the results from hundreds or even thousands of diffusions, a significant gain in information over the single PPR diffusion. Finally, column 7 gives the best ratio of conductance found by "path" compared to that 24 D. F. Gleich and K. Kloster Data num ε Single diff. time (sec.) ppr-path time (sec.) multi diff. time (sec.) φ-ratio 25 50 75 25 50 75 25 50 75 0.02 0.02 0.01 0.01 0.01 0.41 0.51 0.10 0.05 0.01 0.02 0.28 0.40 0.05 0.03 0.01 0.01 5292 8138 2844 3464 862 2799 94.2 97.9 38.7 34.6 16.5 30.9 17.2 10.3 13.6 70.8 87.3 28.6 28.1 14.0 24.5 14.0 6.5 11.1 1.77 1.12 1.47 1.09 1.16 2.09 1.19 1.05 1.09 123.2 111.5 49.2 40.5 19.5 43.6 22.4 18.1 16.6 0.69 0.03 0.02 0.65 0.02 0.02 0.15 0.01 0.01 0.07 0.01 0.01 0.01 < 0.01 < 0.01 0.01 0.01 0.05 0.01 < 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01 < 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01 < 0.01 < 0.01 < 0.01 < 0.01 < 0.01 0.01 itdk0304 dblp youtube fb-one fbA ljournal hollywood 423 twitter 172 friendster 402 Table 2. Runtime and conductance comparison of the solution paths (all accuracies from 10−1 to 10−5) with (1) a single PPR diffusion with accuracy 10−5 (labelled "single") and (2) 10,000 PPR diffusions, accuracies k−1 for k = 1 to 10,000 (labelled "mult"). On each dataset we selected 100 distinct nodes uniformly at random and ran the algorithms with the settings α = 0.99 and ε = 10−5 and ρ = 0. Column "num ε" displays the median number of distinct accuracy parameters ε explored by our algorithm ppr-path. Columns under "Time" report 25th, 50th, and 75th percentile of runtimes over these 100 trials. The column "φ-ratio" lists the largest (best) ratio of conductance achieved by a single diffusion with conductance achieved by our ppr-path, showing our method can improve on the conductance found by a single diffusion by as much as a factor of 2.09. found by "single". This shows that the solution paths can improve conductance by 10% to even 50% compared to a single diffusion. To display the efficiency of our algorithm in computing these many diffusion settings, we again use the standard PPR implementation, but this time set to compute the diffusion for every accuracy setting k−1 for k = 1 to 10, 000. This algorithm is "mult" in Table 2, and is essentially a naıve method for approximating the solution paths. Column 5 gives the ratio of "mult" time to "single" time, and shows that this naıve approach to computing diffusions with multiple accuracies is prohibitively slow – it is thousands of times slower than our "path" method. Lastly, we acknowledge here that both variations on the PPR diffusion are naıve approaches to the problem at hand. However, currently there is no other algorithm for computing the PPR solution paths which we can use as a more competitive baseline. 6.3 Runtime and Conductance: ppr-grid We compare our second method ppr-grid with a method called ppr-grow, which uses the push framework described in Section 3. Each of these algorithms uses a variety of accuracy settings, and returns the set of best conductance found from performing a sweep-cut over the diffusion vector resulting from each accuracy setting. The algorithm ppr-grow has 32 pre-set accuracy parameters εk. In contrast with ppr-grid, which takes its accuracy parameters from a log-spaced grid εk = ε0θk, the parameters for ppr-grow are chosen as the inverses of values from the grid 10j ·(cid:2) 2 15 (cid:3) for j = 0, 1,··· , 4, 5 along with two additional parameters, 10−6/2 and 10−6/3. 10 3 4 In addition to α, our method ppr-grid has the parameters ε0 and εN , the laxest and strictest accuracies (respectively), and θ, which determines the fineness of the grid of 25 accuracy parameters. We use the values ε0 = 10−1 and εN = 10−6/3, and use values of θ corresponding to N = 32, 64, and 1256 different accuracy parameters. We emphasize that this comparison with the ppr-grow method is not as naıve as it might seem: out of the 32 calls that it makes, in practice the very last call (with the strictest value of ε) constitutes near 37% of the total runtime. This means that making only a single call would save little work, and would sacrifice the information from the other 31 (smaller) approximations. Furthermore, the primary optimizations that would be made to the ppr-grow framework to improve on this are exactly the optimizations that we make with our ppr-grid algorithm, namely avoiding re-doing push work between diffusion computations for different values of ε. Because the two algorithms compute the same PageRank diffusion, comparing their runtimes here allows us to study what proportion of the total work is made up of redundant push operations, and what proportion is comprised of the sweep cut procedures, which both algorithms perform anew for each diffusion. To study this, we highlight the results in Table 3 which displays the runtimes for ppr-grow and the ratios of the runtimes of ppr-grid with ppr-grow for computing the best-conductance set from the same number of different diffusions, N = 32. We also display ppr-grid results for the cases N = 64 and 1256 to show how the algorithm scales with the fineness of the grid. To compare runtimes, we perform the following for each different dataset. For 100 distinct nodes selected uniformly at random, we ran both algorithms with the setting α = 0.99. We display the best (25%) and worst (75%) quartile of performance of each algorithm and parameter setting. On almost all datasets, we see that ppr-grid with N = 32 has a speedup of a factor 2 to 3. This is consistent with our theoretical comparison of the two runtimes in Theorem 5.2, which predicts a factor of 2.9 difference in the push- work that the two algorithms perform. Then, columns 6 through 9 of Table 3 display how quickly ppr-grid can compute even more diffusions: whereas ppr-grow takes around 1 second to compute and analyze N = 32 diffusions, ppr-grid takes little more than half that time to compute on N = 64 diffusions (columns 6 and 7). Columns 8 and 9 show that ppr-grid can compute and analyze N = 1256 diffusions, nearly 40 times as many as ppr-grow, in an amount of time only 1.10 to 6.59 times greater than the time required by ppr-grow. The conductances displayed in Table 4 are taken from the same trials as the runtime information in Table 3. As with the table of runtimes, for each dataset the table gives the 25% (best) and 75% (worst) percentiles of conductance scores produced by each algorithm on the 100 trials. We see nearly identical conductance scores for ppr-grow and ppr-grid with N = 32, which we expect because the two perform nearly identical work. It is interesting to note, however, that increasing the number of diffusions can result in significantly improved conductance scores in some cases, as with N = 1256 on the "fb-one" and "hollywood" datasets. This demonstrates concretely the potential effect of using a broad swath of parameter settings for ε to study the meso-scale structure. Moreover, it demonstrates that even a finely spaced mesh of ε values, as with ppr-grow and ppr-grid with N = 64, can miss informative diffusions. 26 Data D. F. Gleich and K. Kloster time (sec.) ppr-grow time ratio ppr-grid N = 32 time ratio ppr-grid N = 64 time ratio ppr-grid N = 1256 25 6.23 itdk0304 4.52 dblp 1.73 youtube 1.25 fb-one 0.49 fbA ljournal 0.82 hollywood 0.28 0.13 twitter friendster 0.34 75 8.73 7.21 2.39 1.60 0.65 1.20 0.64 0.37 0.49 25 0.56 0.56 0.39 0.33 0.47 0.44 0.34 0.39 0.39 75 0.61 0.62 0.50 0.39 0.55 0.55 0.49 0.44 0.44 25 0.61 0.62 0.54 0.45 0.63 0.58 0.44 0.54 0.51 75 0.66 0.67 0.65 0.53 0.72 0.74 0.60 0.60 0.58 25 1.10 1.28 3.35 3.72 5.99 4.57 3.47 4.61 3.90 75 1.20 1.43 4.38 4.38 6.59 6.12 5.00 5.44 4.32 Table 3. Runtime comparison of our ppr-grid with ppr-grow. For each dataset, we selected 100 distinct nodes uniformly at random and ran ppr-grow with 32 and ppr-grid with N different accuracy settings εk. Columns 2 and 3 display the 25th and 75th percentile runtimes for ppr-grow (in seconds). The other columns display the median over the 100 trials of the ratios of the runtimes of ppr-grid (using the indicated parameter setting) with the runtime of ppr-grow on the same node. These results demonstrate that our algorithm computing over N = 32 accuracy parameters εk achieves the factor of 2 to 3 speed-up predicted by our theory in Section 5.3. Data grow N = 32 N = 64 N = 1256 0.06 itdk0304 0.07 dblp 0.18 youtube 0.37 fb-one 0.56 fbA ljournal 0.32 hollywood 0.29 0.80 twitter friendster 0.85 25 1.00 1.00 1.01 1.06 1.00 1.00 1.00 1.00 1.00 75 1.00 1.00 1.30 1.16 1.05 1.01 1.01 1.00 1.00 25 1.00 1.00 1.09 1.10 1.00 1.00 1.00 1.00 1.00 75 1.01 1.00 1.50 1.26 1.06 1.01 1.01 1.00 1.00 25 1.00 1.00 1.21 1.18 1.00 1.00 1.00 1.00 1.00 75 1.02 1.01 1.72 1.37 1.09 1.01 1.02 1.00 1.01 Table 4. Conductance comparison of our ppr-grid with ppr-grow. Column 2 displays the median of the conductances found by ppr-grow in the same 100 trials presented in Table 3. The other columns display the 25% and 75% percentiles of the ratio of the conductances achieved by ppr-grow and ppr-grid for the same seed set. For example, on the dataset 'fb-one', the conductances found by ppr-grow are 18% larger than those found by ppr-grid with N = 1256 accuracy settings - and that comparison is on the quartile of trials where ppr-grid compares the worst to ppr-grow. We report the ratios in this manner (rather than their reciprocals) because in this form the values displayed are greater than 1, which distinguishes the values from conductance scores (which are between 0 and 1). 7 Related work As we already mentioned, regularization paths are common in statistics [9, 15], and they help guide model selection questions. In terms of clustering and community detection, solution paths are extremely important for a new type of convex clustering objective 27 function [16, 22]. Here, the solution path is closely related to the number and size of clusters in the model. One of the features of the solution path that we utilize to understand the behavior of the diffusion is the stability of the set of best conductance over time. In ref. [8], the authors use a closely related concept to study the persistence of communities as a different type of temporal relaxation parameter varies. Again, they use the stability of communities over regions of this parameter space to indicate high-quality clustering solutions. In terms of PageRank, there is a variety of work that considers the PageRank vector as a function of the teleportation parameter α [5, 20]. Much of this work seeks to understand the sensitivity of the problem with respect to α. For instance, we can compute the derivative of the PageRank vector with respect to α. It is also used to extrapolate solutions to accelerate PageRank methods [6]. More recently, varying α was used to show a relationship between personalized-PageRank-like vectors and spectral clustering [23]. Note that PageRank solution paths as α varies would be an equally interesting parameter regime to analyze. The parameter α functions akin to ε in that large values of α cause the diffusion to propagate further in the graph. 8 Conclusions and discussion We proposed two algorithms that utilize the push step in new ways to generate refined insights on the behavior of diffusions in networks. The first is a method to rapidly estimate the degree-normalized PageRank solution path as a function of the tolerance ε. This method is slower than estimating the solution of a single diffusion in absolute run time, but still fast enough for use on large graphs. We designed that method, and the associated degree-normalized PageRank solution path plot, in order to reveal new insights about regions at different size-scales in large networks. The second method is a fast approximation to the solution path on a grid of logarithmically-spaced ε values. It uses an interesting application of bucket sort to efficiently manage these diffusions. We demonstrate that both of these algorithms are fast and local on large networks. The seeded PageRank solution plots, in particular, are effective at identifying a number of subtle structures that emerge as a diffusion propagates from a set of seed nodes to the remainder of the network. We hope that these become useful tools to diagnose and study the properties of large networks. As recently established by Ghosh et al. [10], there are many related diffusion methods that all share Cheeger-like inequalities for specific definitions of conductance. We anticipate that our solution path algorithm could apply to any of these diffusions as well. For instance, our recent result on estimating the heat kernel diffusion in large graphs is based on the push step as well [18]; we anticipate only mild difficulty in adapting our results to that diffusion. Fast access to the solution path trajectories provides a number of additional opportuni- ties that we have not yet explored. We may be able to track multiple clusters directly by managing intermediate data. We may be able to find near-optimal conductance sets that are larger than those that directly optimize the objective. Also, nodes in an egonet or larger set could be further clustered by properties of their solution paths instead of their connectivity patterns. 28 D. F. Gleich and K. Kloster Acknowledgments We thank the following people for their careful reading of several early drafts: Huda Nassar, Bryan Rainey, and Varun Vasudevan. This work was supported by NSF CAREER Award CCF-1149756. References [1] R. Andersen and F. Chung. Detecting sharp drops in pagerank and a simplified local partitioning algorithm. In Theory and Applications of Models of Computation, pages 1–12. 2007. [2] R. Andersen, F. Chung, and K. Lang. Local graph partitioning using PageRank vectors. In FOCS, 2006. [3] P. Boldi, F. Bonchi, C. Castillo, D. Donato, A. Gionis, and S. Vigna. The query-flow graph: Model and applications. In Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM '08, pages 609–618, New York, NY, USA, 2008. ACM. [4] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered label propagation: A multiresolution In Proceedings of the 20th coordinate-free ordering for compressing social networks. WWW2011, pages 587–596, March 2011. [5] P. Boldi, M. Santini, and S. Vigna. PageRank: Functional dependencies. ACM Trans. Inf. Syst., 27(4):1–23, 2009. [6] C. Brezinski, M. Redivo-Zaglia, and S. Serra-Capizzano. Extrapolation methods for pagerank computations. Comptes Rendus Mathematique, 340(5):393 – 397, March 2005. [7] F. Chierichetti, R. Kumar, S. Lattanzi, M. Mitzenmacher, A. Panconesi, and P. Raghavan. On compressing social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '09, pages 219–228, New York, NY, USA, 2009. ACM. [8] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona. Stability of graph communities across time scales. Proceedings of the National Academy of Sciences, 107(29):12755–12760, June 2010. [9] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. Ann. Statist., 32(2):407–499, 04 2004. [10] R. Ghosh, S.-h. Teng, K. Lerman, and X. Yan. The interplay between dynamics and networks: Centrality, communities, and cheeger inequality. In KDD, pages 1406–1415, 2014. [11] D. F. Gleich. PageRank beyond the web. SIAM Review, 57(3):321–363, August 2015. [12] D. F. Gleich and M. M. Mahoney. Algorithmic anti-differentiation: A case study with min-cuts, spectral, and flow. In ICML, pages 1018–1025, 2014. [13] D. F. Gleich and C. Seshadhri. Vertex neighborhoods, low conductance cuts, and good seeds for local community methods. In KDD, pages 597–605, Aug. 2012. [14] T. Gutierrez-Bunster, U. Stege, A. Thomo, and J. Taylor. How do biological networks differ from social networks? (an experimental study). In ASONAM, pages 744–751, 2014. [15] T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer, 2009. [16] T. Hocking, J.-P. Vert, A. Joulin, and F. R. Bach. Clusterpath: an algorithm for clustering using convex fusion penalties. In ICML), pages 745–752, 2011. [17] L. G. S. Jeub, P. Balachandran, M. A. Porter, P. J. Mucha, and M. W. Mahoney. Think locally, act locally: Detection of small, medium-sized, and large communities in large networks. Phys. Rev. E, 91:012821, Jan 2015. [18] K. Kloster and D. F. Gleich. Heat kernel based community detection. In KDD, pages 1386–1395, 2014. [19] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news 29 media? In WWW '10: Proceedings of the 19th international conference on World wide web, pages 591–600, New York, NY, USA, 2010. ACM. [20] A. N. Langville and C. D. Meyer. Google's PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, 2006. [21] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29–123, September 2009. [22] F. Lindsten, H. Ohlsson, and L. Ljung. Just relax and come clustering! a convexification of k-means clustering. Technical report, Linkopings universitet, 2011. [23] M. W. Mahoney, L. Orecchia, and N. K. Vishnoi. A local spectral method for graphs: With applications to improving graph partitions and exploring data graphs locally. Journal of Machine Learning Research, 13:2339–2365, August 2012. [24] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07, pages 29–42, New York, NY, USA, 2007. ACM. [25] M. E. J. Newman. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E, 74(3):036104, September 2006. [26] S. E. Schaeffer. Graph clustering. Computer Science Review, 1(1):27–64, 2007. [27] C. (The Cooperative Association for Internet Data Analyais). Network datasets. http: //www.caida.org/tools/measurement/skitter/router_topology/, 2005. Accessed in 2005. [28] J. J. Whang, D. F. Gleich, and I. S. Dhillon. Overlapping community detection using seed set expansion. In CIKM, pages 2099–2108, 2013. [29] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In EuroSys, pages 205–218, 2009. [30] J. Xie, S. Kelley, and B. K. Szymanski. Overlapping community detection in networks: The state-of-the-art and comparative study. ACM Comput. Surv., 45(4):43:1–43:35, Aug. 2013. [31] J. Yang and J. Leskovec. Defining and evaluating network communities based on ground- truth. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 745–754, Dec 2012. [32] D. Zhou, O. Bousquet, T. N. Lal, J. Weston, and B. Scholkopf. Learning with local and global consistency. In Advances in neural information processing systems (NIPS), volume 16, pages 321–328, 2003.
1911.06961
1
1911
2019-11-16T05:25:01
Towards Automated Sexual Violence Report Tracking
[ "cs.SI", "cs.CL" ]
Tracking sexual violence is a challenging task. In this paper, we present a supervised learning-based automated sexual violence report tracking model that is more scalable, and reliable than its crowdsource based counterparts. We define the sexual violence report tracking problem by considering victim, perpetrator contexts and the nature of the violence. We find that our model could identify sexual violence reports with a precision and recall of 80.4% and 83.4%, respectively. Moreover, we also applied the model during and after the \#MeToo movement. Several interesting findings are discovered which are not easily identifiable from a shallow analysis.
cs.SI
cs
Towards Automated Sexual Violence Report Tracking Naeemul Hassan1, Amrit Poudel2, Jason Hale2, Claire Hubacek2, Khandakar Tasnim Huq3 Shubhra Kanti Karmaker Santu4, Syed Ishtiaque Ahmed5 1University of Maryland, College Park, 2University of Mississippi, 3Khulna University of Engineering and Technology 4Massachusetts Institute of Technology, 5University of Toronto 9 1 0 2 v o N 6 1 ] I S . s c [ 1 v 1 6 9 6 0 . 1 1 9 1 : v i X r a Abstract Tracking sexual violence is a challenging task. In this paper, we present a supervised learning-based automated sexual vio- lence report tracking model that is more scalable, and reliable than its crowdsource based counterparts. We define the sex- ual violence report tracking problem by considering victim, perpetrator contexts and the nature of the violence. We find that our model could identify sexual violence reports with a precision and recall of 80.4% and 83.4%, respectively. More- over, we also applied the model during and after the #MeToo movement. Several interesting findings are discovered which are not easily identifiable from a shallow analysis. 1 Introduction According to World Health Organization (WHO), sexual vi- olence is defined as any sexual act, attempt to obtain a sex- ual act, unwanted sexual comments or advances, or acts to traffic, or otherwise directed, against a person's sexuality us- ing coercion, by any person regardless of their relationship to the victim, in any setting, including but not limited to home and work (Krug et al. 2002). This is a serious offence that causes several negative impacts on the victims' physi- cal, psychological, and social health (Fitzgerald et al. 1997; Loy and Stewart 1984). Unfortunately, the prevalence of sexual violence is very high across the globe (Gelfand, Fitzgerald, and Drasgow 1995), and women are the princi- ple victims of sexual violence. According to UN Women and World health Organization (WHO), 35% (more than one in every three) of women worldwide have experienced either physical and/or sexual intimate partner violence or sexual violence by a non-partner at some point in their lives (UN WOMEN contributors 2017). Despite its disturbing prevalence and severity, it is often difficult to detect sexual violence and reach out to a victim in a timely manner (Aroussi 2011). This challenge mostly comes from the fact that sexual violence is often subjective and context-dependent (Clay-Warner 2003). Without a re- port by the victim, many sexual violence acts are hard to recognize. However, self-reporting is not always easy for the Copyright c(cid:13) 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. victims because of various social and cultural constraints in- cluding taboos around discussing sex, stigma around the vic- tims of sexual violence, and the possibility of victim blam- ing in many societies around the world (Fisher et al. 2003; Kathleen C. Basile 2014; Spencer et al. 2017). These chal- lenges constitute a 'silence' that surrounds sexual violence and that has long been impeding the process of reducing the occurrence and impact of this problem. While the victims tend not to self-report through tradi- tional mechanisms such as filing a police report (Felson and Par´e 2005) or going to corresponding workplace/educational system (e.g., Title IX) (Cantor et al. 2015) due to uncertainty and complexity of the process among other reasons (Krebs et al. 2007), they often take their frustration into social media and disclose their violent experience to friends, peers, or fol- lowers (Andalibi et al. 2016). The objective of this paper is to identify the sexual violence victims by mining self-reports from social media. In October, 2017, an online movement began over social media where women from all over the world started shar- ing their stories of experiencing sexual violence using the hashtag #MeToo. This online movement was fueled up by actress Alyssa Milano's invitation to all women to reveal the name of the perpetrators of sexual violence. She said, "If all the women who have been sexually harassed or assaulted wrote 'Me too' as a status, we might give people a sense of the magnitude of the problem", on October 15, 2017. Af- ter Milano's tweet, within 24 hours, there were more than 4.5 million posts on different social network platforms with hashtag #MeToo (or some variants of it). Thus, the #MeToo movement created an unprecedented opportunity for women to express their untold feelings to the world, and for researchers and practitioners to understand various patterns of violence in various contexts. Millions of #MeToo posts allow us learning the kind of violence, vic- tim's relationship with the perpetrator, location and time of the incident, and victim's emotional response among oth- ers. This, in turn, also creates the opportunity to identify if a written statement expresses a report of sexual violence, even if it's not explicitly tagged with #MeToo. This capabil- ity is particularly important in order to automatically detect violence from a massive stream of text data over social me- dia. An automated system for identifying posts that report sexual violence will eliminate the need for a huge amount of human power to observe and evaluate each post sepa- rately. Furthermore, attention to posts on social media often depends on the social capital of the poster, which shrinks the way for victims with small capital to get proper atten- tion. An automated system can eliminate such limitations and provide a scalable platform to instantly detect a post with a report of violence and inform concerned parties for reacting. Such automated tools can also be used for under- standing the prevalence, severity, and nature of violence in different geographic locations in different times of the year. To this end, we have developed a data-driven, AI based automated sexual violence report tracking model that can i) detect a sexual violence report, ii) characterize the report with respect to several contexts -- gender of the victim, na- ture of the violence in terms of severity, category of the per- petrator, and iii) automatically tag the perpetrator describ- ing portion from the report. Our model can detect the sex- ual violence reports with a precision and recall of 80.4% and 83.4%, respectively. It can also annotate the perpetrator identity from the report with an average F1-measure of 76%. Overall, we make the following contributions in this paper- 1. We gather about a million #MeToo hashtagged tweets, systematically process the corpus to remove noise, and identify potential sexual violence reports using Seman- tic Role Labeling (Section 3.2). A subset of the corpus is made public for researchers. 2. We design a sexual violence report annotation and char- acterization scheme by following the guidelines of Center for Disease Control and Prevention (CDC) and use Ama- zon Mechanical Turk to annotate about 18, 000 tweets. 3. We define the sexual violence report tracking as multi- ple multi-class supervised classification problem and se- quence labeling problem (Section 4, 5). To the best of our knowledge, this is the first data-driven, AI based solution towards automated sexual violence report tracking. 4. We present two cases by deploying the tracking models over the #MeToo corpus and a Post-MeToo corpus (Sec- tions 6.1, 6.2). Our analysis reveals several relationships between violence and perpetrator category. 2 Literature Review Barriers to Reporting: Knowledge about sexual violence is limited by a widespread silence around it. There are differ- ent factors working behind this silence. One dominant fac- tor, especially operational in the western world, is the fear of retaliation which is defined by the victim's fear of be- ing ignored or the incident being trivialized by the listen- ers (Bergman et al. 2002). This silence is also often cre- ated by the lack of hope in the victim who do not expect the listeners to help them (Banyard 2011; Garrett and Has- san 2019). Furthermore, in many workplaces, sexual vio- lence is often considered as an expression of masculinity, and being a victim is seen as a sign of weakness. This holds women back from reporting any sexual violence happened to them (Fitzgerald 1993). Speaking out is even harder for women in many places in the south Asia. In most places in the Indian subcontinent, for example, "sex" is a tabooed topic, and talking about sexual harassment is seen as an act of immodesty (Nair and John 2000). This challenge is compounded by the strong patriarchal culture (Houston and Kramarae 1991) in India and the middle-east (Shalhoub- Kevorkian 2003), where women often depend on men for most things needed for their living including foods, shel- ter, education, transportation, and health (Mitter 1992). For these and many other reasons, women often remain silent about the violence they experience; and their silence creates a gap in our knowledge about this particular problem. Current Reporting Mechanisms: Feminist activists, re- searchers, artists, and scholars have long been trying to break this silence of women about sexual harassment. There have been many demonstrations on the street and on the news, radio, and television media by the feminist activists that depict the severity of sexual harassment, and the gender- politics related to it (Hester, Kelly, and Radford 1996). With the advancement of information and communication tech- nologies, people have now many effective means of commu- nication including mobile phone and internet. Researchers have tried to leverage them to design different communica- tion platforms for women to report abuses, get safety infor- mation, combat harassment, and share their opinions with others. For example, Hollaback! is a smartphone application that allows the users to take pictures of the harassers and post the pictures on social media to shame them (Dimond et al. 2013). Victims can also report harassment through Ha- rassmap (harassmap.org), Bijoya (bijoya.crowdmap.com), or Akshara (akshara.crowdmap.com), applications that show an interactive map of sexual harassment incident places to the users (Young 2014). One limitation of these systems is, unless the victims are aware of these, the systems won't sustain. For example, Bijoya had the latest report in 2013 and Akshara had the latest report in 2016. Once the pop- ularity of such a system fades out, it no longer tracks re- ports of sexual harassment. Safetipin is a mobile phone ap- plication with which users can mark the unsafe places, and it also informs a user if they enter into an unsafe place. On the other hand, Circle of 6 (www.circleof6app.com) helps users find other trusted women to accompany them while traveling. Protibadi, a mobile application was de- ployed that allowed women to anonymously report harass- ment, provided an interactive harassment map, and allowed the users to participate in a discussion around harassment anonymously (Ahmed et al. 2014). All these applications have been proven to be effective to some extent, and could help some women break the silence and raise their voice against sexual harassment. However, as it has been seen, many women do not use these platforms to talk about sexual harassment because of many larger social, cultural, and po- litical challenges that just cannot be fully mitigated only by easy, accessible, ubiquitous, and intelligent applications and communication tools (Ahmed et al. 2016). Promise of Social Media Based Report Tracking: The #MeToo movement on Twitter and other social media is con- sidered revolutionary (Manikonda et al. 2018). Such volun- tary and spontaneous participation of millions of women across the globe in breaking down a silence that had long been suppressing them was unprecedented in the his- tory (Kearl 2018). Through the tweets of these women, we could know information about sexual harassment that was never disclosed before (Rodino-Colocino 2018). We could also learn the context, emotion, and repercussions around sexual harassment which would be hard to get oth- erwise (Khatua, Cambria, and Khatua 2018; Bhattacharyya 2018). We argue that the tweets shared by the victims over Twitter have not only helped them release their bot- tled up emotions, but also have provided us with impor- tant data that we can use for better understanding the nature of sexual harassment (Tambe 2018). Such information can be used for improving existing law, policy, education, and technology to reduce the occurrences of sexual harassment and to extend a better support to the victims (Jaffe 2018; Tippett 2018). Moreover, our analysis finds that victims take to social media to report violence experience even in the ab- sence of a social movement. So, we argue that the insights extracted from the #MeToo movement data can potentially assist in tracking sexual violence reports from social media. 3 Data Preparation 3.1 Collection We collected about a million tweets containing the #MeToo hashtag from all over the world within the October 15 − 31, 2017 period using the Twitter API. This is the period when the movement was gaining momentum. We have made a 25% random sample of the whole dataset publicly available for other researchers 1. We removed the duplicate tweets from the dataset by matching the permanent URLs of the tweets. After that, we removed the re-tweets of original tweets. These cleaning steps reduced the collection size to 520, 761 tweets that were tweeted by 363, 090 unique users. As the tweets are gathered from all over the world, we find that they are written in multiple languages. We translated the non-English tweets to English using the Google Trans- late API 2. 3.2 Processing Our primary inspection finds that the dataset contains tweets that are pertinent to the #MeToo movement and also some tweets that were irrelevant such as advertisements, spams, etc. Moreover, the pertinent tweets were also of varying na- ture. For instance, some tweets contained sexual violence reports, some expressed support to the spirit of the #MeToo movement, and some were opposing or questioning the movement. We used the Amazon Mechanical Turk [AMT] (details in Section 3.3) to separate the sexual violence re- ports from the rest of the dataset. However, as the number of tweets is large and the AMT service is not cheap, we wanted to filter the dataset and maximize the chance of getting pos- itive samples. We processed the data as follows. Identify Common Violence Related Verbs We used NLTK 3 part of speech (POS) tagger to identify the verbs 1Link is not provided due to the anonymous submission policy. 2https://cloud.google.com/translate/docs/ 3https://www.nltk.org/ that are present in the tweets. Then, we manually inspected the top-1000 most frequent verbs and identified a set of 27 verbs, H, which are generally associated with sexual vio- lence or events of that nature. The verbs are -- Abuse, As- sault, Attack, Beat, Bully, Catcall, Flirt, Fondle, Force, Fuck, Grab, Grope, Harass, Hit, Hurt, Kiss, Masturbate, Molest, Pull, Rape, Rub, Slap, Stalk, Threat, Touch, Use, Whistle. These verbs and their variants (e.g., Abuse: abuse, abused, abusing) were present in 103, 083 tweets (20% of 520, 761). Identify Potential Sexual Violence Reports We under- stand that the presence of a sexual violence related verb in a tweet does not necessarily mean that the tweet reports a sexual violence. To identify potential sexual violence re- ports, we applied Semantic Role Labeling (SRL) (Carreras and M`arquez 2005). Given a sentence, SRL can identify the verb, the agent of the verb, and the details. For example, SRL extracts the tuple (a jerk, grab, my vagina) from the tweet "A jerk grab my vagina at a night club in NYC". We used a deep highway BiLSTM with constrained decoding based SRL detection technique (He et al. 2017) that achieves 83.2% F-1 on the CoNLL 2005 (Carreras and M`arquez 2005) test set and 83.4% F-1 on CoNLL 2012 (Pradhan et al. 2012). We considered the tweets where SRL finds a tuple < agent, verb, detail > such that, verb ∈ H agent = a string with a noun or 3rd person pronoun detail (cid:54)= an empty string It should be noted that the SRL detection technique iden- tifies presence of negation of an action (e.g., He didn't kiss her) or modal of an action (e.g., Women can abuse men). We omitted the tweets containing negation or modal from our consideration. In total, we identified 17, 935 (17.39% of 103, 083) such tweets through this process. We argue that these tweets are more likely to contain sexual violence re- ports than the tweets where SRL doesn't find such a tuple. We take a random sample of 16, 000 from these 17, 935 tweets and a random sample of 10, 000 from the rest of the tweets that -- i) didn't pass the SRL filter, thereby don't nec- essarily contain a violence related verb, and ii) contained at least 5 words. In this way, we created a set of 26, 000 tweets to annotate using AMT. 3.3 Annotation Scheme We prepare the annotation scheme by following the sex- ual violence reporting guidelines and categorizations pro- vided by the Centers for Disease Control and Prevention (CDC) (Kathleen C. Basile 2014), the leading national pub- lic health institute of the United States. Given a tweet, an AMT worker identifies the following five information- 1. Category of sexual violence, if reported in the tweet. The categories are- (a) (PEN) Completed or attempted forced penetration. (b) (PEN) Completed or attempted alcohol/drug facilitated penetration. (c) (PEN) Completed or attempted forced acts in which a victim is made to penetrate someone. (d) (PEN) Completed or attempted alcohol/drug facilitated acts in which a victim is made to penetrate someone. (e) (PEN) Nonphysically forced penetration which occurs after a person is pressured to consent. (f) (USC) Unwanted sexual contact. (g) (NSE) Non-contact unwanted sexual experiences. (h) (OTH) A sexual violence incident that doesn't belong to any of the above category. (i) (NON) The tweet doesn't report a sexual violence. 2. Identity of the victim in case the tweet reports a vio- lence. Possible categories are- (a) (SLF) The tweeter is the victim- in other words, the victim is self-reporting, (b) (nSLF) The tweeter is not the victim. 3. Gender of the victim. The options are- (FEM) Female, (MAL) Male, and (UNS) Unspecified. 4. Category of the perpetrator (person who inflicts the vio- lence), if specified in the tweet. The categories are -- (INT) Intimate Partner, (FAM) Family Member, (POW) Person in Position of Power, Authority or Trust, (FRN) Friend or Acquaintance, (STR) Stranger, and (PNM) Perpetrator not mentioned or not specific enough. 5. Words from the tweet that describe the perpetrator. Example 1. For example, given the following tweet- "an old guy at wendy's moved me aside in line by grabbing me by the hips", possible annotations would be 1. USC, 2. SLF, 3. FEM, and 4. STR, and 5. "an old guy". 3.4 Annotated Data Each tweet was annotated by one annotator. Due to the large scale of the data, we couldn't afford multiple annotators for a tweet. However, a manual analysis of the annotated data found the annotations to be of good quality. In total, 18, 624 tweets were annotated by AMT out of 26, 0004. Ta- ble 1 shows distributions of the sexual violence categories. In total, there are 11, 671 tweets containing a sexual vio- lence reports and 6, 953 tweets do not contain any sexual violence reports. There are 3, 529 penetration (PEN) related reports that comprise of the first five sexual violence cate- gories. In our sexual violence characterization task (details in Section 4.2), we treat the penetration related violence as a whole rather than treating each of the PEN categories sepa- rately due to limited sample size for these categories except for the first one. The most frequent category is the Unwanted Sexual Contact (USC). About 79.13% (9, 236) of the reports are from the 16K SRL filtered data. This demonstrates the effectiveness of the SRL based filtering to maximize getting sexual violence re- ports. About 20.86% (2, 435) of the reports came from 10K data. So, our dataset also contains a good number of reports which don't follow the SRL based patterns. Among the 11, 671 sexual violence reports, 7, 395 (63.36%) were self-reported (SLF) by the victims and the remaining 4, 276 were not self reported (nSLF). Our analy- sis finds that the nSLF set contains reports where the tweeter 4The annotation task is paused at this moment to preserve anonymity of the authors. It will be resumed after this manuscript's reviews are available. is reporting a sexual violence of other victim such as a fam- ily member or an acquaintance. It also has reports where the victim is mentioned but not specifically enough to under- stand the identity. Question 3 asked about gender identity of the victim. The percentage of FEM, MAL, and UNS were 41.43%, 9.39%, and 49.18%, respectively. A gender-violence bi-variate anal- ysis reveals that females face more unwanted sexual contact (USC) violence than what males face. Table 2 shows fre- quency (percentage) of each gender category for each vio- lence category. Percentage of USC among FEM is 38.02% whereas it is 26.56% among MAL. Also, USC is the most common violence in FEM whereas for MAL it is PEN. Question 4 asked about perpetrator's nature. We find that 7, 509 (64.34%) of the sexual violence reports contain clear categorization of the relationship between the victim and the perpetrator. The relationship can be one of the first 5 cate- gories described in Question 4. Table 4 shows distribution of the categories. The majority of the perpetrators are stranger to the victims. The second major category consists of per- petrator from person in position of power or authority or trust. There are 4, 162 (35.66%) violence reports which ei- ther don't mention the relationship specifically or don't men- tion about perpetrator at all (PNM category of Question 4). Question 5 requires the AMT coders to highlight the words of a tweet that describe the perpetrator of a sexual violence. We took several precautionary measures to ensure good quality annotation and discourage spam activities. For example, we discarded the data where coders responded (i) NON to Question 1 or (f) PNM to Question 4 but at the same time highlighted words in Question 5. We also alerted the coders when they deliberately or mistakenly highlighted the whole tweet. Our analysis finds that the highlighted words by and large comprise of nouns such as boss, teacher, un- cle, etc. or pronouns such as he, she. Table 3 shows some of the most frequent perpetrator indicating texts that were high- lighted by the coders. The table has both 'a man' and 'man'. It could be because a tweeter wrote without the article 'a' or because a coder didn't highlight the article. The average number of highlighted words in the tweets is 2.19. We use these words to train a sequence labeling model that can pre- dict perpetrator of sexual violence (details in Section 5.4). 4 Problem Formulation We design the sexual violence report tracking as a two step process- i) detecting sexual violence reports and ii) charac- terizing the reports with respect to violence nature, victim's identity, gender identity, and relationship with perpetrator. 4.1 Sexual Violence Report Detection We define the sexual violence report detection task as a supervised binary classification problem where the set of classes, C = {SV R, nSV R}. Formally, given X , a set of all tweets, and a training set T of annotated tweets (cid:104)t, c(cid:105), where (cid:104)t, c(cid:105) ∈ X × C, our goal is to learn a function γ such that γ : X → C, in other words, it maps tweets to {SV R, nSV R}. Category Completed or attempted forced penetration Completed or attempted alcohol or drug facilitated penetration Completed or attempted forced acts in which a victim is made to penetrate someone Completed or attempted alcohol or drug facilitated acts in which a victim is made to penetrate someone Nonphysically forced penetration which occurs after a person is pressured to consent Unwanted sexual contact Non-contact unwanted sexual experiences A sexual violence incident that doesn't belong to any of the above category This tweet doesn't report a sexual violence Table 1: Sexual violence category distribution in the annotated data PEN 3529 Count Code Count 1919 438 699 241 232 3980 1492 2670 6953 USC NSE OTH NON 3980 1492 2670 6953 NSE FEM 610 (14.12) MAL 90 (9.19) UNS 679 (13.24) OTH 843 (19.51) 197 (20.12) 1264 (24.65) PEN 1225 (28.35) 432 (44.13) 1246 (24.30) USC 1643 (38.02) 260 (26.56) 1939 (37.81) Table 2: Frequency (Percentage) of each Gender-Violence combination Text he men a man a guy man someone guy Text a boy boss Count 509 276 269 women friend 192 114 a stranger the man 77 75 the guy Count Text 69 my boss 64 63 60 56 55 49 manager they stranger a woman boyfriend she Count 47 42 42 40 35 31 29 Table 3: Common perpetrator words Category (INT) Intimate Partner (FAM) Family Member (not Intimate Partner) (POW) Person in Position of Power/Authority/Trust (FRN) Friend or Acquaintance (STR) Stranger Total Count 545 837 2045 1735 2347 7509 % 7.26 11.14 27.23 23.11 31.26 100 Table 4: Perpetrator category distribution supervised a 4.2 Sexual Violence Report Characterization We formulate the characterization of reports as mul- tiple multi-class problems. Formally, given XSVR, that tweets have been mapped to {SV R} by γ, and a train- (cid:104)t, (c, v, g, p)(cid:105) ing where t ∈ XSVR, c ∈ {P EN, U SC, N SE, OT H}, v ∈ {SLF, nSLF}, g ∈ {F EM, M AL, U N S}, p ∈ {IN T, F AM, P OW, F RN, ST R, P N M}, our goal is to learn functions ζ, υ, ξ, ρ such that- classification set of set TSVR of annotated ζ : XSVR → {P EN, U SC, N SE, OT H} υ : XSVR → {SLF, nSLF} all tweets ξ : XSVR → {F EM, M AL, U N S} ρ : XSVR → {IN T, F AM, P OW, F RN, ST R, P N M} In addition, we model the perpetrator tagging task as a se- quence labeling problem. Specifically, given a tweet t, the goal is to identify the consecutive set of words in t that de- notes the perpetrator who caused the sexual violence. 5 Model Development In the following sections, we describe the processing of the annotated data, modeling of the problems, and comparison of performances of multiple learning techniques. 5.1 Data Processing We preprocessed the tweets following a series of steps. First, we converted the tweets to all lowercase. Then, a Python package named tweet-preprocessor 5 was used to remove URLs, emojis, and smileys from the tweets. We also re- moved the hashtag #metoo from the tweets. After that, these cleaned tweets were transformed to vectors using Bag-of- Words (BOW) model and TF-IDF (with sublinear tf). We used unigrams and bigrams as features (ngrams with n = 1, 2). There were 147, 370 such features. The ngrams that were present in only one tweet (very rare) or present in more than 25% of all tweets (very common) were discarded from fea- ture set. This step reduced the number of features to 34, 688. From these, we selected the most frequent 5, 000 ngram fea- tures and experimented with these in all the experiments. Note: We experimented with stopwords removal and stemming. However, these steps decreased the overall per- formance. So, we decided not to use these two steps. 5.2 Model Selection We experimented with multiple supervised learning al- gorithms. Specifically, we used Support Vector Machine (SVM) with linear kernel, Random Forest (RDF) with 100 estimators, and Gradient Boosting (GDB). In some cases, the SVM and GDB outperformed others in terms of f1- measure. However, we observed a better performance when all of the three classifiers were combined to build a majority voting classifier (MVC). We used a Python package named 5https://pypi.org/project/tweet-preprocessor/ scikit-learn to build MVC. It predicts the class label based on the argmax of the sums of the predicted probabilities by SVM, RDF, and GDB. Table 7 shows performances of the classifiers in terms of precision (P), recall (R), and F1- measure(F1). We conducted 5-fold cross-validation. In each fold, 80% of the data was used for training and the remain- ing 20% was used for testing. Then took the average of the performances of the folds. The highest F1-measure for each category is highlighted in the table. MVC achieved the high- est F1-measures in 10 of the 17 total categories. Note: We also experimented with word embedding based techniques (GLOVE (Pennington, Socher, and Manning 2014)) with deep learning models (LSTM, IndRNN (Li et al. 2018)). However, we didn't observe better performance, particularly in task 4.2. This could be because of the fact that the sample size was small to learn the model parameters. 5.3 Sexual Violence Report Detection Recall that the dataset has about 11K sexual violence reports and 7K other tweets. MVC classifier achieves the best per- formance in detecting sexual violence reports in tweets. It can identify a report with a precision, recall, and F1-measure of 0.804, 0.834, and 0.808, respectively. To further under- stand the effectiveness of MVC, we used its SV R class probabilities to conduct ranking evaluation. We measured the accuracy of the top-k sentences by two commonly used measures- Precision-at-k (P@k), and Average Precision-at-k (AvgP@k). Table 5 shows these measures for various value of k. In general, MVC achieves excellent performance in ranking. For top 1000 sentences, its precision is 0.951. This indicates that MVC has a strong agreement with human an- notators on detecting sexual violence reports. k P@k AvgP@k 25 1.0 1.0 50 1.0 1.0 100 1.0 1.0 300 0.993 0.997 500 0.982 0.993 1000 0.951 0.950 2500 0.798 0.935 Table 5: Ranking evaluation of sexual violence reports 5.4 Sexual Violence Report Characterization In general, MVC outperforms other classifiers in charac- terizing sexual violence reports. It achieves the highest weighted-average F1-measure in all the categorization tasks. The weighted-average F1-measure for violence, victim, gen- der, and perpetrator categorization is 0.57, 0.82, 0.612, and 0.55, respectively. Violence and Victim Category MVC also achieves the best precision and recall in detecting penetration related (P EN) sexual violence reports. In case of detecting un- wanted sexual contact (U SC), the GDB has the best preci- sion (0.736) and F1-measure (0.724). None of the classifiers performed well in case of detecting non-contact sexual ex- perience (N SE). It could be because of the comparatively limited sample or class imbalance. The SVM achieves the best F1-measure (0.4) in this category which is 0.15 higher than a random guess. SVM and MVC comparatively per- form well in detecting whether the sexual violence report is a self-report or not. MVC achieves the best weighted aver- age F1-measure- 0.82. Gender Category Similar argument can be made for M AL category in gender categorization. Although the per- formances are reasonable for F EM, and U N S but M AL measures, particularly recall and F1-measure, are lower than random guess. This suggests that many M AL reports were mis-classified into other categories. A further look into the confusion matrix reveals that 57% and 35% of M AL reports were classified as U N S and F EM, respectively. Perpetrator Category MVC achieves the best weighted F-1 measure in all perpetrator categories. The weighted av- erage F1-measure is 0.55, 0.38 higher than a random guess. Our annotation scheme collects the perpetrator denoting words from the tweets (see Section 3.3, 3.4 and Exam- ple 1 for reference). We used Conditional Random Field (CRF) (Lafferty, McCallum, and Pereira 2001) to train a se- quence labeling model using these words. We used the BIE (begin-inside-end) notation to tag the perpetrator word se- quences. Words those were not part of the perpetrator se- quence, were assigned the O tag. For instance, the tweet "in the subway an old man grabbed me" would be tagged as- {in-O, the-O, subway-O, an-B, old-I, man-E, grabbed- O, me-O}. We used the words, their prefix and suffix, and their parts-of-speech tags as features while training the se- quence labeling model. In total, 8, 614 sexual violence re- porting tweets were labeled with perpetrator words. We did a 5-fold cross-validation. Table 6 shows performance of the CRF perpetrator text labeling model in terms of precision, recall, and F1-measure. The model achieves a weighted- average F1-measure of 0.943 (0.70 if class O is not consid- ered). We observe that the performance for class I is low. As most of the highlighted perpetrator text (6, 653 out of 8, 614) was less than or equal two words, we didn't have enough sample for class I. For the B and E classes, the F1-measures were above 0.76. Class O B E I Avg / total Precision Recall 0.959 0.989 0.703 0.840 0.739 0.883 0.218 0.601 0.943 0.949 F1-measure 0.974 0.765 0.805 0.320 0.943 Support 35440 1723 1723 871 39757 Table 6: Performance of perpetrator labeling 6 Case Studies Using the above described classifiers, we conduct an ex- ploratory analysis on two cases- i) the #MeToo movement and ii) the Post-Metoo era. The data collection method for the #Metoo has been explained in Section 3.1. For the Post- MeToo case, we collected 631, 677 tweets from May, 2019 when the #MeToo movement was not the major news topic in the world. Classifier Categories Sexual Violence Report Violence Category Victim Category Gender Category Perpetrator Category nSV R SV R weighted-Avg N SE OT H P EN U SC weighted-Avg SLF nSLF weighted-Avg F EM M AL U N S weighted-Avg F AM F RN IN T P N M P OW ST R weighted-Avg SVM R 0.666 0.802 0.754 0.358 0.452 0.532 0.718 0.554 0.714 0.878 0.818 0.538 0.092 0.782 0.616 0.466 0.346 0.340 0.770 0.482 0.434 0.548 P 0.708 0.810 0.772 0.456 0.422 0.560 0.678 0.558 0.780 0.842 0.818 0.618 0.642 0.618 0.618 0.692 0.512 0.708 0.502 0.656 0.574 0.568 F-1 0.662 0.798 0.744 0.400 0.432 0.546 0.694 0.554 0.744 0.860 0.818 0.576 0.154 0.688 0.592 0.552 0.410 0.452 0.604 0.552 0.486 0.532 P 0.710 0.786 0.758 0.444 0.434 0.548 0.736 0.572 0.766 0.768 0.766 0.708 0.616 0.614 0.654 0.696 0.582 0.546 0.488 0.726 0.622 0.590 GDB R 0.620 0.810 0.740 0.358 0.454 0.576 0.720 0.570 0.532 0.902 0.770 0.476 0.078 0.892 0.642 0.472 0.326 0.354 0.814 0.426 0.426 0.550 F-1 0.632 0.792 0.732 0.394 0.440 0.560 0.724 0.566 0.626 0.832 0.756 0.570 0.138 0.728 0.606 0.552 0.418 0.424 0.610 0.536 0.496 0.534 P 0.736 0.798 0.778 0.446 0.434 0.574 0.664 0.556 0.77 0.83 0.81 0.648 0.570 0.632 0.630 0.674 0.618 0.640 0.486 0.660 0.590 0.578 RDF R 0.628 0.830 0.756 0.276 0.420 0.576 0.760 0.566 0.694 0.876 0.808 0.540 0.062 0.826 0.634 0.436 0.308 0.314 0.808 0.448 0.428 0.546 F-1 0.648 0.804 0.746 0.340 0.426 0.576 0.708 0.556 0.726 0.852 0.802 0.586 0.108 0.716 0.604 0.526 0.406 0.414 0.608 0.526 0.490 0.524 MVC R 0.638 0.834 0.760 0.336 0.434 0.584 0.758 0.580 0.688 0.898 0.822 0.522 0.074 0.858 0.642 0.482 0.330 0.360 0.830 0.478 0.432 0.564 P 0.752 0.804 0.782 0.484 0.444 0.578 0.686 0.572 0.802 0.834 0.826 0.680 0.642 0.624 0.650 0.718 0.610 0.682 0.500 0.702 0.642 0.604 F-1 0.656 0.808 0.750 0.394 0.438 0.580 0.718 0.570 0.738 0.864 0.820 0.590 0.130 0.722 0.612 0.568 0.426 0.462 0.622 0.564 0.508 0.550 Table 7: Performance of different classifiers on the detection and characterization tasks 6.1 The #MeToo Movement We apply our sexual violence report detecting and character- izing classifiers on the 0.49 million tweets (except the tweets which were used to train the models) which were collected during the #MeToo movement's prime time (see details in Section 3.1). Our goal is to understand to what extent sexual violence experiences were reported during this movement, what were the nature of the violence, who are the perpetra- tors, and more. Extent of Sexual Violence Our classifiers identify 106, 885 tweets containing sexual violence reports. 59, 776 of them are self-reported (SLF ). To conduct a robust anal- ysis with high-probable violence reports, we identified the SLF s with SV R class probability greater than or equal to 0.7. This threshold is set empirically, after attempting with multiple smaller and larger values. There are 25, 163 self- reports which surpass this threshold. We continue our anal- ysis with these high SV R class probability, SLF labeled reports only. 4, 462 of these SLF reports are from female (F EM) victims, 105 from male (M AL), and 20, 596 be- long to U N S. Nature of Violence Our violence category classifier finds that out of 25, 163 SV R, SLF labeled reports, 1, 866, 3, 477, 9, 193, and 10, 627 reports are classified as N SE, OT H, P EN, and U SC, respectively. Perpetrator Category The perpetrator classifier finds that 10, 698 (42.5%) of the reports contain specific perpetrator information and the rest didn't mention perpetrator in the tweet. Table 8 shows the distribution of perpetrator cate- gories among these reports. Overall, we observe a large Category FAM FRN INT POW STR Frequency 1112 2568 751 2408 3859 Percentage Tagged 10.39 24.00 7.02 22.51 36.07 442 731 230 1865 939 Percentage 39.75 28.47 30.63 77.45 24.33 Table 8: Perpetrator category distribution number of violence committed by ST R (36.07%). Only 7.02% of the violence was attributed to IN T . Perpetrator Annotation We apply the CRF perpetrator text labeling model on the 10, 698 reports where perpetra- tor information is provided. Overall, the model could tag the perpetrator denoting text in 3, 391 reports. The rightmost two columns in Table 8 shows the number and percentage of tagged reports in each category. Figure 1 shows a wordcloud of CRF tagged perpetrator text for each perpetrator category. The font size signifies relative frequency of a text. Overall, CRF identifies different roles under each category. For ex- ample, the F AM cloud shows father, brother, cousin, un- cle, step father etc. The P OW cloud shows boss, teacher, manager, professor and so on. In Section 6.2, we provide more examples of reports with annotated perpetrator text. Violence-Perpetrator Relation We further investigate the relation between perpetrator category and the nature of vi- olence. Figure 2 shows the number of reports for each violence-perpetrator category pairs (left). Overall, the most common reports are about unwanted sexual contact by (a) INT (b) FAM Figure 1: Perpetrator text tagged by CRF in each perpetrator category. Font size is proportion to relative frequency. (c) FRN (d) POW (e) STR strangers (U SC − ST R) and the least common is non- contact unwanted sexual experience by intimate partners (N SE − IN T ). Figure 2 also shows the percentages of sexual violence categories across the perpetrators (middle) and the percentages of perpetrator categories across the vio- lence (right). An interesting observation is that intimate part- ners mostly conduct penetration related violence (62.18%) but, penetration violence is least done by intimate partners (13.21%). Strangers mostly commit unwanted sexual con- tacts (72.19%); almost 5 times more than the second most common violence category (P EN, 15.03%). At the same time, strangers are also the most common perpetrator of the U SC category (50.72%); more than twice as common as the next probable perpetrator category (P OW, 20.19%). For non-contact unwanted sexual experiences, person in posi- tion of power/authority/trust (P OW ) and ST R are signifi- cantly more responsible than others. Also, P OW is the sec- ond most common perpetrator class in each of the violence categories. Overall, the perpetrators who are closer to the victims (F AM, IN T , F RN) are related to severe sexual violence (P EN) more than to what the less closer perpe- trators (ST R, P OW ) relate. Also, the less closer perpetra- tors (ST R, P OW ) are more related to mild sexual violence (U SC, N SE) compared to the closer perpetrators (F AM, IN T , F RN). 6.2 Post-MeToo Period Even though the spirit of the #MeToo movement is still present to some extent, the momentum diminished from its initial period. We wanted to investigate- to what extent peo- ple take social media to share their sexual violence expe- rience without the presence of an active online movement. So, we collected about 631, 677 tweets from May, 2019, one and a half year after the movement became viral, using the Twitter Streaming API by querying the 27 keywords in H (see Section 3.2 for reference). Then, we applied the classi- fication and sequence labeling models over these tweets. In total, we find 4, 830 (0.76%) self-reported sexual violence reports that had a SV R class probability >= 0.7. The CRF perpetrator tagger could label 655 of these reports with per- petrator text. Table 9 shows top-10 sexual violence reports with respect to the SV R class probability. The CRF tagged perpetrator text in each report is highlighted with red color bold font. The predicted SV C category is also presented on the left column. CRF could correctly tag the complete perpetrator text in 6 cases (e.g., 1, 7). However, there are some false positives as well, 2, 4, 6 for example. We plan to continue get more data annotated, including tweets with- out #MeToo hashtag, and improve the quality of the models which can further reduce the amount of false positives. 7 Discussion In this paper, we present a data-driven, supervised learning approach of mining sexual violence reports from social me- dia. We envision several pathways regarding how the out- comes of this paper can create impact in the real world. First, the sexual violence supporting coalitions across the world can benefit from this work. Currently, the coalitions depend on the victims' self-reports to them before they can provide any support. An automated tracker can assist the coalitions in identifying the victims. As explained in the Literature Re- view section, many victims do not go to the authority due to different reasons. An automated tracker can find the self- reported victims in social networks and connect with the au- thorities. Second, we understand that there is room for ad- versarial attacks. One way to mitigate those attacks is to de- sign an human-in-the-loop system. The output from this au- tomated tracker can be feed to a set of human domain experts before any decisions or actions are made on the identified re- ports. Third, due to the sensitivity of the issue, it is possible that the user who publicly shared a sexual violence report on social media may not actually want to be contacted by support centers or law and regulatory entities. It is an issue that demands further research; how to support the victims without the conventional support centers. One possible idea could be creating a social community of sexual violence vic- tims that can provide mental and logistical supports to the peers. We plan to continue working along this line in future. 8 Limitations We present a data-driven, supervised learning approach of mining sexual violence reports from social media in this pa- per. Our proposed technique can identify the reports with a precision and recall of 80.4% and 83.4%, respectively. Our techniques can also characterize the identified reports in terms of violence severity, perpetrator category, and gen- der. We also automatically tag the perpetrator text if that is present in a report. However, there are some limita- tions. First, we only used the unigram and bigram fea- tures. One possible improvement could be exploiting the user specific and network specific features. These features can particularly improve the gender and victim characteri- zation. Second, the lack of samples in some characterization classes created class imbalance problem. Although, we ex- perimented with undersampling and oversampling methods (details not provided in this paper), but that didn't improve generalization ability of the models. That is why proceeded with actual sample sizes. One can collect more samples of the undersampled classes and improve the overall perfor- mances of the models. More data samples would also al- low leveraging deep learning based models. Third, we didn't consider credibility of a report into account. So, our mod- Figure 2: Distribution of Sexual Violence and Perpetrator pairs. (left: frequency, middle: percentage of sexual violence cate- gories across the perpetrators, right: percentage of perpetrator categories across the violence. i was 8 years old asleep when my biological father first raped me. he didn't give a fuck about what i was wearing. instead Tweet No. SV C PEN 1 USC my boss at dominos was telling me about how he was walking his dog at 2am &; some guy in a truck stopped to talk to 2 USC my mother was married 12 times and one of the use to touch me i am a molested victim ...i got saved when i was 14 3 PEN 4 5 USC USC 6 USC 7 USC @parkersuave is it the same guy that tried to touch dababy ass when he agreed to take the picture 8 USC @jeff lj lloyd he def used his body to push the guy back until he fell, then tried to act like he didn't do anythin 9 this one guy told us how his father died and he said dead asss word for word woke up in the middle of the night 10 PEN i also, zero hates bible thumpers. he hates religion. when his pastor used to rape him, he would insist it was god rt @drippinswagu: @parkersuave is it the same guy that tried to touch dababy ass when he agreed to take the picture likethe nigga friend could be dead ass struggle dude in jail ask him for a couple dollars he say no cus he strugglin tw// assaulti was wearing leggings and an oversized sweatshirt when a 16 year old boy grabbed my thighs and told Table 9: Examples of self-reported sexual violence reports. Perpetrator texts are annotated in red. els cannot discern a true sexual violence report from a false claim. 9 Conclusion In this paper, we address the sexual violence report detec- tion and characterization task using data-driven, machine learning approach. In the process, we make several con- tributions. First, we collect about a million #MeToo hash- tagged tweets from the period when the movement was in its prime. We systematically annotated a subset of these tweets using Amazon Mechanical Turk following Center for Dis- ease Control and Prevention (CDC) guidelines. To the best of our knowledge, it is the first annotated dataset of sexual violence reports. We employed supervised classification and sequence labeling algorithms to train models using these an- notated data. Our models can identify the sexual violence re- ports with a precision of 80.4% and characterize the reports with respect to four characteristics. Our sequence labeling model can annotate the perpetrator identity from a report with an average F1-measure of 76%. We use these models to analyze the full #MeToo corpus and another Post-MeToo corpus. Our analysis finds some interesting insights such as the relationship between violence severity and perpetrator category. We argue that our contributions in this paper, the annotated data, models, and insights, can be useful in de- signing an automated, scalable, and reliable sexual violence reports tracking system that can assist the victims by con- necting them with appropriate authorities and at the same time help relevant entities such as human rights groups, law and regulatory agencies to reach the victims. In future, our goal is to address the limitations and implement an auto- mated data-driven tracking system. Data Sharing and Reproducibility Statement We have made 25% of our collected #MeToo hashtagged data pub- licly available. We plan to make the full data public con- tingent on the decision of the paper. We also plan to make 50% of our annotated data open for researchers. Moreover, we will make our code public through github to facilitate reproducibility of our findings. References [Ahmed et al. 2014] Ahmed, S. I.; Jackson, S. J.; Ahmed, N.; Fer- dous, H. S.; Rifat, M. R.; Rizvi, A.; Ahmed, S.; and Mansur, R. S. 2014. Protibadi: A platform for fighting sexual harassment in urban bangladesh. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2695 -- 2704. ACM. [Ahmed et al. 2016] Ahmed, S. I.; Ahmed, N.; Hussain, F.; and Ku- mar, N. 2016. Computing beyond gender-imposed limits. In Pro- ceedings of the Second Workshop on Computing within Limits, 6. ACM. [Andalibi et al. 2016] Andalibi, N.; Haimson, O. L.; De Choudhury, M.; and Forte, A. 2016. Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3906 -- 3918. ACM. [Aroussi 2011] Aroussi, S. 2011. women, peace and security: ad- dressing accountability for wartime sexual violence. International Feminist Journal of Politics 13(4):576 -- 593. [Banyard 2011] Banyard, V. L. 2011. Who will help prevent sexual violence: Creating an ecological model of bystander intervention. Psychology of violence 1(3):216. [Bergman et al. 2002] Bergman, M. E.; Langhout, R. D.; Palmieri, P. A.; Cortina, L. M.; and Fitzgerald, L. F. 2002. The (un) reason- ableness of reporting: Antecedents and consequences of reporting sexual harassment. Journal of Applied Psychology 87(2):230. [Bhattacharyya 2018] Bhattacharyya, R. 2018. # metoo movement: An awareness campaign. [Cantor et al. 2015] Cantor, D.; Fisher, B.; Chibnall, S. H.; Townsend, R.; Lee, H.; Thomas, G.; Bruce, C.; and Westat, I. 2015. Report on the aau campus climate survey on sexual assault and sex- ual misconduct. [Carreras and M`arquez 2005] Carreras, X., and M`arquez, L. 2005. Introduction to the conll-2005 shared task: Semantic role labeling. In Proceedings of the Ninth Conference on Computational Natu- ral Language Learning, 152 -- 164. Association for Computational Linguistics. [Clay-Warner 2003] Clay-Warner, J. 2003. The context of sexual violence: Situational predictors of self-protective actions. Violence and Victims 18(5):543. [Dimond et al. 2013] Dimond, J. P.; Dye, M.; LaRose, D.; and Bruckman, A. S. 2013. Hollaback!: the role of storytelling online in a social movement organization. In Proceedings of the 2013 con- ference on Computer supported cooperative work, 477 -- 490. ACM. [Felson and Par´e 2005] Felson, R. B., and Par´e, P.-P. 2005. The reporting of domestic violence and sexual assault by nonstrangers to the police. Journal of marriage and family 67(3):597 -- 610. [Fisher et al. 2003] Fisher, B. S.; Daigle, L. E.; Cullen, F. T.; and Turner, M. G. 2003. Reporting sexual victimization to the police and others: Results from a national-level study of college women. Criminal justice and behavior 30(1):6 -- 38. [Fitzgerald et al. 1997] Fitzgerald, L. F.; Drasgow, F.; Hulin, C. L.; Gelfand, M. J.; and Magley, V. J. 1997. Antecedents and conse- quences of sexual harassment in organizations: a test of an inte- grated model. Journal of Applied psychology 82(4):578. [Fitzgerald 1993] Fitzgerald, L. F. 1993. Sexual harassment: Vi- olence against women in the workplace. American Psychologist 48(10):1070. [Garrett and Hassan 2019] Garrett, A., and Hassan, N. 2019. Un- derstanding the silence of sexual harassment victims through the# whyididntreport movement. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2019. ACM. [Gelfand, Fitzgerald, and Drasgow 1995] Gelfand, M. J.; Fitzger- ald, L. F.; and Drasgow, F. 1995. The structure of sexual harass- ment: A confirmatory analysis across cultures and settings. Journal of Vocational Behavior 47(2):164 -- 177. [He et al. 2017] He, L.; Lee, K.; Lewis, M.; and Zettlemoyer, L. 2017. Deep semantic role labeling: What works and what's next. In Proceedings of the Annual Meeting of the Association for Com- putational Linguistics. [Hester, Kelly, and Radford 1996] Hester, M.; Kelly, L.; and Rad- ford, J. 1996. Women, violence, and male power: Feminist ac- tivism, research, and practice. Open University Press Buckingham. [Houston and Kramarae 1991] Houston, M., and Kramarae, C. 1991. Speaking from silence: Methods of silencing and of resis- tance. Discourse & Society 2(4):387 -- 399. [Jaffe 2018] Jaffe, S. 2018. The collective power of# metoo. Dis- sent 65(2). [Kathleen C. Basile 2014] Kathleen C. Basile, Sharon G. Smith, M. J. B. M. C. B. R. M. 2014. Sexual violence surveillance: Uniform definitions and recommended data elements. https://www.cdc.gov/ violenceprevention/pdf/sv surveillance definitionsl-2009-a.pdf. [Online; accessed 24-April-2019]. [Kearl 2018] Kearl, H. 2018. The facts behind the# metoo move- ment: A national study on sexual harassment and assault (executive summary). [Khatua, Cambria, and Khatua 2018] Khatua, A.; Cambria, E.; and Khatua, A. 2018. Sounds of silence breakers: Exploring sexual violence on twitter. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 397 -- 400. IEEE. [Krebs et al. 2007] Krebs, C. P.; Lindquist, C. H.; Warner, T. D.; Fisher, B. S.; and Martin, S. L. 2007. The campus sexual assault (csa) study. Washington, DC: National Institute of Justice, US De- partment of Justice. [Krug et al. 2002] Krug, E. G.; Mercy, J. A.; Dahlberg, L. L.; and Zwi, A. B. 2002. The world report on violence and health. The lancet 360(9339):1083 -- 1088. [Lafferty, McCallum, and Pereira 2001] Lafferty, J.; McCal- lum, A.; and Pereira, F. C. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. [Li et al. 2018] Li, S.; Li, W.; Cook, C.; Zhu, C.; and Gao, Y. 2018. Independently recurrent neural network (indrnn): Building a longer and deeper rnn. In Proceedings of the IEEE Conference on Com- puter Vision and Pattern Recognition, 5457 -- 5466. [Loy and Stewart 1984] Loy, P. H., and Stewart, L. P. 1984. The extent and effects of the sexual harassment of working women. So- ciological focus 17(1):31 -- 43. [Manikonda et al. 2018] Manikonda, L.; Beigi, G.; Liu, H.; and Kambhampati, S. 2018. Twitter for sparking a movement, reddit for sharing the moment:# metoo through the lens of social media. arXiv preprint arXiv:1803.08022. Dependency and autonomy: [Mitter 1992] Mitter, S. 1992. Women's employment and the family in calcutta. Feminist Review 41(1):133 -- 135. [Nair and John 2000] Nair, J., and John, M. E. 2000. A question of silence: The sexual economies of modern India. Zed Books. [Pennington, Socher, and Manning 2014] Pennington, J.; Socher, R.; and Manning, C. 2014. Glove: Global vectors for word rep- resentation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), 1532 -- 1543. [Pradhan et al. 2012] Pradhan, S.; Moschitti, A.; Xue, N.; Uryupina, O.; and Zhang, Y. 2012. CoNLL-2012 shared task: Modeling multilingual unrestricted coreference in OntoNotes. In Proceedings of the Sixteenth Conference on Computational Natural Language Learning (CoNLL 2012). [Rodino-Colocino 2018] Rodino-Colocino, M. 2018. Me too,# metoo: countering cruelty with empathy. Communication and Crit- ical/Cultural Studies 15(1):96 -- 100. [Shalhoub-Kevorkian 2003] Shalhoub-Kevorkian, N. 2003. Reex- amining femicide: Breaking the silence and crossing scientific bor- ders. Signs: Journal of Women in Culture and Society 28(2):581 -- 608. [Spencer et al. 2017] Spencer, C.; Mallory, A.; Toews, M.; Stith, S.; and Wood, L. 2017. Why sexual assault survivors do not report to universities: A feminist analysis. Family relations 66(1):166 -- 179. [Tambe 2018] Tambe, A. 2018. Reckoning with the silences of# metoo. Feminist Studies 44(1):197 -- 203. [Tippett 2018] Tippett, E. C. 2018. The legal implications of the metoo movement. Minn. L. Rev. 103:229. [UN WOMEN contributors 2017] UN WOMEN contributors. 2017. Un women: Facts and figures: Ending violence against http://www.unwomen.org/en/what-we-do/ending- women. violence-against-women/facts-and-figures. [Online; accessed 24-April-2019]. [Young 2014] Young, C. 2014. Harassmap: using crowdsourced data to map sexual harassment in egypt. Technology Innovation Management Review 4(3).
1608.04418
4
1608
2016-11-03T17:44:11
A Note on Markov Normalized Magnetic Eigenmaps
[ "cs.SI", "physics.soc-ph" ]
We note that building a magnetic Laplacian from the Markov transition matrix, rather than the graph adjacency matrix, yields several benefits for the magnetic eigenmaps algorithm. The two largest benefits are that the embedding becomes more stable as a function of the rotation parameter g, and the principal eigenvector of the magnetic Laplacian now converges to the page rank of the network as a function of diffusion time. We show empirically that this normalization improves the phase and real/imaginary embeddings of the low-frequency eigenvectors of the magnetic Laplacian.
cs.SI
cs
A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS ALEXANDER CLONINGER Abstract. We note that building a magnetic Laplacian from the Markov transition matrix, rather than the graph adjacency matrix, yields several benefits for the magnetic eigenmaps algorithm. The two largest benefits are that the embedding becomes more stable as a function of the rotation parameter g, and the principal eigenvector of the magnetic Laplacian now converges to the page rank of the network as a function of diffusion time. We show empirically that this normalization improves the phase and real/imaginary embeddings of the low-frequency eigenvectors of the magnetic Laplacian. 1. Introduction We consider the problem of building a diffusion operator on directed networks and graphs with adjacency matrix W ∈ RN×N that parallels Diffusion Maps on undirected networks [1]. A natural approach to this is to build the Magnetic Eigenmaps Laplacian [2], L = D − T ◦ W (s), and Di,i =(cid:80) where (T ◦ W (s))i,j = e2πig(Wj,i−Wi,j ) Wi,j +Wj,i i,j . This method assigns a complex rotation to asymmetric links. This approach generalizes the notion of building a diffusion map or graph embedding to work on directed graphs. j W (s) 2 In this note, we observe that Markov normalization of the adjacency matrix, P (x, y) = (cid:80) W (x, y) y W (x, y) , allows us to introduce the notion of diffusion time steps, which is capable of capturing the evolution of the process. Markov normalization of the graph adjacency matrix yields several benefits: (1) normalizing the complex rotation matrix e2πig(Pj,i−Pi,j ) by the density of the node, which emphasizes absorbing states and converges to the stationary distribution of the process, (2) stabilizing the phase embedding with respect to choice of the rotation parameter g, (3) separating the long time trend of the process into the first eigenvector and recurrent states into subsequent eigenvectors, and (4) introducing diffusion time, which allows for the study of multi-step neighborhoods. We further note that it is possible to augment the adjacency matrix by a transportation factor, as is done in the PageRank algorithm , when there exists an absorbing state [3]. 1 A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 2 For a small α > 0, we replace P → (1 − α)P + α11 (cid:124) . This creates a small probability of jumping from any node to any other node, and thus escaping a sink in the process and making the process ergodic. For the rest of the paper we will assume that the adjacency matrix P is ergodic, under the pretense that if there is an absorbing state, we simply add a transportation factor. 2. Markov Property and Diffusion Time An important aspect of diffusion maps is the ability to separate the statistics of the sam- pling distribution from the geometry of the underlying manifold [4]. This is accomplished by normalizing the affinity between points by the overall transition probability, (cid:40)(cid:80) P = T −1W, where Tx,y = y W (x, y), x = y x (cid:54)= y . 0, This also allows us to consider the properties of the multiple time step diffusion process P t for t ∈ R+. For a symmetric process (i.e. undirected graph), the embedding of this process remains stable. This is because, if the eigendecomposition is P = ΦΛΦ∗, then P t = (ΦΛΦ∗)t = ΦΛtΦ∗. However, for a non-symmetric graph, this property no longer holds. Thus the eigenvectors of P t will exhibit time dependence beyond a simple multiplicity factor. The markov normalized magnetic Laplacian then takes the form of i,j = Di,j − e2πig(P t L(t) j,i−P t i,j ) P t i,j + P t j,i 2 , where Di,i = 1 2 (cid:88) (cid:0)P t j (cid:1) . i,j + P t j,i Adjusting the weight matrix to be Markov normalized has several implications on the magnetic Laplacian. In diffusion on a symmetric graph, normalizing by the node density causes the principal eigenvector φ0 to be a constant across all nodes and is thus trivial. However, when the network is not symmetric, the principal eigenvector takes on a much more important role. Namely, the principal eigenvector recovers the degree of asymmetry between nodes. This implies that, as t increases, the phase of the eigenvectors converges to the page rank of the network. i,j > 0 for all i, j. Let Lnorm = D−1/2LD−1/2 Theorem 1. Suppose there exists T such that P T be the normalized magnetic Laplacian. Then in the limit as t → ∞, the principal eigen- vector of the normalized Laplacian Lnorm = limt L(t) norm (denoted φ) converge to (cid:18) 1 +(cid:80) (cid:19)1/2 , j Pj,i 2 i = c · e2πghi φ(g) where h = pagerank(P ) (i.e. the stationary distribution of P ), and c ∈ C. Proof. From Theorem 1 in [2], we know that the magnetic Laplacian L has a zero eigenvalue iff ∃h such that ai,j = hj − hi. Furthermore, we know that, in this case, φ(g) k,i = e2πighiφ(0) k,i . A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 3 We also know that, since P is ergodic by assumption, P t pagerank(P ). That means ai,j = P t Let v be the principal eigenvector of I − D−1/2PsymD−1/2, where Psym =(cid:0) P +P ∗ Dxx =(cid:80) j,i = hj − hi. i,j − P t . Then 2 i,· = h as t → ∞, where h = (cid:1) and y(Psym)xy = 1+(cid:80) (cid:16) I − D−1/2PsymD−1/2(cid:17) x Pxy 2 v = 0 =⇒ (cid:16) D1/2 − PsymD−1/2(cid:17) (cid:1) x = 0, =⇒ (D − Psym) x = 0 =⇒ (cid:0)I − D−1Psym v = 0 where x = D−1/2v. Because D−1Psym is row stochastic, we know x = 1, so v = D1/21. Since φ(g) k,i = e2πighiφ(0) k,i , we know φ(g) i = e2πighi(c · D1/2 = c · e2πighi (cid:18) 1 +(cid:80) ) i (cid:19)1/2 . j Pj,i 2 (cid:3) This only applies in the limit as t → ∞. The embeddings of L(t) for small t, and even t = 1, yield valuable properties due to the Markov normalization. We show this empirically in Section 3. 3. Examples In all examples of the Markov normalized process, we will refer to a value of g ∈ [0, 1/2) that is on the same scale as for the unnormalized Laplacian. However, due to the weights being normalized to sum to 1, they are actually on a different scale than the unnormalized weights matrix. For that reason, we set g ← g/max(max(P )) for the Markov normalized weights so that the degree of rotation is on the same order of magnitude for both methods. 3.1. Three Cluster Example. We begin with the three cluster example from [2]. This example is particularly simple given that the complex rotation of three clusters will, more often than not, keep the clusters separated. However, for small values of g, rotation of the unnormalized asymmetric weights matrix yields insufficient separation between the clusters, as shown in Figure 1. In fact, Figure 2 shows the percentage of points that cluster correctly across 100 uniform random small values of g (g < 0.25), where clustering was done by k-means with k = 3. By incorporating the notion of diffusion time, we are also able to observe the time dynamics of this process. Figure 8 in the appendix shows the embedding for each t ∈ {1, 2, ..., 9}. Notice that after 3 and 4 time steps, the clusters become momentarily blurred. This is because, by that time, most of the energy from cluster 1 will have moved to clusters 2 and 3, etc. However, after that momentary blurring, the process stabilizes and we continue to see the three clusters rotating about each other for larger t. This tells us that there is a global mixing time of t > 1 for the process to satisfy Pi,j >  for all i, j. A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 4 Unnormalized Embedding Unnormalized Phase Unnormalized Phase vs Page Rank Markov Normalized Embedding Markov Normalized Phase Markov Normalized Phase vs Page Rank Figure 1. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5, P (rotateClockwise) = 0.9, and with parameter g = 0.04. The markov normalized embeddings are with t = 1, though the bottom right page rank plot is for t = 4 to allow sufficient time to converge. Unnormalized Embedding Hist Markov Normalized Embedding Hist Figure 2. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5, P (rotateClockwise) = 0.9, and with random parameter g < 0.25. The markov normalized embeddings are with t = 1. 3.2. Circle with Drift. We consider data distributed on a unit circle, with drift in the counterclockwise direction. This is an interesting process as it has a very large mixing A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 5 time. We define the affinity between points to be (cid:40) k(x, y) = e−(cid:107)x−y(cid:107)2/5σ2, (cid:93)xy ≥ 0 e−(cid:107)x−y(cid:107)2/σ2, (cid:93)xy < 0 , where (cid:93)xy measures the angle between the points. The affinity matrix is seen in Figure 9 in the appendix. Figure 3 compares the different normalizations and eigenvectors for the circle with drift. By normalizing the weights matrix, the first eigenvector is once again the trivial eigenvector. Subsequent eigenvectors recover the geometry of the circle. Unnormalized Embedding Unnormalized Phase Markov Normalized Embedding Markov Normalized Phase Figure 3. Circle with drift, colored by angle in original data. Top: Un- normalized and leading two eigenvectors, Bottom: Markov normalized and first two non-trivial eigenvectors. g = 0.04 The higher order eigenvectors also contain useful information, as in diffusion maps. They mimic the sins and cosines of the angle around the circle, as the Fourier functions {einx} are eigenfunctions of the Laplacian on the circle. We wish to recover these functions independent of the sampling density on the circle. Figure 10 in the appendix shows that the Markov normalized weights matrix gives a closer approximation of the sin multiples on the circle that comes from the unnormalized weights matrix. Note that the data used here is not uniformly sampled across the circle. 3.3. Bow Tie Example. Another issue with not including a diffusion time is the need for g to implicitly assume the number of clusters. By setting g to be 1/k for k clusters as the authors suggest [2], the complex rotation can lose valuable information about transitions A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 6 that aren't k periodic. We demonstrate this with an example similar to the three cluster example from Section 3.1. We build a three cluster cycle among clusters 1,2, and 3, and a 5 cluster cycle among clusters 1, 4, 5, 6, and 7. By normalizing the weights, we see in Figure 4 that the non-principal eigenvectors capture the geometry of the process. Moreover, we discount the fact that cluster 1 appears in both cycles, and will end with twice the energy of the other clusters for large t. Unnormalized Embedding Unnormalized Phase Markov Normalized Embedding Markov Normalized Phase Figure 4. Bow tie clusters with P (inCluster) = 0.5, P (outCluster) = 0.5, P (rotateClockwise) = 0.9, and with g = 0.04. For Markov normalization, we take t = 1. We are also able to observe the time dynamics of this process. Figure 11 in the appendix shows the embedding for each t ∈ {1, 2, ..., 9}. Notice that after 7 and 8 time steps, the clusters become momentarily blurred. This is because, by that time, most of the energy from one end of the bow tie has moved to the other. However, after that momentary blurring, the process stabilizes and we continue to see the three clusters rotating about each other for larger t. This tells us that there is a global mixing time of t > 6 for the process to satisfy Pi,j >  for all i, j. We can also see these dynamics in the affinity matrix in Figure 12. And finally, we see in Figure 12 that after a large t, the phase of the leading eigenvector converges to the page rank of the process. 3.4. Hidden Circle. As a different example, we consider a mix of absorbing and recurrent states. The data we consider is a unit square with drift from left to right via (cid:40) k(x, y) = e−(cid:107)x−y(cid:107)2/3σ2, x1 < y1 x1 ≥ y1 e−(cid:107)x−y(cid:107)2/σ2, . A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 7 On top of that, we add an annulus in the middle of the unit square with counterclockwise flow. The results of the phase and embedding are in Figure 5. Unnormalized Phase V0 Unnormalized Phase V1 Unnormalized Embedding Markov Normalized Phase V0 Markov Normalized Phase V1 Markov Normalized Embedding Figure 5. g = 0.24, t = 4 Also, by not normalizing the phase rotation, low density points become separated in the phase space (see Figure 6). This leads to discontinuity in the torus projection of the phase, because the top and bottom edges of the square do not have much energy coming in. Unnormalized Phase Torus Markov Normalized Phase Torus Figure 6. g = 0.24, t = 1 3.5. Absorbing States. As a final example, we return to the three cluster example from Section 3.1. We change this by removing one node's out going edges, making that node an absorbing state. We augment the weights matrix for the normalized weights matrix by adding a teleportation parameter of α = 0.1. A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 8 Unnormalized Phase Unnormalized Embedding Normalized Phase t = 1 Normalized Embedding t = 1 Normalized Phase t = 5 Normalized Embedding t = 5 Figure 7. Three cluster data with absorbing state from orange cluster. Absorbing state in red. Top: diffusion time of 1, Bottom: diffusion time of 5. g = 0.04 We see in Figure 7 that, as time progresses, the state becomes more central to the Markov normalized process while still maintaining the geometry of the three clusters. Moreover, the phase of the principal eigenvector converges to the page rank of the process, correctly placing the absorbing state in middling importance as in Figure 13 in the appendix. This is compared to the unnormalized magnetic Laplacian, which captures the absorbing nature of the red node, but loses the geometry of the other clusters or the relationship between the absorbing state and cluster 3. We note that Markov normalization of the graph adjacency matrix yields several benefits. Normalization of the complex rotation matrix T converges to the page rank of the graph 4. Conclusion A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 9 for a large time, as in Section 3.1. The Markov normalization also stabilizes the phase embedding over a larger choice of g, as in most examples in Section 3. By emphasizing the absorbing states in the first eigenvector, this normalization separates the recurrent states into subsequent eigenvectors as in Section 3.4. And finally, we can introduce diffusion time into the process and observe the multi-step neighborhood dynamics of the graph, as in most examples in Section 3. References [1] Coifman, Ronald R., and St´ephane Lafon. "Diffusion maps." Applied and computational harmonic analysis 21.1 (2006): 5-30. [2] Fanuel, Michael, et al. Magnetic Eigenmaps for Visualization of Directed Networks. arXiv preprint arXiv:1606.08266 (2016). [3] Page, Lawrence, et al. The PageRank citation ranking: bringing order to the web. (1999). [4] Lafon, St´ephane S. Diffusion maps and geometric harmonics. Diss. Yale University, 2004. A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 10 Appendix t=1 t=2 t=3 t=4 t=5 t=6 t=7 t=8 t=9 Figure 8. Three clusters with P (inCluster) = 0.5, P (outCluster) = 0.5, P (rotateClockwise) = 0.9, and with g = 1/4. Evolve cluster from t ∈ {1, ..., 9}. A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 11 Figure 9. Affinity matrix for circle with drift Normalized real(φ1) Normalized real(φ3) Normalized real(φ5) Unnormalized real(φ1) Unnormalized real(φ3) Unnormalized real(φ5) Figure 10. Circle with drift, colored by corresponding real part of real(φi). Top: Markov normalized, Bottom: Unnormalized. The eigenvectors corre- spond to multiples of sinusoids, the eigenvectors of the DFT matrix. A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 12 t=1 t=2 t=3 t=4 t=5 t=6 t=7 t=8 t=9 Figure 11. Bow tie clusters with P (inCluster) = 0.5, P (outCluster) = 0.5, P (rotateClockwise) = 0.9, and with g = 1/4. Evolve cluster from t ∈ {1, ..., 9}. Figure 12. Bow tie clusters affinity at t = 7 (left), and bow tie clusters phase(V0) at t = 10 (right). A NOTE ON MARKOV NORMALIZED MAGNETIC EIGENMAPS 13 Figure 13. Absorbing state principal eigenvector phase compared to the page rank of the process.
1707.03375
1
1707
2017-07-11T17:28:05
Trump vs. Hillary: What went Viral during the 2016 US Presidential Election
[ "cs.SI" ]
In this paper, we present quantitative and qualitative analysis of the top retweeted tweets (viral tweets) pertaining to the US presidential elections from September 1, 2016 to Election Day on November 8, 2016. For everyday, we tagged the top 50 most retweeted tweets as supporting or attacking either candidate or as neutral/irrelevant. Then we analyzed the tweets in each class for: general trends and statistics; the most frequently used hashtags, terms, and locations; the most retweeted accounts and tweets; and the most shared news and links. In all we analyzed the 3,450 most viral tweets that grabbed the most attention during the US election and were retweeted in total 26.3 million times accounting over 40% of the total tweet volume pertaining to the US election in the aforementioned period. Our analysis of the tweets highlights some of the differences between the social media strategies of both candidates, the penetration of their messages, and the potential effect of attacks on both
cs.SI
cs
Trump vs. Hillary: What went Viral during the (cid:2)(cid:0)(cid:1)(cid:6) US Presidential Election Kareem Darwish1, Walid Magdy2, and Tahar Zanouda1 1 Qatar Computing Research Institute, HBKU, Doha, Qatar {kdarwish,tzanouda}@hbku.edu.qa, 2 School of Informatics, The University of Edinburgh, Scotland [email protected] 7 1 0 2 l u J 1 1 ] I S . s c [ 1 v 5 7 3 3 0 . 7 0 7 1 : v i X r a Abstract. In this paper, we present quantitative and qualitative analysis of the top retweeted tweets (viral tweets) pertaining to the US presidential elections from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to Election Day on November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6). For everyday, we tagged the top (cid:5)(cid:0) most retweeted tweets as supporting or attacking either candidate or as neutral/irrelevant. Then we analyzed the tweets in each class for: general trends and statistics; the most frequently used hashtags, terms, and locations; the most retweeted accounts and tweets; and the most shared news and links. In all we analyzed the (cid:3),(cid:4)(cid:5)(cid:0) most viral tweets that grabbed the most attention during the US election and were retweeted in total (cid:2)(cid:6).(cid:3) million times accounting over (cid:4)(cid:0)% of the total tweet volume pertaining to the US election in the aforementioned period. Our analysis of the tweets highlights some of the differences between the social media strategies of both candidates, the penetration of their messages, and the potential effect of attacks on both. Keywords: US elections, quantitative analysis, qualitative analysis, com- putational Social Science. Introduction Social media is an important platform for political discourse and political cam- paigns [(cid:2)(cid:6), (cid:3)(cid:1)]. Political candidates have been increasingly using social media platforms to promote themselves and their policies and to attack their opponents and their policies. Consequently, some political campaigns have their own social media advisers and strategists, whose success can be pivotal to the success of the campaign as a whole. The (cid:2)(cid:0)(cid:1)(cid:6) US presidential election is no exception, in which the Republican candidate Donald Trump won over his main rival Hilary Clinton. In this work, we showcase some of the Twitter trends pertaining to the US presidential election by analyzing the most retweeted tweets in the sixty eight days leading to the election and election day itself. In particular, we try to answer the following research questions: (cid:1)) Which candidate was more popular in the viral tweets on Twitter? What proportion of viral tweets in terms of number and volume were supporting or attacking either candidate? (cid:2)) Which election related events, topics, and issues pertaining to each candi- date elicited the most user reaction, and what were their effect on each candidate? Which accounts were the most influential? (cid:2) Kareem Darwish et al. (cid:3)) How credible were the links and news that were shared in viral tweets? To answer these questions, we analyze the most retweeted (viral) (cid:5)(cid:0) tweets per day starting from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) and ending on Election Day on November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6). The total number of unique tweets that we analyze is (cid:3),(cid:4)(cid:5)(cid:0), whose retweet volume of (cid:2)(cid:6).(cid:3) million retweets accounts for over (cid:4)(cid:0)% of the total tweets/retweets volume concerning the US election during that period. We have manually tagged all the tweets in our collection as supporting or attacking either candidate, or neutral (or irrelevant). For the different classes, we analyze retweet volume trends, top hashtags, most frequently used words, most retweeted accounts and tweets, and most shared news and links. Our analysis of the tweets shows some clear differences between the social media strategies of each candidate and subsequent user responses. For example, our observations show that the Trump campaign seems to be more effective than the Clinton campaign in achieving better penetration and reach for: the campaign's slogans, attacks against his rival, and promotion of campaign activities in different US states. We also noticed that the prominent vulnerabilities for each candidate were Trump's views towards women and Clinton's email leaks and scandal. In addition, our analysis shows that the majority of tweets benefiting Clinton were actually more about attacking Trump rather than supporting Clinton, while for Trump, tweets in his favor had more balance between supporting him and attacking Clinton. By analyzing the links in the viral tweets, the tweets attacking Clinton had the most number of links (accounting for (cid:5)(cid:8)% of the volume of shared links), where approximately half were to highly credible sites and the remaining were to sites of mixed credibility. We hope that our observations and analysis would aid political and social scientists in understanding some of the factors that may have led to the eventual outcome of the election. Background Social media is a fertile ground for developing tools and algorithms that can capture the opinions of the general population at a large scale [(cid:1)(cid:3)]. Much work has studied the potential possibility of predicting the outcome of political elections from social data. Yet, there is no unified approach for tackling this problem. While Bollen et al. [(cid:4)] analyzed people's emotions (not sentiment) towards the US (cid:2)(cid:0)(cid:0)(cid:8) Presidential campaign, the authors used both US (cid:2)(cid:0)(cid:0)(cid:8) Presidential campaign and election of Obama as a case study. Sentiment typically signifies preconceived positions towards an issue, while emotions, such as happiness or sadness, are temporary responses to external stimulus. Though the authors mentioned the feasibility of using such data to predict election results, they did not offer supporting results. Using the same approach, O'Connor et al. [(cid:2)(cid:3)] discussed the feasibility of using Twitter data to replace polls. Tumasjan et al. [(cid:2)(cid:7)] provided one of the earliest attempts for using this kind of data to estimate election results. They have used twitter data to forecast the national German federal election, and investigated whether online interactions on Twitter validly mirrored offline political sentiment. The study was criticized for being contingent on arbitrary experimental variables [(cid:9), (cid:1)(cid:0), (cid:1)(cid:4), (cid:2)(cid:1)]. Metaxas et al. [(cid:2)(cid:1)] argued Trump vs. Hillary (cid:3) that the predictive power of Twitter is exaggerated and it cannot be accurate unless we are able to identify unbiased representative sample of voters. However, these early papers kicked off a new wave of research initiatives that focus on studying the political discourse on Twitter, and how this social platform can be used as a proxy for understanding people's opinions [(cid:2)(cid:2)]. On the other hand, many studies have questioned the accuracy, and not just the feasibility, of using social data to predict and forecast [(cid:9), (cid:1)(cid:0)]. Without combining the contextual information, together with social interactions, the results might lead to biased findings. One of the main problems of studying political social phenomena on Twitter is that users tend to interact with like-minded people, forming so-called "echo chambers" [(cid:1), (cid:6), (cid:1)(cid:8)]. Thus, the social structure of their interactions will limit their ability to interact in a genuinely open political space. Though the literature on the predictive power of twitter is undoubtedly relevant, the focus of this work is on performing post-election analysis to better understand the potential strengths and weaknesses of the social media strategies of political campaigns and how they might have contributed to eventual electoral outcomes. A step closer to our politically motivated work, we find some studies that focused on studying the US presidential election. For the (cid:2)(cid:0)(cid:1)(cid:2) US presidential election, Shi et al. [(cid:2)(cid:5)] analyzed millions of tweets to predict the public opinion towards the Republican presidential primaries. The authors trained a linear regression model and showed good results compared to pre-electoral polls during the early stages of the campaign. In addition, the Obama campaign data analytics system(cid:3), a decision-making tool that harnesses different kind of data ranging from social media to news, was developed to help the Obama team sense the pulse of public opinion and strategically manage the campaign. With an attempt to study the recent US presidential election, early studies have showed promising results. For example, Wang et al. [(cid:2)(cid:9)] studied the growth pattern of Donald Trump's followers at a very early stage. They characterized individuals who ceased to support Hillary Clinton and Donald Trump, by focusing on three dimensions of social demographics: social status, gender, and age. They also analyzed Twitter profile images to reveal the demographics of both Donald Trump and Hillary followers. Wang et al. [(cid:3)(cid:0)] studied the frequency of 'likes' for every tweet that Trump published. More recently, Bovet et al. [(cid:5)] developed an analytical tool to study the opinion of Twitter users, in regards to their structural and social interactions, to infer their political affiliation. Authors showed that the resulting Twitter trends follow the New York Times National Polling Average. Concerning disseminating information, recent research has focused on how candidates engaged in spreading fake news and in amplifying their message via the use of social bots, which are programmatically controlled accounts that produce content and automatically interact with other users [(cid:7),(cid:1)(cid:5)]. Bessi and Ferrara [(cid:3)] investigated how the presence of social media bots affected political discussion around the (cid:2)(cid:0)(cid:1)(cid:6) U.S. presidential election. Authors suggest that the presence of social media bots can negatively affect democratic political discussion rather than improving it, which in turn can potentially alter public opinion and (cid:3) edition.cnn.com/(cid:2)(cid:0)(cid:1)(cid:2)/(cid:1)(cid:1)/(cid:0)(cid:7)/tech/web/obama-campaign-tech-team/index.html (cid:4) Kareem Darwish et al. endanger the integrity of the presidential election. In the same context, Giglietto et al. [(cid:1)(cid:1)] studied the role played by "fake-news" circulating on social media during the (cid:2)(cid:0)(cid:1)(cid:6) US Presidential election. In this study, we provide a quantitative and qualitative analysis of tweets related to the (cid:2)(cid:0)(cid:1)(cid:6) US presidential election. By tapping into the wealth of Twitter data, we focus on analyzing and understanding the possible factors underlying the success and failure of candidates. Our work builds upon the aforementioned research in social and computer sciences to study and measure the volume and diversity of support for the two main candidates for the (cid:2)(cid:0)(cid:1)(cid:6) US presidential elections, Donald Trump and Hillary Clinton. Data Collection and Labeling To acquire the tweets that are relevant to the US presidential election, we obtained the tweets that were collected by TweetElect.com from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6) (Election Day). TweetElect is a public website that aggregates tweets that are relevant to the (cid:2)(cid:0)(cid:1)(cid:6) US presidential election. It shows the most retweeted content on Twitter including text tweets, images, videos, and links. The site uses state-of-the-art adaptive filtering methods for detecting relevant tweets on broad and dynamic topics, such as politics and elections [(cid:1)(cid:9), (cid:2)(cid:0)]. TweetElect used an initial set of (cid:3)(cid:8) keywords related to the US elections for streaming relevant tweets. Consequently, adaptive filtering continuously enriches the set of keywords with additional terms that emerge over time [(cid:2)(cid:0)]. The (cid:3)(cid:8) seeding keywords included all candidate names and common keywords (including hashtags) about the elections and participating parties. During the period of interest, the total number of aggregated tweets per day (including retweets) related to the US elections typically ranged between (cid:2)(cid:0)(cid:0)K and (cid:6)(cid:0)(cid:0)K. This number increased dramatically after specific events or revelations, such as after the presidential debates and Election Day, when the number of tweets exceeded (cid:3).(cid:5) million tweets. The total number of unique tweets collected by TweetElect between September (cid:1) and November (cid:8) was (cid:6).(cid:8) million, while the full volume of tweets including retweets was (cid:6)(cid:5).(cid:8) million. In this work, we are interested in analyzing the most "viral" tweets pertain to the US presidential elections, as they typically express the topics that garnered the most attention on Twitter [(cid:1)(cid:7)]. Specifically, we constructed a set of the most retweeted (cid:5)(cid:0) tweets for everyday in the period of interest. Thus, our collection contained (cid:3),(cid:4)(cid:5)(cid:0) unique tweets that were retweeted (cid:2)(cid:6).(cid:6) million times, representing more than (cid:4)(cid:0)% of the total volume of tweets during that period. Out of the (cid:3),(cid:4)(cid:5)(cid:0) tweets in our collection, (cid:7)(cid:0)(cid:0) were authored by the official account of Donald Trump, accounting for (cid:8).(cid:7) million retweets, and (cid:6)(cid:9)(cid:8) were authored by Clinton's official account, accounting for (cid:4).(cid:7) million retweets. Figure (cid:1) shows the distribution of the number of tweets collected by TweetElect in the US elections in the period of study. The number of unique tweets, retweets volume, and retweets volume of the top viral daily tweets are displayed. As shown, the volume of tweets increased as election day approached. The biggest four peaks in the graph represent the days following the presidential debates and the election day. As it is shown, the retweet volume of the top (cid:5)(cid:0) daily viral tweets correlates well Trump vs. Hillary (cid:5) Fig. (cid:1). Volume of retweets the top (cid:5)(cid:0) daily viral tweets on the US collection compared to the full volume of tweets and retweets. Label attack Trump, sup- port Clinton attack Trump, tack Clinton attack Clinton attack Trump at- neutral Tweet Donald Trump is unfit for the office of president. Fortunately, there's an exceptionally qualified candidate @HillaryClinton Donald Trump looks like what Hillary Clinton smells like A rough night for Hillary Clinton ABC News. Trump to Matt Lauer on Iraq: I was totally against the war. Here's proof Trump is lying: https://t.co/(cid:6)ZhgJMUhs(cid:3) It s official: the US has joined the #ParisAgreement https://t.co/qYN(cid:1)iRzSJk Table (cid:1). Example annotations with the full retweet volume, with a Pearson correlation of (cid:0).(cid:9)(cid:2), which indicates nearly identical trend. We calculated the daily coverage 𝐶𝑑𝑎𝑖𝑙𝑦 of the top (cid:5)(cid:0) daily viral tweets to the full tweet volume. The daily coverage ranged between (cid:2)(cid:3)% and (cid:6)(cid:6)%, with the majority of the days having 𝐶𝑑𝑎𝑖𝑙𝑦 over (cid:4)(cid:0)%. This indicates that the top (cid:5)(cid:0) viral daily tweets may offer good coverage and reasonable indicators for public interaction with the US election on Twitter. All tweets were labeled with one of five class labels, namely: "support Trump", "attack Trump", "support Clinton", "attack Clinton", or "neutral/irrelevant", with tweets being allowed to have multiple labels if applicable. Support for a candidate included praising or defending the candidate, his/her supporters, or staff, spreading positive news about the candidate, asking people to vote for the candidate, mentioning favorable polls where the candidate is ahead, promoting the candidate's agenda, or advertising appearances such as TV interviews or rallies. Attacking a candidate included maligning and name calling targeted at the candidate, his/her supporters, or staff, spreading negative news about the candidate, mentioning polls where the candidates is behind, or attacking the candidate's agenda. Other tweets were labeled as neutral/irrelevant. Tweets were allowed to have more than one label such as "support Trump, attack Clinton". The labeling was done by an annotator with strong knowledge of US politics. The annotator was instructed to check the content of tweets carefully including any images, videos, or external links to obtain accurate annotations. In addition, we advised the annotator to check the profile of tweet authors to better understand their position towards the candidates if needed. One of the authors took a random sample of (cid:5)(cid:0) tweets to verify the correctness of the annotation. In all, both agreed fully on (cid:9)(cid:0)% of the sample, partially agreed on (cid:8)%, and disagreed on the remaining (cid:2)%. The agreement between the annotator and the author, as measured using Cohen's Kappa, is (cid:0).(cid:8)(cid:7), meaning nearly perfect agreement. Table (cid:1) shows few sample labeled tweets. 01,000,0002,000,0003,000,00001/0903/0905/0907/0909/0911/0913/0915/0917/0919/0921/0923/0925/0927/0929/0901/1003/1005/1007/1009/1011/1013/1015/1017/1019/1021/1023/1025/1027/1029/1031/1002/1104/1106/1108/11Volume of tweets/retweets of collected data and Top 50 daily viral tweets# tweets# retweets# retweets (top 50) (cid:6) Kareem Darwish et al. Class No. of Tweets % of Tweets No. of Retweets % of Retweets Support Clinton (cid:1)(cid:1).(cid:5)% Attack Trump (cid:2)(cid:2).(cid:8)% Support Trump (cid:2)(cid:4).(cid:7)% Attack Clinton (cid:3)(cid:3).(cid:8)% Neutral/irrelevant (cid:7).(cid:1)% Table (cid:2). Number of tweets and retweet volume per class. (cid:3),(cid:2)(cid:0)(cid:5),(cid:3)(cid:0)(cid:3) (cid:6),(cid:3)(cid:7)(cid:3),(cid:5)(cid:4)(cid:9) (cid:6),(cid:8)(cid:9)(cid:6),(cid:9)(cid:4)(cid:0) (cid:9),(cid:4)(cid:4)(cid:1),(cid:9)(cid:2)(cid:1) (cid:1),(cid:9)(cid:7)(cid:8),(cid:7)(cid:8)(cid:4) (cid:5)(cid:0)(cid:6) (cid:7)(cid:1)(cid:2) (cid:8)(cid:4)(cid:8) (cid:1),(cid:4)(cid:5)(cid:8) (cid:1)(cid:9)(cid:9) (cid:1)(cid:3).(cid:6)% (cid:1)(cid:9).(cid:1)% (cid:2)(cid:2).(cid:8)% (cid:3)(cid:9).(cid:2)% (cid:5).(cid:3)% Tweet Analysis We analyze tweets in every class from different perspectives. Specifically, we look at: user engagement with class over time, most viral events during election, most discussed topics, most shared links and news, and most influential accounts supporting them. Popularity of Candidates on Twitter Table (cid:2) shows the number of tweets and their retweet volume for each label. For further analysis, we ignore tweets that are labeled as neutral/irrelevant as they are not interesting to this work. Figure (cid:2) shows a break down for each label across all days. Table (cid:2) shows that the majority of the tweets and retweets volume were in favor of Trump ((cid:6)(cid:1).(cid:9)% of tweets, (cid:5)(cid:8).(cid:6)% of retweet volume), either by supporting him or attacking Clinton, while those in favor of Clinton represent only ((cid:3)(cid:2).(cid:7)% of tweets, (cid:3)(cid:4).(cid:3)% of retweet volume) of the total, either supporting her or attacking Trump. It can be observed that the retweet volume of tweets attacking Clinton outnumbered the retweet volume of tweets supporting her by nearly a (cid:3)-to-(cid:1) margin, while for Trump those supporting and attacking him were almost evenly matched. Figure (cid:2)(a) shows the distribution of support/attack of each candidate over the period of study. Figure (cid:2)(b) shows the relative per day retweet volume for tweets supporting/attacking each candidate. As expected, large spikes in volume happen in conjunction with major events such the presidential and vice presidential debates, Election Day, the release of Trump's lewd Access Hollywood tape, and the FBI announcement concerning the reopening of the investigation of Clinton. An interesting observation from Figure (cid:2)(b) is that tweets in favor of Trump (either supporting him or attacking Clinton) were retweeted more than tweets in favor of Clinton for (cid:8)(cid:5)% of the days, with the exception of a few days, especially the day following the first presidential debate and following the release of Trump's lewd tape. This observation might be different to the trends in normal media, where large number of articles were more negative towards Trump [(cid:2)(cid:8)]. Table (cid:3) lists the three days for every class when each class had the largest percentage of tweet volume along with the leading topic. As can be seen, the "support Clinton" class not only had the lowest average overall, but it also never exceed (cid:3)(cid:3)% on any given day. All other classes had days when their volume exceeded (cid:6)(cid:0)% of the total retweet volume, with the "attack Clinton" class reach- ing nearly (cid:7)(cid:3)%. The relative volume of "support Clinton" retweets peaked after public appearances (promotional video, debate, and TV interview). The "attack Clinton" class peaked when her health came into question and after WikiLeaks leaks questioned her integrity. For the "support Trump" class, it peaked after polls showed he was ahead and after he announced the building of a wall with Mexico. The "attack Trump" class peaked due positions on immigration and women. The most frequent hashtags and terms reflect similar trends. Date Leading topic (cid:1)(cid:1)/(cid:5) release of a video promoting Clinton (cid:9)/(cid:2)(cid:6) after first presidential debate (cid:9)/(cid:2)(cid:2) interview w/ comedy program (two Ferns) (cid:9)/(cid:1)(cid:1) Clinton faints at (cid:9)/(cid:1)(cid:1) memorial (cid:1)(cid:0)/(cid:3)(cid:1) WikiLeaks: Clinton got gifts from foreign governments (cid:1)(cid:0)/(cid:1)(cid:9) WikiLeaks: Clinton got gift from Qatar attack Clinton support Trump (cid:1)(cid:0)/(cid:2)(cid:2) Trump leads in (cid:3) national polls (cid:1)(cid:0)/(cid:6) Trump leads in Virginia poll (cid:9)/(cid:1) Trump says to build wall with Mexico (cid:9)/(cid:1)(cid:6) Sanders attacks Trump on immigration (cid:9)/(cid:1)(cid:5) Trump quoted: "pregnancy very inconvenient for business" (cid:1)(cid:0)/(cid:7) Trump lewd tape released attack Trump % (cid:3)(cid:2).(cid:9)% (cid:3)(cid:2).(cid:2)% (cid:2)(cid:8).(cid:2)% (cid:7)(cid:2).(cid:9)% (cid:6)(cid:9).(cid:4)% (cid:6)(cid:2).(cid:9)% (cid:6)(cid:0).(cid:2)% (cid:5)(cid:0).(cid:7)% (cid:5)(cid:0).(cid:1)% (cid:6)(cid:6).(cid:4)% (cid:6)(cid:0).(cid:2)% (cid:5)(cid:5).(cid:5)% Trump vs. Hillary (cid:7) Fig. (cid:2). (a) Retweet volume for each label per day, and (b) Percentage of labels per day. support Clinton Table (cid:3). Top (cid:3) days when relative volume for each class peaked with leading topic and percentage. . Most Frequent Hashtags In order to understand the most discussed topics in the viral tweets, Table (cid:4) shows the top hashtags that are used in attacking or supporting either candidate divided into categories along with the volume in each category. The top used hashtags for the different labels reveal some stark contrasts between the two candidates. These include: (i) The top most frequently appearing hashtags favoring Clinton were those praising her debate performances and attacking Trump. On the Trump side, the most frequently appearing hashtags were those iterating his campaign slogans, encouraging people to vote, and spreading campaign news. (i) Hashtags of Trump's campaign slogans appeared nearly (cid:2)(cid:0)(cid:0) times more than Clinton's campaign slogan (#IAmWithHer). In fact, Trump's campaign slogans category has the most frequently appearing hashtags. (ii) Hashtags indicating "Get out of the vote" were (cid:4) times more voluminous for Trump than Clinton. Trump and his campaign were more effective in promoting their activities (ex. #ICYMI – in case you missed it, #TrumpRally). (iii) Hashtags pertaining to the presidential debate appeared for every class. The support to attack hashtag volume ratio was roughly (cid:3)-to-(cid:2) for Clinton and (cid:1)-to-(cid:9) for Trump. Further, the debates were the number one category for the "support Clinton" and the "attack Trump" classes. It seems that most users thought that she did better in the debates than him. 0%10%20%30%40%50%60%70%80%90%100%01 Sep02 Sep03 Sep04 Sep05 Sep06 Sep07 Sep08 Sep09 Sep10 Sep11 Sep12 Sep13 Sep14 Sep15 Sep16 Sep17 Sep18 Sep19 Sep20 Sep21 Sep22 Sep23 Sep24 Sep25 Sep26 Sep27 Sep28 Sep29 Sep30 Sep01 Oct02 Oct03 Oct04 Oct05 Oct06 Oct07 Oct08 Oct09 Oct10 Oct11 Oct12 Oct13 Oct14 Oct15 Oct16 Oct17 Oct18 Oct19 Oct20 Oct21 Oct22 Oct23 Oct24 Oct25 Oct26 Oct27 Oct28 Oct29 Oct30 Oct31 Oct01 Nov02 Nov03 Nov04 Nov05 Nov06 Nov07 Nov08 NovRelative percentage of each class per day0200,000400,000600,000800,0001,000,0001,200,0001,400,00001 Sep02 Sep03 Sep04 Sep05 Sep06 Sep07 Sep08 Sep09 Sep10 Sep11 Sep12 Sep13 Sep14 Sep15 Sep16 Sep17 Sep18 Sep19 Sep20 Sep21 Sep22 Sep23 Sep24 Sep25 Sep26 Sep27 Sep28 Sep29 Sep30 Sep01 Oct02 Oct03 Oct04 Oct05 Oct06 Oct07 Oct08 Oct09 Oct10 Oct11 Oct12 Oct13 Oct14 Oct15 Oct16 Oct17 Oct18 Oct19 Oct20 Oct21 Oct22 Oct23 Oct24 Oct25 Oct26 Oct27 Oct28 Oct29 Oct30 Oct31 Oct01 Nov02 Nov03 Nov04 Nov05 Nov06 Nov07 Nov08 NovVolume per class per daysupport Trumpattack Clintonattack Trumpsupport Clinton1st debateVP debateTrump lewdtape2nd debate3rd debateFBI investigatesCLintonElection Day (cid:8) Kareem Darwish et al. Category Debate performance Attacking Trump Get out the vote Campaign Issues Campaign slogan Corruption/lying Wikileaks Releases Debate performance Health Care Tension w/Sanders sup- porters Media/Election Bias Ben Ghazi attack Clinton's health Campaign slogans Get out the vote Campaign news Debate performance Attacking Clinton Debate performance Sexual misconduct General attacks and in- sults Comedy attacks #tag Freq. Hashtags Support Clinton (cid:4)(cid:8)(cid:6),(cid:4)(cid:0)(cid:2) #DebateNight #Debate #SheWon #VPDebate #Debates(cid:2)(cid:0)(cid:1)(cid:6) #NBCNews- #Interro- (cid:1)(cid:1)(cid:4),(cid:6)(cid:1)(cid:4) #TrumpTapes Forum gateTrump #ImWithTacos #AlSmithDinner #TangerineNightmare (cid:8)(cid:6),(cid:2)(cid:9)(cid:7) #ElectionDay #Election(cid:2)(cid:0)(cid:1)(cid:6) #Voting #OHVotesEarly #Vote #Elec- (cid:1)(cid:5),(cid:0)(cid:5)(cid:5) #NationalComingOutDay #LatinaEqualPay (cid:1)(cid:0),(cid:0)(cid:8)(cid:4) #ImWithHer #ImVotingBecause tions(cid:2)(cid:0)(cid:1)(cid:6) Attack Clinton (cid:8)(cid:4)(cid:2),(cid:8)(cid:9)(cid:2) #DrainTheSwamp #CrookedHillary #BigLeagueTruth #GoldmanSach #FollowTheMoney #PayToPlay (cid:6)(cid:4)(cid:0),(cid:3)(cid:3)(cid:0) #PodestaEmails #Wikileaks #PodestaEmails{(cid:8),(cid:3)(cid:1),(cid:2)(cid:8),(cid:2)(cid:6),(cid:1)(cid:5)} #SpiritCook- ing #Podesta #DNCLeak #DNCLeak(cid:2) #FreeJulian #AnthonyWeiner (cid:3)(cid:4)(cid:8),(cid:7)(cid:4)(cid:9) #Debates(cid:2)(cid:0)(cid:1)(cid:6) #Debate #DebateNight #VPDebate #Debates (cid:1)(cid:1)(cid:3),(cid:3)(cid:1)(cid:8) #ObamaCare #ObamaCareFail #ObamaCareInThreeWords (cid:8)(cid:6),(cid:3)(cid:3)(cid:3) #FeelTheBern #BasementDwellers (cid:7)(cid:8),(cid:5)(cid:1)(cid:1) #VoterFraud #RiggedSystem (cid:4)(cid:6),(cid:7)(cid:2)(cid:5) #BenGhazi (cid:3)(cid:0),(cid:7)(cid:4)(cid:7) #HillarysHealth Support Trump (cid:2),(cid:0)(cid:8)(cid:9),(cid:1)(cid:6)(cid:2) #MAGA (Make America Great Again) #DrainTheSwamp #AmericaFirst #MakeAmericaGreatAgain #ImWithYou #TrumpTrain #TrumpPence(cid:1)(cid:6) (cid:3)(cid:4)(cid:9),(cid:0)(cid:7)(cid:8) #VoteTrumpPence(cid:1)(cid:6) #ElectionDay #VoteTrump #Vote #IVoted #Elec- tionNight #TheHoodForTrump #Vote(cid:2)(cid:0)(cid:1)(cid:6) #EarlyVote (cid:1)(cid:8)(cid:3),(cid:0)(cid:3)(cid:1) #ICYMI (in case you missed it) #TrumpRally #Gettysburg (public speech) (cid:7)(cid:4),(cid:8)(cid:0)(cid:8) #VPDebate #DebateNight #Debates #Debates(cid:2)(cid:0)(cid:1)(cid:6) (cid:6)(cid:6),(cid:3)(cid:1)(cid:8) #FollowTheMoney #DNCLeak #ObamaCareFailed #BigLeagueTruth Attack Trump (cid:7)(cid:7)(cid:6),(cid:9)(cid:5)(cid:6) #DebateNight #Debate #VPDebate #Debates #NBCNewsForum (cid:7)(cid:8),(cid:0)(cid:4)(cid:3) #TrumpTapes #NatashaStoynoff (cid:4)(cid:4),(cid:1)(cid:0)(cid:0) #ImVotingBecause #TangerineNightmare #Lunatic #DangerousMan #Un- fit #Deceit #InterrogateTrump (cid:2)(cid:6),(cid:9)(cid:8)(cid:0) #ACloserLook (segment on Seth Meyer comedy show) #AlSmithDinner Attacking speech Table (cid:4). Top hashtags attacking or supporting both candidates with their categories. (cid:2)(cid:1),(cid:1)(cid:1)(cid:7) #LoveTrumpsHate #NastyWoman Trump's (charity dinner) (iv) Attacks against Clinton focus on her character and on the WikiLeaks leaks, which cover Clinton's relationship with Wall Street (ex. #GoldmanSachs), alleged impropriety in the Clinton Foundation (ex. #FollowTheMoney, #PayToPlay), mishandling of the Ben Ghazi attack in Libya, Democratic Party primary race against senator Sanders (ex. #BasementDewellers), the FBI investigation of Clinton (#AnthonyWeiner), and accusation of witchcraft (#SpiritCooking). (v) Attacks against Trump were dominated by his debate performance. The frequency of hashtags for the next category pertaining to accusations of sex- ual misconduct (ex. #TrumpTapes) is one order of magnitude lower than the frequency of those about the debate. This suggests that accusations of sexual misconduct against Trump were not the primary of focus of users. (vi) Policy issues such as health care (ex. #ObamaCare, #LatinaEqualPay) were eclipsed by issues pertaining to the personalities of the candidates and insults (ex. #CrookedHillary, #TangerineNightmare). Most Frequent Terms We look at the most frequent terms in the tweets to better understand the most popular topics being discussed. Figure (cid:3) shows tag-clouds of the most frequent terms for the different classes, which exhibit similar trends to those in the most frequent hashtags. For example, top terms in the "attack Clinton" class include "crooked", "emails", "FBI", "WikiLeaks", and "#DrainTheSwamp". Similarly, "#DebateNight" was prominent in the "support Clinton" and "attack Trump" classes. One interesting word in the "support Trump" class is the word "thank", which typically appears in Trump authored tweets in conjunction with polls showing Trump ahead (ex. "Great poll out of Nevada- thank you!"), after rallies (ex. "Great evening in Canton Ohio-thank you!"), or in Trump vs. Hillary (cid:9) Fig. (cid:3). Tag-cloud of top frequent terms in each class support/attack Clinton/Trump. response to endorsements (ex. "Thank you Rep. @MarshaBlackburn!"). Words of thanks appeared in (cid:1)(cid:6)(cid:7) "support Trump" tweets that were retweeted more than (cid:1).(cid:5) million times compared to (cid:1)(cid:5) "support Clinton" tweets that were retweeted (cid:7)(cid:5) thousand times only. Another set of words that do not show in the hashtags are "pregnancy" and "inconvenient" that come from two tweets that mention that "Trump said pregnancy is very inconvenient for businesses". One of these tweets is the most retweeted in the "attack Trump" class. Mentions of States One of the top terms that appeared in tweets supporting Trump is "Florida", Figure (cid:3)(c). This motivated us to analyze mentions of states in the tweets of each class. The frequency of state mentions may indicate states of interest to candidates and Twitter users. Figure (cid:4) lists the number of times each of the (cid:1)(cid:5) most frequently mentioned states. To obtain the counts, we tagged all tweets using a named entity recognizer that is tuned for tweets [(cid:2)(cid:4)]. We auto- matically filtered entities to obtain geolocations, and then we manually filtered locations to retain state names and city and town names within states. Then, we mapped city and town names to states (ex. "Grand Rapids" → "Iowa"). As expected, so-called "swing states", which are states that could vote Republican or Democrat in any given election(cid:4), dominated the list. The only non-swing states on the list are New York, Washington, and Texas. Interestingly, the number of mentions in "support Trump" tweets far surpasses the counts for all other classes. Most of the mentions of swing states were in tweets authored by Trump indicating Trump rallies being held in these states. This suggests that the Trump campaign effectively highlighted their efforts in these states, and there was signif- icant interest from Twitter users as indicated by the number of retweets. Of the swing states in the figure, Trump won the first six, namely Florida, Ohio, North Carolina, Pennsylvania, Michigan, and Arizona, along with Iowa and Wisconsin. Most Shared Links An important debate that surfaced after the US elections was whether fake news affected the election results or not [(cid:1)(cid:1),(cid:1)(cid:6)]. Thus, we analyze the credibility of the websites that were most linked to in the tweets for each (cid:4) https://projects.fivethirtyeight.com/(cid:2)(cid:0)(cid:1)(cid:6)-election-forecast/ (a) Support Clinton (b) Attack Trump (c) Support Trump (d) Attack Clinton Support Clinton Count Volume Leaning Credibility Link Attack Trump Count Volume Leaning Credibility (cid:1)(cid:0) Kareem Darwish et al. Link Hillaryclinton.com Democrats.org IWillVote.com SnappyTV.com CNN.com WashingtonPost.com Medium.com BusinessInsider.com NYTimes.com YouTube.com Left (cid:6)(cid:3) (cid:3)(cid:6)(cid:3),(cid:1)(cid:5)(cid:3) Left (cid:8) (cid:1)(cid:2)(cid:0),(cid:0)(cid:2)(cid:6) (cid:2)(cid:6) (cid:1)(cid:0)(cid:1),(cid:9)(cid:9)(cid:6) Left (cid:1)(cid:4) (cid:5)(cid:8),(cid:9)(cid:2)(cid:6) N/A (cid:6) (cid:4)(cid:3),(cid:3)(cid:5)(cid:5) (cid:1)(cid:0) (cid:2)(cid:7),(cid:2)(cid:6)(cid:4) (cid:2)(cid:7),(cid:1)(cid:8)(cid:7) (cid:8) (cid:4) (cid:1)(cid:6),(cid:0)(cid:1)(cid:0) (cid:6) (cid:1)(cid:5),(cid:8)(cid:8)(cid:6) (cid:2) (cid:1)(cid:1),(cid:5)(cid:6)(cid:4) N/A -(cid:3) -(cid:2) -(cid:2) -(cid:2) -(cid:2) – – – Mixed High High Mixed High High Mixed Hillaryclinton.com WashingtonPost.com IWillVote.com SnappyTV.com Democrats.org Newsweek.com NYTimes.com CNN.com Vox.com Facebook.com Left (cid:6)(cid:5) (cid:2)(cid:3)(cid:6),(cid:1)(cid:2)(cid:6) -(cid:2) (cid:2)(cid:3) (cid:1)(cid:0)(cid:2),(cid:1)(cid:7)(cid:9) (cid:1)(cid:1) (cid:9)(cid:5),(cid:1)(cid:2)(cid:6) Left (cid:1)(cid:4) (cid:8)(cid:6),(cid:1)(cid:0)(cid:0) N/A Left (cid:3) (cid:6)(cid:7),(cid:8)(cid:4)(cid:3) -(cid:3) (cid:1)(cid:1) (cid:5)(cid:5),(cid:6)(cid:6)(cid:3) -(cid:2) (cid:9) (cid:3)(cid:7),(cid:9)(cid:9)(cid:3) -(cid:3) (cid:6) (cid:2)(cid:7),(cid:2)(cid:7)(cid:5) (cid:1)(cid:3),(cid:9)(cid:9)(cid:2) (cid:4) -(cid:4) (cid:2) (cid:1)(cid:1),(cid:9)(cid:7)(cid:3) N/A – – – High Mixed High High High High Mixed Support Trump (cid:7)(cid:7) (cid:5)(cid:0)(cid:3),(cid:3)(cid:7)(cid:5) right (cid:2)(cid:5) (cid:1)(cid:6)(cid:4),(cid:9)(cid:9)(cid:5) N/A DonaldJTrump.com Facebook.com WashingtonPost.com Lifezette.com SnappyTV.com Instagram.com DailyCaller.com NYPost.com Periscope.tv YouTube.com Table (cid:5). Top shared links per class – support/attack Clinton/Trump – with ideological leaning (-(cid:5) extreme left to (cid:5) extreme right) and credibility (high or mixed) according to https://mediabiasfactcheck.com/ WikiLeaks.org DailyCaller.com FoxNews.com YouTube.com Breitbart.com Politico.com NYPost.com CNN.com Vox.com Facebook.com (cid:7) (cid:5)(cid:6),(cid:8)(cid:5)(cid:5) (cid:3) (cid:4)(cid:9),(cid:1)(cid:3)(cid:2) (cid:4) (cid:3)(cid:6),(cid:6)(cid:6)(cid:3) N/A (cid:5) (cid:3)(cid:6),(cid:1)(cid:3)(cid:2) N/A (cid:3) (cid:3)(cid:5),(cid:4)(cid:7)(cid:4) (cid:4) (cid:3)(cid:4),(cid:9)(cid:3)(cid:0) (cid:3) (cid:2)(cid:2),(cid:5)(cid:9)(cid:6) N/A (cid:5) (cid:2)(cid:0),(cid:0)(cid:4)(cid:6) N/A Attack Clinton (cid:4)(cid:7) (cid:4)(cid:0)(cid:6),(cid:6)(cid:0)(cid:7) (cid:2)(cid:2) (cid:1)(cid:9)(cid:5),(cid:6)(cid:9)(cid:5) (cid:2)(cid:8) (cid:1)(cid:4)(cid:6),(cid:5)(cid:7)(cid:1) (cid:2)(cid:9) (cid:1)(cid:0)(cid:7),(cid:9)(cid:1)(cid:5) N/A (cid:1)(cid:7) (cid:1)(cid:0)(cid:2),(cid:9)(cid:4)(cid:9) (cid:1)(cid:1) (cid:9)(cid:3),(cid:1)(cid:6)(cid:5) (cid:1)(cid:4) (cid:9)(cid:2),(cid:1)(cid:4)(cid:7) (cid:1)(cid:1) (cid:7)(cid:8),(cid:7)(cid:9)(cid:7) Right (cid:1)(cid:6) (cid:7)(cid:7),(cid:3)(cid:4)(cid:0) (cid:9) (cid:6)(cid:3),(cid:8)(cid:9)(cid:6) Mixed Hight Mixed Mixed Mixed Mixed Mixed Mixed Mixed High Mixed Mixed Mixed Mixed High Mixed High High (cid:2) (cid:4) (cid:4) (cid:5) -(cid:2) (cid:3) (cid:3) (cid:3) -(cid:2) (cid:4) (cid:4) (cid:3) class. Our analysis shows that (cid:2)(cid:9)% of the viral tweets ((cid:2)(cid:1)% of the full retweet volume) contained external links. Table (cid:5) shows the top (cid:1)(cid:0) web domains that were linked to in the tweets dataset along with ideological leaning and credibility rating. Aside from the official websites of the campaigns (ex. HillaryClinton.com, Democrats.org, and DonaldJTrump.com), the remaining links were to news websites (ex. CNN and NYTimes) and social media sites (ex. Facebook, Insta- gram, and YouTube). As Table (cid:5) shows, the candidates' official websites received the most links. However, it is interesting to note the large difference in focus between both. Clinton's website attacked Trump than it supported Clinton, while Trump's website did the exact opposite. This again shows the differences in strategies and trends between both candidates and their supporters. We checked the leaning and credibility of the news websites on mediabiasfactcheck.com, a fact checking website which rates news sites anywhere between "Extreme Left" to "Extreme Right" and their credibility between "Very Low" and "Very High" with "Mixed" being the middle point. We assumed social media sites to have no ideological leaning with a credibility of "Mixed". We opted for assigning credibility to websites as opposed to individual stories, because investigating the truthfulness of individual stories is rather tricky and is beyond the scope of this work. Though some stories are easily debunked, such as the Breitbart story claiming that "Hillary gave an award to a terrorist's wife(cid:5)", other mix some truth with opinion, stretched truth, and potential lies, such as the Breitbart story that the "FBI is seething at the botched investigation of Clinton". Figure (cid:4) aggregates all the number of retweets for each category for the websites with credibility of "High" and "Mixed" – none of the sites had credibility of "Very High", "Low", or "Very Low". The aggregate number of links for all categories to "High" and "Mixed" credibility websites was (cid:1).(cid:0)(cid:4) million and (cid:1).(cid:1)(cid:8) million respectively. The figure shows that a significantly higher proportion of highly credible websites were linked to for the "support Clinton" and "attack (cid:5) http://bit.ly/(cid:2)d(cid:9)(cid:9)lWD/ 6 http://bit.ly/(cid:2)tEUxVw Trump vs. Hillary (cid:1)(cid:1) Fig. (cid:4). Mentions of states for each class. Fig. (cid:5). Credibility of websites that are linked to from each category Trump" categories compared to mixed credibility sites. The opposite was true for the "support Trump" category, where the majority of links used to support Trump was from mixed creditability websites. This may indicate that Trump supporters were more susceptible to share less credible sources compared to Clinton supporters. High and mixed credibility sites were evenly matched for the "attack Clinton" category. WikiLeaks was the foremost shared site for attacking Clinton, which has high credibility. This again highlights the role of WikiLeaks in steering public opinion against Clinton. It worth mentioning that "The Podesta Emails(cid:6)" was the most popular link. Thus, though lower credibility links were used to attack Clinton, high credibility links featured prominently. For ideological orientation, left leaning sources featured prominently in the "support Clinton" and "attack Trump" classes, and right leaning sources featured prominently for the two other classes. The only left leaning sources appearing on the "support Trump" and "attack Clinton" lists were Washington Post and Politico. Most Retweeted Tweets Table (cid:6) lists the top (cid:5) most retweeted(cid:7) tweets for each class. They illustrate the trends to those exhibited in our previous analysis, namely: "support Clinton" tweets are led by talk about debates and attacks against Trump; the most retweeted "attack Clinton" tweets are from WikiLeaks; Trump campaign slogans appear atop of "support Trump" tweets; and the most retweeted attack Trump" tweets cover demeaning statements against women and minorities and mockery of Trump. An interesting observation is that the most retweeted tweet attacking Trump came from a Nigerian account with screen name "Ozzyonce" who had less than (cid:2),(cid:0)(cid:0)(cid:0) followers at the time when she posted the tweet. Nonetheless, this tweet received over (cid:1)(cid:5)(cid:0)K retweets in one day. Most Retweeted Accounts Table (cid:7) lists the most retweeted accounts for each class. As expected, the most retweeted accounts for "support" and "attack" classes were those of the candidates themselves and their rivals respectively. Notably: (i) Clinton authored (cid:1)(cid:0)% more "attack Trump" tweets (with (cid:3)(cid:5)% more volume) (cid:6) https://wikileaks.org/podesta-emails/ (cid:7) The number of retweets in the table are taken in November (cid:2)(cid:0)(cid:1)(cid:6) (cid:1)(cid:2) Kareem Darwish et al. Date Author Text Count support Clinton (cid:9)/(cid:2)(cid:7) (cid:9)/(cid:2)(cid:7) Hillary Clinton RT this if you re proud to be standing with Hillary tonight. #debatenight Hillary Clinton belongs in the White House. Donald Trump belongs on my show. (cid:7)(cid:8),(cid:8)(cid:7)(cid:2) (cid:7)(cid:2),(cid:4)(cid:4)(cid:3) Jerry Springer (cid:1)(cid:0)/(cid:1)(cid:0) Erin Ruberry (cid:1)(cid:0)/(cid:2)(cid:0) Hillary Clinton RT if you're https://t.co/(cid:9)(cid:1)tBmKxVMs Hillary is proof a woman can work hard rise to the top of her field still have to compete against a less qualified man for the same job. proud https://t.co/H(cid:7)CJep(cid:7)APX Trump: Don t judge me on the man I was (cid:1)(cid:0) years ago. But please judge Hillary on the man her husband was (cid:2)(cid:0) years ago #TrumpTapes tonight. #DebateNight #SheWon of Hillary (cid:1)(cid:0)/(cid:8) Richard Hine (cid:1)(cid:1)/(cid:1) (cid:1)(cid:0)/(cid:1)(cid:4) (cid:1)(cid:0)/(cid:3) WikiLeaks WikiLeaks WikiLeaks attack Clinton No link between Trump Russia No link between Assange Russia But Podesta Clin- ton involved in selling (cid:2)(cid:0)% of US uranium to Russia Democrats prepared fake Trump grope under the meeting table Craigslist employ- ment advertisement in May (cid:2)(cid:0)(cid:1)(cid:6) https://t.co/JM(cid:9)JMeLYet Hillary Clinton on Assange Can t we just drone https://t.co/S(cid:7)tPrl(cid:2)QCZ https://t.co/qy(cid:2)EQBa(cid:4)(cid:8)y this guy – report (cid:7)(cid:2),(cid:1)(cid:6)(cid:7) (cid:7)(cid:2),(cid:1)(cid:5)(cid:0) (cid:6)(cid:6),(cid:8)(cid:1)(cid:7) (cid:5)(cid:1),(cid:3)(cid:1)(cid:1) (cid:4)(cid:5),(cid:3)(cid:4)(cid:8) (cid:4)(cid:5),(cid:2)(cid:3)(cid:3) (cid:4)(cid:2),(cid:3)(cid:3)(cid:1) (cid:4)(cid:1),(cid:0)(cid:4)(cid:7) (cid:3)(cid:5)(cid:2),(cid:1)(cid:4)(cid:0) (cid:6)(cid:0),(cid:7)(cid:1)(cid:8) (cid:5)(cid:2),(cid:8)(cid:8)(cid:7) (cid:4)(cid:3),(cid:6)(cid:2)(cid:7) (cid:4)(cid:2),(cid:1)(cid:7)(cid:8) (cid:1)(cid:5)(cid:2),(cid:7)(cid:5)(cid:6) (cid:1)(cid:2)(cid:4),(cid:3)(cid:2)(cid:2) (cid:1)(cid:2)(cid:1),(cid:6)(cid:3)(cid:5) (cid:1)(cid:0)(cid:5),(cid:1)(cid:1)(cid:8) (cid:1)(cid:0)(cid:2),(cid:0)(cid:6)(cid:3) (cid:1)(cid:1)/(cid:4) Donald J. Trump If Obama worked as hard on straightening out our country as he has trying to (cid:1)(cid:1)/(cid:8) Cloyd Rivers protect and elect Hillary we would all be much better off! To everyone who wants to vote for Hillary just to keep Trump from becomin President watch this... https://t.co/TuUpD(cid:7)Qgcg (cid:1)(cid:1)/(cid:8) Donald J. Trump TODAY WE MAKE AMERICA GREAT AGAIN! (cid:1)(cid:1)/(cid:5) Donald J. Trump MAKE AMERICA GREAT AGAIN! (cid:1)(cid:0)/(cid:8) Donald J. Trump Here is my statement. https://t.co/WAZiGoQqMQ (cid:1)(cid:1)/(cid:7) Immigrants(cid:4)Trump If you make this go viral Trump will win. It s about (cid:2) minutes that makes the choice in this election crystal clear https://t.co/CqMY(cid:4)CSJbp Congrats to my running mate @realDonaldTrump on a big debate win! Proud to stand with you as we #MAGA. support Trump attack Trump Donald Trump said pregnancy is very inconvenient for businesses like his mother s pregnancy hasn't been inconvenient for the whole world. Good morning everyone especially the person who destroyed Donald Trump s walk of fame star https://t.co/IcBthxMPd(cid:9) Stephen King My newest horror story: Once upon a time there was a man named Donald Trump Kat Combs Es un racista and he ran for president. Some people wanted him to win. Trump writing a term paper: Sources Cited: (cid:1). You Know It (cid:2). I know It (cid:3). Every- body Knows It Anna for you to sit here call Trump a racist is outrageous Anna: OH?! Well lemme do it again in (cid:2) languages! https://t.co/nq(cid:4)DO(cid:7)bN(cid:7)J Table (cid:6). Top retweeted tweets for each class – support/attack Clinton/Trump. (cid:1)(cid:0)/(cid:2)(cid:1) (cid:1)(cid:0)/(cid:1)(cid:0) (cid:1)(cid:0)/(cid:8) (cid:1)(cid:0)/(cid:1)(cid:0) Mike Pence (cid:9)/(cid:1)(cid:5) Ozzyonce (cid:1)(cid:0)/(cid:2)(cid:6) Bailey Disler than "support Clinton". In contrast, Trump authored (cid:8)(cid:1)% more "support Trump" tweets (with (cid:3)(cid:8)% more volume) than "attack Clinton" tweets. This suggests that Clinton expended more energy attacking her opponent than promoting herself, while Trump did the exact opposite. Trump campaign staffers and accounts, such as Kellyanne Conway, Dan Scavino Jr., and Official Team Trump, were slightly more active in the "attack Clinton" class than the "support Trump" class. (ii) Trump Campaign accounts featured prominently in "support Trump" and "attack Clinton" classes, capturing (cid:7) out of (cid:1)(cid:0) and (cid:4) out of (cid:1)(cid:0) top spots for both classes respectively. In contrast, Clinton campaign account captured (cid:2) out of (cid:1)(cid:0) and (cid:1) out of (cid:1)(cid:0) top spots for "support Clinton" and "attack Trump" classes respectively. Top Clinton aides like Huma Abedin and John Podesta were absent from the top list, suggesting a more concerted Trump campaign Twitter strategy. (iii) Though Clinton authored (cid:4)(cid:8)% more tweets attacking her rival than tweets Trump authored attacking her, his attack tweets led to (cid:3)(cid:4)% more retweet volume. This suggests that his attacks were more effective than her attacks. Trump tweets were more retweeted on average than Clinton's tweets with an average of (cid:1)(cid:1),(cid:1)(cid:9)(cid:5) and (cid:6),(cid:1)(cid:2)(cid:0) retweets per tweet for both respectively. Highlighting WikiLeaks' role in the election, WikiLeaks was the second most retweeted account attacking Clinton and had four times as much retweet volume than the next account. Discussion Our analysis contrasts differences in support for either candidate, namely: Popularity: While Trump received more negative coverage than Clinton in Trump vs. Hillary (cid:1)(cid:3) Volume (cid:3)(cid:6)(cid:3) (cid:2),(cid:6)(cid:9)(cid:8),(cid:2)(cid:0)(cid:9) (cid:3)(cid:0)(cid:4),(cid:8)(cid:6)(cid:0) (cid:1)(cid:5)(cid:2),(cid:7)(cid:5)(cid:6) (cid:1)(cid:2)(cid:4),(cid:3)(cid:2)(cid:2) (cid:1)(cid:2)(cid:1),(cid:6)(cid:3)(cid:5) (cid:1)(cid:0)(cid:5),(cid:1)(cid:1)(cid:8) (cid:1)(cid:0)(cid:2),(cid:0)(cid:6)(cid:3) (cid:9)(cid:9),(cid:4)(cid:0)(cid:1) (cid:7)(cid:8),(cid:8)(cid:7)(cid:2) (cid:6)(cid:7),(cid:6)(cid:9)(cid:0) (cid:1)(cid:1) (cid:1) (cid:1) (cid:2) (cid:1) (cid:1) (cid:1) (cid:1) (cid:1) (cid:2)(cid:4)(cid:6) (cid:3),(cid:6)(cid:1)(cid:3),(cid:0)(cid:2)(cid:5) (cid:1),(cid:4)(cid:5)(cid:4),(cid:9)(cid:0)(cid:3) (cid:1)(cid:4)(cid:1) (cid:3)(cid:4)(cid:9),(cid:0)(cid:2)(cid:5) (cid:9)(cid:2) (cid:2)(cid:9)(cid:7),(cid:2)(cid:7)(cid:3) (cid:7)(cid:8) (cid:1)(cid:5)(cid:0),(cid:9)(cid:3)(cid:2) (cid:2)(cid:3) (cid:1)(cid:2)(cid:6),(cid:7)(cid:4)(cid:4) (cid:3)(cid:4) (cid:1)(cid:9) (cid:8)(cid:5),(cid:7)(cid:4)(cid:2) (cid:8)(cid:4),(cid:0)(cid:6)(cid:3) (cid:7) (cid:8)(cid:3),(cid:9)(cid:0)(cid:3) (cid:4) (cid:1)(cid:6) (cid:7)(cid:8),(cid:7)(cid:1)(cid:9) attack Trump Count support Clinton Count Volume Account Account Hillary Clinton President Obama Senator Tim Kaine Jerry Springer Erin Ruberry Richard Hine Bernie Sanders CNN Funny Or Die Channel (cid:4) News (cid:3)(cid:3)(cid:1) (cid:2),(cid:0)(cid:2)(cid:5),(cid:8)(cid:2)(cid:1) Hillary Clinton (cid:4) (cid:1)(cid:5) (cid:1) (cid:1) (cid:1) (cid:7) (cid:6) (cid:1) (cid:1) Support Trump (cid:1)(cid:2)(cid:2),(cid:9)(cid:4)(cid:7) Bernie Sanders (cid:8)(cid:4),(cid:2)(cid:4)(cid:5) Ozzyonce (cid:7)(cid:8),(cid:8)(cid:7)(cid:2) Bailey Disler (cid:7)(cid:2),(cid:1)(cid:6)(cid:7) Stephen King (cid:6)(cid:6),(cid:8)(cid:1)(cid:7) Kat Combs (cid:4)(cid:6),(cid:1)(cid:8)(cid:0) Es un racista (cid:4)(cid:1),(cid:9)(cid:8)(cid:3) Rob Fee (cid:2)(cid:7),(cid:9)(cid:0)(cid:9) Jerry Springer (cid:2)(cid:7),(cid:4)(cid:0)(cid:9) Master of None attack Clinton Donald J. Trump Kellyanne Conway Mike Pence Dan Scavino Jr. Official Team Trump Donald Trump Jr. Eric Trump Immigrants(cid:4)Trump Cloyd Rivers Paul Joseph Watson (cid:4)(cid:4)(cid:6) (cid:4),(cid:9)(cid:9)(cid:2),(cid:8)(cid:4)(cid:5) Donald J. Trump (cid:5)(cid:1) (cid:1)(cid:9)(cid:9),(cid:5)(cid:1)(cid:1) WikiLeaks (cid:1)(cid:9)(cid:5),(cid:8)(cid:2)(cid:4) Kellyanne Conway (cid:3)(cid:6) (cid:4)(cid:0) (cid:1)(cid:8)(cid:1),(cid:6)(cid:0)(cid:1) Paul Joseph Watson (cid:1)(cid:4)(cid:1),(cid:2)(cid:8)(cid:9) Official Team Trump (cid:1)(cid:4) (cid:1)(cid:1)(cid:2),(cid:8)(cid:3)(cid:5) Donald Trump Jr. (cid:2)(cid:0) (cid:7)(cid:9),(cid:3)(cid:8)(cid:7) Jared Wyand (cid:8) (cid:5)(cid:2),(cid:2)(cid:5)(cid:6) Cloyd Rivers (cid:4) (cid:4)(cid:5),(cid:4)(cid:9)(cid:3) Juanita Broaddrick (cid:2) (cid:1)(cid:0) (cid:3)(cid:8),(cid:4)(cid:7)(cid:4) James Woods Table (cid:7). Top retweeted accounts per class – support/attack Clinton/Trump. Accounts of candidates and campaign affiliates are italicized. mainstream media [(cid:2)(cid:8)], Trump benefited from many more tweets that are either supporting him or attacking his rival. In fact, (cid:6)(cid:3)% of the volume of viral content on US election were in his favor compared to only (cid:3)(cid:7)% in favor of Clinton. Similarly, on (cid:8)(cid:5)% of the days in the last two months preceding the election, Trump had more tweets favoring him than Clinton. This observation shows the gap between the trends of social media and traditional news media. Positive vs negative attention: The volume of tweets attacking and support- ing Trump were evenly matched, while the volume of tweets attacking Clinton outnumbered tweets praising her by a (cid:3)-to-(cid:1) margin. Given the importance of social media in elections, this may have been particularly damaging. Support points: Trump campaign accounts featured more prominently in the top retweeted accounts supporting their candidate. Support came in the form of promoting his slogans, urging supporters to vote, and featuring positive polls and campaign news. Conversely, Clinton support came mostly in the form of contrasting her to her rival, praise for her debate performance against Trump, and praise for her attacks on Trump. In fact, viral tweets from her campaign account were attacking Trump more than promoting her. Unfortunately for her, she was framed in reference to her rival, and research has shown that debates have a dwindling effect election outcomes as the election day draws closer [(cid:2),(cid:8),(cid:1)(cid:2)]. Consequently, her post-debate surges in volume of attacks against Trump eclipsed surges of support for her. Attack points: Both candidates were attacked on different things. Trump was mainly attacked on his debate performance, eclipsing attacks related to his scan- dals, such as the lewd Access Hollywood tape. Luckily for him, debates have a diminishing effect on voters as election day draws near [(cid:2), (cid:8), (cid:1)(cid:2)]. Conversely for Clinton, persistent allegations of corruption and wrongdoing triggered by WikiLeaks and the FBI investigation of her emails dominated attacks against her. These attacks may have led to her eventual loss, with polls suggesting that "email define(d) Clinton"(cid:8). (cid:8) gallup.com/poll/(cid:1)(cid:8)(cid:5)(cid:4)(cid:8)(cid:6)/email-defines-clinton-immigration-defines-trump.aspx (cid:1)(cid:4) Kareem Darwish et al. Message penetration: Trump's slogan, "Make America Great Again", had a far greater reach than that of his rival, "Stronger Together". Similarly, his policy positions and agenda items, such as the proposal to build a wall with Mexico, attracted significantly more attention than those of Clinton, where her proposed policy positions received very little mention. Geographical focus: Trump and his supporters effectively promoted his cam- paign's efforts in swing state, with frequent mentions of rallies and polls from these states along with messages of thanks for people turning-out for his rallies. The volume of tweets mentioning swing states and supporting Trump were typi- cally two orders of magnitude larger than similar tweets supporting Clinton. This might have contributed to the narrow victory he achieved in many of them. Low credibility links: Trump supporters were more likely to share links from websites of questionable credibility than Clinton supporters. However, WikiLeaks, which has high credibility, was the most prominent source attacking Clinton. To better understand the presented results, a few limitations that need to be considered. First, the top (cid:5)(cid:0) viral tweets do not have to be representative of the whole collection. Nonetheless, they still represent over (cid:4)(cid:0)% of the tweets volume on the US elections during the period of the study. Second, the results are based on tweets collected from TweetElect. Although it is highly robust, the site uses automatic filtering methods that are not perfect [(cid:1)(cid:9)]. Therefore, there might be other relevant viral tweets that were not captured by the filtering method. Lastly, measuring support for a candidate using viral tweets does not have to represent actual support on the ground for many reasons. Some of these reasons include the fact that demographics of Twitter users may not match the general public, more popular accounts have a better chance of having their tweets go viral, or either campaign may engage in astroturfing, in which dedicated groups or bots may methodically tweet or retweet pro-candidate messages [(cid:3)]. Conclusion In this paper, we presented quantitative and qualitative analysis of the top retweeted tweets pertaining to the US presidential elections from September (cid:1), (cid:2)(cid:0)(cid:1)(cid:6) to election day on November (cid:8), (cid:2)(cid:0)(cid:1)(cid:6). For everyday, we tagged the top (cid:5)(cid:0) most retweeted tweets as supporting/attacking either candidate or as neutral/irrelevant. Then we analyzed the tweets in each class from the perspective of: general trends and statistics; most frequent hashtags, terms, and locations; and most retweeted accounts and tweets. Our analysis highlights some of the differences between the social media strategies of both candidates, the effectiveness of both in pushing their messages, and the potential effect of attacks on both. We show that compared to the Clinton campaign, the Trump campaign seems more effective in: promoting Trump's messages and slogans, attacking and framing Clinton, and promoting campaign activities in "swing" states. For future work, we would like to study the users who retweeted the viral tweets in our study to ascertain such things as political leanings and geolocations. This can help map the political dynamics underlying the support and opposition of both candidates. References Trump vs. Hillary (cid:1)(cid:5) (cid:1). Barberá, P., Jost, J.T., Nagler, J., Tucker, J.A., Bonneau, R.: Tweeting from left to right is online political communication more than an echo chamber? Psychological science ((cid:2)(cid:0)(cid:1)(cid:5)) (cid:2). Benoit, W.L., Hansen, G.J., Verser, R.M.: A meta-analysis of the effects of viewing us presidential debates. Communication Monographs (cid:7)(cid:0)((cid:4)), (cid:3)(cid:3)(cid:5)–(cid:3)(cid:5)(cid:0) ((cid:2)(cid:0)(cid:0)(cid:3)) (cid:3). Bessi, A., Ferrara, E.: Social bots distort the (cid:2)(cid:0)(cid:1)(cid:6) us presidential election online discussion. First Monday (cid:2)(cid:1)((cid:1)(cid:1)) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:4). Bollen, J., Mao, H., Pepe, A.: Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena. ICWSM (cid:1)(cid:1), (cid:4)(cid:5)(cid:0)–(cid:4)(cid:5)(cid:3) ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:5). Bovet, A., Morone, F., Makse, H.A.: Predicting election trends with twitter: Hillary clinton versus donald trump. arXiv preprint arXiv:(cid:1)(cid:6)(cid:1)(cid:0).(cid:0)(cid:1)(cid:5)(cid:8)(cid:7) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:6). Colleoni, E., Rozza, A., Arvidsson, A.: Echo chamber or public sphere? predicting political orientation and measuring political homophily in twitter using big data. Journal of Communication (cid:6)(cid:4)((cid:2)), (cid:3)(cid:1)(cid:7)–(cid:3)(cid:3)(cid:2) ((cid:2)(cid:0)(cid:1)(cid:4)) (cid:7). Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system to evaluate social bots. In: Proceedings of the (cid:2)(cid:5)th International Conference Companion on World Wide Web. pp. (cid:2)(cid:7)(cid:3)–(cid:2)(cid:7)(cid:4). International World Wide Web Conferences Steering Committee ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:8). Erikson, R.S., Wlezien, C.: The timeline of presidential elections: How campaigns do (and do not) matter. University of Chicago Press ((cid:2)(cid:0)(cid:1)(cid:2)) (cid:9). Gayo-Avello, D.: Don't turn social media into another'literary digest'poll. Commu- nications of the ACM (cid:5)(cid:4)((cid:1)(cid:0)), (cid:1)(cid:2)(cid:1)–(cid:1)(cid:2)(cid:8) ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:1)(cid:0). Gayo Avello, D., Metaxas, P.T., Mustafaraj, E.: Limits of electoral predictions using twitter. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. Association for the Advancement of Artificial Intelligence ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:1)(cid:1). Giglietto, F., Iannelli, L., Rossi, L., Valeriani, A.: Fakes, news and the election: A new taxonomy for the study of misleading information within the hybrid media system ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:1)(cid:2). Hillygus, D.S., Jackman, S.: Voter decision making in election (cid:2)(cid:0)(cid:0)(cid:0): Campaign effects, partisan activation, and the clinton legacy. American Journal of Political Science (cid:4)(cid:7)((cid:4)), (cid:5)(cid:8)(cid:3)–(cid:5)(cid:9)(cid:6) ((cid:2)(cid:0)(cid:0)(cid:3)) (cid:1)(cid:3). Jungherr, A.: Analyzing political communication with digital trace data. Cham, Switzerland: Springer ((cid:2)(cid:0)(cid:1)(cid:5)) (cid:1)(cid:4). Jungherr, A., Jürgens, P., Schoen, H.: Why the pirate party won the german election of (cid:2)(cid:0)(cid:0)(cid:9) or the trouble with predictions: A response to tumasjan, a., sprenger, to, sander, pg, & welpe, im "predicting elections with twitter: What (cid:1)(cid:4)(cid:0) characters reveal about political sentimen". Social science computer review (cid:3)(cid:0)((cid:2)), (cid:2)(cid:2)(cid:9)–(cid:2)(cid:3)(cid:4) ((cid:2)(cid:0)(cid:1)(cid:2)) (cid:1)(cid:5). Kollanyi, B., Howard, P.N., Woolley, S.C.: Bots and automation over twitter during the first us presidential debate. Comprop Data Memo ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:1)(cid:6). Kucharski, A.: Post-truth: Study epidemiology of fake news. Nature (cid:5)(cid:4)(cid:0)((cid:7)(cid:6)(cid:3)(cid:4)), (cid:5)(cid:2)(cid:5)–(cid:5)(cid:2)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:1)(cid:7). Magdy, W., Darwish, K.: Trump vs. hillary analyzing viral tweets during us presi- dential elections (cid:2)(cid:0)(cid:1)(cid:6). arXiv preprint arXiv:(cid:1)(cid:6)(cid:1)(cid:0).(cid:0)(cid:1)(cid:6)(cid:5)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:1)(cid:8). Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: # isisisnotislam or# deportallmuslims?: Predicting unspoken views. In: Proceedings of the (cid:8)th ACM Conference on Web Science. pp. (cid:9)(cid:5)–(cid:1)(cid:0)(cid:6). ACM ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:1)(cid:6) Kareem Darwish et al. (cid:1)(cid:9). Magdy, W., Elsayed, T.: Adaptive method for following dynamic topics on twitter. In: ICWSM ((cid:2)(cid:0)(cid:1)(cid:4)) (cid:2)(cid:0). Magdy, W., Elsayed, T.: Unsupervised adaptive microblog filtering for broad dynamic topics. Information Processing & Management (cid:5)(cid:2)((cid:4)), (cid:5)(cid:1)(cid:3)–(cid:5)(cid:2)(cid:8) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:2)(cid:1). Metaxas, P.T., Mustafaraj, E., Gayo-Avello, D.: How (not) to predict elections. In: Privacy, Security, Risk and Trust (PASSAT) and (cid:2)(cid:0)(cid:1)(cid:1) IEEE Third Inernational Conference on Social Computing (SocialCom), (cid:2)(cid:0)(cid:1)(cid:1) IEEE Third International Conference on. pp. (cid:1)(cid:6)(cid:5)–(cid:1)(cid:7)(cid:1). IEEE ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:2)(cid:2). Mislove, A., Lehmann, S., Ahn, Y.Y., Onnela, J.P., Rosenquist, J.N.: Understanding the demographics of twitter users. ICWSM (cid:1)(cid:1), (cid:5)th ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:2)(cid:3). O'Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A.: From tweets to polls: Linking text sentiment to public opinion time series. ICWSM (cid:1)(cid:1)((cid:1)(cid:2)(cid:2)-(cid:1)(cid:2)(cid:9)), (cid:1)–(cid:2) ((cid:2)(cid:0)(cid:1)(cid:0)) (cid:2)(cid:4). Ritter, A., Clark, S., Etzioni, O., et al.: Named entity recognition in tweets: an experimental study. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing. pp. (cid:1)(cid:5)(cid:2)(cid:4)–(cid:1)(cid:5)(cid:3)(cid:4). Association for Computational Linguistics ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:2)(cid:5). Shi, L., Agarwal, N., Agrawal, A., Garg, R., Spoelstra, J.: Predicting us primary elections with twitter. URL: http://snap. stanford. edu/social(cid:2)(cid:0)(cid:1)(cid:2)/papers/shi. pdf ((cid:2)(cid:0)(cid:1)(cid:2)) (cid:2)(cid:6). Shirky, C.: The political power of social media: Technology, the public sphere, and political change. Foreign affairs pp. (cid:2)(cid:8)–(cid:4)(cid:1) ((cid:2)(cid:0)(cid:1)(cid:1)) (cid:2)(cid:7). Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twitter: What (cid:1)(cid:4)(cid:0) characters reveal about political sentiment. ICWSM (cid:1)(cid:0), (cid:1)(cid:7)(cid:8)–(cid:1)(cid:8)(cid:5) ((cid:2)(cid:0)(cid:1)(cid:0)) (cid:2)(cid:8). Van Aelst, P., Van Erkel, P., DâĂŹheer, E., Harder, R.A.: Who is leading the cam- paign charts? comparing individual popularity on old and new media. Information, Communication & Society (cid:2)(cid:0)((cid:5)), (cid:7)(cid:1)(cid:5)–(cid:7)(cid:3)(cid:2) ((cid:2)(cid:0)(cid:1)(cid:7)) (cid:2)(cid:9). Wang, Y., Li, Y., Luo, J.: Deciphering the (cid:2)(cid:0)(cid:1)(cid:6) us presidential campaign in the twitter sphere: A comparison of the trumpists and clintonists. arXiv preprint arXiv:(cid:1)(cid:6)(cid:0)(cid:3).(cid:0)(cid:3)(cid:0)(cid:9)(cid:7) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:3)(cid:0). Wang, Y., Luo, J., Niemi, R., Li, Y., Hu, T.: Catching fire via"likes": Inferring topic preferences of trump followers on twitter. arXiv preprint arXiv:(cid:1)(cid:6)(cid:0)(cid:3).(cid:0)(cid:3)(cid:0)(cid:9)(cid:9) ((cid:2)(cid:0)(cid:1)(cid:6)) (cid:3)(cid:1). West, D.M.: Air wars: Television advertising and social media in election campaigns, (cid:1)(cid:9)(cid:5)(cid:2)-(cid:2)(cid:0)(cid:1)(cid:2). Sage ((cid:2)(cid:0)(cid:1)(cid:3))
1710.03852
2
1710
2018-05-09T22:22:18
Top-k Route Search through Submodularity Modeling of Recurrent POI Features
[ "cs.SI", "cs.DB", "cs.DS" ]
We consider a practical top-k route search problem: given a collection of points of interest (POIs) with rated features and traveling costs between POIs, a user wants to find k routes from a source to a destination and limited in a cost budget, that maximally match her needs on feature preferences. One challenge is dealing with the personalized diversity requirement where users have various trade-off between quantity (the number of POIs with a specified feature) and variety (the coverage of specified features). Another challenge is the large scale of the POI map and the great many alternative routes to search. We model the personalized diversity requirement by the whole class of submodular functions, and present an optimal solution to the top-k route search problem through indices for retrieving relevant POIs in both feature and route spaces and various strategies for pruning the search space using user preferences and constraints. We also present promising heuristic solutions and evaluate all the solutions on real life data.
cs.SI
cs
Top-k Route Search through Submodularity Modeling of Recurrent POI Features Hongwei Liang School of Computing Science Simon Fraser University, Canada [email protected] Ke Wang School of Computing Science Simon Fraser University, Canada [email protected] 8 1 0 2 y a M 9 ] I S . s c [ 2 v 2 5 8 3 0 . 0 1 7 1 : v i X r a ABSTRACT We consider a practical top-k route search problem: given a collec- tion of points of interest (POIs) with rated features and traveling costs between POIs, a user wants to find k routes from a source to a destination and limited in a cost budget, that maximally match her needs on feature preferences. One challenge is dealing with the per- sonalized diversity requirement where users have various trade-off between quantity (the number of POIs with a specified feature) and variety (the coverage of specified features). Another challenge is the large scale of the POI map and the great many alternative routes to search. We model the personalized diversity requirement by the whole class of submodular functions, and present an opti- mal solution to the top-k route search problem through indices for retrieving relevant POIs in both feature and route spaces and vari- ous strategies for pruning the search space using user preferences and constraints. We also present promising heuristic solutions and evaluate all the solutions on real life data. KEYWORDS Location-based Search; Route Planning; Diversity Requirement ACM Reference Format: Hongwei Liang and Ke Wang. 2018. Top-k Route Search through Submod- ularity Modeling of Recurrent POI Features. In SIGIR '18: The 41st Inter- national ACM SIGIR Conference on Research & Development in Information Retrieval, July 8–12, 2018, Ann Arbor, MI, USA. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3209978.3210038 1 INTRODUCTION The dramatic growth of publicly accessible mobile/geo-tagged data has triggered a revolution in location based services [10]. An emerg- ing thread is route planning, with pervasive applications in trip rec- ommendation, intelligent navigation, ride-sharing, and augmented- reality gaming, etc. According to [23], the travel and tourism indus- try directly and indirectly contributed US$7.6 trillion to the global economy and supported 292 million jobs in 2016. The majority of current route planning systems yields shortest paths or explores popular POIs [28], or recommends routes based on users' histori- cal records [15] or crowdsourced experience [20]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy other- wise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. SIGIR'18, July 2018, Ann Arbor, MI, USA © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-5657-2/18/07. . . $15.00 https://doi.org/10.1145/3209978.3210038 ( 0, 1, 0 ) v 1 Feature vector ( (cid:875) 14 (cid:875) ) ) ) ( 0, 0.9, 0 ) ( 0, 0.4, 0.6 ) v 6 v 4 3 ( 0, 0, 0.9 ) v 5 ( 0.8, 0, 0 ) v 2 5 ( 1, 0, 0.2 ) v 3 Figure 1: A sample POI map. Each node vi represents a POI with 3 features (Park, Museum, Restaurant). Each feature has a numeric rating in the range [0, 1], indicated by the vec- tor aside the POI. Each edge has an associated traveling cost. A practical problem that has not been well studied is that, a user wants to be suggested a small number of routes that not only sat- isfy her cost budget and spatial constraints, but also best meet her personalized requirements on diverse POI features. We instantiate this problem with a travel scenario. Consider that a new visitor to Rome wishes to be recommended a trip, starting from her hotel and ending at the airport, that allows her to visit museums, souvenir shops, and eat at some good Italian restaurants (not necessarily in this order) in the remaining hours before taking the flight. She values the variety over the number of places visited, e.g., a route consisting of one museum, one shop, and one Italian restaurant is preferred to a route consisting of two museums and two shops. The above problem is actually generalizable to various route planning scenarios, and they illustrate some common structures and requirements. First, there is a POI map where POIs are con- nected by edges with traveling cost between POIs, and each POI has a location and is associated with a vector of features (e.g., mu- seum) with numeric or binary ratings. The POI map can be cre- ated from Google Map, and features and ratings of POIs can be created from user rating and text tips available on location-based services such as Foursquare, or extracted from check-ins and user provided reviews [7]. Second, the user seeks to find top-k routes {P1, · · · , Pk }, from a specified source x to a specified destination y within a travel cost budget b, that have highest values of a cer- tain gain function Gain(Pi V ) for the set of POIs Pi V on the routes Pi . The user specifies her preference of routes through a weight vector w with wh being the weight of a feature h, and a route diver- sity requirement, which specifies a trade-off between quantity (the number of POIs with a preferred feature) and variety (the coverage of preferred features) for the POIs on a route. The gain function has wh Φh (PV ), where Φh for each feature h the form Gain(PV ) =h aggregates the feature's scores of the POIs PV . SIGIR'18, July 2018, Ann Arbor, MI, USA Hongwei Liang and Ke Wang To better motivate the route diversity requirement, let us con- sider the POI map in Figure 1 and a user with the source v1, des- tination v5 and the budget b = 18. The user weights the features Park and Museum using the vector w = (0.4, 0.6, 0), and values both quantity and variety. If the sum aggregation Φh is used, the route v1 → v6 → v4 → v5 will have the highest Gain. How- ever, the user may not prefer this route because it does not include any park though it includes 3 museums. With the max aggregation used, the route v1 → v3 → v5 has the highest Gain by including one top scored museum and one top scored park, but this route does not maximally use the entire budget available. Intuitively, the sum aggregation is "quantity minded" but ignores variety, whereas the max aggregation is the opposite; neither models a proper trade- off between quantity and variety as the user considered. The above user more prefers the route v1 → v2 → v3 → v5 that visits mul- tiple highly scored museums and parks, which will better address both quantity and variety. Solving the top-k route search problem faces two challenges. Challenge I. One challenge is to design a general enough Φ h that includes a large class of aggregation functions to model a per- sonalized route diversity requirement where each user has her own quantity and variety trade-off. Our approach is treating the satis- faction by visiting each POI as the marginal utility and modeling the aggregation of such utilities of POIs with the diminishing mar- ginal utility property by submodular set functions Φ h. The intu- ition is that, as the user visits more POIs of the same, her marginal gain from such visits decreases gradually. Submodularity has been used for modeling user behaviors in many real world problems [14][11]. To the best of our knowledge, modeling user's diversity requirement on a route by submodularity has not been done previ- ously. Challenge II. The top-k route problem is NP-hard as it sub- sumes the NP-hard orienteering problem [4]. However, users typi- cally demand the routes not only be in high quality, even optimal, but also be generated in a timely manner (seconds to minutes). For- tunately, the users' preferences and constraints on desired routes provide new opportunities to reduce the search space and find op- timal top-k routes with fast responses. For example, for a user with only 6-hour time budget and preferring museums and parks on a route, all the POIs in other types or beyond the 6 hours limit will be irrelevant. The key of an exact algorithm is to prune, as early as possible, such irrelevant POIs as well as the routes that are un- promising to make into the top-k list due to a low gain Gain(PV ). However, this task is complicated by the incorporation of a generic submodular aggregation function Φh motivated above in our objec- tive Gain(PV ), and designing a tight upper bounding strategy on Gain(PV ) for pruning unpromising routes is a major challenge. Contributions. The main contributions of this paper are: • We define the top-k route search problem with a new person- alized route diversity requirement where the user can choose any submodular function Φh to model her desired level of diminishing return. As an instantiation, we show that the family of power-law functions is a sub-family of submodular functions and can model a spectrum of personalized diversity requirement. (Section 3) • Our first step towards an efficient solution is to eliminate irrel- evant POIs for a query, by proposing a novel structure for indexing the POI map on both features and travel costs. This index reduces the POI map to a small set of POIs for a query.(Section 4) • Our second step towards an efficient solution is to prune un- promising routes, by proposing a novel optimal algorithm, PACER. The novelties of the algorithm include an elegant route enumer- ation strategy for a compact representation of search space and the reuse of computed results, a cost-based pruning for eliminat- ing non-optimal routes, and a gain-based upper bound strategy for pruning routes that cannot make into the top-k list. The algorithm works for any submodular function Φ h. (Section 5) • To deal with the looser query constraints, we present two heuristic algorithms with a good efficiency-accuracy trade-off, by finding a good solution with far smaller search spaces. (Section 6) • We evaluate our algorithms on real-world data sets. PACER provides optimal answers while being orders of magnitude faster than the baselines. The heuristic algorithms provide answers of a competitive quality and work efficiently for a larger POI map and/or a looser query constraint. (Section 7) 2 RELATED WORK Route recommendation/planning that suggests a POI sequence or a path is related to our work. Works like [15] [6] learn from historical travel behaviors and recommend routes by either sequentially pre- dicting the next location via a Markov model or globally construct- ing a route. These works rely on users' historical visit data, thus, cannot be applied to a new user with no visit data or a user with dynamically changed preferences. [1] interactively plans a route based on user feedback at each step. Our approach does not rely on user's previous visit data or interactive feedback, and works for any users by modeling the preferences through a query. Several works recommend a route by maximizing user satisfac- tion under certain constraints. [8] assumes that each POI has a single type and searches for a route with POIs following a pre- determined order of types. [25] allows the user to specify a min- imum number of POI types, instead of exact types, in a route. [19] estimates temporal-based user preferences. [17] focuses on mod- eling the queuing time on POIs. [3] constructs an optimal route covering user-specified categories associated with locations. None of them considers a general route diversity requirement for mod- eling user's quantity and variety trade-off. [24], perhaps most related to our work, adopts a keyword cov- erage function to measure the degree to which query keywords are covered by a route, similar to ours. Their pruning strategies are designed specifically for their specific keyword coverage func- tion; thus, does not address the personalized route diversity re- quirement, where a different submodular function may be required. Our pruning strategies apply to any submodular function Φh. Fi- nally [24] produces a single route, and its performance is only "2-3 times faster than the brute-force algorithm", as pointed in [24]. Less related to our work is the next POI recommendation [26] that aims to recommend the POI to be visited next, and the travel package recommendation [18] that aims to recommend a set of POIs. They are quite different from our goal of finding a route as a sequence of featured POIs. Trajectory search either retrieves exist- ing (segments of) trajectories that match certain similarity query [27] from a database, or constructs a route based on the retrieved Top-k Route Search through Submodularity Modeling of Recurrent POI Features SIGIR'18, July 2018, Ann Arbor, MI, USA Table 1: Nomenclature Interpretation POI-feature matrix F with POI set V and feature set H the rating on feature h ∈ H for POI i ∈ V staying cost on POI i the traveling cost on edge ei , j ∈ E the least traveling cost from any POI i to any POI j route P with the included POI set PV user query with parameters: x and y – source and destination location b – travel cost budget w ∈ RH – feature preference vector θ ∈ RH – filtering vector on feature ratings Φ – feature aggregation functions POI candidates set VQ retrieved by Q with its size n Fi ,h after filtered by θ gain of a route P given query Q Notation F ∈ RV ×H Fi ,h si ti , j Ti , j P, PV Q = (x , y, b , Φ) w θ , , VQ , n Fi ,h Gain(PV , Q ) trajectories [5]. These works assume the existence of a trajectory database, instead of a POI map for route construction. The classical Orienteering Problem (OP), such as [4], studied in operational research on theoretical level, finds a path, limited in length, that visits some nodes and maximizes a global reward col- lected from the nodes on the path. No POI feature or route diversity requirement is considered in OP. 3 PRELIMINARY Table 1 summarizes the notations frequently used throughout the paper. The variables in bold-face are vectors or matrices. 3.1 Problem Statement Definition 1. [A POI Map] A POI map G = (V, E) is a di- rected/undirected and connected graph, where V is a set of geo-tagged POI nodes and E ⊆ V × V is a set of edges between nodes (i, j), i, j ∈ V. H is a set of features on POIs. F ∈ R V × H denotes the POI-feature matrix, where Fi ,h ∈ [0, β] is the rating on a feature h for the POI i. Each POI i ∈ V is associated with a staying cost si . Each edge ei , j ∈ E has a travel cost ti , j . (cid:3) The choices of si and ti , j can be time, expenses, or other costs. Definition 2. [Routes] A route P is a path x → · · · i · · · → y in G from the origin x to the destination y through a sequence of non- repeating POIs i except possibly x = y. PV denotes the set of POIs on P. Ti , j denotes the least traveling cost from i to the next visited j, where i, j are not necessarily adjacent in G. The cost of P is cost (P) =i ∈PV si +i →j ∈P Ti , j . (cid:3) (1) A route P includes only the POIs i that the user actually "visits" by staying at i with si > 0. Each i → j on a route is a path from i to j with the least traveling cost Ti , j . The intermediate POIs between i, j on path i → j are not included in P. The staying times at x and/or y can be either considered or ignored depending on the user choice. The latter case can be modeled by setting sx = sy = 0. At the minimum, the user has an origin x and a destination y for a route, not necessarily distinct, and a budget b on the cost of the route. In addition, the user may want the POIs to have certain fea- tures specified by a H -dimensional weight vector w with each element wh ∈ [0, 1] and Σh wh = 1. The user can also specify a filtering vector θ so that Fi ,h is set to 0 if it is less than θ h. Fi ,h de- notes Fi ,h after this filtering. Finally, the user may specify a route diversity requirement through a feature aggregation function vec- tor Φ, with Φh for each feature h. Φh(PV ) aggregates the rating on feature h over the POIs in PV . See more details in Section 3.2. Definition 3. [Query and Gain] A query Q is a 6-tuple (x, y, b, w, θ , Φ). A route P is valid if cost (P) ≤ b. The gain of P w.r.t. Q is Gain(PV , Q) =h wh Φh (PV ). (cid:3) (2) Note that only the specification of x, y, b is required; if the spec- ification of w, θ , Φ is not provided by a user, their default choices can be used, or can be learned from users' travel records if such data are available (not the focus of this paper). Gain(PV , Q) is a set function and all routes P that differ only in the order of POIs have the same Gain, and the order of POIs affects only cost (P). [Top-k route search problem] Given a query Q and an integer k, the goal is to find k valid routes P that have different POI sets PV (among all routes having the same PV , we consider only the route with the smallest cost (P)) and the highest Gain(PV , Q) (if ties, ranked by cost (P)). The k routes are denoted by topK. In the rest of the paper, we use Gain(PV ) for Gain(PV , Q). 3.2 Modeling Route Diversity Requirement To address the personalized route diversity requirement, we con- sider a submodular Φh to model the diminishing marginal utility as more POIs with feature h are added to a route. A set function f : 2V → R is submodular if for every X ⊆ Y ⊆ V and v ∈ V \ Y , f (X ∪ {v })− f (X ) ≥ f (Y ∪ {v })− f (Y ), and is monotone if for every X ⊆ Y ⊆ V , f (X ) ≤ f (Y ). The next theorem follows from [13] and the fact that Gain(PV ) is a nonnegative linear combination of Φ h. Theorem 1. If for every feature h, Φh (PV ) is nonnegative, mono- tone and submodular, so is Gain(PV ). We aim to provide a general solution to the top-k route search problem for any nonnegative, monotone and submodular Φh, which model various personalized route diversity requirement. To illus- trate the modeling power of such Φ defined by the power law function h, for example, consider Φ h Φ h (PV ) =i ∈PV Rh(i)−α h F i ,h , (3) where Rh(i) is the rank of POI i on the rating of feature h among all the POIs in PV (the largest value ranks the first), rather than the order that i is added to P, and α h ∈ [0, +∞) is the power law exponent for feature h. Rh(i)−α h is non-increasing as Rh(i) increases. For a sample route P = A(3) → B(5) with the ratings of feature h for each POI in the brackets, and α h = 1, the ranks for A and B on h are Rh (A) = 2 and Rh(B) = 1. Thus, Φh (PV ) = 2−1 × 3 + 1−1 × 5, with a diminishing factor 2−1 for the secondly h (PV ) = 2−2 × 3 + 1−2 × 5 ranked A. If we use a larger α h = 2, Φ has a larger diminishing factor for A. In general, a larger αh means a faster diminishing factor for the ratings Fi ,h on the recurrent feature, i.e., a diminishing marginal value on h. Note that the sum aggregation (αh = 0) and the max SIGIR'18, July 2018, Ann Arbor, MI, USA Hongwei Liang and Ke Wang aggregation (αh = ∞) are the special cases. Hence, Eqn. (3) sup- ports a spectrum of diversity requirement through the setting of αh . Note that Rh (i) for an existing POI i may decrease when a new POI j is added to P, so it is incorrect to compute the new Φh (PV ) by simply adding the marginal brought by j to existing value of h (PV ). For ease of presentation, we assume α h has same value Φ for all h and use α for α h in the rest of the paper. Theorem 2. Φ h (PV ) defined in Eqn. (3) is nonnegative, monotone and submodular. Proof. The nonnegativity and monotonicity of Φh (PV ) in Eqn. (3) is straightforward. For its submodularity, we omit the mathe- matical proof due to limited space and only present an intuitive idea. Let X and Y be the set of POIs in two routes, X ⊆ Y . Intu- itively, for every i ∈ X , there must be i ∈ Y and i's rank in X is not lower than that in Y . Let v ∈ V \ Y so that X ′ = X ∪ {v } and Y ′ = Y ∪ {v }. Similarly, v' rank in X ′ is not lower than that in Y ′, thus the increment brought by v to X is not less than that to Y , which means Φh(X ′) − Φh (X ) ≥ Φh(Y ′) − Φh(Y ). Hence, it is submodular. (cid:3) The user can also personalize her diversity requirement by spec- ifying any other submodular Φh, such as a log utility function h (PV ) = Φ h (PV ) = lo❕(1+i ∈PV 1 −i ∈PV [1 − Fi ,h]. Our approach only depends on the submod- ularity of Φh, but is independent of the exact choices of such func- tions. F i ,h) and the coverage function Φ Our problem subsumes two NP-hard problems, i.e., the submod- ular maximization problem [13] and the orienteering problem [4]. 3.3 Framework Overview To efficiently deal with the high computational complexity of this problem, we divide the overall framework into the offline compo- nent and the online component. Before processing any query, the offline component carefully indexes the POI map on feature and cost dimensions for speeding up future POI selection and travel cost computation. The online component responds to the user query Q with Sub-index Retrieval that extracts the sub-indices relevant to Q, and Routes Search that finds the top-k routes using the sub- indices. For routes search, as motivated in Section 1, we consider both the exact algorithm with novel pruning strategies, and heuris- tic algorithms to deal with the worst case of less constrained Q. We first consider an indexing strategy in Section 4, and then consider routes search algorithms in Section 5 and Section 6. 4 INDEXING In this section, we explain the offline indexing component and the Sub-index Retrieval of the online component. 4.1 Offline Index Building The POI map data is stored on disk. To answer user queries rapidly with low I/O access and speed up travel cost computation, we build two indices, FI and HI stored on disk. Offline Index Building Online Sub-index Retrieval (stored on disk) Feature Index (FI) (loaded to memory) Query specific Feature Index (FIQ) park: { (v3,1) (v2,0.8) } park: { (v3,1) (v2,0.8) } museum: { (v1,1) (v4,0.9) (v6,0.4) } museum: { (v1,1) (v4,0.9) } food: { (v5,0.9) (v6,0.6) (v3,0.2) } 2-Hop Index (HI) Q = (v6, v2, 13, ( 0.5, 0.5, 0 ), 0.6, 1) $ % ! " # v1: { (v1,0) (v2,12) (v6,12) (v4,14) } Query specific 2-Hop Index (HIQ) v2: { (v2,0) (v6,4) (v3,5) } v3: { (v3,0) (v4,4) (v6,4) } v4: { (v4,0) (v6,3) } v1: { (v1,0) (v2,12) (v6,12) } v2: { (v2,0) (v6,4) (v3,5) } v3: { (v3,0) (v4,4) (v6,4) } v5: { (v5,0) (v3,1) (v4,3) (v6,5) } v4: { (v4,0) (v6,3) } v6: { (v6,0) } v6: { (v6,0) } Figure 2: Left part: FI and HI built from the POI map in Figure 1. Right Part: Given a query Q, retrieve POI candidates VQ by retrieving the subindices FIQ and HIQ from FI and HI. i ,h for POI vi , sorted in descending order of F FI is an inverted index mapping each feature h to a list of POIs having non-zero rating on h. An entry (vi , Fi ,h) indicates the fea- ture rating F i ,h. FI helps retrieving the POIs related to the features specified by a query. The least traveling costTi , j between two arbitrary POIs i and j is frequently required in the online component. To compute Ti , j effi- ciently, we employ the 2-hop labeling [9] for point-to-point short- est distance querying on weighted graphs. [9] shows scalable re- sults for finding 2-hop labels for both unweighted and weighted graphs, and the constructed labels return exact shortest distance queries. Our HI index is built using the 2-hop labeling method. HI. For an undirected graph, there is one list of labels for each node vi , where each label (u, d) contains a node u ∈ V, called pivot, and the least traveling cost d between vi and u. HI(vi ) denotes the list of labels for vi , sorted in the ascending order of d. According to [9], Ti , j between vi and vj is computed by Ti , j = min (u ,d1)∈HI(vi )∩(u ,d2)∈HI(vj ) (d1 + d2). (4) Figure 2 (left part) shows the FI and HI for the POI map in Figure 1. For example, to compute T2,5, we search for the common pivot nodes u from the pivot label lists of v2 and v5 and find that v3 minimizes the traveling cost between v2 and v5, so T2,5 = 5 +1 = 6. In the case of a directed graph, each POI vi will have two lists ) for vi as the source, and HI(vin ) for vi as i and vj with of labels in HI, HI(vout the destination. And we simply replace vi with vout vin j in Eqn. (4) to compute Ti , j . i i 4.2 Online Sub-index Retrieval Given a query Q, the first thing is to retrieve the POI candidates VQ that are likely to be used in the routes search part. In particular, the POIs that do not contain any feature in the preference vector w or do not pass any threshold in θ will never be used, nor the ones that cannot be visited on the way from the source x to the destination y within the budget b. This is implemented by retrieving the query specific sub-indices FIQ from FI and HIQ from HI. Figure 2 (right part) shows how the retrieval works for a query Q = (x = v6, y = v2, b = 13, w = (0.5, 0.5, 0), θ = 0.6, α = 1), where the weights in w are for (Park, Museum, Food), and α is the Top-k Route Search through Submodularity Modeling of Recurrent POI Features SIGIR'18, July 2018, Ann Arbor, MI, USA power law exponent in Eqn. (3). Here the elements in each vector θ and α have the same value for all features. FIQ, a sub-index of FI, is retrieved using w and θ. w directly locates the lists for the user preferred (with w h > 0) features. θ is used to cut off lower rated POIs on the sorted lists indicated by red scissors. VQ = {v1, v2, v3, v4} contains the remaining POIs. HIQ, a sub-index of HI, is then formed by retrieving the lists for each POI in VQ and also those for x and y, and b is used to cut off the sorted lists, indicated by red scissors. We also check whether a POI i in current VQ is actually reachable by checking the single- point visit cost: if sx + Tx ,i + si + Ti ,y + sy > b, we remove i from VQ and remove its list from HIQ , as indicated by the blue shading. Then we get the final POI candidates VQ . Typically, VQ ≪ V . FIQ and HIQ are retrieved only once and kept in memory. 5 OPTIMAL ROUTES SEARCH With POI candidate set VQ and the sub-indices extracted, the next step is the Routes Search phase. We present an optimal routes search algorithm in this section. Considering the complexity and general- ity of the problem, a standard tree search or a traditional algorithm for the orienteering problem does not work. An ideal algorithm de- sign should meet the following goals: i. search all promising routes in a smart manner without any redundancy; ii. prune unpromising routes as aggressively as possible while preserving the optimality of the top-k answers; iii. ensure that the search and pruning strate- gies are applicable to any nonnegative, monotone and submodular aggregation functions Φh. To this end, we propose a novel algo- rithm, Prefix bAsed Compact statEs gRowth (PACER), that incor- porates the idea of dynamic programming and fuses a cost-based pruning strategy and a gain-based pruning strategy in an unified way. Next, we present our enumeration and pruning strategies, fol- lowed by the detailed algorithm and the complexity analysis. 5.1 Prefix-based Compact State Growth A route P is associated with several variables: PV , Gain(PV ), the ending POI end(P), and cost (P). If x is not visited, sx and Fx ,h for every h are set to 0; the same is applied to y. A POI sequence is an open route if it starts from x and visits several POIs other than y; it is a closed route if it starts from x and ends at y. The initial open route includes only x. An open route P is feasible if its closed form P → y satisfies cost (P → y) ≤ b. In the following discussion, P denotes either an open route or a closed route. An open route P− with end(P−) = i can be extended into a longer open route P = P− → j by a POI j < P− V ∪ {y}. The variables for P are PV = P− V ∪ {j} Gain(PV ) =h w h Φ h(PV ) end(P) = j cost (P) = cost (P−) + Ti , j + sj . (5)   Compact states C. PV and Gain(PV ) depend on the POI set of the route P but are independent of how the POIs are ordered. Hence, we group all open routes sharing the same PV as a compact state, denoted as C, and let CL denote the list of open routes having 0Ø 1{A} 2{B} 4{C} 8{D} 3{AB} {AB} {A}→B {B}→A 5{AC} {AC} {A}→C {C}→A 6{BC} {BC} {B}→C {C}→B 9{AD} {A}→D {D}→A 10{BD} {BD} {B}→D {D}→B 12{CD} {CD} {C}→D {C}→D {D}→C {AB}→C {AB}→C 7{ABC}{AC}→B {BC}→A 11{ABD} {AB}→D {AD}→B {BD}→A 13{ACD} {AC}→D {AD}→C {CD}→A 14{BCD} {BC}→D {BD}→C {CD}→B 15{ABCD} {ABC}→D {ABD}→C {ACD}→B {BCD}→A Figure 3: The compact state enumeration tree for PACER. The number indicates the order of enumeration. C as the POI set. C is associated with the following fields: (cid:26) Gain(C) : the gain of routes grouped by C CL : ∀P ∈ CL, end(P), cost (P). (6) These information is cached in a hash map with C as the key. We assume that the POIs in VQ are arranged in the lexicograph- ical order of POI IDs. The compact states are enumerated as the subsets of VQ . x is included in every compact state, so we omit x. Figure 3 shows a compact state enumeration tree for VQ = {A, B, C , D}, excluding x and y. Each capital letter represents a POI, each node represents a compact state. We define the set of POIs that precede i, in the above order, in a POI set as the prefix of a POI i, e.g., prefix of C is {AB}. The compact states are generated in a spe- cific prefix-first depth-first manner so that longer open routes are extended from earlier computed shorter ones. Initially, the root is the empty set ∅. A child node C of the current node C− is generated by appending a POI i that precedes any POIs in C− to the front of C−, and all child nodes are arranged by the order of i. For exam- ple, Node 7 {ABC } is generated as a child node of Node 6 {BC } by appending A to the front of {BC } because A precedes B and C. At node C, the open routes in CL are generated by extending the cached routes in every compact state C−j = C \ {j} where j ∈ C. There are C such C−j . We generate each route P = P− → j by −j selecting the routes P− from each C L and append j at the end, and compute the gain and cost of P based on the accessed information for C−j from the hash map. P is kept in CL if it is feasible. For example, to generate the open routes at the node {ABC }, we access the cached open routes at nodes {AB}, {AC } and {BC } and append the missing POI. {AB} → C represents all the open routes ended with C and the first two POIs in any order, i.e., x → A → B → C and x → B → A → C. Note that it materializes only the current expanded branch of the tree, instead of the entire tree. A closed route P → y for each P ∈ CL is used to update the top-k routes topK. If CL is empty, this compact state is not kept. If no compact state is expandable, we stops the enumeration and yield the final topK. Note that each CL can include C! open routes and enumerating all the routes can be very expensive. We present two strategies to prune unpromising routes. SIGIR'18, July 2018, Ann Arbor, MI, USA Hongwei Liang and Ke Wang 5.2 Cost-based Pruning Strategy Consider two feasible open routes P and P ′. We say P dominates P ′ if PV = P ′ V , end(P) = end(P ′) and cost (P) ≤ cost (P ′). Be- cause, if a route P ′ → P is feasible, P → P with the same exten- sion P must be also feasible and cost (P → P) ≤ cost (P ′ → P). Pruning-1: cost dominance pruning. Leveraging the above dominance relationship, at the compact state C, when generating P = P− → j for a given j, we only select the open route P− from −j L such that P is feasible and has the least cost, thus, dominates C −j all other routes P ′− → j with P ′− from C L . This reduces C! open routes to at most C dominating open routes at the compact state C, one for each j in C, without affecting the optimality. We call this strategy cost dominance pruning. For example, {AB} → C on node 7 {ABC } now represents only one open route with the least cost chosen from A → B → C and B → A → C. Note that Pruning-1 is a subtree pruning, e.g., if A → B on node 3 is pruned, all the open routes starting with A → B, such as A → B → C on node 7 and A → B → D on node 11, will never be considered. Though all dominated open routes are pruned, many of the re- maining dominating open routes are still unpromising to lead to the top-k closed routes. This further motivates our next strategy. 5.3 Gain-based Pruning Strategy We can extend a dominating open route P step by step using the remaining budget ∆b = b − cost (P) into a closed route P → P. The POIs used for extension at each step should be reachable from the current end(P), therefore, chosen from the set U = {i Tend (P),i + si + Ti ,y + sy ≤ ∆b }, (7) where i is an unvisited POI other than y. Tend (P),i and Ti ,y can be computed through HIQ . P → P has gain Gain(PV ∪ PV ). Then the marginal gain by concatenating P to the existing P is ∆Gain( PV PV ) = Gain(PV ∪ PV ) − Gain(PV ). (8) Let P → P∗ denote the P → P with the highest gain. If P → P∗ ranks lower than the current k-th top routes topK [k], P is not promising and all the open routes extended from P can be pruned. Pruning-2: marginal gain upper bound pruning. However, finding P∗ is as hard as finding an optimal route from scratch, so we seek to estimate an upper bound U P of the marginal gain ∆Gain( PV PV ), such that if Gain(PV ) + U P is less than the gain of topK [k], P is not promising, thus, P and all its extensions can be pruned without affecting the optimality. We call this marginal gain upper bound pruning. As more routes are enumerated, the gain of topK [k] increases and this pruning becomes more powerful. The challenge of estimating U P is to estimate the cost of the extended part P without knowing the order of the POIs. Because ∆Gain( PV PV ) is independent of the POIs' order, we can ignore the order and approximate the "route cost" by a "set cost", i.e., the sum of some cost c(i) of each POI i ∈ PV , where c(i) is no larger than i's actual cost when it is included in P. We define c(i) as: c(i) = si + min(tj,i )/2 + min(ti ,k)/2, (9) where tj,i is the cost on an in-edge ej,i and ti ,k is the cost on an out-edge ei ,k . As the order of POIs is ignored, it is easy to verify that min ensures the above property of c(i). The destination y is "one-sided", i.e., c(y) = sy + min(tj,y)/2. To make a tighter cost ap- proximation, we also count the half out-edge cost min(tend (P),k )/2 for end(P). Then, U P is exact the solution, i.e., the maximum ∆Gain(S ∗PV ), to the following optimization problem: max S ⊆ U∪{y } ∆Gain(S PV ) s .t .i ∈S c(i) ≤ B, (10) where U is defined in Eqn. (7) and B = ∆b − min(tend (P),k )/2. Note that S should include y because end( P) = y. As c(i) and c(end(P)) are no larger than their actual costs, ∆Gain(S ∗PV ) ≥ ∆Gain( PV PV ) for any P. Thus, using ∆Gain(S ∗PV ) as U P never loses the optimality. To solve Eqn. (10), we first show the properties of the marginal gain function ∆Gain. Theorem 3. The marginal gain function ∆Gain as defined in Eqn. (8) is nonnegative, monotone and submodular. Proof. We only show that ∆Gain is submodular. According to [13], if a set function ❕ : 2V → R is submodular, and X , Y ⊂ V are disjoint, the residual function f : 2Y → R defined as f (S) = ❕(X ∪ S)−❕(X ) is also submodular. Since Gain is submodular (Theorem 1) and since PV , U ⊂ V are disjoint, ∆Gain( PV PV ) = Gain(PV ∪ PV ) − Gain(PV ) is residual on PV , thus, is submodular. (cid:3) Apparently, Eqn. (10) is a submodular maximization problem subject to a knapsack constraint, which unfortunately is also NP- hard [13]. Computing ∆Gain(S ∗PV ) is costly, thus, we consider estimating its upper bound. One approach, according to [22], is to run a Ω(B U 4) time (B is defined in Eqn. (10)) greedy algorithm in [12] to obtain an approx- imate solution ∆Gain(S ′PV ) for the above problem with approxi- mation ratio of 1 − e −1, then the upper bound of ∆Gain(S ∗PV ) is achieved by ∆Gain(S ′PV )/(1 − e −1). A less costly version of this algorithm runs in O(B U ) but its approximation ratio is 1 2 (1−e −1). Compared with the above mentioned offline bounds, i.e., 1 − e −1 and 1 2 (1 − e −1) that are stated in advance before running the ac- tual algorithm, the next theorem states that we can instead use the submodularity to acquire a much tighter online bound. Theorem 4. For each POI i ∈ U ∪ {y}, let δi = ∆Gain({i }PV ). Let ri = δi /c(i), and let i1, · · · , im be the sequence of these POIs with j =1c(ij ) ≤ B and ri in decreasing order. Let l be such that C = l −1 l j =1c(ij ) > B. Let λ = (B − C)/c(il ). Then (11) U P =l −1 j =1 δi j + λδil ≥ ∆Gain(S ∗PV ). Proof. [16] showed a theorem that a tight online bound for ar- bitrary given solution A (obtained using any algorithm) to a con- strained submodular maximization problem can be got to measure A is from the optimal solution. By applying [16] to the how far problem in Eqn. (10) and let A = ∅, Theorem 4 is deduced. (cid:3) By this means, U P is computed without running a greedy algo- rithm. We also empirically proved that this online bound in Eqn. (11) outperforms the offline bounds on both tightness and compu- tational cost. Thus, we finally choose the online bound. Top-k Route Search through Submodularity Modeling of Recurrent POI Features SIGIR'18, July 2018, Ann Arbor, MI, USA Algorithm 1: PACER(C− Globals , I ) (Recursive funcion) :Q = (x, y, b, w, θ , Φ), VQ , FIQ and HIQ to compute Gain(C) and cost (P), and k Parameters :compact state C− and the set of POIs I Output : a priority queue topK 1 forall POI i in set I in order do 2 3 4 5 6 7 8 9 10 11 12 13 C ← {i } ∪ C−; compute Gain(C); forall POI j in C do C−j ← C \ {j}; P− ← the dominating route in C cost (P− → j) is minimum; // prune-1 P ← P− → j; if cost (P → y) ≤ b then −j L such that Compute U P using Eqn. (11); if Gain(C) + U P ≥ Gain(topK [k]) then insert route P into CL; // prune-2 UpdateTopK(CL, topK ); PACER(C, prefix of i in I ); 5.4 Algorithm Algorithm 1 incorporates the above enumeration and pruning strate- gies. Given the global variables, PACER(C− , I ) recursively enumer- ates the subtree at the current compact state C− with the POI set I available for extending C−, and finally return the k best routes in topK. The initial call is PACER(∅, VQ ), when only x is included. As explained in Section 5.1, Line 1 - 3 extends C− by each i in the set I in order, creating the child node C and computing Gain(C). Lines 4 - 11 generate the dominating and promising open routes CL. Specifically, for each j ∈ C selected as the ending POI, Line 5 - 6 −j find the dominating route P− from the previously computed C L . This corresponds to Pruning-1. Only when the new open route P is feasible, Pruning-2 is applied to check if P has a promising gain, and if so, P is inserted into CL (Lines 8 - 11). After CL is finalized, it selects an open route P in CL such that P → y has the least cost to update topK (Line 12). The information of the new compact state C, as in Eqn. (6), is added to the hash map. At last, C is extended recursively with the POIs in the prefix of i in current I (Line 13). Summary of the properties of PACER. (1) PACER works for any nonnegative, monotone, and submodular Gain function so as to deal with the personalized diversity requirement. (2) Open routes are enumerated as compact states in a prefix-first depth-first order to construct open routes incrementally, i.e., dynamic pro- gramming. (3) With Pruning-1, we compute at most C domi- nating feasible open routes at each compact state C, instead of C! routes. (4) Pruning-2 further weeds out the dominating feasible open routes not having a promising estimated maximum gain. 5.5 Complexity Analysis We measure the computational complexity by the number of routes examined. Two main factors affecting this measure are the size of the POI candidate set, i.e., VQ denoted by n, and the maximum length of routes examined (excluding x and y), i.e., the maximum P denoted by p. p ≪ n. We analyze PACER relatively to the brute- force search and a state-of-the-art approximation solution. PACER. The compact states on the l-th level of the enumeration tree (Figure 3) compute the routes containing l POIs; thus, there are at most(cid:0)n l(cid:1) compact states on level l. And thanks to Pruning-1, each compact state represents at most l dominating open routes. There are n dominating open routes with single POI on level l = 1. Starting from l = 2, to generate each dominating open route on level l, we need to examine (l −1) sub-routes having the same set of POIs as the prefix and add the same ending to find the dominating one, according to the cost dominance pruning. Hence, with p ≪ n and the Pascal's rule [2], the number of routes examined is at most n + l (l − 1)(cid:18)n l(cid:19) = n + n(n − 1) pl =2 p − 3(cid:19)) = n(n − 1)(cid:18)n − 1 + (cid:18)n − 2 p − 2(cid:19) = p − 2(cid:19) l − 2(cid:19) ≈ n(n − 1)((cid:18)n − 2 (cid:18)n − 2 pl =2 n − 1 (n − p + 1)(p − 2)! n! (n − p)! . (12) (n−p)! ) with Therefore, the computation cost of PACER is O( p ≪ n. If Pruning-2 is also enabled and it prunes the γ percent of the routes examined by PACER with Pruning-1, the computation cost of PACER is O((1 − γ ) (p−2)! 1 1 n! n! (n−p)! ). (p−2)! Brute-force algorithm (BF). The brute-force algorithm based on the breadth-first expansion examines O( n! (n−p)! ) routes. Approximation algorithm (AP). [4] proposed a quasi-polynomial time approximation algorithm for the Orienteering Problem. We modified AP to solve our problem. It uses a recursive binary search to produce a single route with the approximation ratio ⌈log p⌉ + 1 and runs in O((n · OPT · log b)log p ), where OPT and b are the num- bers of discrete value for an estimated optimal Gain and for the budget, respectively. The cost is expensive if b or OPT has many discrete values. For example, for b = 512 minutes, n = 50, p = 8 and OPT = 10.0 (100 discrete values with the single decimal point pre- cision), the computation cost is (50 · 100 · log 512)log 8 = 9.11 × 1013. Lower precision leads to smaller computation cost, but also lower accuracy. [21] noted that AP took more than 104 seconds for a small graph with 22 nodes. Compared with AP, the computation cost of PACER with Pruning-1 given by Eqn. (12) is only 50 × 49 × (cid:0)49 6(cid:1) = 3.43 ×1010. This cost is further reduced by Pruning-2. PACER finds the optimal top-k routes whereas AP only finds single approximate solution. We will experimentally compare PACER with AP. 6 HEURISTIC SOLUTIONS PACER remains expensive for a large budget b and a large POI can- didate set VQ . The above approximation algorithm is not scalable. Hence, we design two heuristics when such extreme cases arise. State collapse heuristic. The cost dominance pruning in PACER keeps at most l open routes for a compact state representing a set of l POIs (excluding x and y). A more aggressive pruning is to keep only one open route having the least cost at each compact state, with the heuristic that this route likely visits more POIs. We denote this heuristic algorithm by PACER-SC, where SC stands SIGIR'18, July 2018, Ann Arbor, MI, USA Hongwei Liang and Ke Wang for "State Collapsing". Clearly, PACER-SC trades optimality for ef- ficiency, but it inherits many nice properties from PACER and Sec- tion 7.2 will show that it usually produces k routes with quite good quality. Analogous to the complexity analysis for PACER in Section 5.5, with p ≪ n, PACER-SC examines no more thanp routes, which is around 1/p of that for PACER. l =1 l(cid:0)n l(cid:1) ≈ n(cid:0) n p−1(cid:1) Greedy algorithm. PACER-SC's computation complexity re- mains exponential in the route length p. Our next greedy algorithm runs in polynomial time. It starts with the initial route x → y and iteratively inserts an unvisited POI i to the current route to maxi- mize the marginal gain/cost ratio Gain({i } ∪ C) − Gain(C) si + Tx ,i + Ti ,y , (13) where C denotes the set of POIs on the current route. It inserts i between two adjacent POIs in the current route so that the total cost of the resulting route is minimized. The term Tx ,i + Ti ,y con- strains the selected POIs i to be those not too far away from the two end points. The expansion process is repeated until the budget b is used up. The algorithm only produces a single route and exam- ines O(pn) routes because each insertion will consider at most n unvisited POIs. 7 EXPERIMENTAL EVALUATION All algorithms were implemented in C++ and were run on Ubuntu 16.04.1 LTS with Intel i7-3770 CPU @ 3.40 GHz and 16G of RAM. 7.1 Experimental Setup 7.1.1 Datasets. We use two real-world datasets from [24]. Sin- gapore denotes the Foursquare check-in data collected in Singa- pore, and Austin denotes the Gowalla check-in data collected in Austin. Singapore has 189,306 check-ins at 5,412 locations by 2,321 users, and Austin has 201,525 check-ins at 6,176 locations by 4,630 users. Same as suggested in [3, 24], we built an edge between two locations if they were visited on the same date by the same user. The locations not connected by edges were ignored. We filled in the edge costs ti , j by querying the traveling time in minute using Google Maps API under driving mode. The staying time si were generated following the Gaussian distribution, si ∼ N (µ, σ 2), with µ = 90 minutes and σ = 15. The features are extracted based on the user mentioned keywords at check-ins, same to [24]. We obtain the rating of a feature h on POI i by Fi ,h = min{ N Ch(i) 1/Sh ×j ∈Sh N Ch(j) × β 2 , β }, (14) where N Ch(i) is the number of check-ins at POI i containing the feature h, Sh is the set of POIs containing h, β is the maximum feature rating and is set to β = 5 for both data sets. The calculation scales the middle value β 2 by the ratio of a POI's check-in count to the average check-in count on h. Table 2 shows the descriptive statistics of the datasets after the above preprocessing. Both datasets were used in [24], which also studied a route plan- ning problem. The datasets are not small considering the scenario for a daily trip in a city where the user has a limited cost budget. Even with 150 POIs to choose from, the number of possible routes Table 2: Dataset statistics Singapore Austin # POI 1,625 2,609 # Edges Average ti , j 16.24 minutes 24,969 34,340 11.12 minutes # Features 202 252 consisting of 5 POIs can reach 70 billions. Compared to our work, [17] evaluated its itinerary recommendation methods using theme park data, where each park contains only 20 to 30 attractions. 7.1.2 Algorithms. We compared the following algorithms. BF is the brute-force method (Section 5.5). PACER+1 is our proposed optimal algorithm with only Pruning-1 enabled. PACER+2 enables both Pruning-1 and Pruning-2. PACER-SC is the state collapse al- gorithm and GR is the greedy algorithm in Section 6. AP is the approximation algorithm proposed by [4] (see Section 5.5). A* is the A* algorithm proposed by [24]. Since A* works only for its spe- cific keyword coverage function, it is not compared until Section 7.3 where we adapt their coverage function in our method. To be fair, all algorithms use the indices in Section 4 to speed up. Note that BF, PACER+1, PACER+2 and A* are exact algorithms, while PACER-SC, GR, and AP are greedy or approximation algorithms. 7.1.3 (cid:30)eries. A query Q has the six parameters x, y, b, w, θ , Φ. For concreteness, we choose Φh in Eqn. (3) with α controlling the diversity of POIs on a desired route. We assume θ h and α h are the same for all features h. For Singapore, we set x as Singapore Zoo and y as Nanyang Technological University; and for Austin, we set x as UT Austin and y as Four Seasons Hotel Austin. For each dataset, we generated 50 weight vectors w to model the feature preferences of 50 users as follows. For each w, we draw m features, where m is a random integer in [1, 4], and the probability of selecting each feature h is Pr(h) = N Ch (i ) . N Ch(i) and Sh are defined in Eqn. (14). Let HQ be the set of selected fea- tures. For each h ∈ HQ , wh = i ∈Sh h ∈Hi ∈Sh N Ch (i ) . i ∈Sh N Ch (i ) N Ch (i ) h ∈HQ i ∈Sh Finally, we consider b ∈ {4, 5, 6, 7, 8, 9} in hours, θ ∈ {0, 1.25, 2.5, 3.75}, and α ∈ {0, 0.5, 1, 2} with the default settings in bold face. For each setting of b, θ , α , we generated 50 queries Q = (x, y, b, w, θ , α ) using the 50 vectors w above. All costs are in minutes, therefore, b = 5 specifies the budget of 300 minutes. We first evaluate the performance of our proposed algorithms (Section 7.2), then we compare with the A* algorithm (Section 7.3). 7.2 Performance Study Evaluation metrics. As we solve an optimization problem, we evaluate Gain for effectiveness, CPU runtime and search space (in the number of examined open routes) for efficiency. For every algorithm, we evaluate the three metrics for process- ing a query, and report the average for the 50 queries (i.e., vectors w) under each setting of (b, θ , α ) chosen from the above ranges. GR and AP only find single route, thus, we first set k = 1 to com- pare all algorithms, and discuss the impact of larger k in Section 7.2.4. Figures 4 and 5 report the experiments for Singapore and Austin, respectively. Each row corresponds to various settings of one of b, θ , α while fixing the other two at the default settings. OPTIMAL Top-k Route Search through Submodularity Modeling of Recurrent POI Features SIGIR'18, July 2018, Ann Arbor, MI, USA BF PACER+1 PACER+2 OPTIMAL PACER-SC BF PACER+1 PACER+2 OPTIMAL PACER-SC PACER-SC GR AP GR AP PACER-SC GR AP GR AP 31/50 42/50 ) c e s ( e m i t n u R 103 101 10-1 10-3 4 5 6 7 8 9 Time budget b (hour) (a) Runtime vs. b ) c e s ( e m i t n u R 103 101 10-1 10-3 t s e u o r f o # 0 1.25 2.5 3.75 t s e u o r f o # 1010 108 106 104 102 31/50 42/50 4 5 6 7 8 9 Time budget b (hour) 37/50 40/50 ) c e s ( e m i t n u R 103 101 10-1 10-3 4 5 6 7 8 9 Time budget b (hour) t s e u o r f o # 1010 108 106 104 102 37/50 40/50 4 5 6 7 8 9 Time budget b (hour) 6 5 4 9 Time budget b (hour) 7 8 (b) # of routes vs. b 1010 108 106 104 102 0 1.25 2.5 3.75 (c) Gain vs. b (a) Runtime vs. b 46/50 ) c e s ( e m i t n u R 103 101 10-1 10-3 t s e u o r f o # 0 1.25 2.5 3.75 0 1.25 2.5 3.75 46/50 (b) # of routes vs. b 1010 108 106 104 102 0 1.25 2.5 3.75 i n a G i n a G 14 12 10 8 6 4 10 8 6 4 5 6 4 9 Time budget b (hour) 7 8 (c) Gain vs. b 0 1.25 2.5 3.75 (d) Runtime vs. θ (e) # of routes vs. θ (f) Gain vs. θ (d) Runtime vs. θ (e) # of routes vs. θ (f) Gain vs. θ i n a G i n a G 14 12 10 8 6 4 10 8 6 4 16 12 8 4 ) c e s ( e m i t n u R 101 100 10-1 10-2 10-3 107 105 103 s e t u o r f o # i n a G ) c e s ( e m i t n u R 101 100 10-1 10-2 10-3 107 105 103 s e t u o r f o # i n a G 101 0 0.5 1 2 16 12 8 4 0 0.5 1 2 0 0.5 1 2 101 0 0.5 1 2 0 0.5 1 2 0 0.5 1 2 (g) Runtime vs. α (h) # of routes vs. α (i) Gain vs. α (g) Runtime vs. α (h) # of routes vs. α (i) Gain vs. α Figure 4: Experimental results for Singapore. Run time and search space (# of routes) are in logarithmic scale. The labels beside data points indicate the ratio of queries successfully responded by the algorithm under the parameter setting. No label if no query fail. Data point or bar is not drawn if more than half fail. AP can only respond queries with small b. denotes the same optimal gain of PACER+2, PACER+1 and BF. We terminated an algorithm for a given query after it runs for 1 hour or runs out of memory, and used the label beside a data point to indicate the percentage of finished queries. If more than a half of the queries were terminated, no data point is shown. 7.2.1 Impact of budget b (Figure 4a - 4c and 5a - 5c). b affects the length of routes (the number of POIs included). AP is the worst. This is consistent with the analysis in Section 5.5 that AP suffers from a high complexity when b and OPT have many discrete values. b = 6 has 360 discrete values in minute, a ma- jority of the queries cannot finish. The efficiency of BF drops dra- matically as b increases, since the number of open routes becomes huger and processing them is both time and memory consuming. PACER+1's search space is two orders of magnitude smaller than that of BF, thanks to the compact state enumeration and the cost dominance pruning. PACER+2 is the best among all the exact al- gorithms. Compared with PACER+1, the one order of magnitude speedup in runtime and two orders of magnitude reduction in search space clearly demonstrates the additional pruning power of the Gain based upper bound pruning. PACER-SC trades optimality for efficiency. Surprisingly, as shown in Figure 4c and 5c, PACER-SC performs quite well with Gain being close to that of OPTIMAL. GR always finishes in less than 10−2 seconds. For Singapore, the achieved gain is far worse than that of OPTIMAL, compared with Figure 5: Experimental results for Austin the difference for Austin. This is because x and y for Singapore are relatively remote to the central city. GR will greedily select a POI i not too far away from x and y (Eqn. (13)), thus, many POIs with possibly higher feature ratings located in the central city are less likely to be chosen. In contrast, x and y for Austin are in the down- town area and this situation is avoided in most cases. 7.2.2 Impact of of filtering threshold θ . In Figure 4d - 4f and 5d - 5f, as θ increases, the POI candidate set becomes smaller and all the algorithms run faster. The majority of the queries for AP cannot finish and its results are not shown. The study suggests that a reasonable value of θ, e.g., 2.5, reduces the searching cost greatly while having little loss on the quality of the found routes. 7.2.3 Impact of route diversity parameter α (Figure 4g - 4i and 5g - 5i). PACER+2 and PACER-SC are slightly affected when α varies. As α increases, the marginal return diminishes faster and Φh be- haves more towards the max aggregation. In this case, Pruning-2 becomes less effective. When α = 0 (the sum aggregation), both Gain and the difference between OPTIMAL and GR reach the max- imum. Figure 6 illustrates the effectiveness of our power law function in Eqn. (3) for modeling the personalized route diversity require- ment. We run two queries on Singapore, one with α = 0.5, which specifies a diversity requirement, and one with α = 0, which speci- fies the usual sum aggregation. The other query parameters are the same. The figures show the best routes found for each query, with the POIs on a route labeled sequentially as A, B · · · . The red dots represent the source x and destination y. The route for α = 0.5 covers all specified features, i.e., two POIs for each feature, while maximizing the total Gain. While the route for α = 0 has four SIGIR'18, July 2018, Ann Arbor, MI, USA Hongwei Liang and Ke Wang Hilton Singapore A: National Museum B: Fort Canning Park C: Singapore Art Museum D: Esplanade Park F: Tiong Shian Eating House E: Peach Garden Hilton Singapore → A (M:5.0): National Museum → B (P:4.1): Fort Canning Park → C (M:5.0): Singapore Art Museum → D (P:3.1): Esplanade Park → E (R:3.6): Peach Garden → F (R:5.0): Tiong Shian Eating House → (cid:1) Hilton (cid:1) Gain Singapore; =(cid:1) 7.34115;(cid:1) Cost (cid:1) =(cid:1) 540(cid:1) mins (a) α = 0 .5 (with diversity requirement) E: Bukit Timah Nature Reserve D: Tampines Eco Green C: Bedok Reservoir Park A: National Museum Hilton Singapore B: Fort Canning Park Hilton Singapore → A (M:5.0): National Museum → B (P:4.1): Fort Canning Park → C (P:4.0): Bedok Reservoir Park → D (P:5.0): Tampines Eco Green → E (P:4.8): BukitTimah Nature Reserve → Hilton Singapore; Gain = 8.66; Cost = 535 mins (b) α = 0 (without diversity requirement) Figure 6: Two routes found from Singapore by PACER+2 for the query Q = (x, y, b = 9, w = (P : 0.4, M : 0.3, R : 0.3), θ = 2.5, α ), where x and y are Hilton Singapore, and P, M and R represent Park, Museum, and Chinese Restaurant. parks out of five POIs due to the higher weight of Park in w; thus, it is less preferred by a user who values diversity. In fact, the second route's Gain value when evaluated using α = 0.5 is only 6.60. 7.2.4 Impact of k. We vary k in range [1, 100] while fixing b, θ , α at the default values and run the algorithms, except GR and AP, on both datasets. As k only influences the gain-based pruning, the per- formance of BF and PACER+1 are unchanged. For PACER+2 and PACER-SC, the change is limited (less than 25% slower for k = 100). Because when k is small, the Gain of the k-th best route is usually not far away to that of the best route, thus, the marginal gain up- per bound pruning is not seriously influenced. We omit the figures due to limited space. h(PV ) = 7.3 Comparison with A* A* [24] only works for their keyword coverage function: Φ 1 −i ∈PV [1 − Fi ,h], and finds single route. In [24], Fi ,h is in the range [0, 1] and it is set to 1 if the number of check-ins on POI i for feature h is above average. In this case, the single POI in P yields the maximum Φh (PV ) value; the feature h of other POIs will be ignored. For a fair comparison, we set β = 0.5 in Eqn. (14) for both algorithms, we also leverage our indices to speed up A*. Note that the maximum b in [24] is 15 kilometers in their efficiency study, which is about 20 minutes by Google Maps under driving mode. Figure 7 shows the comparison between PACER+2 and the mod- ified A* on both datasets. The report of Gain is omitted as they are both exact algorithms. We also omit the comparison of search space due to page limit (PACER+2 searches one to two orders of magnitude less than A*). Apparently, PACER+2 outperforms A*, es- pecially for a large b. A few queries of A* on Austin even failed for b = 9. Although A* has a pruning strategy specifically for their key- word coverage function, the search strategy itself is a bottleneck. Besides, their pruning based on the greedy algorithm in [12] has a bound looser than ours. In fact, the experiments in [24] showed that A* is just 2-3 times faster than the brute-force algorithm. Gain, it is only 6.6045, which is smaller than that of Gain, it is only 6.6045, which is smaller than that of in Figure ?? in Figure ?? 8. CONCLUSIONS 8. CONCLUSIONS 9. REFERENCES 9. REFERENCES T. B T. B evolutionary computation. New York: Oxford, 1997. D. B. Fogel, and Z. Michalewicz. Handbook of D. B. Fogel, and Z. Michalewicz. Handbook of PACER+2 A* ) c e s ( e m i t n u R 103 101 10-1 ) c e s ( e m i t n u R 103 101 10-1 PACER+2 A* 39/50 4 5 6 7 8 9 Time budget b (hour) 4 5 6 7 8 9 Time budget b (hour) (a) Runtime - Singapore (b) Runtime - Austin Figure 7: PACER+2 vs. A* (logarithmic scale). 8 CONCLUSION We considered a personalized top-k route search problem. The large scale of POI maps and the combination of search in feature space and path space make this problem computationally hard. The per- sonalized route diversity requirement further demands a solution that works for any reasonable route diversity specification. We pre- sented an exact search algorithm with multiple pruning strategies to address these challenges. We also presented high-performance heuristic solutions. The analytical evaluation suggested that our solutions significantly outperform the state-of-the-art algorithms. Acknowledgments. Ke Wang's work was partially supported by a discovery grant from The Natural Sciences and Engineering Research Council of Canada (NSERC). REFERENCES [1] Senjuti Basu Roy, Gautam Das, Sihem Amer-Yahia, and Cong Yu. 2011. Interac- tive itinerary planning. In ICDE. IEEE, 15–26. [2] David M Burton. 2006. Elementary number theory. Tata McGraw-Hill Education. [3] Xin Cao, Lisi Chen, Gao Cong, and Xiaokui Xiao. 2012. Keyword-aware optimal route search. VLDB Endowment 5, 11 (2012), 1136–1147. [4] Chandra Chekuri and Martin Pal. 2005. A recursive greedy algorithm for walks in directed graphs. In FOCS. IEEE, 245–253. [5] Jian Dai, Bin Yang, Chenjuan Guo, and Zhiming Ding. 2015. Personalized route recommendation using big trajectory data. In ICDE. IEEE, 543–554. [6] Munmun De Choudhury, Moran Feldman, Sihem Amer-Yahia, Nadav Golbandi, Ronny Lempel, and Cong Yu. 2010. Automatic construction of travel itineraries using social breadcrumbs. In ACM Hypertext and Hypermedia. ACM, 35–44. [7] Qiming Diao, Minghui Qiu, Chao-Yuan Wu, Alexander J Smola, Jing Jiang, and Chong Wang. 2014. Jointly modeling aspects, ratings and sentiments for movie recommendation (jmars). In the 20th ACM SIGKDD. ACM, 193–202. [8] Aristides Gionis, Theodoros Lappas, Konstantinos Pelechrinis, and Evimaria Terzi. 2014. Customized tour recommendations in urban areas. In WSDM. 313– 322. [9] Minhao Jiang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, and Yanyan Xu. 2014. Hop doubling label indexing for point-to-point distance querying on scale- free networks. VLDB Endowment 7, 12 (2014), 1203–1214. [10] Iris A Junglas and Richard T Watson. 2008. Location-based services. Commun. ACM 51, 3 (2008), 65–69. [11] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In ACM SIGKDD. ACM, 137–146. [12] Samir Khuller, Anna Moss, and Joseph Seffi Naor. 1999. The budgeted maximum coverage problem. Inform. Process. Lett. 70, 1 (1999), 39–45. [13] Andreas Krause and Daniel Golovin. 2012. Submodular function maximization. Tractability: Practical Approaches to Hard Problems 3, 19 (2012), 8. [14] Andreas Krause and Carlos Guestrin. 2008. Beyond convexity: Submodularity in machine learning. ICML Tutorials (2008). [15] Takeshi Kurashima, Tomoharu Iwata, Go Irie, and Ko Fujimura. 2010. Travel route recommendation using geotags in photo sharing sites. In CIKM. 579–588. [16] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne Van- Briesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD. ACM, 420–429. [17] Kwan Hui Lim, Jeffrey Chan, Shanika Karunasekera, and Christopher Leckie. 2017. Personalized itinerary recommendation with queuing time awareness. In Proceedings of the 40th ACM SIGIR. ACM, 325–334. [18] Qi Liu, Yong Ge, Zhongmou Li, Enhong Chen, and Hui Xiong. 2011. Personalized travel package recommendation. In ICDM. IEEE, 407–416. Top-k Route Search through Submodularity Modeling of Recurrent POI Features SIGIR'18, July 2018, Ann Arbor, MI, USA [19] Eric Hsueh-Chan Lu, Ching-Yu Chen, and Vincent S Tseng. 2012. Personalized trip recommendation with multiple constraints by mining user check-in behav- iors. In SIGSPATIAL. ACM, 209–218. [20] Daniele Quercia, Rossano Schifanella, and Luca Maria Aiello. 2014. The shortest path to happiness: Recommending beautiful, quiet, and happy routes in the city. In ACM Hypertext and Social media. ACM, 116–125. [21] Amarjeet Singh, Andreas Krause, Carlos Guestrin, William J Kaiser, and Maxim A Batalin. 2007. Efficient Planning of Informative Paths for Multiple Robots.. In IJCAI, Vol. 7. 2204–2211. [22] Maxim Sviridenko. 2004. A note on maximizing a submodular set function sub- ject to a knapsack constraint. Operations Research Letters 32, 1 (2004), 41–43. [23] World Travel and Tourism Council. 2017. Travel and Tourism Global Economic Impact and Issues 2017. https://www.wttc.org/ (2017). [24] Yifeng Zeng, Xuefeng Chen, Xin Cao, Shengchao Qin, Marc Cavazza, and Yan- ping Xiang. 2015. Optimal Route Search with the Coverage of Users' Preferences. In 24th IJCAI. AAAI Press, 2118–2124. [25] Chenyi Zhang, Hongwei Liang, and Ke Wang. 2016. Trip recommendation meets real-world constraints: POI availability, diversity, and traveling time uncertainty. ACM TOIS 35, 1 (2016), 5. [26] Wei Zhang and Jianyong Wang. 2015. Location and Time Aware Social Col- laborative Retrieval for New Successive Point-of-Interest Recommendation. In Proceedings of the 24th ACM CIKM. ACM, 1221–1230. [27] Bolong Zheng, Nicholas Jing Yuan, Kai Zheng, Xing Xie, Shazia Sadiq, and Xiao- fang Zhou. 2015. Approximate keyword search in semantic trajectory database. In 31st ICDE. IEEE, 975–986. [28] Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In WWW. 791–800.
1802.04475
1
1802
2018-02-13T06:31:15
Graph-Based Ascent Algorithms for Function Maximization
[ "cs.SI", "math.NA", "math.OC", "stat.ML" ]
We study the problem of finding the maximum of a function defined on the nodes of a connected graph. The goal is to identify a node where the function obtains its maximum. We focus on local iterative algorithms, which traverse the nodes of the graph along a path, and the next iterate is chosen from the neighbors of the current iterate with probability distribution determined by the function values at the current iterate and its neighbors. We study two algorithms corresponding to a Metropolis-Hastings random walk with different transition kernels: (i) The first algorithm is an exponentially weighted random walk governed by a parameter $\gamma$. (ii) The second algorithm is defined with respect to the graph Laplacian and a smoothness parameter $k$. We derive convergence rates for the two algorithms in terms of total variation distance and hitting times. We also provide simulations showing the relative convergence rates of our algorithms in comparison to an unbiased random walk, as a function of the smoothness of the graph function. Our algorithms may be categorized as a new class of "descent-based" methods for function maximization on the nodes of a graph.
cs.SI
cs
Graph-Based Ascent Algorithms for Function Maximization Muni Sreenivas Pydi∗ [email protected] Varun Jog∗ [email protected] Po-Ling Loh∗† [email protected] Department of Electrical & Computer Engineering∗ Department of Statistics† University of Wisconsin - Madison 1415 Engineering Drive Madison, WI 53706 8 1 0 2 b e F 3 1 ] I S . s c [ 1 v 5 7 4 4 0 . 2 0 8 1 : v i X r a February 2018 Abstract We study the problem of finding the maximum of a function defined on the nodes of a connected graph. The goal is to identify a node where the function obtains its maximum. We focus on local iterative algorithms, which traverse the nodes of the graph along a path, and the next iterate is chosen from the neighbors of the current iterate with probability distribution determined by the function values at the current iterate and its neighbors. We study two algorithms corresponding to a Metropolis-Hastings random walk with different transition kernels: (i) The first algorithm is an exponentially weighted random walk governed by a parameter γ. (ii) The second algorithm is defined with respect to the graph Laplacian and a smoothness parameter k. We derive convergence rates for the two algorithms in terms of total variation distance and hitting times. We also provide simulations showing the relative convergence rates of our algorithms in comparison to an unbiased random walk, as a function of the smoothness of the graph function. Our algorithms may be categorized as a new class of "descent-based" methods for function maximization on the nodes of a graph. 1 Introduction Social media and big data analysis have led to an explosion of graph-structured datasets in diverse domains such as neuroscience, economics, sensor networks, and databases. In many important instances, the object of interest may be expressed as a function defined on the vertices of the graph. For example, in social network analysis, it is useful to identify a node or nodes with a maximal centrality (or "influence") score relative to the other nodes, for the purpose of performing strategic interventions [7,14]. In electrical network modeling, the edges of a graph correspond to connections in an electrical grid, and the amount of power available at each node may similarly be represented using a graph-structured function [25]. This has led to a variety of statistical studies in graph function estimation, including Laplacian smoothing [15, 23] and graph trend filtering [27], when noisy measurements of graph characteristics may be available. In this paper, we focus on the problem of obtaining the maximum value of a function defined on the nodes of a graph. We assume a setting where only local information is available, and any algorithm must make decisions based on graph information obtained by traversing the nodes of the graph in a sequential manner. For instance, such a setting may arise in web crawling [6], respondent- driven sampling [12], or other demographic studies [3]. Although basic properties of Markov chains imply that an unbiased random walk on the nodes of a connected graph will eventually visit every 1 node-hence produce a function maximum-we wish to use information about the value of the function on neighboring nodes to guide the path of the algorithm, borrowing ideas from the extensive literature on function optimization in the continuous domain. For continuous optimization, several algorithms such as gradient descent, stochastic gradient descent, stochastic gradient Langevin dynamics, and momentum-based descent algorithms [4,18,28] provide guarantees for finding local and global optima when the function is sufficiently smooth. Common classes of smooth functions include Lipschitz functions, convex functions, and Polyak- Łojasiewicz functions [19]. Most of these notions, however, do not have direct analogs in the discrete domain of graphs. For instance, there is no obvious analog of a convex function on a graph [13, 17]. In this paper, we take a step toward systematically studying function optimization on graphs by considering a certain class of smooth graph functions, where the notion of smoothness is motivated by the theory of band-limited graph signals. Such topics constitute an area of study in graph signal-processing [22], which has become popular within the signal processing community in recent years [2,20]. The algorithms we propose exploit the underlying graph structure to construct efficient algorithms for maximizing such smooth graph functions, producing a promising analogy to gradient descent algorithms for continuous functions. Two key features of all our algorithms are that they are iterative and local; i.e., the random walk relies only on the function values of neighboring nodes when deciding its next step. This is a direct analogy to first-order optimization methods in continuous domains. Our proposed algorithms employ random walk methods based on Monte Carlo approaches, specifically the Metropolis-Hastings (MH) algorithm [8]. An important idea is to reformulate the problem of graph function maximization as a problem involving sampling vertices with high function values. Such strategies have recently gained traction in continuous domain optimization, as well [9, 21,29]. Starting with a proposal probability density on the vertices of the graph that is related to the original function values in an appropriate manner, we construct random walk transition kernels that converge to the desired proposal distribution. Our approach differs significantly from comparable approaches in the literature in the following way: In constructing the MH random walk kernel, we exploit the graph-connectivity information implied by the graph Laplacian matrix to construct rapidly-mixing walks that converge to the function maximum. Through hitting time analysis, we provide theoretical guarantees for the speed of convergence of these algorithms. The remainder of the paper is organized as follows: In Section 2, we introduce the mathematical formulation of the graph maximization problem and the types of local algorithms and smooth functions we will consider. In Section 3, we provide a formal statement of our proposed algorithms, which are analyzed rigorously in Section 4. In Section 5, we provide simulations demonstrating the behavior of our algorithms. We conclude with a list of interesting open questions in Section 6. Notation: We write (cid:107) · (cid:107)T V to denote the total variation norm and (cid:107) · (cid:107)2 to denote the Euclidean norm of a vector. For a matrix A ∈ Rn×n, we write diag(A) to denote the n × n matrix with diagonal entries equal to the components of A and all other entries equal to zero. We write (cid:98)·(cid:99) to denote the floor operator. 2 Background and Problem Setup Consider an unweighted, undirected graph G with vertex set V of size n and symmetric adjacency matrix W . For a node i ∈ V , we write di to denote the degree of i and N (i) to denote the neighborhood set of i. We write dmax = maxi∈V di. We refer to a function f : V → R as a graph function defined on the vertices of G, and sometimes write fi to denote the function value f (i). Our 2 goal is to design a local algorithm that finds the maximum value of an unknown graph function in an efficient manner. 2.1 Local Search Algorithms Formally, we define a local search algorithm as a discrete time Markov process, where the states of the process are the n nodes, and a Markov chain in state Xt at time t chooses the next state Xt+1 among the neighbors of Xt, with transition probability distribution defined as a function of the value f (Xt) and the set of values {f (Vt) : Vt ∈ N (Xt)} at neighboring nodes in the graph. We briefly mention some related work. Borgs et al. [5] studied the problem of finding the first node in a preferential attachment network, where the algorithm is given access to all nodes in a frontier of radius r around the set of previously queried nodes. Frieze and Pegden [10] proposed an alternative algorithm of finding the root of a preferential attachment graph, where the algorithm is given access to a sorted list of the highest-degree neighbors of the current iterate. Brautbar and Kearns [6] studied algorithms for finding nodes with high degrees or high clustering coefficients using a "jump and crawl" method, where a crawl step consists of randomly querying a neighbor of the existing iterate, and a jump step allows the algorithm to query a uniformly sampled node from the vertex set of the graph. Note, however, that our methods differ from the studies of Borgs et al. [5] and Frieze and Pegden [10] due to the fact that we are interested in different classes of graph functions besides the age function (indeed, the age of the nodes in the graph may not constitute a smooth function), and from the study of Brautbar and Kearns [6] due to the fact that successive steps may only visit immediate neighbors, rather than jumping to an entirely different node in the graph. 2.2 Metropolis-Hastings Algorithm Many of our algorithms are based on versions of the Metropolis-Hastings Algorithm, which we review in this section. Given a state space V and a target probability density pf (·), the MH algorithm constructs a Markov chain with transition probability matrix P whose stationary distribution π is the same as the target probability density (i.e., π(i) = pf (i) ∀ i ∈ V ). The matrix P is defined in terms of a "proposal" distribution Q, as follows: (cid:40) 1 −(cid:80) (cid:18) QijR(i, j), j(cid:54)=i Pij, R(i, j) = min 1, j (cid:54)= i j = i, (cid:19) . pf (j)Qji pf (i)Qij Pij = where (1) (2) The general idea behind the MH algorithm is that successive steps are guided by the proposal distribution, such that the move from node i to node j depends on the ratio pf (j) pf (i) , but is also moderated by the proposal distribution according to the ratio Qji . Known results in probability Qij theory guarantee the convergence of the MH algorithm to the target density [11]. In addition to generating samples from a desired distribution, however, the MH algorithm is also a valuable tool in stochastic optimization [8]. The key idea is that if a function f with domain V is encoded into an appropriate density pf , such that larger values of f correspond to larger values of pf , the random walk generated by the MH algorithm will be more likely to visit nodes with larger density values, hence larger values of f. 3 The independent MH algorithm corresponds to the choice of proposal distribution Qij = pg(j), where pg is some probability measure over the state space V . In Section 3, we present a variety of algorithms for function maximization based on running the MH algorithm with different choices of proposal distributions and target densities, for which we may obtain provable guarantees for the rate of convergence. 2.3 Smooth Graph Functions We wish to leverage information about local changes in the graph function across edges in the graph to guide the movement of an algorithm. Intuitively, this will lead to improvements in the rate of convergence of an algorithm to the graph maximum when the function satisfies certain smoothness properties, as a rough analog of the convergence results of gradient descent for smooth functions on a real domain. In order to make these notions rigorous, we now define the smooth class of graph functions to be analyzed in our paper, borrowing from the literature on graph signal processing. j=1 Wij The unnormalized graph Laplacian for a graph G with adjacency matrix W is given by L = D−W , where D = diag is the degree matrix. Since the Laplacian is symmetric, we can calculate the eigendecomposition of L as U ΛU T , where U ∈ Rn×n is an orthonormal matrix whose ith column ui is the eigenvector corresponding to the eigenvalue λi, and Λ is a diagonal matrix with sorted eigenvalues 0 = λ1 ≤ ··· ≤ λn. Since U is unitary, the columns of U form an orthogonal basis for any graph function f. In the basis of Laplacian eigenvectors, the function f may be written as f = U f, where f is defined as the graph Fourier transform f = U T f. The ith column ui of U is the ith Fourier mode of the graph, corresponding to the ith smallest graph frequency, also equal to √ (cid:16)(cid:80)n (cid:17) Intuitively, a "smooth" graph function is a function that does not vary much across vertices that are connected by edges. This notion of smoothness is captured by the term f T Lf, as shown in the following identity [26]: λi [22]. wij(fi − fj)2. (3) n(cid:88) i,j=1 f T Lf = 1 2 n(cid:88) For a smooth function, the sum of squared differences (fi − fj)2 across all the connected vertices is small, implying that f T Lf is small. Representing f in the Fourier basis, we have f T Lf = ( f T U T )U ΛU T (U f ) = f T Λ f = λi fi 2 . Since the λi's are arranged in ascending order, setting the higher-order Fourier coefficients fi's close to zero leads to a small value for f T Lf, implying that f is smooth. We have the following definition: Definition 1. A function f : G → R is called k-smooth if there exists a vector α ∈ Rk such that f = Ukα, where Uk ∈ Rn×k is the matrix consisting of the first k columns of U. i=1 In general, any graph function f can be decomposed as f = fks + fr, where fks = UkU T k-smooth component and fr is the residual component. Note that fr⊥fks, so k f is the (cid:107)f(cid:107)2 2 = (cid:107)fks(cid:107)2 2 + (cid:107)fr(cid:107)2 2. In graph signal processing, a k-smooth function is viewed as a band-limited graph signal restricted to the lowest k Fourier modes of the graph. The vector α represents the projection of f onto the lowest k graph frequencies [20]. Denote δi to be the vector with 1 in the ith coordinate and zeros elsewhere. We then have the following definition: 4 Figure 1: Examples of randomly generated smooth functions with k = 10, k = 20, and k = 30 on a 32 × 32 2D grid graph of n = 1024 nodes. The eigenvectors u10, u20 and u30 are plotted in the first row. A higher intensity on a pixel indicates a higher positive value for the vector at that node. Note that as expected, functions corresponding to a smaller value of k have fewer undulations. Definition 2. The term (cid:107)U T at node i [24]. The LC-k quantity satisfies k δi(cid:107)2 is referred to as the local cumulative coherence of order k (LC-k) k δi(cid:107)2 (cid:107)U T (cid:107)U T δi(cid:107)2 . = k δi(cid:107)2 (cid:107)U T (cid:107)δi(cid:107)2 (cid:107)U T From equation (4), we see that (cid:107)U T k δi(cid:107)2 = (4) k δi(cid:107)2 gives the proportion of the energy of the graph impulse function δi that is concentrated on the top k Fourier modes [20]. The LC-k varies between 0 and 1. Whereas we do not usually associate δi with smoothness, it may happen that for certain graph topologies, the value of LC-k at node i is close to 1, implying that δi is an approximately k-smooth function on the graph. Although LC-k cannot be computed locally, methods exist for computing the value approximately, without having to perform an eigendecomposition of a potentially large graph Laplacian matrix [20, 24]. 3 Algorithms We now describe the local algorithms that we will compare in this paper. A theoretical analysis of the relative convergence rates is provided in the next section. 3.1 Vanilla Random Walk We begin by formally writing out the algorithm for an unbiased random walk on the vertices of the graph. The random walk proceeds around the nodes of the graph that are connected by edges. 5 Algorithm 1 Vanilla RW Require: Local access to graph G (i.e., at every node, all its neighbors are accessible) and number of iterations T . 1. initialize: i ← Unif{1, . . . , n} (Uniform sampling from V ) imax ← i fmax ← fi 2. repeat for T iterations: i ← Unif{j : wij = 1} if fi > fmax: fmax ← fi imax ← i return imax The transition kernel for the vanilla random walk is given by P = D−1W . Thus, the transition probability from node i to node j is given by Pij = wij , where wij = 1 if an edge exists between i di and j, and wij = 0 otherwise. The vanilla random walk is agnostic to the function f, and converges to a stationary distribution that is proportional to the degrees of the graph nodes [1]. Note, however, that we cannot immediately conclude that such a function-agnostic random walk will not optimize the function efficiently-the class of k-smooth functions on graphs does not have a simple description, and it may happen that optimizers of such functions lie at high-degree nodes, which are precisely those nodes that attract the vanilla random walk. 3.2 Exponentially-Weighted Walk The second algorithm involves biasing the choices of each move in the vanilla random walk according to the function values on the neighboring nodes. We choose an exponential weight function, so that the target probability density is defined by pf (i) ∝ exp (γfi). Starting with a proposal distribution Q = D−1W , we use the MH method in equation (1) to construct the transition kernel for the exponentially-weighted walk, as follows: (cid:40) 1 1 −(cid:80) di wijR(i, j) j(cid:54)=i Pij Pij = j (cid:54)= i, j = i, (cid:18) (cid:19) (5) (cid:19) . where (cid:18) R(i, j) = min 1, pf (j)(1/dj) pf (i)(1/di) = min 1, eγ(fj−fi) di dj Thus, the transition probability between any two nodes in the exponentially-weighted walk depends on the difference in function value fi− fj and the degrees of the nodes. The parameter γ determines the "peakiness" of the target density pf . Unlike in the vanilla random walk, we assume that at every node, it is possible to access the function value and the degree of its neighbors. However, we do not make use of the smoothness constraint on the function. The parameter γ may be viewed as controlling the greedy nature of this algorithm. When γ = +∞, the random walk always ascends; i.e., if f (j) < f (i), then P (i, j) = 0. 6 However, such a greedy walk is susceptible to getting stuck at local maxima and failing to find the global maxima quickly. At the other extreme, when γ = 0, the exponential random walk is function-agnostic (as in the vanilla random walk), and converges to the uniform distribution over vertices. Algorithm 2 Exponential RW(γ) Require: Local access to graph G and function f (i.e., at every node, all its neighbors and their function values are accessible), number of iterations T , and tuning parameter γ. 1. initialize: i ← Unif{1, . . . , n} (Uniform sampling from V ) imax ← i fmax ← fi 2. repeat for T iterations: Generate j according to Pij given in equation (5) i ← j if fi > fmax: fmax ← fi imax ← i return imax 3.3 Graph Laplacian Walk For the third algorithm, we use a proposal distribution that is derived from the graph Lapla- cian, instead of the vanilla random walk proposal distribution Q = D−1W that we used for the exponentially-weighted walk. Let Uk represent the matrix containing k eigenvectors corresponding to the smallest k eigenvalues of the graph Laplacian. Let δi ∈ {0, 1}n represent the indicator vector for node i. The proposal distribution for the graph Laplacian walk is given by (cid:80) k δj(cid:107)2 (cid:107)U T j:wij =1 (cid:107)U T k δj(cid:107)2 ij = Q(cid:48) wij. (6) 2 2 Note that the Laplacian-based proposal distribution Q(cid:48) is indeed "local," since Q(cid:48) ij = 0 whenever Qij = 0. For the Laplacian walk, we choose a target probability density according to pf (i) ∝ f 2 i . The squaring of the function restricts our analysis to maximizing positive functions. Using the MH method in equation (1), we derive the transition kernel for graph Laplacian walk, as follows: where we set R(i, j) = 0 if wij = 0; and if wij = 1, we have (cid:107)U T (cid:107)U T pf (j)Q(cid:48) pf (i)Q(cid:48) R(i, j) = min = min 1, 1, ji f 2 j f 2 i ij k δi(cid:107)2 k δj(cid:107)2 2 2 (cid:18) (7) (8) (cid:33) . (cid:80) (cid:80) j:wij =1 (cid:107)U T i:wji=1 (cid:107)U T k δj(cid:107)2 k δi(cid:107)2 2 2 Pij = Q(cid:48) ijR(i, j) (cid:40) 1 −(cid:80) (cid:32) (cid:19) j(cid:54)=i Pij j (cid:54)= i, j = i, 7 Algorithm 3 Laplacian RW(k) Require: Function smoothness k, local access to graph G, function f and LC-k (i.e., at every node, all its neighbors, their function values, and their LC-k values are accessible/computable), and number of iterations T 1. initialize: i ← Unif{1, . . . , n} (Uniform sampling from V ) imax ← i fmax ← fi 2. repeat for T iterations: Generate j according to Pij given in equation (7) i ← j if fi > fmax: fmax ← fi imax ← i return imax An important difference between the exponentially-weighted walk and the graph Laplacian walk is that the former algorithm is truly a local algorithm. Indeed, only the function values of the neigh- boring nodes are needed to determine the probability distribution for the next step of Algorithm 2. This differs from Algorithm 3, for which we assume knowledge of the graph Laplacian (or at least its top k eigenvectors) in order to compute (cid:107)U T 2 for the neighboring nodes of every iterate. We now describe a variant of Algorithm 3 applicable to approximately smooth functions. We k δi(cid:107)2 begin with a definition: Definition 3. A function f is -approximately k-smooth if for the decomposition f = fks + fr where fks = U T k Ukf, we have for all i ∈ V and some  > 0. fr(i) ≤ (cid:107)fks(cid:107)2, For the class of -approximate k-smooth functions, the proposal distribution for the graph Lapla- cian walk given in equation (6) is replaced by k δj(cid:107)2 + (cid:1)2 (cid:0)(cid:107)U T (cid:0)(cid:107)U T k δj(cid:107)2 + (cid:1)2 wij. j:wij =1 (cid:80) Q(cid:48) ij = (9) The transition kernel for the Laplacian walk will remain the same as in equation (7), with the modified Q(cid:48) ij in equation (9). 4 Theoretical Analysis In this section, we provide results concerning the convergence rate of the local search algorithms. For both of our algorithms, we derive bounds on (i) the total variation distance between the probability distribution at time t and the stationary distribution of the Markov chain; and (ii) bounds on the hitting time of the algorithm in expectation and in high probability. A practical consequence of 8 the total variation bounds is that if we run the corresponding local algorithms for sufficiently many steps, we are guaranteed that taking the maximizer of the empirically constructed distribution will be provably close to the function maximizer. The hitting time bounds may be interpreted as a bound on the amount of time needed to first visit a maximum-thus, if we halt the algorithms after a prescribed number of steps and choose the node with the largest function value so far, we are guaranteed to obtain a maximum with high probability. In fact, if we are given slightly more knowledge (i.e., that we have located a function maximizer upon visiting it for the first time), the theorems provide stronger guarantees for a variant of the local algorithms that halt once they identify a maximum. 4.1 Exponentially-Weighted Walk In this section, we analyze the exponentially-weighted random walk in Algorithm 2. 4.1.1 Convergence In the first theorem, we show the convergence of the exponentially-weighted random walk to the target density pf in total variation norm. Theorem 1 (Convergence of Algorithm 2). For a connected graph G with diameter r, and for a graph function f that is nonzero on all vertices, the rate of convergence of the random walk proposed in Algorithm 3 to its stationary distribution pf is given by (cid:32) Pt i∗ − pfT V ≤ 1 − δr−1 f (dmax∆f )r , ∀ i ∈ V, (10) i∗ is the ith row of Pt (the transition probability matrix after t steps), δf = mini pf (i), where Pt ∆f = maxi pf (i). Proof. For any two vertices i and j connected by an edge, we have (cid:33)(cid:98) t r(cid:99) (cid:17) Pij = Qij min (cid:16) (cid:16) (cid:16) 1 , di min 1, = 1 di = min 1, (cid:17) pf (j)Qji pf (i)Qij pf (j)di pf (i)dj pf (j) pf (i)dj 1 (cid:16) (cid:17) , = pf (j) min ≥ 1 dmax∆f ≥ δf dmax∆f , pf (j) (cid:17) 1 dipf (j) djpf (i) For any two vertices i and j that are not connected by an edge, it is possible to find at most r − 1 vertices that connect i to j, since the diameter of the graph is r. Hence, in all cases, (cid:18) δf (cid:19)r−1 ij ≥ Pr dmax∆f dmax∆f 9 1 pf (j) = δr−1 f (dmax∆f )r pf (j), implying that Prs+m i∗ − pfT V = θs(QsP m)i∗ − pfT V ≤ θs. We now adopt a proof technique from Theorem 4.9 in Levin and Peres [16]. Define Pf ∈ Rn×n such that Pf (i, j) = pf (j). We may write P r = (1 − θ)Pf + θB, where θ = 1 − δr−1 f (dmax∆f )r and Q is a stochastic matrix. By induction, we will prove that P rs = (1 − θs)Pf + θsBs. (11) Assuming equation (11) is true for s, we have P r(s+1) = P rsP r = (1 − θs)Pf P r + θsBs((1 − θ)Pf + θB) = (1 − θs)Pf + (1 − θ)θsBsPf + θs+1Bs+1 = (1 − θs+1)Pf + θs+1Bs+1, since Pf P r = Pf B = Pf Pf = Pf . Multiplying equation (11) by P m, where 0 ≤ m < r, we then have P rs+m = (1 − θs)Pf P m + θsBsP m = Pf + θs(BsP m − Pf ), implying that Hence, Taking t = rs + m, where s =(cid:4) t (cid:107)Prs+m i∗ r P rs+m − Pf = θs(BsP m − Pf ). − pf(cid:107)T V = θs(cid:107)(BsP m)i∗ − pf(cid:107)T V ≤ θs. (cid:5), completes the proof. 4.1.2 Results on Hitting Times In the next theorem, we prove an upper bound on the expected number of steps it takes for Algorithm 2 to reach the function maximum. Theorem 2 (Expected hitting time). For Algorithm 2, let vt ∈ V be the state at time t, and define Thit = min{t ≥ 0 : fvt = fmax} to be the number steps it takes for Algorithm 2 to reach the function maximum. Let fmin denote the minimum value of the function f. Then the expected value of the hitting time is bounded by EThit ≤ dr Proof. From the proof of Theorem 3, we have maxeγ(r−1)(fmax−fmin). (12) P t − Pf = θs (QsP m − Pf ) , (dmax∆f )r , and t = rs + m and s =(cid:4) t for θ = 1 − δr−1 0 : vt = i}. Let EiTj denote the expected hitting time for state j given that the MH Markov chain starts at state i. From Lemma 2.12 in Aldous [1], we have (cid:5). Define hitting time for state i as Ti = min{t ≥ (13) r f pf (j)EiTj = Zjj − Zij, 10 where Zij =(cid:80)∞ ∞(cid:88) pf (j)EiTj = t=0(P t ij − pf (j)). Using equation (13), we then have ∞(cid:88) θt(cid:0)(QsP m)t jj − (QsP m)t (cid:1) ≤ jj − P t ∞(cid:88) ij) = ij (P t t=0 t=0 t=0 θt = 1 1 − θ = (dmax∆f )r δr−1 f . Hence, and EiThit ≤ (dmax∆f )r δr−1 f ∆f , f δr−1 EiTj ≤ (dmax∆f )r pf (j) (cid:19)r−1 (cid:18) ∆f = dr max δf = dr maxeγ(r−1)(fmax−fmin). We now derive a high-probability bound on the hitting time. Theorem 3 (High-probability bound on hitting time). For any initial distribution µ and any s > 0, we have , (14) (cid:19)(cid:98)t/s(cid:99) (cid:18) t(cid:63) hit s Pµ[Thit > t] ≤ hit = dr maxeγ(r−1)(fmax−fmin) and t > 0. where t(cid:63) Proof. For any integer m ≥ 1, we have Pµ[Thit > ms Thit > (m − 1)s] ≤ max By induction on m, we obtain Pµ[Thit > ms] ≤(cid:16) t(cid:63) j hit s Pj(Thit > s) ≤ Ej(Thit) (cid:17)m s = t(cid:63) hit s . , which implies inequality (14). 4.2 Graph Laplacian Walk We begin by proving a few lemmas concerning the proposal distribution Q(cid:48) used in Algorithm 3 for k-smooth and -approximately k-smooth functions. We establish the following envelope condition: pf (j) ≤ Q(cid:48) ij, 1 M (15) for an appropriate constant M, when wij = 1. Lemma 1 (Dominance for k-smooth graph functions). Suppose f is k-smooth. For the proposal distribution Q(cid:48) given in equation (6), the envelope condition (15) holds with M = k. Proof. Since f is k-smooth, we have f = Ukα for some α ∈ Rk. It follows that fi = δT (cid:104)U T i Ukα = k δi, α(cid:105). Hence, k δi, α(cid:105)2 ≤ (cid:107)U T k δi(cid:107)2 2(cid:107)α(cid:107)2 2, implying that i = (cid:104)U T f 2 (cid:88) i∈V 11 i = (cid:107)f(cid:107)2 f 2 2 = (cid:107)U T k α(cid:107)2 2 = (cid:107)α(cid:107)2 2. Thus, for j (cid:54)= i, we have j(cid:80) f 2 i∈V f 2 i pf (i) = ≤ (cid:107)U T k δi(cid:107)2 2. Using equation (6), for wij = 1, we then have Q(cid:48) ij = (cid:80) (cid:107)U T k δj(cid:107)2 j:wij =1 (cid:107)U T 2 k δj(cid:107)2 2 (cid:80) pf (j) j:wij =1 (cid:107)U T k δj(cid:107)2 2 (cid:80)n pf (j) j=1 (cid:107)U T k δj(cid:107)2 2 ≥ = 1 k pf (j). ≥ Lemma 2 (Dominance for -approximate k-smooth graph functions). Suppose f is -approximate k-smooth. For the proposal distribution Q(cid:48) given in equation (9), the envelope condition (15) holds with √ M = k + 2k n + n2. (16) Proof. Let fks = U T k α for some α ∈ Rk.Then f (i)2 = (fks(i) + fr(i))2 ≤(cid:0)(cid:104)U T k δi, α(cid:105) + (cid:107)fks(cid:107)2 (cid:1)2 ≤(cid:0)(cid:107)U T k δi(cid:107)2(cid:107)α(cid:107)2 + (cid:107)α(cid:107)2 (cid:1)2 , implying that Thus, for j (cid:54)= i, we have (cid:88) i∈V f (i)2 = (cid:107)f(cid:107)2 2 = (cid:107)fks(cid:107)2 2 + (cid:107)fr(cid:107)2 2. ≥ α2 2 ≤(cid:0)(cid:107)U T k δi(cid:107)2 + (cid:1)2 . f 2 i∈V f 2 i From equation (9), for j (cid:54)= i and wij = 1, we have pf (i) = j(cid:80) k δj(cid:107)2 + (cid:1)2 (cid:0)(cid:107)U T (cid:0)(cid:107)U T k δj(cid:107)2 + (cid:1)2 ≥ (cid:80) k + n2 + 2(cid:0)√ n(cid:80) pf (i)2 j:wij =1 i∈V (cid:107)U T Q(cid:48) ij = ≥ (cid:80)n k δi(cid:107)2 2 pf (i) (cid:0)(cid:107)U T k δj(cid:107)2 + (cid:1)2 (cid:1) = pf (i)2 . M j=1 4.2.1 Convergence The first theorem concerns convergence in TV distance. Theorem 4 (Convergence of Algorithm 3). For a connected graph G with diameter r, and for a k-smooth graph function f (either exact or -approximate) that is nonzero on all the vertices, the rate of convergence of the random walk proposed in Algorithm 3 to its stationary distribution pf is given by (cid:107)Pt i∗ − pf(cid:107)T V ≤ , ∀ i ∈ V, (17) (cid:33)(cid:98) t r(cid:99) (cid:32) 1 − δr−1 f M r where Pt Lemmas 1 and 2. i∗ is the ith row of Pt, δf = mini pf (i), and M is the dominance constant established in 12 Proof. From equations (7) and (8), for any two vertices i and j connected by an edge, we have (cid:18) Q(cid:48) Q(cid:48) ji pf (i) , ij pf (j) (cid:19) ≥ 1 M pf (j), (cid:32) (cid:33) pf (j)Q(cid:48) pf (i)Q(cid:48) ji ij Pij = Q(cid:48) ij min 1, = pf (j) min where the last inequality follows from Lemmas 1 and 2. For any two vertices i and j that are not connected by an edge, it is possible to find at most r − 1 vertices that connect i to j, since the diameter of the graph is r. This leads to the following inequality: ij ≥(cid:16) δf M Pr (cid:17)r−1 1 pf (j) = δr−1 M r pf (j). f M Similar to proof of Theorem 1, define Pf ∈ Rn×n such that Pf (i, j) = pf (j). We then write P r = (1 − θ)Pf + θB, where θ = 1 − δr−1 with the modified θ completes the proof. f M r and B is a stochastic matrix. Following a similar analysis as that in Theorem 1 4.2.2 Results on Hitting Times In the next theorem, we prove an upper bound on the expected number of steps it takes for Algorithm 3 to reach the function maximum. Theorem 5 (Expected hitting time). For Algorithm 3, suppose vt ∈ V be the state at time t, and define Thit = min{t ≥ 0 : fvt = fmax}. The expected value of the hitting time is bounded by EThit ≤ (Mf2)r maxf 2(r−1) f 2 min . (18) Proof. Following the analysis of Theorem 2 with θ = 1 − δr−1 M r , we have M r δr−1 pf (j)EiTj ≤ 1 1 − θ = , f f where EiTj is the expected hitting time to reach node j, starting from node i. For Thit, we substitute j = imax, so that Hence, pf (imax) = max i pf (i) = ∆f . EThit ≤ M r δr−1 f ∆f = (Mf2)r maxf 2(r−1) f 2 min . The high-probability bound on expected time would be same as that in Theorem 3, with t(cid:63) hit = (Mf2)r maxf 2(r−1) f 2 min . 13 Figure 2: An example run of the algorithms on a 20-smooth function on a 32 × 32 2D grid graph. White pixels in rows 2–5 indicate nodes that have been visited by the algorithm. White pixels in the function plot denote high function values. Notice that the Laplacian RW is very effective at traversing regions of the graph where the function takes large values. The exponential RW with γ = 1 is also effective at reaching the function peaks located at the coordinates (15,10). The vanilla random walk covers a large area but without any preferred direction, as expected. 14 5 Experiments n In this section, we consider various graph topologies and approximately k-smooth functions defined on the nodes of the graphs and compare the algorithms described in Section 3. We simulated Algorithms 1, 2 and 3 on the following graph models: (i) 2D Grid graph, (ii) Erdős-Renyi (ER) graph, (ii) and Barabasi-Albert (BA) graph. For the 2D grid graph, we ran the algorithms on a 32 × 32 grid of n = 1024 nodes. For the ER graph, we generated a random graph with n = 1000 nodes with the probability of an edge between any two nodes being p = 1.1 log n , and discarded the graphs with isolated nodes so that the entire graph formed one connected component. For the BA graph, we generated a random graph with n = 1000 nodes starting with a seed set of m = 3 nodes. For each of these graphs, we generated random smooth functions for varying values of k. For each value of k, we sampled α from a k × 1 vector of standard normal random variables, and constructed the smooth function as f = Ukα, where U ∈ Rn×k is the matrix containing the top k eigenvectors of the graph Laplacian matrix. The functions were then made nonnegative by lifting the function value at every node by the minimum. Since the constant vector is the first eigenvector of the graph Laplacian, this process of adding a constant vector does not affect the smoothness of the function. The algorithms were run till the random walk "hit" the maximum, or up to a maximum of 10, 000 steps. The hitting times were then averaged over 100 iterations for each value of k, and for 10 randomly chosen functions (i.e., a total of 1000 iterations for each value of k). For Algorithm 2, we ran the experiments with two different values of γ. The case γ = 0 corresponds to a function- agnostic random walk that converges to a uniform stationary distribution across all the nodes. The case γ = 1 corresponds to a moderately greedy random walk that converges to a stationary distribution proportional to eγf . A high value of γ would reduce Algorithm 2 to a 'greedy' walk that gets stuck in local minima, which is not desirable. For instance, in our experiments, γ = 10 led to very poor performance due the algorithm often being unable to move out of local minima. Figures 3, 4, and 5, report the results. As can be seen, the Laplacian walk of Algorithm 3 consistently outperformed all other algorithms for all the three classes of graphs we considered. It is also worth noting that changing the comparison criterion from hitting the global maximum to hitting the top 1% of nodes did not change the performance of the algorithms in our simulations. 6 Discussion We have presented two new algorithms for graph function maximization based on local movements around the nodes of a graph. Our first algorithm concerns an exponentially weighted random graph, and our second algorithm uses information about the spectrum of the graph Laplacian matrix. We have provided theoretical results concerning the rate of convergence of our algorithms in terms of total variation distance and hitting time when the graph function belongs to a certain smoothness class. The algorithms we have studied in this paper only involve local movements along edges, from one node to an adjoining neighbor. However, one might imagine variants of the algorithms that allow "jump" movements that reinitialize the walk at a randomly drawn vertex, either uniformly selected from all the nodes or all the nodes previously explored in previous time steps. It would be interesting to see how incorporating the option of a jump move might affect the convergence analysis of the algorithms. Another question to explore is the tightness of our bounds on rates of convergence of the algo- rithms. Our results are derived based on a seemingly coarse analysis, and it would be interesting 15 Figure 3: Comparison of hitting times for Erdős-Renyi graphs as a function of smoothness Figure 4: Comparison of hitting times for Barabasi-Albert graphs as a function of smoothness 16 Figure 5: Comparison of hitting times for 2D grid graphs as a function of smoothness to see if it is possible to find worst-case graphs and classes of smooth functions for which one can also derive lower bounds for the rate of convergence of any local algorithm. This also gives rise to the important related question of the landscape of local and global optima of a k-smooth function, where the smoothness is defined in terms of eigenvalues of the graph Laplacian. This appears to be a challenging problem even for k = 2 and for Erdős-Renyi random graphs. Ideally, we would also like to be able to translate the bounds on total variation distance and hitting time into precise recommendations regarding the number of iterates required for each of our algorithms to locate a maximum. A final question concerns improving the convergence rate of local algorithms when the next iterate is allowed to depend on the values of the function in a neighborhood of radius r around the current iterate. The algorithms described in this paper are limited to the case when r = 1. However, if the local algorithm were given information about a larger neighborhood at each step, perhaps it would be possible to devise an analog of higher-order descent algorithms, which are known to exhibit faster rates of convergence in continuous optimization settings. References [1] D. Aldous and J. Fill. Reversible Markov chains and random walks on graphs, 2002. [2] A. Anis, A. Gadde, and A. Ortega. Efficient sampling set selection for bandlimited graph signals using graph spectral proxies. IEEE Transactions on Signal Processing, 64(14):3775–3789, 2016. [3] A. Banerjee, A. G. Chandrasekhar, E. Duflo, and M. O. Jackson. Gossip: Identifying central individuals in a social network. Technical report, National Bureau of Economic Research, 2014. [4] D. P. Bertsekas. Nonlinear Programming. Athena Scientific Belmont, 1999. 17 [5] C. Borgs, M. Brautbar, J. Chayes, S. Khanna, and B. Lucier. The power of local information In International Workshop on Internet and Network Economics, pages in social networks. 406–419. Springer, 2012. [6] M. Brautbar and M. J. Kearns. Local algorithms for finding interesting individuals in large networks. 2010. [7] D. Chen, L. Lü, M.-S. Shang, Y.-C. Zhang, and T. Zhou. Identifying influential nodes in complex networks. Physica A: Statistical Mechanics and Its Applications, 391(4):1777–1787, 2012. [8] P. R. Christian and G. Casella. Monte Carlo Statistical Methods. Springer New York, 1999. [9] A. S. Dalalyan. Theoretical guarantees for approximate sampling from smooth and log-concave densities. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 79(3):651– 676, 2017. [10] A. Frieze and W. Pegden. Looking for vertex number one. The Annals of Applied Probability, 27(1):582–630, 2017. [11] G. Grimmett and D. Stirzaker. Probability and Random Processes. Probability and Random Processes. OUP Oxford, 2001. [12] D. D. Heckathorn. Respondent-driven sampling: A new approach to the study of hidden populations. Social Problems, 44(2):174–199, 1997. [13] H. Hirai. Discrete convex functions on graphs and their algorithmic applications. In Combina- torial Optimization and Graph Algorithms, pages 67–100. Springer, 2017. [14] M. O. Jackson. Social and Economic Networks. Princeton University Press, 2010. [15] R. I. Kondor and J. Lafferty. Diffusion kernels on graphs and other discrete input spaces. In ICML, volume 2, pages 315–322, 2002. [16] D. A. Levin and Y. Peres. Markov Chains and Mixing Times, volume 107. American Mathe- matical Soc., 2017. [17] Y. Lin, L. Lu, and S.-T. Yau. Ricci curvature of graphs. Tohoku Mathematical Journal, Second Series, 63(4):605–627, 2011. [18] Y. Nesterov. A method of solving a convex programming problem with convergence rate o(1/k2). In Soviet Mathematics Doklady, volume 27, pages 372–376, 1983. [19] Y. Nesterov. Introductory Lectures on Convex Optimization: A Basic Course, volume 87. Springer Science & Business Media, 2013. [20] G. Puy, N. Tremblay, R. Gribonval, and P. Vandergheynst. Random sampling of bandlimited signals on graphs. Applied and Computational Harmonic Analysis, 2016. [21] M. Raginsky, A. Rakhlin, and M. Telgarsky. Non-convex learning via stochastic gradient Langevin dynamics: a nonasymptotic analysis. arXiv preprint arXiv:1702.03849, 2017. [22] D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, and P. Vandergheynst. The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Processing Magazine, 30(3):83–98, 2013. 18 [23] A. J. Smola and R. Kondor. Kernels and regularization on graphs. In Learning Theory and Kernel Machines, pages 144–158. Springer, 2003. [24] N. Tremblay, G. Puy, R. Gribonval, and P. Vandergheynst. Compressive spectral clustering. In International Conference on Machine Learning, pages 1002–1011, 2016. [25] N. K. Vishnoi. lx = b laplacian solvers and their algorithmic applications. Foundations and Trends in Theoretical Computer Science, 8(1–2):1–141, 2013. [26] U. Von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4):395–416, 2007. [27] Y.-X. Wang, J. Sharpnack, A. J. Smola, and R. J. Tibshirani. Trend filtering on graphs. Journal of Machine Learning Research, 17(105):1–41, 2016. [28] M. Welling and Y. W. Teh. Bayesian learning via stochastic gradient Langevin dynamics. In Proceedings of the 28th International Conference on Machine Learning, pages 681–688, 2011. [29] Y. Zhang, P. Liang, and M. Charikar. A hitting time analysis of stochastic gradient Langevin dynamics. arXiv preprint arXiv:1702.05575, 2017. 19
1709.02339
2
1709
2019-07-17T00:03:27
When Labels Fall Short: Property Graph Simulation via Blending of Network Structure and Vertex Attributes
[ "cs.SI" ]
Property graphs can be used to represent heterogeneous networks with labeled (attributed) vertices and edges. Given a property graph, simulating another graph with same or greater size with the same statistical properties with respect to the labels and connectivity is critical for privacy preservation and benchmarking purposes. In this work we tackle the problem of capturing the statistical dependence of the edge connectivity on the vertex labels and using the same distribution to regenerate property graphs of the same or expanded size in a scalable manner. However, accurate simulation becomes a challenge when the attributes do not completely explain the network structure. We propose the Property Graph Model (PGM) approach that uses a label augmentation strategy to mitigate the problem and preserve the vertex label and the edge connectivity distributions as well as their correlation, while also replicating the degree distribution. Our proposed algorithm is scalable with a linear complexity in the number of edges in the target graph. We illustrate the efficacy of the PGM approach in regenerating and expanding the datasets by leveraging two distinct illustrations. Our open-source implementation is available on GitHub.
cs.SI
cs
When Labels Fall Short: Property Graph Simulation via Blending of Network Structure and Vertex Attributes Pacific Northwest National Laboratory, Seattle, WA, Pacific Northwest National Laboratory, Richland, WA, Sutanay Choudhury Arun V. Sathanur USA [email protected] Cliff Joslyn USA [email protected] [email protected] Sumit Purohit USA USA [email protected] 9 1 0 2 l u J 7 1 ] I S . s c [ 2 v 9 3 3 2 0 . 9 0 7 1 : v i X r a Pacific Northwest National Laboratory, Seattle, WA, Pacific Northwest National Laboratory, Richland, WA, ABSTRACT Property graphs can be used to represent heterogeneous net- works with labeled (attributed) vertices and edges. Given a property graph, simulating another graph with same or greater size with the same statistical properties with respect to the labels and connectivity is critical for privacy preservation and benchmarking purposes. In this work we tackle the problem of capturing the statistical dependence of the edge connec- tivity on the vertex labels and using the same distribution to regenerate property graphs of the same or expanded size in a scalable manner. However, accurate simulation becomes a challenge when the attributes do not completely explain the network structure. We propose the Property Graph Model (PGM) approach that uses a label augmentation strategy to mitigate the problem and preserve the vertex label and the edge connectivity distributions as well as their correlation, while also replicating the degree distribution. Our proposed algorithm is scalable with a linear complexity in the number of edges in the target graph. We illustrate the efficacy of the PGM approach in regenerating and expanding the datasets by leveraging two distinct illustrations. Our open-source imple- mentation is available on GitHub 1. KEYWORDS Property Graphs, Attributed Graphs, Joint Distribution, Graph Generation, Label Augmentation, Label-Topology Correla- tion 1 INTRODUCTION Most real-world datasets that naturally lend themselves to a graph representation also contain significant amounts of label (or attribute) information. This situation is promoting the popularity of property graphs: multi-graphs where the 1https://github.com/propgraph/pgm vertices and edges are labeled with key-value pairs [10]. For example, the Microsoft Academic Graph has labels such as af- filiation, field of study, etc., for every person. These attributes help answer questions such as: 1) how strong are collabora- tions between two fields? 2) where is a person with a certain affiliation and field of study likely to publish most? Simi- lar motivating examples are abound in other domains such as bioinformatics (protein-interaction networks), medicine (clinical records) and cyber-security (network-traffic data). The need for accurate and scalable simulation arises as an important capability for property graphs. We often need to re-generate datasets with equivalent properties for privacy reasons, or expand a dataset by multiple orders of magnitude for benchmarking studies. THE PROBLEM In this work we consider the problem of capturing the relationships between given and (in general) correlated vertex labels and edge connectivity in property graphs through the use of two different joint distributions. We show that a straightforward approach to capturing the label-structure relationships can be accuracy-limited when the given labels cannot explain the structure completely. We mitigate this problem by modeling the dependence of the edge connectivity on the vertex labels and the structure itself via the introduction of an augmented label that categorizes the vertex degree distribution. We demonstrate the modeling of graphs with vertices of the same type, connected by one specific type of relationship. General property graphs with heterogeneous vertices and multiple relationships can be mod- eled by introducing vertex types as new labels and building multiple distributions for the typed edges. CONTRIBUTIONS Our Property Graph Model (PGM) re- tains the generative nature of the Multiplicative Attribute Graph (MAG) model [4] by expressing the probability of edge connection as a function of the vertex labels. However, while MAG deals with latent labels, PGM caters to correlated, meaningful real-world labels. In this way it is similar to the Attribute Graph Model (AGM) approach [8]. PGM has the added benefit of not needing to assume a model for the graph topology, making it general enough to model property graphs across domains. The use of label and edge categories to define multinomial distributions provides for a scalable implemen- tation linear in the number of edges required in the target dataset. Finally, we demonstrate our results on two datasets: a synthetic dataset generated by a role-based approach [3] and a real-world dataset extracted from the Facebook Social Graph [5]. 1, li 2, . . . , li k , . . . , li M ¯L(vi) =(cid:10)li (cid:11) drawing a label value li 2 THE BASIC PGM APPROACH Consider a source property graph GS = ⟨VS , ES , L, L(VS)⟩ with the set of vertices VS and the set of edges ES ⊆ VS × VS . L = {Lk}M k =1 is a set of M vertex label sets. Associated with the kth label is Lk , the set of possible label values for that label and nk = Lk . For example, in a social graph, the first label, Income-Range, may have 6 possible values where as the second label, Education-Level, may have 4 possible values. Associated with each vertex vi ∈ VS is a random M-vector k ∈ Lk , for each of the M labels. We denote by L(VS), the set of all the VS label value vectors in one to one correspondence with the set of vertices VS .The target property graph GT = ⟨VT , ET , L, L(VT)⟩ is defined analogously, and is generated by capturing appropriate statistics on GS . Note that both GS and GT share the same set of vertex labels L. Each realized vertex label vector ¯L(vi) can be considered as a draw from the set of joint label assignments L = M k =1 Lk . k =1 nk possible joint label assignments called label categories and the jth label category is denoted by cj. In doing so, we flatten the joint distribution to a multi- nomial label distribution PL over these N categories such that j=1 pj = 1. With the observations of the pj = PL vertex labels in the source dataset GS , we can estimate the parameters pj via the maximum-likelihood method as There are N = M (cid:1), andN (cid:0)cj i =1 1cj(¯L(vi)) VS . (1) (cid:1) = (cid:0)cj  PL VS Here the indicator function is 1 only when the label vector for vertex i is equal to the joint label category cj. over pairs of label categories (cid:0)cj , cj′(cid:1) which we call edge Next, we model the edge connectivity by a joint distribution categories. We denote this distribution by PC. PC is defined over the sample space L × L and has one entry per pair of label vector realizations. PC can be estimated from data as ⟨vi,vi′⟩∈ES 1(cj,cj′)(cid:0)¯L(vi), ¯L(vi′)(cid:1) (cid:0)(cid:0)cj , cj′(cid:1)(cid:1) = PC ES . (2) 2 2 Here the indicator function is 1 only when the two vertices vi and vi′ have an edge between them and their label vectors take on categories cj and cj′ respectively. Note that for undirected graphs, where the order of cj and cj′ does not matter, PC can be represented as a more compact multinomial distribution (cid:1) categories. When we draw an edge from PC, with N =(cid:0)N the successful category gives the vertex label categories cor- responding to the two end points that form the edge. Using a data structure such as a map (C2V in Algorithm 1), the participating vertices can be randomly drawn from the pools of vertices corresponding to those label categories. Drawing the edges from the multinomial distribution PC renders the algorithm linear in the number of edges required as opposed to a naive implementation over vertex pairs which will lead to an algorithm that is quadratic in the number of vertices required. Algorithm 1 describes the basic PGM approach. Algorithm 1 The input to the algorithm is the source property graph dataset DS and the number of vertices and edges in the target property graph - nt = VT and mt = ET . The output is the target property graph ⟨VT , ET , L, L(VT)⟩. 1: procedure PGM-BASIC(DS , nt , mt ) ⟨VS , ES , L, L(VS)⟩ = processSourceDataSet (DS) 2: GT = SIMATTRGRAPH(⟨VS , ES , L, L(VS)⟩ , nt , mt ) 3: 4: end procedure 5: procedure SIMATTRGRAPH(⟨V , E, L, L(V)⟩ , nt , mt ) PL = computeV ertexLabelDist (V , L(V)) 6: PC = computeEdдeConnectivityDist (V , E, L(V)) 7: VX = ϕ, L(VX) = ϕ, EX = ϕ 8: for idx = 1 to nt do 9: 10: 11: (cid:0)v, ¯L(v)(cid:1) = sampleFromMultiNomialDist (PL) VX = VX ∪ {v}, L(VX) = L(VX) ∪(cid:8)¯L(v)(cid:9) categories for i = 1 to N do ▷ Create map C2V for all N C2V [ci] = Set of all vertices with label category for idx = 1 to mt do ▷ Draw one edge at a time [c1, c2] = sampleFromMultiNomialDist(PC) Draw v1 and v2 at random from C2V [c1] and EX = EX ∪ {(v1, v2)} return ⟨VX , EX , L, L(VX)⟩ C2V [c2] 17: 18: 19: end procedure 12: 13: 14: 15: 16: ci Lines 6 and 7 compute the label and edge connectivity dis- tributions PL and PC from the source graph dataset GS . Lines 9-11 sample from the distribution PL, the vertex label set L(VT) for the target graph. Lines 14-17 construct the edge set ET by drawing one edge at a time by sampling from a multi- nomial distribution over the edge categories. The resultant vertices to be connected are drawn at random from the sets of vertices corresponding to the label categories obtained from the edge category. Self and repeated edges can be removed by post-processing. 3 WHEN LABELS FALL SHORT We use two example graphs with contrasting properties to illustrate the strengths and limitations of the PGM method. The first example is a role-based graph [3] such as an enter- prise network where the connectivity depends on roles that the vertices serve [2]. Thus, it is possible that there is a high chance of an edge between a SERVER-CLIENT pair while the chance of an edge between a SERVER-SERVER or a CLIENT-CLIENT pair is small. By considering two binary labels that can explain the edge connectivity, we synthesized a role-based graph with 2000 vertices and 90,000 undirected edges. Our next example consists of an anonymized Facebook social graph from the SNAP website [5]. The data is available as a number of ego-nets, each associated with a large number of binary vertex features that vary across the ego-nets. We collected the 4 labels that were common to all vertices across the ego-nets and leveraged the combined graph for our ex- periments. The graph has around 4000 vertices and 88,000 undirected edges with nearly a power-law degree distribution. We then run the steps presented in Algorithm 1 to re- generate target property graphs of same size as the source property graphs. We compare the distributions PL and PC. The design of the algorithm ensures that PL and PC for the source and target distributions will match well in expectation and the same was verified. We also quantify the comparison with respect to the degree distributions between the ground truth graph and the regenerated graph by means of the Jenson- Shannon Divergence (JSD) measure [6]. JSD is small when the distributions are closer to each other. The results for both the example datasets are shown in Figure 1. The top sub-figure shows the degree distribution comparisons between the source and regenerated versions of the role-based graph, for which there is a very good match. The degree distribution is plotted as a complementary cumu- lative distribution function (CCDF). The bottom sub-figure shows comparisons for the Facebook graph (on a log-log scale) for which we don't see a good match. The joint distribution based approach that we described in Algorithm 1 assumes that the edge connectivity is a function of label values alone.This assumption is often violated in the case of real-world datasets rendering the basic PGM approach ineffective in recovering the structural properties such as the degree distributions. It might be impossible to identify and collect all the vertex labels that can explain the graph structure. Even if all the possible labels can be collected, it is possible that the graph is grown temporally and as a result, when new vertices arrive and form edges, the connectivity is not only dependent on the label combination pairs but also on Figure 1: Top: Degree distribution comparison (linear scale) for the scenario where the graph structure is fully explained by the given labels. (JSD = 0.036). Bottom: De- gree distribution comparison (log-log scale) for the Face- book graph where the graph structure is not fully ex- plained by the given labels (JSD = 0.354) the structure of the graph itself at the time point of their arrival. The next section bridges this gap and extends the PGM approach to replicate the topological features under limited label information. 4 LABEL AUGMENTATION TO RESCUE In [7], the authors introduce the notion that the probability of edge formation between a new vertex and a vertex already present in the graph is dependent on both the similarity be- tween the two vertices and the popularity of already present vertex. The similarity notion refers to affinity based on vertex attributes. The popularity notion captures phenomena such as preferential attachment where vertices tend to get attached to popular vertices which are vertices with existing high degree values. Strict role-based networks such as communication networks will favor similarity while networks such as social networks will favor a combination of similarity and popular- ity. In the case of the PGM approach, the joint distribution implicitly encodes and generalizes the notion of similarity by quantifying the average likelihood of edge connectivity between all possible pairs of label categories (not necessarily between vertices having the same label categories). The label augmentation process that we describe next, will bring in the popularity aspect into the PGM approach. Adopting the above philosophy, in order to better match the degree distribution of the given graph, we propose to aug- ment the given set of labels with an additional label La that describe the vertex popularity. The number of values that this additional label can take on is denoted by na, corresponding 3 The same is reflected in the observation that the JSD measure decreases with increasing na. 5 DATASET EXPANSION Next we consider the expansion of the dataset by using the estimated joint distributions of the vertex labels and the edge connectivity, PL and PC respectively. The results are illus- trated in Figure. 3 for both the role-based and the Facebook graphs. The number of vertices were expanded by 10X where as the number of edges were expanded by 12.5X. It's clear from the observed results that the PGM approach in its ba- sic or extended form works well in expanding the attributed graphs and preserves the degree distribution shapes. Lever- aging a serial implementation, we generated graphs with 1 million vertices, 31 million edges and total of 16 vertex label categories (2 binary labels and an augmented label with 4 values) in about 42 minutes on a 2.6GHz Mac workstation. Drawing of independent edges facilitates easy parallelization of the code which is ongoing. to the division of the range of the degree values for the given graph GS into na intervals. Vertex-specific label values for are assigned based on the interval in which a given vertex degree falls. We then run an iterative procedure by increment- ing na by 1 at each step till an error measure over the source and target distributions of structural properties of interest is acceptable. In each iteration, the interval lengths can be opti- mally adjusted by means of an optimizer to minimize the error metric. Note that both the distributions PL and PC without La will be retained as before due to the marginalization property of the joint probability mass functions. Algorithm 2 reflects the updated flow. Algorithm 2 The updated approach that uses label augmen- tation. This algorithm calls the simAttrGraph procedure in Algorithm. 1. 1: ⟨VS , ES , L, L(VS)⟩ = processDataSet (DS) 2: na ← 1 ▷ na is the number of intervals in degree range 3: error ← ∞ 4: procedure PGM-AUGMENTED(⟨VS , ES , L, L(VS)⟩ , nt , mt ) 5: 6: 7: na ← na + 1 Divide degree range of the source graph into na for each v ∈ VS do while (error > tolerance) do intervals Assign la(v) value based on the degree(v) Append the label vector ¯L(v) with la(v) 8: 9: 10: 11: GRAPH(⟨VS , ES , L, L(VS)⟩ , nt , mt ) GT error ← computeError (GS , GT) = 12: 13: end procedure SIMATTR- Figure 2: Degree distribution comparison (log-log) be- tween the Facebook graph and the simulated graph with augmented label La and for various values of na. In our experiments, for a given value of na, we assigned the interval lengths based on a logarithmic scale and the end- points of the intervals were fixed. For the Facebook graph, the results of augmenting with La with na = 0,2,4,8 are shown in Figure 2. As seen the reproduction of the degree distribu- tion is very poor without augmentation (na = 0) and gets progressively better with augmentation and by increasing na. 4 Figure 3: Comparing degree distributions shapes for a 10X dataset expansion. Top : Role-based graph. Bottom : Facebook graph with 8 label values for the augmented label (log-log scale). 6 RELATED WORK Synthetic generation of property graphs is a nascent area of research when compared to models for network topologies. Approaches based on exponential random graph (ERG) [9] model the link probability as a linear model in a number of topological features. While such formulations are general enough to accommodate vertex labels, these methods have high computational cost beyond a few thousand vertices [8]. The Multiplicative Attribute Graph (MAG) approach models [2] PY Chen, S. Choudhury, and A. Hero. 2016. Multi-centrality graph spectral decompositions and their application to cyber intrusion detec- tion. In IEEE ICASSP. [3] K. Henderson and et al. 2012. Rolx: structural role extraction & mining in large graphs. In ACM SIGKDD. [4] M. Kim and J. Leskovec. 2012. Multiplicative attribute graph model of real-world networks. Internet Mathematics 8, 1-2 (2012). [5] J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Net- work Dataset Collection. http://snap.stanford.edu/data. (June 2014). [6] J. Lin. 1991. Divergence measures based on the Shannon entropy. IEEE Transactions on Information theory 37, 1 (1991), 145 -- 151. [7] F. Papadopoulos and et al. 2012. Popularity versus similarity in growing networks. Nature 489, 7417 (2012), 537 -- 540. [8] J.J Pfeiffer III and et al. 2014. Attributed graph models: Modeling network structure with correlated attributes. In WWW. ACM. [9] G. Robins and et al. 2007. An introduction to exponential random graph (p*) models for social networks. Social networks 29, 2 (2007). [10] M. Simeonovski and et al. 2017. Who Controls the Internet?: Analyzing Global Threats Using Property Graph Traversals. In WWW. the link probability between two vertices in terms of affinities along a number of independent vertex level latent labels. How- ever, MAG's drawback also lies in its reliance on latent labels. Generating vertex labels as observed in the data becomes difficult in a latent label based approach [8]. An alternate approach is presented in Attributed Graph Model (AGM) [8] that combines two sources of information: a) it learns the correlation between vertex labels and the graph structure, and b) exploits a known generative model for the graph topol- ogy in the form or Kronecker Product Graph Model or the Chung-Lu model. The AGM approach can perform well in replicating the graph topology and the correlation with the label values for any given set of labels. However the approach is agnostic to the explanatory power of the labels. Further, modeling and expanding arbitrary property graph datasets can be a challenge with the AGM approach that relies on specific models for the graph topology. In a recent work [1] the authors focus on the problem of cloning social networks in a privacy preserving fashion. The authors use preferential attachment model to generate the graph, followed by genetic algorithms to align the statistical distribution of attributes in the source and derived dataset. The use of optimization process in conjunction with the preferential attachment based model limits the applicability and scalability of this approach. 7 CONCLUSIONS AND ONGOING WORK We present a property graph generation algorithm that bridges two state of the art approaches, [4] and [8], by leveraging on their strengths, and addresses their respective weaknesses in modeling realistic property graphs. We initiate the simulation with observed labels and then introduce an augmented label to explain when the connectivity is not explained by the given set of labels. Our approach reproduces or expands property graphs with a single edge relation and homogeneous vertices while being able to match the degree distributions closely. We are addressing several theoretical and implementation challenges as part of ongoing research. They include sup- porting heterogeneous vertices and relationships, better label augmentation strategies for large-scale dataset expansion and preservation of properties beyond degree distribution. ACKNOWLEDGMENTS This research was supported by the High Performance Data Analytics program at the Pacific Northwest National Labora- tory (PNNL). PNNL is a multi- program national laboratory operated by Battelle Memorial Institute for the US Depart- ment of Energy under DE-AC06- 76RLO 1830. REFERENCES [1] A. M. Ali and et al. 2014. Synthetic Generators for Cloning Social Network Data. In International Conference on Social Informatics. Cam- bridge, MA. 5
1211.6512
1
1211
2012-11-28T03:45:14
Using Friends as Sensors to Detect Global-Scale Contagious Outbreaks
[ "cs.SI", "physics.soc-ph" ]
Recent research has focused on the monitoring of global-scale online data for improved detection of epidemics, mood patterns, movements in the stock market, political revolutions, box-office revenues, consumer behaviour and many other important phenomena. However, privacy considerations and the sheer scale of data available online are quickly making global monitoring infeasible, and existing methods do not take full advantage of local network structure to identify key nodes for monitoring. Here, we develop a model of the contagious spread of information in a global-scale, publicly-articulated social network and show that a simple method can yield not just early detection, but advance warning of contagious outbreaks. In this method, we randomly choose a small fraction of nodes in the network and then we randomly choose a "friend" of each node to include in a group for local monitoring. Using six months of data from most of the full Twittersphere, we show that this friend group is more central in the network and it helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we could with an equal-sized randomly chosen group. Moreover, the method actually works better than expected due to network structure alone because highly central actors are both more active and exhibit increased diversity in the information they transmit to others. These results suggest that local monitoring is not just more efficient, it is more effective, and it is possible that other contagious processes in global-scale networks may be similarly monitored.
cs.SI
cs
Using Friends as Sensors to Detect Global-Scale Contagious Outbreaks Manuel Garcia-Herranz1, Esteban Moro Egido2,3,4, Manuel Cebrian5,6,7, Nicholas A. Christakis8,9, James H. Fowler 10,11 1 Escuela Politécnica Superior, Universidad Autónoma de Madrid, Madrid 28049, Spain 2Departamento de Matematicas & GISC, Universidad Carlos III de Madrid, 28911 Leganés, Spain 3 Instituto de Ingeniería del Conocimiento, Universidad Autónoma de Madrid, Madrid 28049, Spain 4Instituto de Ciencias Matemáticas CSIC-UAM-UCM-UC3M (ICMAT), 28049, Madrid, Spain 5 Computer Science & Engineering Department, University of California, San Diego, CA 92093, USA 6 Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA 7 National Information and Communications Technology Australia, Melbourne, Victoria 3010, Australia 8 Department of Sociology, Harvard University, Cambridge, MA 02138, USA 9 Department of Medicine, Harvard Medical School, Boston, MA 02115, USA 10 Medical Genetics Division, School of Medicine, University of California, San Diego, CA 92103, USA 11 Political Science Department, University of California, San Diego, CA 92103, USA * Corresponding Author: JHF, [email protected] Recent research has focused on the monitoring of global-scale online data for improved detection of epidemics1,2,3,4, mood patterns5,6, movements in the stock market7 political revolutions8, box-office revenues9, consumer behaviour3,10 and many other important phenomena. However, privacy considerations and the sheer scale of data available online are quickly making global monitoring infeasible, and existing methods do not take full advantage of local network structure to identify key nodes for monitoring. Here, we develop a model of the contagious spread of information in a global-scale, publicly-articulated social network and show that a simple method can yield not just early detection, but advance warning of contagious outbreaks. In this method, we randomly choose a small fraction of nodes in the network and then we randomly choose a “friend” of each node to include in a group for local monitoring. Using six months of data from most of the full Twittersphere, we show that this friend group is more central in the network and it helps us to detect viral outbreaks of the use of novel hashtags about 7 days earlier than we could with an equal-sized randomly chosen group. Moreover, the method actually works better than expected due to network structure alone because highly central actors are both more active and exhibit increased diversity in the information they transmit to others. These results suggest that local monitoring is not just more efficient, it is more effective, and it is possible that other contagious processes in global-scale networks may be similarly monitored. Modern social, informational, and transactional platforms offer a means for information to spread naturally (e.g, as in the case of the “Arab Spring”11), and there is increasing interest in 1 using these systems to intentionally promote the spread of information and behaviour12,13,14,15. They they also yield a brand-new and large-scale global view of social interactions and dynamics of formerly hidden phenomena16. However, the advent of global monitoring has recently heightened concerns about privacy17 and scholars have shown that anonymization is insufficient to guarantee it18. Thus, future efforts to monitor global phenomena may be restricted to analysis at a local scale4,19. Moreover, the explosive growth of online data has made it more and more difficult to perform a complete global analysis. As a result, scholars are beginning to develop local methods that sample small but relevant parts of the system20,21 . Here, we elaborate a new sampling technique that takes advantage of the local structure inherent in large-scale online social networks, and we use it to test an important hypothesis about social contagion. If a message is transmitted via broadcast, then all individuals in a network are equally likely to receive it. On the other hand, if a message is transmitted from person to person to person via contagion, then individuals at the centre of a network are likely to receive it sooner than randomly-chosen members of the population because central individuals are a smaller number of steps (degrees of separation) away from the average individual in the network22,23. As a result, for contagious processes, we would expect the S-shaped cumulative “epidemic curve”24 to be shifted to the left (forward in time) for centrally located individuals compared to the population as a whole. If so, then the careful collection of information from a sample of central individuals within human social networks could be used to detect contagious outbreaks before they happen in the population at large22. We call this the sensor hypothesis. In fact, the very discrepancy in the time to infection between central and randomly-chosen individuals could serve as a means to distinguish between broadcast and contagion mechanisms, either ex post by comparing their 2 mean times of infection or in real time by looking for the first day in which there is a significant difference in their cumulative incidences. Using 6 months of data from Twitter recorded in 2009, we analyse a network containing 40 million users around the world who are connected by 1.5 billion directed relationships (“follows”). Over six months, these users sent nearly half a billion messages (“tweets”), of which 67 million contained a user-supplied topic keyword called a “hashtag.” These hashtags are prefixed by a pound sign (“#”) and are used to denote unique people, events, or ideas, making them useful for studying the spread of information online25,26,27. To test the sensor hypothesis, we need a sample of individuals with higher network centrality (the “sensor” group) to compare with a sample of randomly-chosen individuals (the “control” group). However, measuring centrality can be a computationally expensive task in large-scale networks like Twitter. Therefore, we use a simplified approach that first randomly selects a set of users for the control group, and then randomly chooses one “friend” of each member of this group to put in the sensor group. This procedure generates a sensor group with higher centrality than the control group because of the “friendship paradox”: high-degree individuals are more likely to be connected to a randomly chosen person than low-degree individuals22,28. In other words, “your friends have more friends than you do.”29 In Fig.1a we demonstrate that the sensor group contains more high degree individuals and fewer low degree individuals, and this is true even if we remove duplicates from the sensor group (duplicates occur when the same person is randomly chosen as a friend by multiple individuals in the control group). However, this difference between the sensor and control groups depends on what fraction of the network is sampled. As the fraction increases, there is increasing overlap between the two groups, reducing the difference in their degree distributions (Fig.1b). We derive closed form equations that characterize the expected degree distribution for both the 3 sensor groups (with and without duplicates) and control groups based on the fraction of nodes sampled and an arbitrary known degree distribution for the network as a whole (see SI). Fig.1c,d show that these equations fit the data well for a random sample of 1.25% of all users (500,000 total) on Twitter, confirming our expectation that the sensor group is more central than the control group. To test whether sensors can provide early warning of a contagious message spreading through the network, suppose tα denotes the time at which a sampled user i first mentions hashtag α (i.e i the infection time). We would expect tα to be smaller on average for users belonging to a i central sensor group S than for those of a random control group C. If we denote i 〉i∈S−〈tα Δtα=〈tα i 〉i∈C for hashtag α, the sensor hypothesis is that Δtα<0. However, note that Δtα depends on the size of the samples in two ways. For small samples, the number of “infected” users (i.e. users mentioning hashtag α) will be scarce, leading to large statistical errors. On the other hand, for big samples, the degree distribution the of control and sensor groups tend to overlap and consequently Δtα approaches 0. Therefore it may be necessary to find an optimal “Goldilocks” sample size that gives statistical power while still preserving the high-centrality characteristic of the sensor group. Fig.2a shows results from a theoretical simulation of an infection30 spreading in a synthetic network (see SI) while Fig.2b shows an empirical analysis of widely used hashtags in our Twitter database. Both theory and data suggest that there exists an optimal (and moderate) sample size that may perform best for detecting large and significant differences between the sensor and control group resulting from contagious processes. 4 To analyse the performance of the sensor mechanism, we collected five random control samples of 50,000 users and a random set of their followees of the same size to use as sensors for each one. Focusing on the 32 most widespread hashtags that appear at least 10 times in each control sample, Fig.2c shows that Δtα is negative (i.e., the sensor sample uses the hashtag prior to the control sample) in all but two cases , with a mean for all hashtags of –7.1 days (SEM 1.1 days). In the SI we also show this distribution for a wider range of hashtags, and these all show that Δtα tends to be negative. In other words, the sensor groups provide early warning of the usage of a wide variety of hashtags. We also hypothesized that comparative monitoring of a sensor group and a control group may help distinguish which hashtags are spreading virally via a contagious process and which are spreading via broadcast. We studied 24 hashtags (Fig.3a) that were “born” during our sample period (they first appeared at least 25 days after the start date of data collection) and then became widely used (they were eventually used more than 20,000 times). Notably, the users using these hashtags tended to be highly connected and many were connected to a giant component, a sign that the hashtags may have spread virally online from user to user (see Fig.3d and SI for more examples). For each of these hashtag networks, we constructed a random control sample of 5% its size and a similarly-sized sensor sample of their followees to calculate Δtα. We then repeated this process 1,000 times to generate a statistical distribution of these observed lead times (Fig.2b). Δtα < 0 ) 79.9% (SE 1.2%) of the time. However, note The sensor group led the control group ( that there was considerable variation in lead times, from 20 days to a few hours or no advance warning. 5 To see how the sensor method works for hashtags that are not spreading virally, we generated a null distribution in which we randomly shuffled the time of each hashtag use within the fully observed data, and then measured the resulting difference in the sensor and control group samples, . Again, we repeated the procedure 1,000 times to generate a statistical distribution (see SI). The results show that the observed distribution of lead times falls outside the null distribution for 65.4% (SE 1.2%) of the hashtags, suggesting they did, in fact, spread virally (Fig.3a). Most hashtags also showed a shift forward in their daily and cumulative incidence curves of the sensor group compared to the control one (Fig.3c,d). This shift forward, another sign of virality in itself, could allow for identification of an outbreak in advance, as the sensor’s deviation from the trajectory of the control group identifies a process that is spreading through the network, affecting central individuals faster than random ones. Estimating the models each day using all available information up to that day, for #openwebawards users, we find two consecutive days of significant (p<0.05) lead time by the sensor group compared to the control group on day 13, a full 15 days before the estimated peak in daily incidence (see SI), and also 15 full days before the control sample reaches the same incidence as the sensor group (See Figure 3c). Finally, while the sensor mechanism allows us to identify a more central group that can be used to detect contagious outbreaks in advance, it may also allow us to focus on users who have other characteristics that could improve monitoring. In particular, users in the sensor group may be more central because they are more active, and indeed we find this to be true (Fig.4a). On average, users in the sensor group sent 154 tweets (SE 2.8) during the six months they were monitored, while users in the control group tweeted only 55 times (SE 1.0, difference of means t 6 = 36, p < 2.2e-16). However, we also find that more central users tend to use a greater variety of hashtags, even controlling for activity levels (Fig.4b). The distribution of the number of users using any one hashtag follows a heavy tailed distribution (see SI) with most hashtags being used by less than a few hundred people and very few reaching the tens of thousands. Therefore, for most hashtags, the probability of finding sufficient users to perform a significant analysis in a random sample of Twitter is very small. Yet despite the relatively small size of the infected populations, the sensor mechanism we test here seems to anticipate the global spread of information in a wide variety of cases. And, importantly, it only requires a tiny fraction of the network as a whole to be monitored. We believe that this method could be applied in a wide variety of contexts in which scholars, policy-makers, and companies are attempting to use “big data” online to predict important phenomena. For example, the sensor method could be used in conjunction with online search to improve surveillance for potential flu outbreaks22,2. By following the online behaviour of a group known to be central in a network (for example, based on e-mail records which could be used to construct a friend sensor group), Google or other companies that monitor flu-related search terms might be able to get high-quality, real-time information about a real-world epidemic with greater lead time, giving public health officials even more time to plan a response. Similarly, policy-makers could monitor global mood patterns6 to anticipate important changes in public sentiment that may influence economic growth, elections, opposition movements, or even political revolutions8. We also conjecture that investors might use these methods to better predict movements in the stock market7. How much advance detection would be achieved in other contexts or in populations of different size or composition remains unknown. Just as we find variation in lead time for different hashtags, we expect that the ability of the sensor method to detect outbreaks early, and 7 how early it might do so, will depend on intrinsic properties of the phenomenon that is spreading; how this is measured; the nature of the population, including the overall prevalence of susceptible or affected individuals; the number of people in the sensor group; the topology of the network (for example, the degree distribution and its variance, or other structural attributes)23; and other factors, such as whether the outbreak modifies the structure of the network as it spreads (for example, by affecting the tendency of any two individuals to remain connected after the information is transmitted). In future work, we hope to explore these factors in order to generalize the conditions under which friends can be used effectively as sensors to detect contagious outbreaks. Acknowledgements This research was supported by a grant from the National Institute on Aging (P-01 AG-031093) and by a Pioneer Grant from the Robert Wood Johnson Foundation. 8 Figure 1: Twitter exhibits the “friendship paradox”: a) Expected degree distributions for a 1.25% random sample of the Twitter network (black line), friends of this randomly chosen group (red line), and the same friends group with duplicates removed (blue line); b) Larger samples of friends show a smaller difference in degree distribution from the overall network (black = overall network, red = 25% sample, green = 7.5% sample, blue = 1.25%); c) and d) Respectively, In-degree (follower) and out-degree (followee) distribution of a random sample of 500,000 users, 1.25% of Twitter’s users (the “control” group, black line) and the theoretical (red line) and observed (blue line) in-degree and out-degree distributions of their friends (the “sensor” group) with duplicates from the friends group removed. 9 Figure 2: Friends as sensors yield early detection of the use of hashtags. a) Measures of lead times based on simulations of an infection spreading through a network with infection probability λ=0.1 and recovery probability γ=0.01 on a Barabasi-Albert random network with tail exponent β>3 show that a sensor group tends to provide earlier warning than a randomly-chosen control group in smaller samples, but decreasing sampling variation in larger sample sizes means that the statistical likelihood of providing early warning is maximized in moderately-sized samples. b) Observed results for hashtags on Twitter used by 1% of the individuals using a hashtag of each sample. c) Average lead time of first usage of each hashtag in the sensor group vs. the control group for all hashtags used by at least 10 users in each of 5 random samples of 50,000 random users. 10 Figure 3: Signs of virality in hashtag usage. a) The average lead for the 24 most-used hashtags time across 1,000 trials of the sensor group (in blue) vs. the same calculated lead time when all times of first usage are randomly shuffled (in red). Vertical bars are SEM.; b) daily incidence and c) cumulative daily incidence for the hashtag #openwebawards show a shift forward in the S-shaped epidemic curve and a burst in the sensor group relative to the control group that could be used to predict the outbreak of this hashtag on the 13th day (the first day on which, using all available information up to that day , there is a significant difference between the sensor and control groups with p-value < 0.05), 15 days before the control group reaches the same cumulative incidence and before the estimated peak in daily incidence; d) greatest connected component of the follower network of users using the #openwebawards hashtag shows that many users are connected in a large component. 11 Figure 4. Users in the sensor group (blue) are more active (a) and also use a wider variety of hashtags (b) than those in the control group (red), even controlling for activity. These attributes both contribute to early warning provided by the sensor group’s structural position. 12 References [1] Ginsberg J, Mohebbi MH, Patel RS, Brammer L, Smolinski MS, et al. (2009) Detecting influenza epidemics using search engine query data. Nature 457. [2] Achrekar, H., Gandhe, A., Lazarus, R., Yu, S.H. & Liu, B. (2011). Predicting flu trends using twitter data. IEEE Computer Communications Workshops (INFOCOM WKSHPS), 702–707. [3] Goel S., Hofman JM., Lahaie S., Pennock DM & Watts DJ. (2010) Predicting consumer behaviour with Web search. Proceedings of the National Academy of Sciences 107 (41), 17486-17490 [4] Salathé M, Bengtsson L, Bodnar TJ, Brewer DD, Brownstein JS, et al. (2012) Digital Epidemiology. PLoS Comput Biol 8(7) [5] Dodds P. S. & Danforth C. M. (2010) Measuring the happiness of large-scale written expression: Songs, blogs, and presidents. J. Happiness Stud. 11, 441. [6] Golder, S.A. & Macy, M.W. (2011). Diurnal and seasonal mood vary with work, sleep, and day length across diverse cultures. Science, 333(6051), 1878–1881. [7] May, R., Levin, S. & Sugihara G. (2008). Complex systems: Ecology for bankers. Nature 451, 893–895 [8] González-Bailón, S., Borge-Holthoefer, J., Rivero, A. & Moreno, Y. (2011). The Dynamics of Protest Recruitment through an Online Network. Scientific reports, Nature. [9] Asur S. & Huberman BA. (2010) Predicting the future with social media. arXiv preprint arXiv:1003.5699. [10] Robust dynamic classes revealed by measuring the response function of a social system, Riley Crane and Didier Sornette, PNAS October 14, 2008 vol. 105 no. 41 15649-15653 [11] Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce & Danah Boyd. (2011). The Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian Revolutions. International Journal of Communications 5, Feature 1375–1405. [12] Bond, R.M., Fariss, C.J., Jones, J.J., Kramer, A.D.I., Marlow, C., Settle, J.E. & Fowler, J.H. (2012) A 61-million-person experiment in social influence and political mobilization. Nature 489, 7415, 295–298. [13] Centola, D. (2010) The spread of behaviour in an online social network experiment. Science 329, 5996, 1194-1197. [14] Aral, S. & Walker, D. (2012). Identifying Influential and Susceptible Members of Social Networks. Science, Vol. 337 no. 6092 pp. 337–341. [15] Boyd, D. & Crawford K. (2011) Six provocations for big data. [16] Leskovec J., Backstrom L. & Kleinberg J.. (2009) Meme-tracking and the dynamics of the news cycle. Proc. 15th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining. [17] Gross R. & Acquisti A. (2005) Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 71-80. [18] Backstrom L., Dwork C. & Kleinberg, J. (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. Proceedings of the 16th ACM international conference on World Wide Web, 181-190. [19] Lazer D., Pentland AS., Adamic L. & Aral S. (2009) Life in the network: the coming age of computational social science. Science. [20] Brautbar, M & Kearns, M. (2010) Local algorithms for finding interesting individuals in large networks. Innovations in Computer Science. [21] The Power of Local Information in Social Networks, Christian Borgs, Michael Brautbar, Jennifer Chayes, Sanjeev Khanna, Brendan Lucier, arXiv:1202.6033 [cs.SI] [22] Christakis, N.A., & Fowler, J.H. (2010). Social network sensors for early detection of contagious outbreaks. PLoS ONE, 5(9), e12948. [23] Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E. & Makse, H.A. (2010) Identification of influential spreaders in complex networks. Nature Physics 6, 11, 888-893. [24] Ross R. (1915). Some a priori pathometric equations. Br Med J. 1(2830), 546–7. [25] Huang, J., Thornton, K.M. & Efthimiadis, E.N. (2010). Conversational tagging in twitter. Proceedings of the 21st ACM conference on Hypertext and hypermedia, 173–178. [26] Yang, J. & Leskovec, J. (2011). Patterns of temporal variation in online media, Proceedings of the fourth ACM international conference on Web search and data mining, 177–186. [27] Romero, D.M. and Meeder, B. and Kleinberg, J. (2011). Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on Twitter. Proceedings of the 20th international conference on World wide web. 695–704. [28] Liu YY., Slotine JJ. & Barabási AL. (2012) Control Centrality and Hierarchical Structure in Complex 13 Networks. PLoS ONE 7(9) [29] Feld, S. (1991). Why your friends have more friends than you do. The American Journal of Sociology, 96(6), 1464–1477. [30] Kermack, W.O. & McKendrick, A.G. (1927) A Contribution to the Mathematical Theory of Epidemics, Proceedings of the Royal Society of London. Series A, Vol. 115, 700-721. 14 Supplemental Information for Using Friends as Sensors to Detect Global-Scale Contagious Outbreaks Manuel Garcia-Herranz1, Esteban Moro Egido2,3,4, Manuel Cebrian5,6,7, Nicholas A. Christakis8,9, James H. Fowler10,11,* 1 Escuela Politécnica Superior, Universidad Autónoma de Madrid, Madrid 28049, Spain 2Departamento de Matematicas & GISC, Universidad Carlos III de Madrid, 28911 Leganés, Spain 3 Instituto de Ingeniería del Conocimiento, Universidad Autónoma de Madrid, Madrid 28049, Spain 4Instituto de Ciencias Matemáticas CSIC-UAM-UCM-UC3M (ICMAT), 28049, Madrid, Spain 5 Computer Science & Engineering Department, University of California, San Diego, CA 92093, USA 6 Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA 7 National Information and Communications Technology Australia, Melbourne, Victoria 3010, Australia 8 Department of Sociology, Harvard University, Cambridge, MA 02138, USA 9 Department of Medicine, Harvard Medical School, Boston, MA 02115, USA 10 Medical Genetics Division, School of Medicine, University of California, San Diego, CA 92103, USA 11 Political Science Department, University of California, San Diego, CA 92103, USA * Corresponding Author: JHF, [email protected] Table of Contents An Analytic Elaboration of the Friendship Paradox .................................................................... 16 The Twitter Data .......................................................................................................................... 17 Sensor Performance in a Simulated Infection Model .................................................................. 18 Sensor Performance in Real Data ................................................................................................ 20 Using the Sensor Method with a Small Set of Samples ............................................................... 20 Using the Sensor Method with Hashtag Networks ...................................................................... 22 Differences in Sensor and Control Characteristics That Also Affect Propagation ...................... 23 Figures .......................................................................................................................................... 25 References .................................................................................................................................... 41 15 An Analytic Elaboration of the Friendship Paradox The “Friendship Paradox” was first elaborated by Feld (1991) who proved that for any arbitrary network the average number of friends of friends is greater than the average number of friends (“Your Friends Have More Friends Than You Do”). Mathematically, we can define µ as the average number of connections per vertex in a network with V vertices and E edges: kv v∈V∑ V 2 E V = µ= (1) where each vertex v∈V has kv connections. Using the same notation, we can derive the number of two-degree connections ρ (the friends of friends). Since the degree kv of a vertex v is counted kv times (if a person has 5 friends, each of them will be added 5 times to the kv 2 v∈V∑ total number of friends of friends), there are two-degree connections, and we can divide this by the total kv v∈V∑ to get the average number of two-degree connections ρ: number of direct connections ρ= v∈V∑ v∈V∑ kv 2 kv (2) Using a property of the variance σ2 in the distribution of kv, note that: kv 2 )2 σ2 = E k −µ( " # % = E k 2"# $ $% − E k[ ] ( )2 v∈V∑ V = )2 kv v∈V∑( V 2 (3) − From this, it is easy to show that: ρ= v∈V∑ v∈V∑ kv 2 kv = µ+ σ2 µ (4) greater, to be precise) and this difference thus increases with the variance σ2 of Therefore ρ is greater than µ ( σ2 µ the degree distribution in the network. Equation (2) implies that the expected distribution of two-degree connections Q(k) will be a function of the degree distribution P(k). Since each vertex of degree k is connected to k other vertices, each vertex’s degree is counted k times in the distribution and therefore there will be k vertices of degree k, leading to the following distribution of two-degree connections: 16 (5) Q(k ) = kP(k ) µ Since we want to sample only a part of the network of monitoring, we need to know the dregree distribution we can expect to find for a random sample of a given size. If we sample a portion of the network (0 ≤ γ ≤ 1), the degree distribution P(k) will remain the same since every person has the same probability γ of being chosen. However, the expected distribution of the two-degree connections for the “friends” sample will differ since a person with more friends has more chances of having a friend being chosen in the random sample and therefore appearing in the friends sample. The probability of not chosing a person with k friends is equal to the probability of not chosing any of thir k friends 1 −γ( and thus their probability of appearing in the friends sample is 1 − 1 −γ( ) k ) k . Drawing on Equation (5), we can use these probabilities to derive the degree distribution of a random sample and a corresponding friends sample for a portion γ of the population: % P(k ) k 1 − 1 −γ( ) k $ " # Aγ Q(k ) = (6) Where Aγ is a normalization factor. For the complete network (γ = 1), Equation (6) simplifies to Equation (5), and both of these demonstrate the friendship paradox, Q(k) > P(k) for large k. This effect is amplified for small γ since it maximizes the multiplying effect of counting k times each vertex with degree k (see Figure S1). Thus, a sensor group composed of the friends of a randomly-sampled control group will tend to have a larger number of high-degree vertices than the control group, itself. One issue with constructing a sensor group is that people with many friends may be friends of several persons of the randomly-sampled control group and therefore may be counted several times as members of the sensor group. In fact, a person with k friends will be counted k times when γ = 1. However, we remove such duplicates when constructing the sensor sample, so that each person is counted only once. This means that the degree distribution of the sensor group will not be multiplied by k: 1 − 1 −γ( ) k " # Aγ % P(k ) $ Q(k ) = (7) Notice that this sensor group with duplicates removed also exhibits higher centrality than the network as a whole since 1 − 1 −γ( ) k ( ) increases with k. However, like the friends degree distribution described in equation (6), the difference between the sensor group Q(k ) and the control group P(k) disappears as γ increases (see Figure S1). Thus, the centrality advantage of the sensor group declines as the size of the sample increases. The Twitter Data We used the data gathered by Kwak et al.1, collected between the 1st of June 2009 and the end of December 2009, that represents a near-complete graph collected by snowball-sampling the online social networking site, Twitter. Most (active) SNS users are connected to the giant connected component to which Paris Hilton belongs (a user with over one million followers that was used for the snowball sample). Additionally all users mentioning trending topics from June to August were also crawled. Summarizing, the sample includes: 1. those users connected to the giant connected component (no matter whether following or followed) 17 2. those who mentioned trending topics. The data includes: • 476,553,560 tweets • 66,935,466 tweets using a hashtag (a key term prefixed by ‘#’) • 4,093,624 different hashtags • 40,171,624 registered users • 1,620,896 registered users using at least once a hashtag • 1,468,365,182 follow relationships • 531,703,974 reciprocal follow relationships (i.e. 265,851,987 bidirectional links) The popularity of different hashtags, measured as the number of different people using each of them at some point along this period, approximately follows a power law. In addition, Figure S2 shows a global increase in the number of tweets per day with a seasonal peak in summer as well as a weekly pattern in the number of hashtags used per day. In Figure S3 we show the popularity and start date for all hashtags appearing for the first time after June 25th, 2009. Since the start date for data collection is June 1st, 2009, and we did not observe these hashtags in the first 25 days, we assume that we have recorded their “birth” in the Twittersphere and therefore their possible initial outbreak. We focus our analysis on the most used hashtags to analyze their virality in order to identify big local propagation communities. Figure S4 shows the relative size of the greatest components for each network made up of all users using a particular hashtag, and compares it to the total number of users who used the hashtag. Sensor Performance in a Simulated Infection Model To test the theoretical behavior of the sensor mechanism in an environment with a known spreading process, we created a simple program in R to generate a synthetic Barabasi-Albert random undirected network with tail exponent β>3 over which we simulated 10 cascades (each beginning at a different vertex of the network) and an infection-recovery process with infection probability λ=0.1 and recovery probability γ=0.01: library(igraph) # generate the network g <- barabasi.game(50000,power=1,m=5,directed=F) mm <- data.frame(get.edgelist(g))+1 #network edges colnames(mm) <- c("id1","id2") tend = 10000 # we simulate the model for 10000 time units ntot <- max(c(mm$id1,mm$id2)) time <- rep(tend,ntot) #infection times infected <- rep(0,ntot) #infected nodes (0=S, 1=I, 2=R) ncascades <- 10 #number of cascades lambda <- 0.1 #infection probability gamma <- 0.01 #recovery probability for(k in 1:ncascades){ # simulate 10 casacades i0 <- sample(1:ntot,1) # select a random seed for the cascade time[i0] <- 0 # ...that gets initialy infected infected[i0] <- 1 ni <- c(1) # 1 node infected (just the seed) nr <- c(0) # no nodes recovery yet for(i in 1:tend){ # begin the cascade #infecteds get recoverd with probability gamma infected[infected==1 & (runif(ntot) < gamma) ] = 2 ii <- which(infected==1) # get the list of still infected 18 nb <- unique(c(mm[is.element(mm$id1,ii),2],mm[is.element(mm$id2,ii),1])) #neighbors of the infected nodes # Sucsceptible neighbors get infected with prob. lambda nb <- nb[runif(length(nb)) < lambda] nb <- nb[infected[nb]==0] infected[nb] <- 1 time[nb] <- I # record time of infection ni <- c(ni,sum(infected==1)) # update infected list nr <- c(nr,sum(infected==2)) # update recovery list if(ni[i]==0) break # stop if there are no more infected } } We then used data generated by these simulations to collect 350 random samples of 7 different sizes (0.124% of the network to 12.5% of the network), 50 of each, and a similarly sized sample of its neighbors to use as sensor: # function to get the neighbors of a node neighbors <- function(id){ unique(c(mm[mm$id1==id,2],mm[mm$id2==id,1])) } samples <- c(62,125,312,625,1250,2500,6250) # sample sizes final <- c() for (samp in 1:length(samples)){ # for eac sample size... dtc <-c() # initialize control times dts<-c() # initialize sensor times for(i in 1:50){ # repeat 50 times # get a control sample control <- sample(1:ntot,samples[samp]) # and a sensor sample of its neighbors \wo repetition sensor <- sample(unique(unlist(lapply(control, neighbors))),samples[samp]) # get the times of infection of the infected nodes tcontrol <- time[control] tsensor <- time[sensor] tcontrol <- tcontrol[tcontrol!=tend] tsensor <- tsensor[tsensor!=tend] # get the mean time of infection of controls dtc <- c(dtc,mean(tcontrol)) #and sensors dts <- c(dts,mean(tsensor)) } finalmean <-mean(dts-dtc) # mean Delta t finalesem <-sd(dts-dtc)/sqrt(length(dts)) # SEM Delta t Save the mean and SEM Delta t of this sample size final<-rbind(final,c(as.character(sample[samp]), as.numeric(finalmean), as.numeric(finalesem))) } finaldf <- data.frame(final) colnames(finaldf)<-c("sample","mean","sem") The results can be seen in Figure 2a of the main text, showing that as the sample size grows the SEM decreases and the mean Δt approaches 0, suggesting that middle sized samples are the best choice for detecting significant lead times. 19 Sensor Performance in Real Data We analyzed random control samples of various sizes (50K, 100K, 250K, 500K, 1M, 1.5M, 2M and 5M users), and compared each one against 30 random sensor samples of the same size. In these sensor samples we ensured that no user appeared more than once within a single sensor sample. In order to detect a viral process with the sensor mechanism two factors are crucial. First, the sensor sample should be more central than the control one. Second, the viral outbreak is large enough to be detected. We study viral outbreaks in retrospect (once the spreading process is finished), focusing our attention on those that affected the largest number of nodes in the network. In Figure S5 all hashtags used by more than 0.01% of each sample’s users (or about 0.25% of all hashtag users) have been plotted and compared to the theoretical infection model, finding that the mean Δtα and variance approach 0 as the sample size grows, as predicted by the model. Figure S6 shows the same thing for hashtags used by more than 0.04% of the sample (or about 1% of hashtag users). Notice that in both cases, small sample sizes are not large enough for lead times (Δtα) to be reliably less than zero (due to sampling variation), while in large samples the control and sensor groups tend to overlap, causing the mean Δtα to approach 0 (see Figure 2a,b in the main text). Many of the important events of 2009 appearing on Twitter show a lead time for the sensor group. They also show a relationship with the control group by sample size similar to that of the infection model. For example, Figure S7 shows hashtags for: • #h1n1: Current level of the novel H1N1 influenza pandemic alert raised from phase 5 to 6, June 11 • #indonesiaunite: Sucide bombers hit two hotels in the center of Jakarta, July 17 • #cop15: UN Climate Change Conference 2009, December 7 • #iran: Protests following 2009 Iranian presidential election, June 13 • #michaeljackson: Michael Jackson’s death, June 25. • #forasarney: Social movement demanding the departure of Senator Jose Sarney of their duties in the National Congress of Brazil, June 17. Figure S8 shows that viral hashtags that grow in usage and spread from person to person over time like #mobsterworld and those used in response to an exogenous event like #indonesiaunite show negative Δtα, suggesting that the sensor method elaborated here may be a reliable way to predict their widespread usage. In contrast, a few hashtags like #health yield a positive Δtα(when the sensor group lags the control group). There is variation in the amount of lead time provided by the sensor group. Hashtags like #beatcancer, a one day campaign granting donations for each tweet using it, spread extremely quickly through the Twitter network. As a result, they display an almost flat curve around zero and no variance, suggesting that, in these cases, the sensor mechanism is not sensitive enough to predict an epidemic in advance. Additional examples of viral and nonviral hashtags can be found in Figures S9 and S10. We also show the network of users using a given hashtag and the cumulative distribution for the sensor and control groups for several example hashtags in Figures S11-S14. Notice that many of these show that the cumulative distribution of usage in the sensor group is shifted to the left, a sign that the center of the network is being infected before the network as a whole, on average. Using the Sensor Method with a Small Set of Samples Here, we study the use of multiple sensor and control samples for detecting contagious outbreaks. We choose 5 random samples of 50,000 Twitter users (to be used as control) with their complete set of followees (from which to obtain the sensor samples), calculating their in and out degree and the times at which they mention any hashtag in a 20 tweet. Obtaining a complete list of followers from a random sample over the whole Twittersphere is a costly process, especially for large samples. Therefore we reduced our statistical analysis to 5 samples and followed the same methodology we later repeated with 1,000 samples when we did not need to tackle Twitter as a whole. We trim the control samples to those users that have mentioned a hashtag at least once. Since only 4% of Twitter users have ever used a hashtag, our control samples are trimed to about 2,000 users and the followees samples to about 150,000 users. For each control we randomly select a similarly-sized sensor sample (without duplicates) from its followees. We then remove all hashtags that have appeared before June 20th 2009 (20 days after our first records) reducing our analysis to those hashtags that were very likely “born” during our sample period. For each of the hashtags we calculate the mean first time of use in the control and sensor samples. We then calculate the mean control time minus the mean sensor time for those hashtags used by at least 10 individuals in 1 or more of 5 samples. Notice that the total population of these hashtags can be described with the following probability distribution: ns i (8) P(α, ns , s) = ns ! $ ! $ && P(α)i 1 − P(α) )ns −i ∑ # & ( ## # & " % i=s " % Where ns is the total number of samples (i.e. 5) and s is the minimum number of samples (i.e. 1) in which we require the hashtag to appear in at least xs users (i.e. 10). Therefore it is the probability of appearing in s samples and not appearing in the other ns − s samples multiplied by the number of posible combinations of ns samples taken in groups of s, plus the same probabilities for every I samples where s > i ≥ ns . Now, the probability of finding xs or more users of a hashtag α in a random sample of S users drawn from a total population of N users is defined through the hypergeometric function, which indicates the probability of finding exactly xs individuals of the Xα users of hashtag α in a random sample of S users drawn from a population of N individuals: ! # # " ! # # " Xα ns P(ns ; N , Xα, S ) = N − Xα $ & S − ns & % N ! $ # & S " % The probaility of finding xs or more individuals is simply the cumulative distribution of Equation (9): (9) $ & & % D(ns ; N , Xα, S ) = Xα P( ∑ k; N , Xα, S ) k=ns (10) while the cumulative distribution for not finding xs − 1 or less individuals is: P(α) ≡ D(ns ; N , Xα, S ) = 1 − ns −1 P( ∑ k; N , Xα, S ) k=0 (11) 21 Where P(α) is the probability for hashtag α to have at least xS users in a random sample of S users drawn from a population of N individuals. Complementing equation (8), equation (11) allows us to estimate the number of total hashtag users for hashtags with 10 or more users appearing in 1 or more of the 5 samples, 2 or more, and so on. The distribution of the total number of users of hashtags appearing in each of these cases and the distribution of their mean Δt can be seen in Figure 2c of the main text and Figure S15. Forcing a hashtag to have representatives in all 5 samples restricts our analysis to the most widespread hashtags (32 in our case), while lowering this restriction to hashtags that have enough representatives in at least one of the samples opens up the analysis to more hashtags (134 in our case) even though they do not necessarily have a global spread as wide as the former. In every analysis (i.e. hashtags having enough representatives in 1 or more of the 5 samples, 2 or more, 3 or more, 4 or more and in all of them) more than 70% of the hashtags show a negative Δtα (in 80.55% in average 7.27% sd) Nevertheless, the results show that raising the threshold number of samples required for detection of the global spread of a hashtag reduces noise and yields a Δt < 0 for nearly all hashtags, providing advance warning of their outbreak. In other words, the wider audience a hashtag has reached, the greater probability that the sensor mechanism will detect it in advance. Using the Sensor Method with Hashtag Networks Given the comparatively low number of hashtag uses on Twitter (about 14% of the tweets and only 4% of the users use hashtags) and the high diversity of hashtags (4 million different hashtags for 66 million tweets displaying a hashtag), the probability of finding enough users of a hashtag for statistical analysis in a small random sample of Twitter is very small. Therefore, to analyze particular hashtags, we focused on the complete network of their users, composed only of those people that have used the hashtag in at least one tweet and their follow relations. This allows us to individually analyze the dynamics of well known hashtags as well as to try to identify smaller networks through which a viral process has spread. We selected all hashtags that were used more than 20,000 times on Twitter, identified their users and their follow relations to construct, for each of them, its hashtag network. For each of these hashtag networks, we selected a random control sample of 5% its size and a similarly-sized sensor sample of their followees to calculate Δtα. We then repeated this process 1,000 times to generate a statistical distribution of these observed lead times (Fig.2b of the main text). The sensor group led the control group ( Δtα < 0 ) 79.9% (SE 1.2%) of the time (52.9%, SE 1.12% for Δt p−value=0.05 %& < 0 ). However, note that there was α#$ considerable variation in lead times, from 20 days to a few hours or no advance warning. Moreover, one could use the difference in the sensor and control group to determine whether or not a viral process is under way. Estimating the models each day using all available information up to that day, for a control and a sensor sample of #openwebawards users, we find a significant lead time (p<0.05) on day 13, a full 15 days before the estimated peak in daily incidence, and also 15 full days before the control sample reaches the same incidence as the sensor group has on day 13 (See Figure 3c in the main text and right figures of Figures S11-S14). While these results are promising, a Δtα < 0 does not necessarily indicate a viral process. Consider a non-viral hashtag with fixed probability of use λ. A user tweeting at a rate of 10 tweets per hour will use a hashtag with probability 10λ in the first hour, 10 times bigger than that of a user tweeting at a rate of 1 tweet per hour. Due to 22 the correlation between degree and tweet frequency (see Figure 4a in the main text) a Δtα < 0 could be observed for a hashtag not because of its virality but because of the higher tweeting rates of users in the sensor group. To see how the sensor method works for hashtags that are not spreading virally, we generated a null distribution in which we randomly shuffled the time of each hashtag use within the fully observed data, and then measured the resulting difference in the sensor and control group samples, Δ R tα . This method preserves any effect that correlation between degree and activity level might have on lead times. Again, we repeated the procedure 1,000 times to generate a statistical distribution (see SI). The results show that the observed distribution of lead times falls outside the null distribution for 65.4% (SE 1.2%) of the hashtags (25%, SE 0.95% for %& < Δ R t p−value=0.05 Δt p−value=0.05 α#$ &( ), suggesting they did, in fact, spread virally. $' α Notice that this method gives us greater confidence that the sensor method detects viral processes, but it also suggests that the non-viral component of Δt could help the sensor mechanism work better than expected, since sensors not only get reached sooner by an epidemic (due to their centrality) but also react earlier (due to their higher tweeting rates). Differences in Sensor and Control Characteristics That Also Affect Propagation By construction, control and sensor groups differ in the local structure of their networks. This is reflected in properties such as degree, betweenness or k-coreness. For instance, in the #openwebawards user network, for 30 control/sensor samples of 10% its user base, sensor users have a mean degree of 24.6 (SEM 1.4), 6.6 times greater in average (SEM 0.6) than the 4.5 (SEM 0.6) mean degree of control users, and a mean betweenness centrality 6.2 times greater too (SEM 0.4), 17,615.9 (SEM 492.9) compared to the 3,119.7 (SEM 192.5) of the controls. For 340 random control and sensor samples of 34 different hashtag networks (from 4,645 to 108,073 users) in only 3 cases did the sensor group have a lower mean degree than the control group. Nevertheless, in all of them the sensor group had a higher mean betweenness than the control one (see Figure S16). Nevertheless, this is not the only factor affecting how much a user may contribute to a contagious outbreak. They may also exhibit different patterns of communication that contribute to the spread of information from person to person to person. From a 1,000,000 random user sample we identified a control group of 36,499 users using at least one hashtag and a sensor group of the same size composed of the control group’s followees. After removing from users from the control group that are present in the sensor group, we end up with 16,332 users in the control group. Figure 4a of the main text shows how the sensor and control groups differ by degree. The mean number of followers and followees are 25 and 28 in the control group, respectively, but they are 422 and 243 in the sensor group. These numbers reiterate the main result from Figure 1 that sensor samples tend to be much more central than control samples. But there is also a large difference in communication behavior. The sensor group tweets more (152 tweets per user compared to the control group’s 55) and also uses more hashtags per tweet (26 compared to the control group’s 9). Both of these comparisons show that the sensor group is about three times more active than the control group, but Figure 4a shows that this is a trivial consequence of the relationship between number of tweets and number of connections. In both the control group and the sensor group, the better connected you are, the more messages you send. Although the quantity of communication is the same for the sensor and control group once we control for differences in connectivity, we find a difference in the quality of these messages net of the difference in activity levels. Since hashtags are used to denote topics, we can study the extent to which users participate in many different topics or just a few. Analyzing the number of different hashtags used per tweet and the number of unique hashtag uses, we find a different trend between the control and sensor samples (see Figure 4b in the main text). Sensors use each different 23 hashtag 2.53 times on average (95 percent confidence interval: 2.23 2.83), slightly more than control users who use each hashtag on average 2.15 times (95 percent confidence interval: 2.03 2.28). Nevertheless, as we have shown, sensors tweet significantly more than controls and when controling for the frequency of hashtag usage (hashtags per tweet), we find that users in the sensor group tend to use a significantly wider variety of hashtags than control users (i.e. they get involved in a larger number of topics), 96.85 different hashtags per tweet (95 percent CI: 93.51 to 100.20) compared to 38.66 different hashtags per tweet for the controls (95 percent CI: 37.47 to 39.85). This fact could be of special importance when using the sensor mechanism to anticipate hashtag epidemics as sensors act not only as social hubs (by having more connections) but also as faster responders (by tweeting more) and as information hubs (by being involved in more topics). 24 Figures Figure S1. Larger samples of friends (as a percentage of the total number of users in he network) show a smaller difference in degree distribution from the overall network both for a) groups of friends with duplicates (e.g. a friend of two users is counted twice) and b) groups of friends without duplicates (a friend of several users is counted only once) 25 Figure S2. Popularity distribution of all hashtags appearing between June 2009 and January 2010 measured as the number of users of each hashtag. This distribution approximately follows a power law. The bottom plots show the total number of tweets and hashtag uses per day. 26 Figure S3. Appearance time and number of users of all hashtags appearing for the first time after June 25th. The diameter is proportional to the number of times the hashtag has been used. In blue are all hashtags used more than 20,000 times. 27 Figure S4. Number of nodes in each hashtag network (composed of all users of a particular hashtag and their follow relations to others using the hashtag) and relative size of its greatest component for all hashtags used more than 20,000 times (those in blue in Figure S3). The size of the nodes is proportional to the number of components of the network. Most networks show a large greatest component and many small isolated components. 28 Figure S5. Sensor lead time (Δtα) distribution for hashtags used by more than 0.01% of all users in various sample sizes. 29 Figure S6. Sensor lead time (Δtα) distribution for hashtags used by more than 0.04% of users in various sample sizes. 30 Figure S7. Relationship of lead time in the sensor group compared to the control group (Δtα) in different sample sizes for hashtags related to important events in 2009. 31 Figure S8. Evolution of Δtα with different control samples for #mobsterworld, an endogenous viral hashtag; #ff, which despite its non virality shows a Δtα<0 similar to that of the simulated infection model on the synthetic network; #health, a nonviral hashtag and #indonesiaunite and #beatcancer, two hashtags for which the sensor mechanism respectively works and does not work. 32 Figure S9. Relationship of lead time in the sensor group compared to the control group (Δtα) in different sample sizes for viral hashtags: #musicmonday, #openwebawards, #fun140, #twitdraw and #forasarney. 33 Figure S10. Relationship of lead time in the sensor group compared to the control group (Δtα) in for nonviral hashtags: #shazam, #livestrong, #iwillneverforget, #wheniwaslittle and #politics. 34 Figure S11. Networks and cumulative distributions for the hashtags showing the biggest lead times in Figure 4 of the main text. #lightupnigeria is a small network showing the biggest difference between the cumulative distributions of the control and sensor groups. #fun140 shows the third biggest lead time of the hashtags analyzed and its network displays an unusually large hub at its center. 35 Figure S12. Two additional examples showing a considerable lead time for the sensor group. 36 Figure S13. Two additional examples showing a considerable lead time for the sensor group. 37 Figure S14. Although these two hashtag networks have large giant components, they show signs of very rapid increase in usage, suggesting the sensor mechanism may not give much advance warning in these cases. Their lead times overlap with a those based on randomly shuffling the data as shown in Figure 4 in the main text. 38 Figure S15. Sensor lead time (Δtα) distribution and total number of users probability distributions for hashtags having at least 10 users in 1 or more of 5 random samples of 50,000 users, 2 or more, 3 or more, 4 or more and in the 5 of them. 39 Figure S16. Mean degree and betweenness for 340 control groups and their corresponding sensors of 34 different hashtags user networks (those of Figure S6). Each point in the plot correspond to the mean value of 10 different samples of a single hashtag network. Each hashtag network is drawn in a different color. Control and sensor samples are 10% the size of the user network. The sensor mechanism shows to be a reliable method for obtaining not only a sample with higher mean degree but also with higher 40 References [1] Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media. Proceedings of the 19th international conference on World wide web, 591–600. 41
1507.04215
2
1507
2015-07-21T08:11:49
Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament
[ "cs.SI", "cs.RO", "math.OC", "physics.soc-ph" ]
In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP). We first process some data collected by the VoteWatch Europe Website for the whole 7 th term (2009-2014), by considering voting similarities between Members of the EP to define weighted signed links. We then apply a selection of community detection algorithms, designed to process only positive links, to these data. We also apply Parallel Iterative Local Search (Parallel ILS), an algorithm recently proposed to identify balanced partitions in signed networks. Our results show that, contrary to the conclusions of a previous study focusing on other data, the partitions detected by ignoring or considering the negative links are indeed remarkably different for these networks. The relevance of negative links for graph partitioning therefore is an open question which should be further explored.
cs.SI
cs
Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament Israel Mendonc¸a, Rosa Figueiredo, Vincent Labatut, Philippe Michelon Emails:{mendonci, rosa.figueiredo, vincent.labatut, philippe.michelon}@univ-avignon.fr Universit´e d’Avignon, LIA EA 4128, France 5 1 0 2 l u J 1 2 ] I S . s c [ 2 v 5 1 2 4 0 . 7 0 5 1 : v i X r a Abstract—In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP). We first process some data collected by the VoteWatch Europe Website for the whole 7th term (2009-2014), by considering voting similarities between Members of the EP to define weighted signed links. We then apply a selection of community detection algorithms, designed to process only positive links, to these data. We also apply Parallel Iterative Local Search (Parallel ILS), an algorithm recently proposed to identify balanced partitions in signed networks. Our results show that, contrary to the conclusions of a previous study focusing on other data, the partitions detected by ignoring or considering the negative links are indeed remarkably different for these networks. The relevance of negative links for graph partitioning therefore is an open question which should be further explored. Index Terms—signed graphs, structural balance, graph parti- tion, European Parliament. I. INTRODUCTION In signed graphs, each link is labeled with a sign + or −, which indicates the nature of the relationship between the considered adjacent nodes. This type of graphs was primarily introduced in Psychology, with the objective of describing the relationship between people belonging to distinct social groups [1]. More generally, a signed graph can be used to model any system containing two types of antithetical relationships, such as like/dislike, for/against, etc. This work and its extensions by Cartwright and Harary in the 1950’s [2], [3], [4] are the basis for the concept of Structural balance. A signed graph is considered structurally balanced if it can be partitioned into two [2] or more [5] mutually hostile subgroups each having internal solidarity. Here, the words hostile and solidary mean: connected by negative and positive links, respectively. However, it is very rare for a real-world network to have a perfectly balanced structure: the question is then to quantify how balanced it is. For this purpose, one must first define a measure of balance, and then apply a method to evaluate the network balance according to this measure. For instance, one could consider counting the numbers of positive links located inside the groups, and of negative links located between them. Such a measure is expressed relatively to a graph partition, so processing the graph balance amounts to identifying the partition corresponding to the highest balance measure. In other words, calculating the graph balance can be formulated as an optimization problem. By using different variants of the balance measure and/or by introducing some additional constraints, one can express various versions of the notion of balance. Each one poten- tially leads to a different optimization problem to be solved. However, besides the very classic measures such as the one mentioned previously, only a few recent works explored this aspects from an Operations Research perspective [6], [7], [8], [9], [10]. A deep investigation of efficient approaches and mathematical formulations to problems related with signed graph balance is therefore still missing. Independently from the Operations Research domain, the study and partition of signed graph has also recently been the object of several works in the domain of Complex Network Analysis, and more particularly community detection. The community detection problem originally concerns unsigned graphs. It consists in partitioning such a graph, in a way such that most links are located inside the groups (aka. com- munities) and only few remain between them. By definition, an unsigned graph focuses on a single type of relationships, say the positive ones. A signed graph representing the same system can therefore be considered as more informative, since it additionally contains the links of the other type (in our example, the negative ones). For this reason, a few authors tried to adapt existing community detection methods, in order to take advantage of this additional information [11], [12], [13], [6]. Other authors tried to study how informative these ad- ditional links really are [14]. Indeed, retrieving a signed network is a task potentially more costly than for an unsigned network, be it in terms of time, money, or methodological complications. For example, in the context of a ground survey, it is much easier to get people to name their friends than their foes. So, the question to know whether this extra cost is worth it is extremely relevant. In their work, Esmailian et al. [14] suggested that if one detects the communities based only on positive links (by ignoring negative ones), most negative links are already placed between the communities, and that the few ones located inside do not significantly affect the communities. The latter point is tested by checking that no additional division of the community allows increasing the overall balance. Consequently, using algorithms that do not take negative links into consideration, such as InfoMap [15], it is possible to obtain a reasonably well partitioned network. However, we see two limitations to this work. First, in order to assess the significance of the negative links located inside the communities, Esmailian et al. considered each community separately, instead of the graph as a whole. Second, these ob- servations were made only for two datasets, both representing Social Networking Services (Slashdot and Epinions), so they do not necessarily apply to all networks, or event to all types of networks. In this paper, we want to explore further the informative value of negative links in the context of graph partitioning. To this purpose, we present a method to extract signed networks from voting data describing the activity of the Members of the European Parliament (MEPs). Based on this new data, we apply state-of-the-art tools in order to partition the graph, on the one hand in terms of community structure, and on the other hand according to the notion of structural balance. We then compare the obtained partitions and show the presence of significant differences between them. The contributions of this paper are essentially two-fold. First, we constitute a new dataset of signed networks and make it publicly available to the community, with the scripts used to obtain it. We treat the voting patterns using several parameters, leading to a collection of signed networks describing the behavior of MEPs according to various modes (time, topic...). Second, based on these data, we experimentally show that negative links can be essential when partitioning networks. We see our work as complementary to that of Esmailian et al., first because the use of a method taking negative links into account as a reference allows us to avoid the issue regarding the assessment of intra-community negative links; and second because we treat a different type of signed real- world networks, in which the links represent vote similarity instead of self-declared social relationships. The rest of this paper is organized as follows. Section II presents a review of the literature regarding the graph partition task. Section III describes the method we used to extract signed networks from the raw data constituted of the sequences of MEPs votes. Section IV summarizes the algorithms we selected to partition our signed networks. In Section V, we present and discuss our experimental results regarding network extraction and network partition. Finally, we conclude by highlighting the main points of the article, and identifying some possible perspectives. II. RELATED WORKS As mentioned before, the concepts of signed graph and structural balance were introduced by Heider [1]. Later, Cartwright et al. [2] formalized Heiders theory, stating that a balanced social group could be partitioned into two mutually hostile subgroups, each having internal solidarity. Observing that a social group may contain more than two hostile sub- groups, Davis [5] proposed the notion of clusterable signed graph. The clustering problem consists in finding the most balanced partition of a signed graph. Evaluating this balance according to the structural balance (SB) measure amounts to solving an optimization problem called Correlation Clustering (CC) [16]. This problem was addressed first by Doreian & Mrvar [17], who proposed an approximate solution and used it to analyze the structural balance of real-world social networks. In [11], Yang et al. called the CC problem Community Mining, and proposed an agent-based heuristic called FEC to find an ap- proximate solution. Elsner & Schudy performed a comparison of several strategies for solving the CC problem in [18], and applied them to document clustering and natural language processing issues. In this context, these authors identified the best strategy as a greedy algorithm able to quickly achieve good objective values with tight bounds. The solution of the CC problem and of some of its variants has already been used as a criterion to measure the balance of signed social networks [19], [17], [20], [8], [6], and as a tool to identify relations contributing to their imbalance [21]. In [6], the authors provide an efficient solution of the CC problem, by the use of a ILS metaheuristic. The proposed algorithm outperforms other methods from the literature on 3 huge signed social networks. In this work, we will use this tool to evaluate the imbalance of the MEPs networks. In the complex networks field, works dedicated to signed networks focus only on the clustering problem, as defined by Davis [5]. Various methods were proposed for this purpose: evolutionary approaches [22], [23], [24], [25], agent-based systems [11], matrix transformation [26], extensions of the Modularity measure [27], [9], [28], [29], [30], simulated annealing [31], spectral approaches [32], [33], [34], particle swarm optimization [35], [36], and others. Some authors performed the same task on bipartite networks [37], while others relaxed the clustering problem in order to identify overlapping communities [38]. Although the methods listed here were applied to networks representing very different systems, authors did not investigate the possibility that some alternative versions of the clustering problems were more appropriate to certain data. Few works tried to compare the CC and community detec- tion approaches. As mentioned in the introduction, Esmailian et al showed that, in certain cases, partitions estimated in signed networks by community detection methods, i.e. based only on the positive links, can be highly balanced [14]. However, this work was conducted only on two networks of self-declared social interaction networks (Epinions and Slashdot), and using a single community detection method (InfoMap [15]). Moreover, they did not compare their results to partitions detected by algorithms designed to solve the CC problem. We investigate if this statement also holds for other real-world networks and community detection methods, and how these compare to results obtained with CC methods. III. NETWORK EXTRACTION In this section, we describe the source we used to retrieve our raw data, and the process we applied to extract signed networks from these data. A. European Parliament Votes In order to be able to conduct our experiments, we were looking for data allowing to extract some form of signed network of interactions. Moreover, in future works, we want to study how the network and the structural balance evolve, so the data had to be longitudinal, with stable nodes (nodes should not change too much through time). The best data we could find relatively to these criteria are those describing the activity of the European Parliament1. More precisely, we focused on the votes of the Members of the European Parliament (MEPs). The Website VoteWatch Europe2 is a non-partisan interna- tional non-governmental organization, completely independent from national and local governments, from the European Union, as well as from political parties, institutions, agencies, businesses and all other bodies. Their goal is to provide easy access to the votes and other activities of the European parliament (among other European institutions). Votewatch compiles data provided by the EP to give a full overview of the MEPs activity. In particular, they describe the vote cast by each MEP for each document considered at the EP. Each MEP is also described through his name, country and political group. Other fields are available too, which we have not used yet, such as how loyal the MEP is to his political group. To summarize, the behavior of a MEP is represented by the series of votes he cast over a certain time period (e.g. a year, a term). For a given document, a MEP can express his vote in one of the three following ways: FOR (the MEP wants the document to be accepted), AGAINST (he wants the document to be rejected) and ABSTAIN (he wants to express his neutrality). Besides these expressed votes, is also possible for the MEP not to vote at all, leading to the following possibilities: ABSENT (the MEP was not present during the vote), DID NOT VOTE (he was there, but did not cast his vote), and DOCUMENTED ABSENCE (he was not there but justified his absence). it For each document, we also have access to the category it belongs to, called Policy. It corresponds roughly to the main theme treated in the considered document. All the policies treated during the 7th term of the EP are listed in Table I, with the numbers of documents they concern. VoteWatch gives us access to raw data, which could be described as individual data, in the sense they describe the state and behavior of the MEPs when considered independently from each others. However, a network is by nature relational, i.e. it represents the relationships between some objects of interest. Thus, we need to process the VoteWatch data in order to retrieve the networks we want. B. Extraction Process Our extraction process is two-stepped. As mentioned before, in the data received from VoteWatch, the behavior of each MEP is represented by a series of votes, corresponding to 1http://www.europarl.europa.eu/ 2http://www.votewatch.eu/ TABLE I LIST OF ALL POLICIES RELATIVE TO THE DOCUMENTS VOTED AT THE EUROPEAN PARLIAMENT, WITH THE CORRESPONDING NUMBERS OF DOCUMENTS, FOR THE 7TH TERM Policy Agriculture Budget Budgetary control Civil liberties, justice & home affairs Constitutional and inter-institutional affairs Culture & education Development Economic & monetary affairs Employment & social affairs Environment & public health Fisheries Foreign & security policy Gender equality Industry, research & energy Internal market & consumer protection Internal regulations of the EP International trade Legal affairs Petitions Regional development Transport & tourism Number of documents 53 179 113 99 40 19 29 128 44 100 53 191 28 51 39 7 106 67 5 35 40 all the documents reviewed by the EP during one term. In this article, we focused on the 7th term (from june 2009 to june 2014). We first filter these data depending on temporal and topical criteria. In other terms, if required, it is possible to focus only on the documents related to a specific policy and/or a specific period of the term, for instance a given year. The second step consists in comparing individually all MEPs in terms of similarity of their voting behaviors. The result of this process is what we call the agreement matrix M. Each numerical value muv contained in the matrix represents the average agreement between two MEPs u and v, i.e. how similarly they vote over all considered documents. The filtering step is straightforward, however the agreement processing constitutes a major methodological point: depend- ing on how it is conducted, it can strongly affect the resulting network. For a pair of MEPs u and v and a given document di, we define the document-wise agreement score muv(di) by comparing the votes of both considered MEPs. It ranges from −1 if the MEPs fully disagree, i.e. one voted FOR and the other AGAINST, to +1 if they fully agree, i.e. they both voted FOR or AGAINST. However, as we mentioned previously, a vote can take other values than just FOR and AGAINST, and those must also be treated. Let us consider first the non-expressed votes: ABSENT, DID NOT VOTE and DOCUMENTED ABSENCE. The EU distin- guishes these different forms of absence not for political, but rather for administrative reasons, so we decided to consider them all simply as absences. The common approach when treating this type of vote data [39], [40] is to ignore all docu- ments di for which at least one of the considered MEPs was absent. However, certain MEPs are absent very often, which mean they would share a very small number of documents with others. This approach could therefore artificially produce extremely strong agreement or disagreement scores. To avoid this, we assign a neutral score of 0 when at least one person is absent for a given document. Handling the abstentions is a bit trickier, because such a behavior can mean different things. A MEP can choose not to vote because he is personally FOR or AGAINST, but undergoes some pressure (from his political group, his constituents, etc.) to vote the other way: in this case, voting ABSTAIN is a way of expressing this conflicting situation. But abstaining could also simply represent neutrality, meaning the MEP is neither FOR nor AGAINST the considered document. There is no consensus in the literature, and different approaches were proposed to account for ABSTAIN-FOR, ABSTAIN-AGAINST and ABSTAIN-ABSTAIN situations [29], [39], [40]. Here, we present two variants corresponding to different interpretations. In the first, described in Table II, an abstention is considered as half an agreement with FOR or AGAINST, leading to a score of +0.5. In the second, described in Table III, two abstaining MEPs are considered to fully agree (+1). But, when only one of them abstains, we consider there is not enough information to determine whether they agree or disagree, and we therefore use a 0 score. Note absences were left out of the tables for clarity. VOTE WEIGHTS REPRESENTING ABSTENTION AS HALF AN AGREEMENT TABLE II FOR FOR +1 ABSTAIN +0.5 −1 AGAINST ABSTAIN +0.5 +0.5 +0.5 AGAINST −1 +0.5 +1 VOTE WEIGHTS REPRESENTING ABSTENTION AS AN ABSENCE OF OPINION TABLE III FOR ABSTAIN AGAINST FOR +1 0 −1 ABSTAIN 0 +1 0 AGAINST −1 0 +1 The document-wise agreement score is completely defined by selecting one of the proposed tables. The average agreement is then obtained by averaging this score over all considered documents. More formally, let us consider two users u and v and note d1, ..., d(cid:96) the documents remaining after the filtering step, and for which u and v both cast their votes. The average agreement muv between these two MEPs is: (cid:96)(cid:88) i=1 muv = 1 (cid:96) muv(di) (1) IV. PARTITION METHODS In this section, we present the methods used to partition the signed network extracted from the VoteWatch data. We first introduce the community detection approaches we selected for our experiment. Then we formally define the Correlation Clustering problem and describe the algorithm we used in this article to estimate its solutions. A. Community Detection In the literature, the problem of community detection is usually defined in an informal way. It consists in finding a partition of the node set of a graph, such that many links lie inside the parts (communities) and few lie in-between them. An other way of putting it is that we are looking for groups of densely interconnected nodes, relatively to the rest of the network [41]. It is difficult to find a formal definition of this problem, or rather, to find a unique formal definition: many authors present and solve their own variant. Because of this, the algorithms presented in the literature do not necessarily solve the exact same problem, although it is still named community detection. To account for this variance, we selected several methods for our experiments, which we briefly present here. All of them are able to process weighted networks. InfoMap [15]. The community structure is represented through a two-level nomenclature based on Huffman coding: one level to distinguish communities in the network and the other to distinguish nodes in a community. The problem of finding the best community structure is expressed as mini- mizing the quantity of information needed to represent some random walk in the network using this nomenclature. With a partition containing few intercommunity links, the walker will probably stay longer inside communities; therefore only the second level will be needed to describe its path, leading to a compact representation. The authors optimize their criterion using simulated annealing. EdgeBetweenness [42]. This divisive hierarchical algorithm adopts a top-down approach to recursively split communities into smaller and smaller node groups. The split is performed by iteratively removing the most central link of the network. This centrality is expressed in terms of edge-betweenness, i.e. number of shortest paths running through the considered link. The idea behind this method is that links connecting different communities tend to be present in the many shortest paths connecting one community to the other. Once the network has been split in two separate components, each one is split again applying the same process, and so on. The resulting compo- nents correspond to communities in the original network. WalkTrap [43]. To the contrary of EdgeBetweenness, this is an agglomerative hierarchical algorithm, which means it uses a bottom-up approach to merge communities into larger and larger groups, starting from singletons. To select the communities to merge, WalkTrap uses a random walk-based distance. Indeed, random walkers tend to get trapped into communities, because most locally available links lead to nodes from the same communities, while only a few links all to escape this community (by definition). If two nodes u and v are in the same community, the probability to reach, through a random walk, a third node located in the same community should not be very different for u and v. The distance is constructed by summing these differences over all nodes, with a correction for degree. FastGreedy [44]. Like WalkTrap, this algorithm adopts an agglomerative hierarchical approach. But this time, the merges are not decided using a distance measure, but rather by locally optimizing the well-known objective function called Modularity [45]. Briefly, this measure compares the proportion of intra-community links present in the network of interest, to the expectation of the same quantity for a randomly generated network of similar size and degree distribution. The process stops when it is not possible to improve the modularity anymore, or when there is no more communities to merge. B. Correlation Clustering Before formally describing the CC problem, we need to introduce some notations and definitions first. Let G = (V, E, s, w) be a weighted undirected signed graph. The sets V and E correspond to the nodes and links constituting the graph. The functions s : E → {+,−} and w : E → [0; +1] assign a sign and a positive weight to each link in E, respectively. A link e ∈ E is called negative if s(e) = − and positive if s(e) = +. Let E− ⊂ E and E+ ⊂ E denote the sets of negative and positive links in G, respectively. Notice that, according to the above definitions, E = E− ∪ E+. We define the negative and positive subgraphs of G as G− = (V, E−) and G+ = (V, E+), respectively. The complementary negative graph is G− = (V, E−), where E− = P2(V ) \ E−, P2(V ) being the set of all unordered pairs from V . Let us consider a partition P of V such that P = {V1, ..., Vk}. A link is said to be cut if it connects nodes from two different parts. We note E[Vi : Vj] ⊂ E the set of links connecting two nodes from Vi and Vj (cut links), and E[Vi] ⊂ E the set of links connecting two nodes from Vi (so, E[Vi] = E[Vi : Vi]) (uncut links). As mentioned before, negative links located inside parts (uncut negative links) and positive links located between parts (cut positive links) are considered to lower the graph balance. For Vi, the total weight of uncut negative links is: Ω−(Vi) = we (2) e∈E−∩E[Vi] And for two parts Vi and Vj, the total weight of cut positive links Ω+ is: (cid:88) (cid:88) Ω+(Vi, Vj) = we (3) e∈E+∩E[Vi:Vj ] The Imbalance I(P ) of a partition P can be defined as the sum of uncut negative and cut positive links over the whole graph: I(P ) = Ω−(Vi) + Ω+(Vi, Vj) (4) (cid:88) 1≤i≤k (cid:88) 1≤i<j≤k Finally, the Correlation Clustering problem is the problem of finding a partition P of V such that the imbalance I(P ) is minimized. In this work we will solve the CC problem using the Parallel ILS algorithm presented in [6], which was designed to solve the CC problem in large real-world networks. ILS is itself a metaheuristic approach allowing to obtain good quality solutions by applying iteratively greedy search methods [46]. Starting from an initial solution estimated through a greedy method, the general principle is two-stepped: first, some perturbations are introduced to modify the current best solution; second, some local searches are performed to find better solutions within the neighborhood. This iterative process is stopped when some condition is met (minimal quality, time limit, etc.). This specific implementation is parallelized, in order to improve speed. Considering that the networks extracted from the VoteWatch data are very dense, we had to perform some minor modi- fications on the original Parallel ILS algorithm, so that the processing time was acceptable. First, the search space used in the local search was reduced by adding a probably (0.7) of visiting a neighbor solution. In other terms, in average we limit the search to only a part of the neighborhood. Second, the perturbation level had to be reduced to 15, half of the maximum run number in the original work. V. RESULTS AND DISCUSSION In this section, we first describe the networks extracted from the VoteWatch data, and how they are affected by the param- eters controlling this extraction process. Then, we discuss the results obtained with the partition methods presented in section IV. In order to process the VoteWatch data, we developed a tool called NetVotes, which takes the form of a collection of R scripts. It implements the method described in section III-B, and additionally calculates some metrics describing the studied networks and their partitions. It is generic enough to treat any type of data of the same form. To perform the community detection, we used the igraph R package, which contains all the algorithms we selected. For the CC problem, we used the author’s version of Parallel ILS, which we modified as explained in section IV-B. All our source code, as well as the data it outputs, are publicly available on GitHub3 and FigShare4, respectively. A. Networks Extraction As described in section III-B, our extraction method takes three parameters: the table used to process the agreement scores, the policy and the time period. We proposed 2 different tables, there are 21 policies and we also considered all doc- uments independently from their policies, and we considered each year separately as well as the whole 5-year long 7th term (2009-2014). This amounts to a total of 264 different modalities. However, in certain cases, the filtering step led to less than 2 documents, so we were not able to extract networks for all combinations of policies and time periods. We first study how the choice of the table used to process the agreement scores affects the extracted network. Figure 1 shows the average agreement distribution for Table II (top plot) and Table III (bottom), using all documents for the whole term (i.e., not applying any filter). Both distributions are very similar, with a clear separation between the negative 3https://github.com/CompNet/NetVotes/ 4http://figshare.com/articles/NetVotes Data/1456268 and positive values. The agreement side is bimodal, with larger frequencies around 0 and 0.6–0.7. The right peak can be explained by the fact the majority of MEPs tend to vote similarly most of the time. The other peak, located at zero, is due to the frequent absence of a certain number of MEPs. When a MEP is absent for a given document, his agreement score with all other MEPs is zero. It is not as contrasted on the disagreement side, with a much flatter distribution. Moreover, there is no strong disagreement since the smaller values are around −0.5 (by comparison, the agreement values can get close to 0.9). This means only a small proportion of MEPs systematically disagree with the rest of the EP. The same observations can be made when considering the different policies independently, as well as when considering each year separately. There are some variations in terms of position and amplitude of the right peak, but this is mainly due to large differences in the number of documents discussed for each policy. The nature of the table used to process the agreement scores does not seem to have any clear effect on the average agreement distribution. We additionally tried to use a variant of Table II, replacing the +0.5 (half-agreement) by −0.5 (half-disagreement) for the situations involving AB- STAIN vs. FOR or AGAINST. The results where extremely similar, confirming our observation. Consequently, in the rest of the article, we present only the results obtained with Table III. B. Partition Comparison We now want to study how the selected community de- tection methods behave on the CC problem, when compared to Parallel ILS, an algorithm specifically designed to treat this problem. However, as mentioned in Section IV-A, these methods can only take positive links into account, so they cannot be applied directly to our signed networks, unlike Parallel ILS. To solve this issue, we proposed to consider two subgraphs of the original signed networks: the signed graph and the complementary negative graph, noted G+ and G− in Section IV-B, respectively. The former is a version of the original graph retaining only its positive links. The latter contains all possible links but the ones labeled negative in the original graph. In both cases, the result is a graph with only one type of unlabeled links, representing a part of the information originally conveyed by the original graph. This is very consistent with our objective, since we want to study if the information loss translates in terms of detected partitions. We applied all the selected community detection algorithms to both types of graphs, for all the modalities described in the previous subsection. For space matters, it is not possible to display and comment all of them, so we decided to focus on two policies of interest, over all years and over the whole term. We picked Foreign & Security Affairs because it is the most frequent, with 191 documents, and Agriculture because it is also well represented (51 document) and topically very distant from the former. The obtained results are shown in Figure 2. The top plot is dedicated Agriculture and the bottom one to Foreign & Fig. 1. Agreement distribution for the whole term and all policies when using Table II (top) and Table III (bottom) Security Affairs. Each group of bars represents the results obtained by one algorithm for each year taken independently, and for the whole term (see the legend). The bar heights are proportional to the imbalance of the estimated partitions, as described in equation (4), only they are expressed in terms of percents relatively to E. The numbers on top of the bars indicate how many parts (communities) the corresponding partitions contain. Note the displayed results are representative of the other policies. Let us compare the algorithms performances. EdgeBetween- ness, FastGreedy and WalkTrap are far from finding optimal results when processing the positive subgraphs: they obtain scores ranging from 20% to more than 60% imbalance, and Second Agreement Score TableAgreementFrequency−1.0−0.50.00.51.0050001000015000First Agreement Score TableFrequency−1.0−0.50.00.51.0050001000015000 or fourth groups. It is worth noticing that the imbalance is more marked for both algorithms for the year 2013, for both considered policy. This might be due to this year being the last in the 7th term, and therefore coinciding with the negotiation of the 8th term budgets and changes in the policies orientation. For instance, the CAP (Common Agricultural Policy) was made greener5. Such changes lead to stronger discussions in the EP, and may challenge the balance of certain political groups. In average, InfoMap identifies partitions 3 times more im- balanced than Parallel ILS and also tends to partition the graph in more clusters. Table IV compares the InfoMap and Parallel ILS partitions in terms of Normalized Mutual Information, which is the standard measure to compare partitions in the do- main of unsupervised classification [47]. This measure ranges from −1 (completely different) to +1 (completely identical), whereas 0 represents statistical independence. The values obtained for both considered policies, and for all the time periods, are extremely close to zero. This means the partitions detected by the two algorithms have little in common, even though their number of clusters and/or imbalance level are sometimes similar. COMPARISON OF THE INFOMAP AND PARALLEL ILS PARTITIONS IN TABLE IV TERMS OF NMI Policy Agriculture Foreign Affairs 2009 0.01 0.01 2010 0.04 0.01 2011 0.01 0.01 2012 0.02 0.01 2013 0.01 0.03 Term 0.02 0.02 We can conclude by stating that, on these data, our results do not confirm the findings of Esmailian et al. [14] regarding the low informative value of negative links. Taking negative links into account leads to a lower imbalance and a different partition, containing larger clusters. Moreover, among our selection of community detection algorithms, InfoMap is the only one to exhibit a behavior comparable to that of Parallel ILS. This means the notion of community implemented in this algorithm, which relies on an information compression-based approach, can be considered as compatible enough with the concept of structural balance. However, this is not the case for the other considered methods, based on link centrality, node distance and modularity. Discussing collectively the different methods proposed to solve the community detection problem might not be relevant, since the notions of community they rely upon are different (despite a common name). VI. CONCLUSION In this article, we have investigated some of the aspects inherent to the partition of signed networks, using data from the European Parliament (EP). We first extracted a collection of networks using the voting patterns of the Members of the EP. Then, we applied a selection of community detection meth- ods to these networks, as well as Parallel ILS, an algorithm 5http://www.europarl.europa.eu/pdfs/news/expert/infopress/ 20131118IPR25538/20131118IPR25538 en.pdf Fig. 2. Imbalance of the partitions (bars) and numbers of detected clusters (blue values), obtained through Parallel ILS (left bar group) and community detection methods (other bar groups), for each year and the whole term (see legend), processed for the Agriculture (top plot) and Foreign & Security (bottom plot) policies generally find a high number of clusters. The multitude of clusters is certainly the cause for these large imbalances. Note this observation is not inconsistent with being efficient at detecting communities, since this task implies taking link density into account. The behavior of the same algorithms is very different when applied to the complementary negative subgraph. The number of detected clusters is much smaller (generally around 2–5), and the imbalance is smaller, but still around 20%. The reason for that is certainly that the graphs being much denser, it becomes harder to distinguish dense subroups, i.e. communities. The InfoMap algorithm is much more successful at detect- ing balanced partitions, and reaches much smaller imbalance than the other community detection algorithms (always less than 20%, often less than 5%). However, on the negative complementary graphs, InfoMap simply puts all the nodes in the same cluster, so these results cannot be considered as relevant. On the positive graphs, the imbalance is very low (with the exception of the year 2013), close to 1%, and the algorithm finds 4–14 clusters. The results obtained with Parallel ILS are even better, in terms of imbalance, since they consistently get close to 0%. Moreover, the number of clusters is relatively low (2–3), which corresponds to what we were expecting a priori. Indeed, the EP is known to be split in two major political sides (EPP and S&P), with some punctual alliances of smaller parties, leading to the formation of third 020406080Foreign & Security Policy20092010201120122013Term33233312574961111111458410722222213474105222222141525391148565339Parallel ILSPositiveInfomapComp. Neg.InfomapPositiveEdgeBetw.Comp. Neg.EdgeBetw.PositiveFastGreedyComp. Neg.FastGreedyPositiveWalkTrapComp. Neg.WalkTrapParallel ILSPositiveInfomapComp. Neg.InfomapPositiveEdgeBetw.Comp. Neg.EdgeBetw.PositiveFastGreedyComp. Neg.FastGreedyPositiveWalkTrapComp. Neg.WalkTrap020406080Agriculture Policy20092010201120122013Term333233745814911111185810161022232385681582222222054165154443411411 specifically designed to treat signed graphs. Among the former, the best results in terms of structural balance are obtained, by far, by InfoMap. However, in average, Parallel ILS detected partitions three times more balanced. This seems to be due to the fact community detection methods ignore negative links and focus instead on link density. Independently from the balance aspect, the number of clusters detected by ILS is lower, which is more consistent with the studied system. These results are in opposition with the finding of Esmailian et al. [14], however they do not invalidate them. Indeed, in both cases, the experiments were performed on a very limited number of networks. The process should be conducted on a large number of different datasets in order to draw more reliable conclusions. In our future work, we plan to constitute a collection of real-world signed networks in order to perform this task. We also want to continue studying the MEPs voting data in further details, focusing on the interpretation of the identified balanced clusters. REFERENCES [1] F. Heider. Attitudes and cognitive organization. Journal of Psychology, 21:107–112, 1946. [2] D. Cartwright and F. Harary. Structure balance: A generalization of heider’s theory. Psychological Review, 63(5):277–293, 1956. [3] J. A. Davis. Structural balance, mechanical solidarity, and interpersonal relations. American Journal of Sociology, 68:444–462, 1963. [4] F. Harary. On the notion of balance of a signed graph. Michigan Math. [5] J. A. Davis. Clustering and structural balance in graphs. Human Journal, 2(2):143–146, 1953. Relations, 20:181–187, 1967. [6] M. Levorato, L. Drummond, Y. Frota, and R. Figueiredo. An ils algorithm to evaluate structural balance in signed social networks. In Symposium on Applied Computing, pages 1117–1122, 2015. [7] R. Figueiredo and Y. Frot. The maximum balanced subgraph of a signed graph: Applications and solution approaches. European Journal of Operational Research, 236:473–487, 2014. [8] R. Figueiredo and G. Moura. Mixed integer programming formulations for clustering problems related to structural balance. Social Networks, 35:639–651, 2013. [9] J. Bruggeman, V. A. Traag, and J. Uitermark. Detecting communities through network data. American Sociology Review, 77(6):1050–1063, 2012. [10] M. Brusco and D. Steinly. Integer programas for one- and two-model blockmodeling based on prespecified image matrices for structural and regular equivalence. Journal of Mathematical Psychology, 53:577–585, 2009. [11] B. Yang, W. K. Cheung, and J. Liu. Community mining from signed so- cial networks. IEEE Transactions on Knowledge and Data Engineering, 19(10):1333–1348, 2007. [12] J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. Social Networks, 31:1–11, 2009. [13] P. Doreian and A. Mrvar. Partitioning signed social networks. In ACM International Conference on World Wide Web, pages 641–650, 2010. [14] P. Esmailian, S. E. Abtahi, and M. Jalili. Mesoscopic analysis of online social networks - the role of negative ties. Phys. Rev. E, 90:042817, 2014. [15] M. Rowvall and C. T. Bergstrom. Maps of random walks on complex networks reveal community structure. PNAS, 105(4):1118–1123, 2008. In 43rd [16] N. Bansal, A. Blum, and S. Chawla. Correlation clustering. [17] P. Doreian and A. Mrvar. A partitioning approach to structural balance. IEEE FOCS, pages 238–250, 2002. Social Networks, 18:149–168, 1996. [18] M. Elsner and W. Schudy. Bounding and comparing methods for In Workshop on Integer Linear correlation clustering beyond ilp. Programming for Natural Language Processing, pages 19–27, 2009. [19] P. Doreian. A multiple indicator approach to blockmodeling signed networks. Social Networks, 30:247–258, 2008. [20] P. Doreian and A. Mrvar. Partitioning signed social networks. Social Networks, 31:1–11, 2009. [21] P. Abell and M. Ludwig. Structural balance: a dynamic perspective. Journal of Mathematical Sociology, 33:129–155, 2009. [22] Y. Li, J. Liu, and C. Liu. A comparative analysis of evolutionary and memetic algorithms for community detection from signed social networks. Soft Computing, 18(2):329–348, 2014. [23] C. Liu, J. Liu, and Z. Jiang. A multiobjective evolutionary algorithm based on similarity for community detection from signed social net- works. IEEE Transactions on Cybernetics, 42(12):2274–2287, 2014. [24] B. Yang. Self-organizing network evolving model for mining network community structure. Lecture Notes in Computer Science, 4093:404– 415, 2006. [25] Y. Zeng and J. Liu. Community detection from signed social networks using a multi-objective evolutionary algorithm. Proceedings in Adapta- tion, Learning and Optimization, 1:259–270, 2015. [26] B. Yang and D.-Y. Liu. A heuristic clustering algorithm for mining Journal of Computer Science and communities in signed networks. Technology, 22(2):320–328, 2007. [27] A. Amelio and C. Pizzuti. Community mining in signed networks: A In IEEE-ACM International Conference on multiobjective approach. Advances in Social Networks Analysis and Mining, pages 95–99, 2013. [28] S. Gomez, P. Jensen, and A. Arenas. Analysis of community structure in networks of correlated data. Phys. Rev. E, 80:016114, 2009. [29] K. T. Macon, P. J. Mucha, and M. A. Porter. Community structure in the united nations general assembly. Physica A, 391(1-2):343–361, 2012. [30] V. A. Traag and J. Bruggeman. Community detection in networks with positive and negative links. Phys. Rev. E, 80:036115, 2008. [31] P. Bogdanov, N. D. Larusso, and A. Singh. Towards community discovery in signed collaborative interaction networks. In IEEE ICDM SIASP, pages 288–295, 2010. [32] P. Anchuri and M. Magdon-Ismail. Communities and balance in signed networks: A spectral approach. In International Conference on Advances in Social Networks Analysis and Mining, pages 259–270, 2012. [33] J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. de Luca, and S. Albayrak. Spectral analysis of signed graphs for clustering, prediction and visualization. In SDM, pages 559–570, 2010. [34] L. Wu, X. Ying, X. Wu, A. Lu, and Z.-H. Zhou. Spectral analysis of k- balanced signed graphs. In 15th Pacific-Asia Conference on Knowledge Discovery and Data Mining, volume 6635, pages 11–12, 2011. [35] Q. Cai, M. Gong, B. Shen, L. Ma, and L. Jiao. Discrete particle swarm optimization for identifying community structures in signed social networks. Neural Networks, 58:4–13, 2014. [36] M. Gong, Q. Cai, X. Chen, and L. Ma. Complex network clustering by multiobjective discrete particle swarm optimization based on decompo- sition. IEEE Transactions on Evolutionary Computation, 18(1):82–97, 2013. [37] A. Mrvar and P. Doreian. Partitioning signed two-mode networks. Journal of Mathematical Sociology, 33(3):196–221, 2009. [38] X. L. Chen, Y. Wang, B. Yuan, and B. Z. Tang. Overlapping community Journal of detection in networks with positive and negative links. Statistical Mechanics, 03:P03021, 2014. [39] M. A. Porter, P. J. Mucha, M. E. J. Newman, and C. M. Warmbrand. A network analysis of committees in the u.s. house of representatives. PNAS, 102(20):7057–7062, May 2005. [40] C. dal Maso, G. Pompa, M. Puliga, G. Riotta, and A. Chessa. Voting behavior, coalitions and government strength through a complex network analysis. PLoS ONE, 9(12):e116046, 2014. [41] S. Fortunato. Community detection in graphs. Physics Reports, 486(3- 5):75–174, February 2010. [42] M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys. Rev. E, 69:026113, 2003. [43] P. Pons and M. Latapy. Computing communities in large networks using random walks. Lecture Notes in Computer Science, 3733:284–293, 2005. [44] A. Clauset, M. E. J. Newman, and C. Moore. Finding community structure in very large networks. Phys. Rev. E, 70:066111, 2004. [45] M. E. J. Newman. Modularity and community structure in networks. PNAS, 103(23):8577–8582, 2006. [46] H. R. Loureno, O. Martin, and T. Sttzle. Iterated local search: Framework In Handbook of Metaheuristics, volume 146 of and applications. International Series in Operations Research & Management Science, pages 363–397. Kluwer Academic Publishers, 2010. [47] A. L. N. Fred and A. K. Jain. Robust data clustering. In Computer Vision and Pattern Recognition, volume 2, pages 128–133, 2003.
1607.04318
1
1607
2016-07-14T21:02:21
Understanding Citizen Reactions and Ebola-Related Information Propagation on Social Media
[ "cs.SI", "cs.CY" ]
In severe outbreaks such as Ebola, bird flu and SARS, people share news, and their thoughts and responses regarding the outbreaks on social media. Understanding how people perceive the severe outbreaks, what their responses are, and what factors affect these responses become important. In this paper, we conduct a comprehensive study of understanding and mining the spread of Ebola-related information on social media. In particular, we (i) conduct a large-scale data-driven analysis of geotagged social media messages to understand citizen reactions regarding Ebola; (ii) build information propagation models which measure locality of information; and (iii) analyze spatial, temporal and social properties of Ebola-related information. Our work provides new insights into Ebola outbreak by understanding citizen reactions and topic-based information propagation, as well as providing a foundation for analysis and response of future public health crises.
cs.SI
cs
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) Understanding Citizen Reactions and Ebola-Related Information Propagation on Social Media Thanh Tran Department of Computer Science Utah State University, Logan, UT 84322 Email: [email protected] Kyumin Lee Department of Computer Science Utah State University, Logan, UT 84322 Email: [email protected] 6 1 0 2 l u J 4 1 ] I S . s c [ 1 v 8 1 3 4 0 . 7 0 6 1 : v i X r a Abstract -- In severe outbreaks such as Ebola, bird flu and SARS, people share news, and their thoughts and responses regarding the outbreaks on social media. Understanding how people perceive the severe outbreaks, what their responses are, and what factors affect these responses become important. In this paper, we conduct a comprehensive study of understanding and mining the spread of Ebola-related information on social media. In particular, we (i) conduct a large-scale data-driven analysis of geotagged social media messages to understand citizen reactions regarding Ebola; (ii) build information propagation models which measure locality of information; and (iii) analyze spatial, temporal and social properties of Ebola-related infor- mation. Our work provides new insights into Ebola outbreak by understanding citizen reactions and topic-based information propagation, as well as providing a foundation for analysis and response of future public health crises. I. INTRODUCTION The World Health Organization declared that Ebola became an international public health problem in August 8, 2014. A person infected by Ebola entered the US in September 19, 2014 and passed away on October 8, 2014. Two nurses, who cared the infected person, also got infected. A physician was positively diagnosed on October 23, 2014. Ebola outbreak has created not only severe public health challenges directly in the areas of infections, but also a tumultuous public health information crisis in the US and abroad. For example, when the 2014 Ebola crisis in West Africa erupted, there were strong US-based reactions with schools closed, voluntary quarantines of students who had merely visited a country in Africa, HazMat teams deployed to scenes of everyday illness, among other potentially costly reactions. Ebola outbreak caused public panic and concerns, and people expressed their responses on social media. Examples of tweets expressing concerns about Ebola on Twitter are "What if we all put In so much hard work & when we graduate & get our diplomas, we die of Ebola", and "Another #Ebola patient in #Orlando? Just saw police escorted ambulance going to #MCO airport". While the sharing of public health information and personal health updates (e.g., "I'm sick") has grown with the commensurate spread of social media [1] -- [3], there is a research gap in our understanding of the landscape of reactions to severe outbreaks, the factors affecting these reactions, and the spatial and temporal patterns of these reactions. IEEE/ACM ASONAM 2016, August 18-21, 2016, San Francisco, CA, USA 978-1-5090-2846-7/16/$31.00 c(cid:13)2016 IEEE In this paper, we aim to (i) conduct a data-driven analysis of the Ebola outbreak to understand citizen reactions, (ii) build novel Ebola-related information propagation models, and (iii) examine how spatial, temporal and social properties are related to Ebola-related information propagation. Specifically, we seek to answer following research questions: What kind of Ebola related messages people posted? Can we group their messages by topics? Can we measure locality of Ebola-related information? By conducting two US Ebola case studies, can we understand how Ebola-related information was propagated over time? Which topic of citizen responses was more broadly propagated? To answer these questions, we collected 2 billion tweets from Twitter and extracted geotagged Ebola-related tweets. Then, we make the following contributions in this paper: ‚ We conducted a comprehensive data-driven analysis of the geotagged Ebola-related tweets to understand language distribution and geographic distribution. ‚ We built topic models from citizen reactions and found six topics. Then we measured how locally or globally each topic was spread. ‚ Finally, we defined three locality measures called Ebola focus, entropy and spread. Then, we conducted two US case studies like Dallas case and New York City case with analyzing spatial, temporal and social properties. II. RELATED WORK Ebola virus became a very serious problem in the world, researchers began studying Ebola-related information on social media. Seltzer et al. [4] collected 1,217 Ebola-related images posted on Instagram and Flickr, and grouped the images by 9 themes. Lazard et al. [5] collected 2,155 tweets containing a hashtag #CDCchat, which were posted from the Centers for Disease Control and some Twitter users, and then found 8 topics from the tweets. Fung et al. [2] analyzed how the fre- quency of Ebola-related tweets is correlated with the frequency of searches on Google. Alicino et al. [6] analyzed Google search queries related to the Ebola outbreak to understand the correlation between the number of web searches and the number of Ebola cases. Compared to the previous research works, we collect and analyze a large-scale Ebola-related tweets, especially focusing on geotagged tweets. We build topic models to understand Fig. 1. A distribution of the number of geotagged tweets over time. what kind of responses people had. Then, we analyze how citizen responses are related to spatial, temporal and social properties by designing Ebola propagation models. III. DATASET Ebola virus disease/Ebola was first identified in 1976 in Nzara, South Sudan1. Between 1976 and 2013, 1,716 people got infected by Ebola. According to the report of Centers for Disease Control and Prevention (CDC), there were 20,171 Ebola cases and 7,889 patients were died in 20142. In partic- ular, the total number of cases in 2014 increased from 1,437 to 20,171 between August 2014 and December 2014. In this paper, we focus on Ebola-related tweets posted between August 2014 and December 2014 (i.e., during the major Ebola outbreak). First, we collected 2 billion tweets by using Twitter Streaming APIs and running two crawlers -- one collecting random tweets (random crawler) and the other one collecting only geotagged tweets (geo crawler). Out of 2 billion tweets, we searched a keyword "ebola" in each of 90 languages to extract tweets containing "ebola". Then, we grouped the retrieved tweets by a language, removed duplicated tweets, and counted the number of tweets in each group. We removed if a group consists of less than 100 tweets (i.e., the language was used in less than 100 tweets). Out of 90 languages, each of 35 ones was used in at least 100 tweets. The total number of the remaining Ebola-related tweets was 1,167,539 tweets (569,888 geotagged tweets from geo crawler and 597,651 non-geotagged tweets from random crawler). To estimate geolocation of the remaining 597,651 non- geotagged tweets, we estimated a home location of the non- geotagged tweet posters/users. Based on the previous works estimating a Twitter user's home location [7], [8], we estimated a non-geotagged tweet poster's home location as follows: first, we collected 200 most recent tweets from each user. Among the 200 tweets, we checked how many tweets contained geolocation information. If at least two out of 200 tweets of a user contained geolocation information, we would consider estimating a home location of the user. Otherwise, we filtered the user's Ebola-related tweets from the home location estima- tion process. Given a user's geotagged tweets, we measured the median latitude and median longitude, and used them as geolocation of the user's Ebola-related tweets. Finally, we 1https://en.wikipedia.org/wiki/Ebola virus disease 2http://www.cdc.gov/vhf/ebola/outbreaks/2014-west-africa/previous-case- counts.html estimated geolocation of 199,576 non-geotagged tweets. In the following sections, we use 769,464 (569,888+199,576) geotagged tweets3, posted by 422,596 users for in-depth analysis and study. IV. ANALYSIS OF ALL GEOTAGGED TWEETS In this section, we analyze the 769,464 geotagged tweets. First, we analyzed a distribution of the number of geotagged tweets in our dataset. Figure 1 shows how many geotagged tweets were posted over time. We clearly observed that most tweets were posted between September 30 and October 30, 2014. We highlighted dates of the US imported and domestic cases in the figure. According to a Wikipedia page [9], the first US imported case happened when Thomas Eric Duncan visited his relatives in Dallas, Texas traveled from Liberia on September 30, 2014. Then, he died on October 8, 2014 and infected two nurses (two US domestic cases) who took care of him at Texas Health Presbyterian Hospital. The second US imported case happened when a physician Craig Spencer from Guinea was positively diagnosed on October 23, 2014 in New York City. Next, we analyzed what languages users used in Ebola- related tweets. English was used the most, taking 62.24% of tweets. Then, Spanish, Portuguese, French, Japanese, Italian were used in 18.63%, 8.18%, 3.07%, 1.16% and 1.14% of tweets, respectively. 5.58% of tweets were posted in other languages. An interesting question is "From where tweets were posted?". To answer the question, we analyzed geolocation information associated with tweets in our dataset. In particular, we grouped tweets by a country and counted the frequency. Top 5 countries were United States, Spain, Brazil, U.K. and Niger where 47.06%, 8.03%, 6.72%, 5.24%, 3.12% of tweets were posted from, respectively. Interestingly, most top coun- tries were the ones which had evacuated or imported cases. The remaining top countries were their neighbor countries. V. ANALYSIS OF GEOTAGGED ENGLISH TWEETS So far, we analyzed all the geotagged tweets. Now we turn to analyze geotagged English tweets by topic modeling since English is a major language (62.24% of tweets) in our dataset. In particular, we are interested in understanding what kind of topics users discussed. 3From now on, we call both geotagged tweets and geolocation-estimated tweets as geotagged tweets. Aug 01Aug 11Aug 21Aug 31Sep 10Sep 20Sep 30Oct 10Oct 20Oct 30Nov 09Nov 19Nov 29Dec 09Dec 19Dec 290K10K20K30KNumber of Geotagged Tweets0K10K20K30KFirst US imported caseFirst US imported casepassed awayFirst US domestic caseSecond US domestic caseSecond US imported case 6 LDA TOPICS, NUMBER OF ASSOCIATED TWEETS AND SAMPLE TWEETS. TABLE I Topics (tweets) 1. Ebola cases in US (33,828) Sample Tweets a. Ebola infected missionaries returning to US for treatment. NYC hospitals on alert but no imminent threat. @ABC7NY #ABC7WakeUp b. Top reason Houston is better than Dallas RT @KUT: A Dallas hospital says it has isolated a patient who may have contracted the #Ebola virus 2. Ebola outbreak in the world (37,195) a. The World Health Organization says the Ebola outbreak in West Africa is spreading faster than efforts to control it. #GNreport b. Nigeria Government will be like.....we are fighting EBola; but doctors are on strike for months now! @Emmydny 3. Fear and pray (44,307) a. Praying God will catch this strain of Ebola. Jesus be a mighty fence! b. This EBOLA scares me.... I'm preparing for a break out 4. Ebola spread and warning (44,301) a. The United States has issued travel warning for three West African countries hit by the deadly Ebola virus outbreak. #GNreport b. With this Ebola crisis going on, why aren't we stopping flights in and out of Africa. It seems very dangerous to allow people to travel. 5. Jokes, swear and disapproval of joke (63,648) a. Ebola jokes are for stupid people...bananyana! very unfunny b. "@PrncessAriel: Ebola is scaring the shit out of me" right? Shit's no joke 6. Impact of Ebola to daily life (78,444) a. Feeling not to work tomorrow cos there's bare fobs and I'm shook of Ebola b. Talk on #Ebola: #Ebola stopped me from going to school. #Ebola stopped me from playing.#Ebola stopped me visiting my friends @PlanGlobal working and schooling. Among the six topics, topics 5 and 6 contained the largest number of tweets while topic 1 contained the smallest number of tweets. In other words, many Twitter users talked about jokes, swear and disapproval of joke, and impact of Ebola to their daily life. Compared to 8 topics found by analyzing Centers for Disease Control and Prevention's Ebola live Twitter chat at [5], our topics are more general. Next, we visualized which topic was the most popular in each country on the world map as shown in Figure 2. Topic 2 "Ebola outbreak in the world" was the most popular topic in the world. Specially it was popular in most Ebola countries like Guinea, Sierra Leone, Liberia, Nigeria, Senegal, U.K. and Mali. The next most popular topic was topic 6 "Impact of Ebola to daily life", which was mostly talked in Ebola countries like US and Spain, and some European countries nearby Ebola countries (e.g., France, Morocco, Ireland, Poland and Netherlands nearby Spain, U.K. and Italy). VI. MINING EBOLA-RELATED INFORMATION PROPAGATION In this section, we analyze Ebola-related information prop- agation on social media. To measure how Ebola-related in- formation was spread, we conducted two US imported case studies. According to a Wikipedia page [9], the first US imported case happened on September 30, 2014 in Dallas. The second US imported case happened on October 23, 2014 in New York City. These two imported cases became two events/sources of Ebola-related information to measure how such Ebola-related information was spread. We chose Texas Health Presbyterian Hospital at Dallas and Bellevue at New York City as two center points where Ebola-related tweets first appeared and began spreading to other regions. Note that we used geotagged tweets posted in US in this section since we focused on two US imported cases. Figure 3 shows the number of Ebola-related tweets of each case during five days since each case was confirmed (i.e., positively diagnosed). Interestingly, even though the first case was confirmed on September 30, a peak day was October 1 while a peak day of the second case was October 23, the same day, when the case was confirmed. We conjecture that it took Fig. 2. Major LDA topics in each country. To answer the question, first we extracted geotagged English tweets from our dataset. Then, we removed news tweets each of which contained a title of a news article (e.g., CNN or New York Times articles) because these tweets did not contain a user's opinion or response. Finally, 301,723 geotagged English tweets were extracted and used in this section. Next, we developed topic models based on Latent Dirichlet Allocation (LDA) [10]. Given a collection of Ebola-related messages/tweets, output of LDA is a group of topics each of which contains a set of messages belonging to the topic. From each topic, we can analyze what kind of Ebola-related messages/tweets people posted to social media toward under- standing their responses. Since LDA works better with long documents, instead of using each tweet/message as a document, we aggregated each user's Ebola-related tweets to make a longer document. Based on a perplexity score, we chose K as 6. In other words, we found six topics from the collection of Ebola-related tweets. Table I presents inferred topic labels, the number of associated tweets and sample tweets. Topic 1 and 2 are related to "Ebola cases in US" and "Ebola outbreak in the world", respectively. Topic 3 contains tweets related to "Fear and pray". Users in topic 4 mentioned about "Ebola spread and warning". Topic 5 represents "Jokes, swear and disapproval of joke". Topic 6 contains tweets about "Impact of Ebola to daily life" such as Topic 1Topic 2Topic 3Topic 4Topic 5Topic 6 (a) Dallas case (b) New York City case Fig. 3. The number of Ebola-related tweets posted in US for five days which were related to two cases. (a) Dallas case (b) New York City case Fig. 5. Distributions of tweets in each 30-minute interval of two events. (a) Dallas case (b) New York City case EbolaEntropy(cid:52)t " ´ Next, we define Ebola entropy, which measures spatial distribution of Ebola-related tweets during a time interval, as follows: ÿ liPL nli(cid:52)t n(cid:52)t log2 nli(cid:52)t n(cid:52)t (2) Fig. 4. CDFs of distance between a center point and each geotagged tweet in two cases. time for social media users in US to pay attention on the first case (i.e., 1 day delay), but they responded so quickly when the second case happened. Authors of the previous works [11] suggested that a peak day is the starting day to analyze spread of information, so we chose October 1, 2014 and October 23, 2014 as two starting days to measure the propagation of Ebola-related tweets. Kwak et al. [12] found that the half of tweets were propagated within an hour, and 75% of tweets were propagated within a day for each event. Based on the results, we extracted 32,262 tweets posted in US between October 1 and October 2, 2014 for the first case and 14,336 tweets posted in US between October 23 and October 24, 2014 for the second case. Overall we extracted 46,598 tweets posted in US from our dataset to investigate how spatial, temporal and social properties were related to information propagation. Before performing our analysis, we first define how to measure locality of each case/event. A. Locality Measures and a set of To measure locality of Ebola-related tweets, we propose and use three locality measures based on previous studies [13], [14]: (i) Ebola focus; (ii) Ebola entropy and (iii) Ebola spread. Given a set of Ebola-related tweets/messages M " tm1, m2, m3, ..., mau locations L " tl1, l2, l3, ..., lbu, Ebola focus during a time interval (e.g., 30 minutes) is defined as follows: EbolaF ocus(cid:52)t " 1 n(cid:52)t (1) , where n(cid:52)t is the total number of tweets posted during a time interval (cid:52)t and nli(cid:52)t is the number of tweets posted at a certain location li during the time interval. Equation 1 is to measure the largest fraction of tweets posted in a location during the time interval. The larger Ebola focus is, the more number of tweets was posted in a single location/region. Intuitively, as Ebola-related tweets were prop- agated from one location/region to multiple locations/regions, Ebola focus will be reduced. pnli(cid:52)tq max liPL If all of Ebola-related tweets are posted in a single re- gion/location, Ebola entropy will be zero. As tweets are posted in more number of locations/regions, Ebola entropy will increase accordingly, reflecting spread of Ebola information. To measure how far Ebola-related information was spread, we define Ebola spread of Ebola-related tweets as: Dpl0, liq EbolaSpread(cid:52)t " 1 L (3) Lÿ i"1 which measures the mean distance for all Ebola-related tweets of an Ebola case/event from its geographic midpoint l0. The midpoint of the those tweets is measured by Haversine distance, taking into account the curvature of the Earth. In the following sub-sections, we use Ebola focus, entropy and spread to understand how Ebola-related tweets were propagated. B. Analysis of Spatial Properties Given two events (i.e., Dallas and New York City cases), we analyzed spatial properties like how far Ebola-related tweets were spread, and what Ebola focus, entropy and spread values of the two events are. Figure 4 shows CDFs of distance between a center point and each geotagged tweet of each event. We observed that only a small portion of tweets was spread locally. For example, about 7% and 29% of tweets were posted within 50 miles in Dallas and New York City cases, respectively. In contrast, most Ebola-related tweets were widely spread. For example, in Dallas case, about 46% of tweets were posted in between 100 and 1,000 miles while about 41% of tweets were posted in between 1,000 and 1,500 miles. In New York City case, 37% of tweets were posted in between 100 and 1,000 miles while 13% of tweets were posted in between 1,000 and 1,500 miles and 16% of tweets were posted in over 1,500 miles from a center point. This result shows that both cases got attention from people nationally. Next, we measured Ebola focus, entropy and spread for each of the two events. In particular, in each event, we grouped 46,598 tweets by a US state, considering each state as a location for Ebola focus and Ebola entropy in Equations 1 and 2. For Ebola spread, we used Equation 3. As shown in (a) Ebola focus (b) Ebola entropy (c) Ebola spread Fig. 6. Ebola focus, entropy and spread in 30-minute interval in Dallas and New York City cases. EBOLA FOCUS, ENTROPY AND SPREAD OF DALLAS AND NEW YORK CITY TABLE II CASES. Ebola Case Dallas New York City Focus 0.19 0.27 Entropy 4.62 4.27 Spread (miles) 774 734 Table II, focus, entropy and spread of Dallas case were 0.19, 4.62 and 774, respectively while focus, entropy and spread of New York City case were 0.27, 4.27 and 734, respectively. New York City case had larger focus, smaller entropy and smaller spread than Dallas case. It means tweets related to New York City case were posted more locally or in nearby areas than Dallas case. C. Analysis of Temporal Properties So far we analyzed spatial properties like how far Ebola- related tweets were propagated in US and measured Ebola focus, entropy and spread of the two events. Other interesting research questions are: (i) did both events have similar patterns in terms of the number of posted tweets over time?; and (ii) how did Ebola focus, entropy and spread of the events have been changed over time after a peak? To answer the first question, we divided tweets in each event (again, two day period) by every 30 minutes. Figure 5 shows distributions of tweets in each 30-minute interval for two events. 0 in x-axis means 00:00 (midnight) of the first day. Tweets reached a peak at 42nd interval (9pm) in Dallas case and 40th interval (8pm) in New York City case. Overall, tweet distributions of the events were similar in the first day reaching the peak point, but in the second day users consistently posted tweets in Dallas case than New York City case. We conjecture that since Dallas case is the first imported Ebola case in US, people had longer attention and posted news and responses consistently. To answer the second question, we measured focus, entropy and spread in each 30-minute interval as shown in Figure 6. 0 in x-axis means the time when the number of tweets reached a peak (again, 9pm on October 1 in Dallas case and 8pm on October 23 in New York City case). Since there was some noisy up-and-down in the raw lines, we applied locally weighted scatter plot smoothing (LOWESS) [15] to make the raw lines smoother. Then we analyzed the smoother lines (i.e., LOWESS lines). Focus in Dallas case gradually increased until 270 minutes, then decreased until 600 minutes. It next increased again until 840 minutes, and became stable. It means people nearby Dallas/Texas areas posted more tweets until 270 minutes by paying attention on the Ebola case. Then people outside Dallas/Texas posted more tweets between 270 and 600 minutes, by paying more attention on the case and related news and indicating Ebola-related tweet propagation. Entropy in Dallas case decreased until 360 minutes and then increased until 690 minutes with Ebola-related tweet propagation. Spread in Dallas case increased until 270 minutes after a peak, indicating that even though more tweets were locally posted (increasing focus), people in far areas (e.g., Washington state) also increased the number of related tweets. Then, spread decreased until 630 minutes, indicating people in far areas relatively decreased their tweets compared with local people. Then, spread gradually increased until 900 minutes and became stable. Interestingly, New York City case had different patterns in the change of Ebola focus and entropy over time. In particular, focus in New York City case decreased until 360 minutes after a peak, reaching 0.25 focus. Then, focus increased until 660 minutes and then decreased. Entropy decreased until 480 minutes after a peak and then gradually increased. However, New York City case had similar spread pattern with Dallas case. Overall, New York City case had larger focus, smaller entropy and slightly smaller spread compared with Dallas case. It indicates that Ebola-related information in Dallas case was more widely propagated (or Dallas case got attention from geographically wider areas) since it was the first imported case in US. D. Analysis of Social Properties On Twitter, a followee's posting is automatically displayed to his follower's timeline. In Ebola cases, we are interested in how social ties play an important role in spreading Ebola- related tweets. In other words, will followers post/retweet more Ebola-related tweets as time goes after followees posted Ebola- related tweets? To answer the question, we crawled Twitter following network of users and built propagation trees in which there are two types of nodes: (i) a root node; and (ii) a child node. A root node is a user who first posted an Ebola-related tweet in his social network (i.e., none of his followees had posted Ebola-related tweets before). A child node is a user who posted an Ebola-related tweet and at least one of his followees had posted an Ebola-related tweet before the user. −120012024036060072084096010800.10.150.20.250.30.350.40.45480 Time (minutes)Ebola Focus0.05 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time)−1200120240360600720840960108033.544.55480 Time (minutes)Ebola Entropy2.5 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time)−1200120240360600720840960108050060070080090010001100480 Time (minutes)Ebola Spread400 Dallas − rawDallas − lowessNew York City − rawNew York City − lowess(peak time) EBOLA FOCUS, ENTROPY AND SPREAD OF 6 LDA TOPICS. TABLE III Topic 1 2 3 4 5 6 Focus 0.748 0.577 0.719 0.711 0.761 0.762 Entropy 1.906 2.865 1.945 2.162 1.728 1.695 Spread (miles) 1,918.36 3,043.10 2,025.27 2,280.94 1,812.36 1,810.23 child nodes gradually increased until a few hours after a peak of each case, meaning that social ties played an important role in spreading Ebola-related tweets. Our work provides new insights into Ebola outbreak by understanding citizen reactions and topic/event-based information propagation, as well as providing a foundation for analysis and response of future public health crises. ACKNOWLEDGMENT This work was supported in part by NSF grant CNS- 1553035. Any opinions, findings and conclusions or recom- mendations expressed in this material are the author(s) and do not necessarily reflect those of the sponsors. REFERENCES [1] A. J. Rodriguez-Morales, D. M. Castaneda-Hern´andez, and A. Mc- Gregor, "What makes people talk about ebola on social media? a retrospective analysis of twitter use." Travel medicine and infectious disease, vol. 13, no. 1, 2015. [2] I. C.-H. Fung, Z. T. H. Tse, C.-N. Cheung, A. S. Miu, and K.-W. Fu, "Ebola and the social media," The Lancet, vol. 384, no. 9961, 2014. [3] S. O. Oyeyemi, E. Gabarron, and R. Wynn, "Ebola, twitter, and misinformation: a dangerous combination?" BMJ, vol. 349, 2014. [4] E. Seltzer, N. Jean, E. Kramer-Golinkoff, D. Asch, and R. Merchant, "The content of social media's shared images about ebola: a retrospective study," Public health, vol. 129, no. 9, 2015. [5] A. J. Lazard, E. Scheinfeld, J. M. Bernhardt, G. B. Wilcox, and M. Suran, "Detecting themes of public concern: A text mining analysis of the centers for disease control and prevention's ebola live twitter chat," American journal of infection control, vol. 43, no. 10, 2015. [6] C. Alicino, N. L. Bragazzi, V. Faccio, D. Amicizia, D. Panatto, R. Gas- parini, G. Icardi, and A. Orsi, "Assessing ebola-related web search behaviour: insights and implications from an analytical study of google trends-based query volumes," Infectious diseases of poverty, vol. 4, no. 1, 2015. [7] Z. Cheng, J. Caverlee, and K. Lee, "You are where you tweet: a content- based approach to geo-locating twitter users," in CIKM, 2010. [8] C. A. Davis Jr, G. L. Pappa, D. R. R. de Oliveira, and F. de L Arcanjo, "Inferring the location of twitter messages based on user relationships," Transactions in GIS, vol. 15, no. 6, pp. 735 -- 751, 2011. [9] Wikipedia, "Ebola virus cases in the united states," https://en.wikipedia. org/wiki/Ebola virus cases in the United States, 2016. [10] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," J. Mach. Learn. Res., vol. 3, pp. 993 -- 1022, Mar. 2003. [11] R. Crane and D. Sornette, "Robust dynamic classes revealed by mea- suring the response function of a social system," Proceedings of the National Academy of Sciences, vol. 105, no. 41, 2008. [12] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social network or a news media?" in WWW, 2010. [13] A. Brodersen, S. Scellato, and M. Wattenhofer, "Youtube around the world: geographic popularity of videos," in WWW, 2012. [14] K. Y. Kamath, J. Caverlee, K. Lee, and Z. Cheng, "Spatio-temporal dynamics of online memes: a study of geo-tagged tweets," in WWW, 2013. [15] W. S. Cleveland, "Lowess: A program for smoothing scatterplots by robust locally weighted regression," The American Statistician, vol. 35, no. 1, p. 54, 1981. Fig. 7. Change of a proportion of child nodes in different time slots of Dallas and New York City cases. Next, we examined what percentage of nodes were child nodes in each 30-minute interval. We cumulatively added nodes/users, who posted Ebola-related tweets, as we added more 30 minutes. In the meantime, we measured how a proportion of child nodes changed over time. Figure 7 shows the change of a proportion of child nodes over time. Again 0 in x-axis is a peak of each event in terms of the number of posted Ebola-related tweets. In Dallas case, a proportion of child nodes gradually increased until 240 minutes after a peak, and then became stable, reaching 35% (i.e., 35% of nodes were child nodes). Likewise, in New York City case, a proportion of child nodes gradually increased until 120 minutes after a peak, and then became stable, reaching 23%. This analysis shown that social ties played an important role to propagate Ebola-related information within a few hours after a peak. In other words, social properties/ties affected the propagation of Ebola-related information over social media. VII. FOCUS, ENTROPY AND SPREAD OF SIX TOPICS Now we apply three locality measures -- Ebola focus, entropy and spread -- to 6 LDA topics that we found in Section V. Given a set of Ebola-related tweets associated with each topic, we examined which topic was more globally or locally discussed by applying the locality measures to each topic. As shown in Table III, topic 2 "Ebola outbreak in the world" had the lowest focus, highest entropy and highest spread which mean the topic was discussed more globally than the rest. It makes sense because the topic itself is related to the world. However, topic 5 "Jokes, swear and against jokes" and topic 6 "Impact of Ebola to daily life" had the highest focus, lowest entropy and lowest spread which mean that the topics were discussed more locally than the rest. VIII. CONCLUSION In this paper, we have presented a comprehensive analysis of the spread of Ebola-related information. In particular, we have conducted a large-scale data-driven analysis of 0.77 million geotagged tweets extracted from 2 billion tweets. By building topic models, we have found 6 topics. Then, we have analyzed how spatial, temporal and social properties were related to propagation of those tweets. We have found that (i) tweets related to New York City case were more locally propagated than tweets related to Dallas case; (ii) New York City case had consistently larger focus, smaller entropy and smaller spread over time; and (iii) a proportion of
1703.06231
1
1703
2017-03-18T01:43:17
Network Comparison: Embeddings and Interiors
[ "cs.SI" ]
This paper presents methods to compare networks where relationships between pairs of nodes in a given network are defined. We define such network distance by searching for the optimal method to embed one network into another network, prove that such distance is a valid metric in the space of networks modulo permutation isomorphisms, and examine its relationship with other network metrics. The network distance defined can be approximated via multi-dimensional scaling, however, the lack of structure in networks results in poor approximations. To alleviate such problem, we consider methods to define the interiors of networks. We show that comparing interiors induced from a pair of networks yields the same result as the actual network distance between the original networks. Practical implications are explored by showing the ability to discriminate networks generated by different models.
cs.SI
cs
Network Comparison: Embeddings and Interiors Weiyu Huang and Alejandro Ribeiro 1 Abstract -- This paper presents methods to compare networks where relationships between pairs of nodes in a given network are defined. We define such network distance by searching for the optimal method to embed one network into another network, prove that such distance is a valid metric in the space of networks modulo permutation isomorphisms, and examine its relationship with other network metrics. The network distance defined can be approximated via multi-dimensional scaling, however, the lack of structure in networks results in poor approximations. To alleviate such problem, we consider methods to define the interiors of networks. We show that comparing interiors induced from a pair of networks yields the same result as the actual network distance between the original networks. Practical implications are explored by showing the ability to discriminate networks generated by different models. Index Terms -- Network theory, networked data, network compar- ison, metric spaces, pattern recognition 7 1 0 2 r a M 8 1 ] I S . s c [ 1 v 1 3 2 6 0 . 3 0 7 1 : v i X r a I. INTRODUCTION The field of network science is predicated on the empirical observation that network structure carries important information about phenomena of interest. Network structures have been ob- served to be fundamental in social organizations [1] and dif- ferences in the structure of brain networks have been shown to have clinical value in neurology and psychology [2]. The fundamental value of network structure has led to an extensive literature on network identification that is mostly concerned with the identification of network features that serve as valuable discriminators in different contexts. Examples of these features and application domains are clustering coefficients [3] and motifs [4] in social networks; neighborhood topology [5], betweenness [6], and wavelets [7] in protein interaction networks; as well as graphlet degree distributions [8], graph theoretic measures [9], and single linkage dendrogram [10] and homology [11] in different contexts. However valuable, it is material to recognize that it is possible for very different networks to be indistinguishable from the perspective of specific features, or, conversely, to have similar networks that differ substantially on the values of some features. One way to sidestep this limitation it to define and evaluate proper network distances. This is the objective of this paper. Without getting into the details of how a valid distance might is apparent that their computation is bound to be defined, it be combinatorial. Indeed, since permutations of unlabeled nodes result in identical networks, distances must rely on comparison between a combinatorial number of node correspondences -- evaluating distances is relatively simpler if nodes are labeled [12] -- [14]. An important observation in this regard is that the space of finite metric spaces is a subset of the space of networks composed of those whose edges satisfy the triangle inequality. This observation is pertinent because there is a rich literature on the comparison of metric spaces that we can adopt as a basis for generalizations that apply to the comparison of networks. Of particular interest here are the Gromov-Hausdorff distance, which measures the size of the smallest modification that allows the spaces to be mapped onto each other [15], [16], and the partial Electrical and Systems Engineering, University of Pennsylvania, 200 S 33rd Street, Philadelphia, PA 19104. Email: whuang, [email protected]. embedding distance, which measures the size of the smallest modification that allows a space to be embedded in the other [17] -- [19]. The computation of either of these distances is intractable. However, Gromov-Hausdorff distances can be tractably approxi- mated using homological features [20] and embedding distances can be approximated using multi-dimensional scaling (MDS) [17]. In prior work we have defined generalizations of the Gromov- Hausdorff distance [21], [22] to networks, and utilized homologi- cal features for computationally tractable approximate evaluations [23], [24]. Our starting point here is the partial embedding distance for metric spaces [16] -- [19]. Our goal is to generalize embedding distances to arbitrary networks and utilize MDS tech- niques for their approximate computation. A. Organization And Contributions Networks, metrics, embedding metrics, and the Gromov- Hausdorff distance for networks are defined in Section II. The issue of defining an embedding distance for networks is addressed in Section III. The idea of an embedding distance d(A, B) is to analyze how much we have to modify network A to make it a subset of network B. This is an asymmetric relationship. In particular, having d(A, B) = 0 means that network A can be embedded in network B but the opposite need not be true. The first contribution of this paper is to: (i) Define network embeddings and a corresponding notion of partial embedding distances. Partial embedding distances define an embedding metric d such that d(A, B) = 0 if and only if A can be embedded in B. We attempt to use the MDS techniques in [18] to approximate the computation of embedding distances but observe that the methodology yields poor results -- see Figure 1 for an illustration of why this is not unexpected. To improve these results we observe that when edge dissimilarities satisfy a triangle inequality, an Euclidean interior is implicitly defined. In the case of arbitrary networks this is not true and motivates the definition of the interior of a network that we undertake in Section IV. The second contribution of this paper is to: (ii) Provide a definition of the interior of a network. The interior of a set of nodes is the set of points that can be written as convex combinations of the nodes. When the network forms a metric space, the dissimilarity between a pair of points in the interior is the distance on the shortest path between the pair. When the dissimilarities in the network do not form a metric space, e.g. representing travel time between nodes, such construction would yield conflict. The problem can be solved by defining the dissimilarity between a pair of points as the travel time on the shortest path between the pair. Having the ability to extend networks into their interiors, we extend different networks and compute partial embedding distances between their extensions. In principle, distances between two networks and their respective extensions need not be related. In Section IV-A we show that a restriction in the embedding of the extended networks renders them identical. Our third and most important contribution is to: (iii) Define embeddings for extended networks such that points in one of the original networks -- prior to extension -- can only be embedded into original points of the other network. We show that the embedding distance that results from this restriction is the same embedding distance between the original networks. The definition of interior is somewhat arbitrary, however be- cause of (iii), the practical implication of interior definition is justified. We point out that a network extension is a dense set that includes all the convex combinations of sets of points. To make interior extensions practical we consider samplings of the interior in Section IV-B. It is not difficult to show in light of Contribution (iii) that the embedding distance between a a pair of networks extended to samples of their interiors is also identical to the embedding distance between the original pair of networks -- if the restriction in the mapping of original nodes is retained. We exploit Contributions (ii) and (iii) to approximate the computation of embedding distances using the MDS techniques in [18] but applied to networks extended to their interiors. The definition of an interior markedly improves the quality of MDS distance approximations. We illustrate this fact in Section V with an artificial illustrative example and also demonstrate the ability to discriminate networks with different generative models. We only extend by adding points that are mid-points of original nodes in the networks, in order to make the process computationally tractable. The small number of points considered in interiors is sufficient to distinguish networks of different processes, despite that the original networks may possess different number of nodes. II. PRELIMINARIES A network is defined as a pair NX = (X, rX ), where X is a finite set of nodes and rX : X 2 = X × X → R+ is a function encoding dissimilarity between pairs. For x, x′ ∈ X, values of this function are denoted as rX (x, x′). We assume that rX (x, x′) = 0 if and only if x = x′ and we further restrict attention to symmetric networks where rX (x, x′) = rX (x′, x) for all pairs of nodes x, x′ ∈ X. The set of all such networks is denoted as N . When defining a distance between networks we need to take into consideration that permutations of nodes amount to rela- belling nodes and should be considered as same entities. We there- fore say that two networks NX = (X, rX ) and NY = (Y, rY ) are isomorphic whenever there exists a bijection φ : X → Y such that for all points x, x′ ∈ X, rX (x, x′) = rY (φ(x), φ(x′)). (1) Such a map is called an isometry. Since the map φ is bijective, (1) can only be satisfied when X is a permutation of Y . When networks are isomorphic we write NX ∼= NY . The space of networks where isomorphic networks NX ∼= NY are represented by the same element is termed the set of networks modulo isomorphism and denoted by N mod ∼=. The space N mod ∼= can be endowed with a valid metric [21], [22]. The definition of this distance requires introducing the prerequisite notion of correspondence [25, Def. 7.3.17]. Definition 1 A correspondence between two sets X and Y is a subset C ⊆ X × Y such that ∀ x ∈ X, there exists y ∈ Y such that (x, y) ∈ C and ∀ y ∈ Y there exists x ∈ X such that (x, y) ∈ C. The set of all correspondences between X and Y is denoted as C(X, Y ). 2 A correspondence in the sense of Definition 1 is a map between node sets X and Y so that every element of each set has at least one correspondent in the other set. Correspondences include permutations as particular cases but also allow mapping of a in X to multiple correspondents in Y or, vice single point versa. Most importantly, this allows definition of correspondences between networks with different numbers of elements. We can now define the distance between two networks by selecting the correspondence that makes them most similar as stated next. Definition 2 Given two networks NX = (X, rX ) and NY = (Y, rY ) and a correspondence C between the node spaces X and Y define the network difference with respect to C as The network distance between NX and NY is then defined as ΓX,Y (C) := . (2) max (x,y),(x′,y ′)∈C(cid:12)(cid:12)(cid:12) rX (x, x′) − rY (y, y′)(cid:12)(cid:12)(cid:12) C∈C(X,Y )nΓX,Y (C)o. dC(NX , NY ) := min (3) For a given correspondence C ∈ C(X, Y ) the network difference ΓX,Y (C) selects the maximum distance difference rX (x1, x2) − rY (y1, y2) among all pairs of correspondents -- we compare rX (x1, x2) with rY (y1, y2) when the points x1 and y1, as well as the points x2 and y2, are correspondents. The distance in (3) is defined by selecting the correspondence that minimizes these maximal differences. The distance in Definition 2 is a proper metric in the space of networks modulo isomorphism. It is nonnegative, symmetric, satisfies the triangle inequality, and is null if and only if the networks are isomorphic [21], [22]. For future reference, the notion of metric is formally stated next. Definition 3 Given a space S and an isomorphism ∼=, a function d : S × S → R is a metric in S mod ∼= if for any a, b, c ∈ S the function d satisfies: (i) Nonnegativity. d(a, b) ≥ 0. (ii) Symmetry. d(a, b) = d(b, a). (iii) Identity. d(a, b) = 0 if and only if a ∼= b. (iv) Triangle inequality. d(a, b) ≤ d(a, c) + d(c, b). A metric d in S mod ∼= gives a proper notion of distance. Since zero distances imply elements being isomorphic, the dis- tance between elements reflects how far they are from being isomorphic. The distance in Definition 2 is a metric in space N mod ∼=. Observe that since correspondences may be between networks with different number of elements, Definition 2 defines a distance dC(NX , NY ) when the node cardinalities X and Y are different. In the particular case when the functions rX satisfy the triangle inequality, the set of networks N reduces to the set of metric spaces M. In this case the metric in Definition 2 reduces to the Gromov-Hausdorff (GH) distance between metric spaces. The distances dC(NX , NY ) in (3) are valid metrics even if the triangle inequalities are violated by rX or rY [21], [22]. A related notion is that of an isometric embedding. We say that a map φ : X → Y is an isometric embedding from NX = (X, rX ) to NY = (Y, rY ) if (1) holds for all points x, x′ ∈ X. Since rX (x, x′) = rY (φ(x), φ(x′)) for any x, x′ ∈ X, rX (x, x′) > 0 for x 6= x′ and rY (y, y) = 0, the map φ is injective. This implies that the condition can only be satisfied when NX = (X, rX ) is a sub-network of NY = (Y, rY ). Such a map is called an isometric embedding. When NX can be isometrically embedded into NY , we write NX ⊑ NY . Related to the notion of isometric embedding is the notion of an embedding metric that we state next. Definition 4 Given a space S and an isometric embedding ⊑, a function d : S × S → R is an embedding metric in S if for any a, b, c ∈ S the function d satisfies: (i) Nonnegativity. d(a, b) ≥ 0. (ii) Embedding identity. d(a, b) = 0 if and only if a ⊑ b. (iii) Triangle inequality. d(a, b) ≤ d(a, c) + d(c, b). The embedding distance dPE(NX , NY ) from one network NX to another network NY is not a metric due to its asymmetry. We can construct a symmetric version from dPE(NX , NY ) by taking the maximum from the embedding distance dPE(NX , NY ) and dPE(NY , NX ). This would give us a valid metric distance in N mod ∼=. A formal definition and theorem are shown next. Definition 6 Given two networks NX = (X, rX ), NY = (Y, rY ), define the embedding distance between the pair as dE(NX , NY ) := max {dPE(NX , NY ), dPE(NY , NX )} . (6) 3 It is apparent that metrics are embedding metrics because bijections are injective, and that in general embedding metrics are not metrics because they are asymmetric. In this paper, we consider defining an embedding distance between networks and evaluate its relationship with the Gromov-Hausdorff distance (Section III). We then consider the problem of augmenting the networks by adding points to fill their "interior". The interior is defined so that embedding metrics between the original networks and embedding metrics between these augmented spaces coincide (Section IV). III. EMBEDDINGS As is the case with correspondences, mappings also allow defi- nition of associations between networks with different numbers of elements. We use this to define the distance from one network to another network by selecting the mapping that makes them most similar as we formally define next. Definition 5 Given two networks NX = (X, rX ), NY = (Y, rY ), and a map φ : X → Y from node space X to the node space Y , define the network difference with respect to φ as partial distances where dPE(NX , NY ) are defined in Definition 5. embedding dPE(NX , NY ) and Theorem 1 The function dE : N × N → R+ defined in (6) is a metric in the space N mod ∼=. Since embedding distances between two networks generate a well-defined metric, they provide a means to compare networks of arbitrary sizes. In comparing the embedding distance in (6) with the network distance in (3) we see that both find the bottleneck that prevents the networks to be matched to each other. It is not there surprising to learn that they satisfy the relationship that we state in the following proposition. Proposition 2 The network distance dC(NX , NY ) defined in (3) can also be written as dC(NX , NY ) = min φ:X→Y ψ:Y →X max {∆X,Y (φ),∆Y,X (ψ),δX,Y (φ,ψ)}, (7) where the network differences ∆X,Y (φ) and ∆Y,X (ψ) with re- spect to mappings φ and ψ are defined in (4) and δX,Y (φ, ψ) measures how far the mappings φ and ψ are from being the inverse of each other, and is defined as The partial embedding distance from NX to NY is defined as ∆X,Y (φ) := max x,x′∈X(cid:12)(cid:12)(cid:12) rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12) φ:X→Y n∆X,Y (φ)o. dPE(NX , NY ) := min . (4) δX,Y (φ, ψ) = max x∈X,y∈Y rX (x, ψ(y)) − rY (φ(x), y) . (8) A direct consequence of Lemma 2 is that the embedding (5) distance (6) is a lower bound of the network distance (3). Both, Definition 2 and Definition 5 consider a mapping between the node space X and the node space Y , compare dissimilarities, and set the network distance to the comparison that yields the smallest value in terms of maximum differences. The distinction between them is that in (2) we consider correspondence, which requires each point in any node spaces (X or Y ) to have a correspondent in the other node space, whereas in (4) we examine mappings, which only require all points in node space X to have one correspondent in the node set Y . Moreover, in (2), a node x ∈ X may have multiple correspondents, however, in (4), a node x ∈ X can only have exactly one correspondent. Except for this distinction, Definition 2 and Definition 5 are analogous since ∆X,Y (φ) selects the difference rX (x1, x2) − rY (y1, y2) among all pairs. The distance dPE(NX , NY ) is defined by selecting the mapping that minimizes these maximal differences. We show in the following proposition that the function dPE : N × N → R+ is, indeed, an embedding metric in the space of networks. Proposition 1 The function dPE : N × N → R+ defined in (5) is an embedding metric in the space N . Proof: See Appendix A for proofs in Section III. (cid:4) Corollary 1 Function dE is a lower bound with dC in (3), i.e. dE(NX , NY ) ≤ dC(NX , NY ), (9) for any networks NX and NY . The relationships in Lemma 2 and Corollary 1 are extensions of similar analyses that hold for the Gromov-Hausdorff distance between metrics spaces, [26], [27]. As in the case of metric spaces, these results imply that the embedding distance dE(NX , NY ) can be used to lower bound the network distance dC(NX , NY ) [cf. (9)]. This value is in addition to the ability of the partial embedding distance dPE(NX , NY ) of Definition 5 to measure how far the network X is to being a subnetwork of network Y . In the comparison of surfaces and shapes, the partial embedding distance dPE(NX , NY ) has the attractive property of being approx- imable using multidimensional scaling techniques [17], [19]. Our empirical analysis shows that the use of analogous techniques to estimate dPE(NX , NY ) for arbitrary networks yields poor results and that this is related to how far the dissimilarities in NX and NY are from satisfying the triangle inequality -- see the example in Figure 1 and the numerical analysis in Section V. To improve the accuracy of multidimensional scaling estimates we NX c c 1 0 -1 -6 1 -4 -2 a 11 a 0 1 b b 2 4 6 NY c c 1 0 -1 -6 3 -4 -2 a 11 a 0 3 b b 2 4 6 NZ c c 1 0 -1 -6 5 -4 -2 a 11 a 0 5 b b 2 4 6 Fig. 1. An example where different networks result in identical multi-dimensional scaling results. We emphasize that the number of dimension used in multi-dimensional scaling would not distinguish networks since the triangle inequality property for relationships between nodes in the networks is violated. Such a caveat would be solved by inducing semimetrics in the space defined by the given networks, as we develop throughout Section IV. 4 NX = (X, rX ) a (1, 0, 0) a (SX , sX ) rX (a, b) rX (a, b) rX (a, c) ⇒ f rX (a, c) (0.5, 0, 0.5) e m (ma, mb, mc) c rX (b, c) b c (0, 0, 1) g rX (b, c) b (0, 1, 0) Fig. 2. An example of induced space with points defined in the original network. We would like to induce a space (SX , sX ) such that SX includes infinite number of points formed by the convex of the original points a, b, and c, and sX is a semimetric for any pair of points in SX . We want to induce the semimetric from the original network such that sX (a, b) = rX (a, b), sX (a, c) = rX (a, c), and sX (b, c) = rX (b, c). Middle points, e.g. e, can be considered as the entity represents 50% of a and 50% of b. An important observation is that any points in the space, e.g. m, can be written as a convex combination representing the proportion of their contents from original nodes -- (ma, mb, mc) with ma + mb + mc = 1. propose to define the interior of a network by defining a space where dissimilarities between any pair of points represented by a convex combination of nodes in the given networks are defined (Section IV). We will further demonstrate that the proposed definition of the interior of a network is such that the partial embedding distances between networks with interiors are the same as the partial embedding distances between the corresponding original networks (Theorems 2 and 3). Empirical demonstrations will show that the comparison of networks with interiors using MDS techniques yields better results that are comparable to those obtained when comparing shapes and surfaces (Section V). IV. INTERIORS We provide a different perspective to think of networks as semimetric spaces where: (i) There are interior points defined by convex combinations of given nodes. (ii) Dissimilarities between these interior points are determined by the dissimilarities between the original points. To substantiate the formal definition below (Definition 7) we discuss the problem of defining the interior of a network with three points. Such network is illustrated in Figure 2 where nodes are denoted as a, b, and c and dissimilarities are denoted as rX . Our aim is to induce a space (SX , sX) where the dissimilarities in the induced space are sX : SX × SX → R+. We require that SX preserve the distance of original points in NX such that sX (a, b) = rX (a, b), sX (a, c) = rX (a, c), and sX (b, c) = rX (b, c). Points inside the network are represented in terms of convex combinations of the original points a, b, and c. Specifically, a point m in the interior of the network is represented by the tuple (ma, mb, mc) which we interpret as indicating that m contains an ma proportion of a, an mb proportion of b, and an mc proportion of c. Points e, f , and g on Figure 2 contain null proportions of some nodes and are interpreted as lying on the edges. Do notice that although we are thinking of m as a point inside the triangle, a geometric representation does not hold. First we consider the case that the triangle inequality is satisfied by rX . To evaluate the dissimilarities between p represented by (1, 0, 0) a q3 (pa, pb, pc) p q4 q2 (0, 0, 1) c w⋆ ab q1 (ma, mb, mc) m w⋆ bc b (0, 1, 0) Fig. 3. Comparing arbitrary points inside the space induced from networks of three nodes. Given a pair of nodes p and m in the induced space, we need to find paths from p to m that are consisted of vectors parallel to the direction of original nodes in the networks, e.g. a to b, a to c, and/or b to c. We assume the direction of original nodes in the networks have unit amount of transformation. Potential choices of paths from p to m include: p to m via q1, via q2, or via q3. Of them, the path p to m via q1 has the smallest amount of transformation traversed along the path. There are paths in the form which involves vectors p to q2, q2 to q4, and q4 to m; such paths would not give the optimal solution to (13). the tuple (pa, pb, pc) and m represented by the tuple (ma, mb, mc) using dissimilarities in the original network, we need to find a path consisting of vectors parallel to the edges in the network that go to m from p. Specifically, denote wab as the proportion transversed in the direction from a to b in the path. For a positive value wab, compared to p, m becomes more similar to b by wab units and less similar to a by −wab units; for a negative wab, compared to p, m becomes more similar to a and less similar to b. Proportion transversed in other directions, e.g. from a to c and from b to c, are denoted as wac and wbc, respectively. For the path transversing wab from a to b, wac from a to c, and wbc from b to c, the dissimilarity can be denoted as wabrX (a, b) + wacrX (a, c) + wbcrX (b, c). There may be many different paths from p to m, as illustrated in Figure 3. Out of all paths, only the one yielding the smallest distance should be considered. This means the dissimilarity sX (p, m) between p and m can be defined by solving the following problem, wab rX (a, b) + wac rX (a, c) + wbc rX (b, c) min s. t. ma = pa − wab − wac, mb = pb + wab − wbc, mc = pc + wac + wbc. (10) the path starts with tuple The constraints make sure that (ma, mb, mc) and ends with tuple (pa, pb, pc). This is like the definition of Manhattan distance. In fact, if Manhattan was a triangle with three endpoints and the roads in Manhattan were in a triangle grid, then the distance between any pair of points in Manhattan would be evaluated as in (10). When relationships in rX do not satisfy triangle inequality, e.g. rX (a, b) + rX (b, c) < rX (a, c), however, the construction in (10) is problematic since the optimal solution in (10) would yield sX (a, c) = rX (a, b) + rX (b, c), which violates our requirement that sX (a, c) should be the same as rX (a, c). The problem arises because each segment in a given path contains two pieces of in- formation -- the proportion of transformation, and the dissimilarity created of such transformation. E.g. for the path segment pq1 in Figure 3, it represents w⋆ ab units of transformation from a to b, and also denotes a dissimilarity between p and q1 as w⋆ abrX (a, b). The two pieces of information unite when rX is a metric, however, create conflicts for dissimilarities in a general network. To resolve such issue, we could separate the amount of transformation from the dissimilarity incurred due to transformation. Firstly, we find the path with the smallest amount of transformation wab + wac + wbc min s. t. ma = pa − wab − wac, mb = pb + wab − wbc, mc = pc + wac + wbc. (11) Then, for the optimal path w⋆ dissimilarity as the distance transversed on the path, i.e. ac, and w⋆ ab, w⋆ bc in (11), define the sX (p, m) = w⋆ ab rX (a, b)+w⋆ bc rX (b, c)+w⋆ ac rX (a, c). (12) The problem in (11) can always be solved since it is underdeter- mined due to the facts that ma + mb + mc = pa + pb + pc = 1. It traces back to (10) when relationships in network are met- rics. Moreover, it satisfy our requirement sX (a, b) = rX (a, b), sX (a, c) = rX (a, c), and sX (b, c) = rX (b, c) for any networks. Regarding our previous example of a triangle-shaped Manhattan with three endpoints, suppose relationships in the network denote the amount of travel time between the endpoints. These relation- ship may not necessarily satisfy triangle inequalities. Suppose roads in Manhattan form a triangle grid, the problem in (11) is finding the shortest path between a pair of locations in Manhattan. The dissimilarity in (12) describes the travel time between this pair of locations using the shortest path. Given any network with arbitrary number of nodes, we define the induced space as a generalization to the case for nodes with three nodes we developed previously. Definition 7 Given a network NX = (X, rX ) with X = {1, 2, . . . , n}, the induced space (SX , sX ) is defined such that the space SX is the convex hull of X with SX = {m = of nodes m, p ∈ SX , the path yielding the smallest amount of transformation from p to m is obtained through the problem (m1, m2, . . . , mn) mi ≥ 0,Pi∈X mi = 1}. Given a pair ij(cid:9) = argmin Xi,j∈X,i<j (cid:8)w⋆ wij (13) s. t. mi = pi − Xj∈X,j>i wij + Xj∈X,j<i wji, ∀i The distance between p and m is then the distance traversed proportional to the original relationships weighted by the path, sX (p, m) = Xi,j∈X,i<j(cid:12)(cid:12)w⋆ ij(cid:12)(cid:12) rX (i, j). (14) The induced space SX is the convex hull constructed by all nodes i ∈ X. Each node in the induced space m ∈ SX can be represented as a tuple (m1, m2, . . . , mn) with Pi∈X mi = 1 where mi represents the percentage of m inheriting the property of node i ∈ X. To come up with distance between pairs of points p, m ∈ SX with the respective tuple representation (p1, p2, . . . , pn) and (m1, m2, . . . , mn), we consider each edge in the original space X, e.g. from i to j, represents one unit of cost to transform i into j. All edges are considered similarly with one unit of cost to transform the starting node into the ending node. We want to find the smallest amount of cost to transform p into m. This is solved via (13), which is always solvable since the problem is underdetermined due to the facts that 5 (QX , rX ) a x1 x3 φ φ φ q x4 x2 φ b x5 x6 c φ (QY , rY ) u φ y1 y2 φ v Fig. 4. An example of regular sample pair (QX , rX ) and (QY , rY ), where QX = {a, b, c, x1, x2, x3, x4, x5, x6, q} collects original points and induced points that are combination of one-third of original nodes, and QY = {u, v, y1, y2}. Here we illustrate a specific mapping φ with φ(a) = φ(b) = u and φ(c) = v; it is apparent that φ(x) ∈ QY for any x ∈ QX . Note that QX = QX /{q} also form a regular sample pair with QY . Pi∈X mi = Pi∈X pi = 1. This gives us the optimal path with weights {w⋆ ij } meaning that the most cost-saving transformation from p into m is to undertaking w⋆ ij unit of transformation along the direction of transforming i into j. The distance in the induced space sX (p, m) is then the distance traversed proportional to the original relationships weighted by the path defined in (14). Proposition 3 The space (SX , sX ) induced from NX = (X, rX ) defined in Definition 7 is a semimetric space in SX . Moreover, the induced space preserves relationships: when p, m ∈ X, sX (p, m) = rX (p, m). Proof: See Appendix B for proofs in Section IV. (cid:4) The semimetric established in Proposition 3 guarantees that the points in the induced space with their dissimilarity sX (p, m) are well-behaved. We note that semimetric is the best property we can expect, since the triangle inequality may not be satisfied even for the dissimilarities in the original networks. Next we show that the embedding distance is preserved when interiors are considered. A. Distances Between Networks Extended To Their Interiors Since semimetrics are induced purely from the relationships in the original network, a pair of networks NX and NY can be compared by considering their induced space, as we state next. Definition 8 Given two networks NX = (X, rX ) and NY = (Y, rY ) with their respective induced space (SX , sX ) and (SY , sY ), for a map φ : SX → SY from the induced space SX to the induced space SY such that φ(x) ∈ Y for any x ∈ X, define the network difference with respect to φ as ∆SX ,SY (φ) := max dPE, S(NX , NY ) := The partial embedding distance from NX to NY measured with respect to the induced spaces is then defined as . x,x′∈SX(cid:12)(cid:12)(cid:12) sX (x, x′) − sY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12) φ:SX →SY φ(x)∈Y,∀x∈Xn∆SX ,SY (φ)o. min (15) (16) The partial embedding distance dPE, S(NX , NY ) with respect to the induced space in (16) is defined similarly as the partial embedding distance dPE(NX , NY ) in (5) however considers the mapping between all elements in the induced spaces. Observe that we further require that the embedding satisfy φ(x) ∈ Y for any x ∈ X. This ensures the original nodes of network X are mapped to original nodes of network Y . The restriction is incorporated because it makes the embedding distance dPE, S(NX , NY ) with respect to the induced spaces identical to the original embedding distance dPE(NX , NY ) as we state next. (QX , rX ) 0.5 0.5 c e 0.5 5.5 a 5.5 6 f f 0.5 0.5 d 5.5 d 0.5 b 1.5 c b 3 2 1 0 -1 -2 -3 -6 e c a 0 -4 -2 2 4 6 (QY , rY ) 1.5 e 1.5 5.5 3 2 1 0 -1 -2 -6 b e -4 -2 a 5.5 7 f f a 0 1.5 1.5 d 5.5 1.5 b 2.5 c d c 2 4 6 6 2.5 b 2.5 2.5 d 5.5 e b 2 4 6 (QZ , rZ ) 2.5 e 2.5 5.5 3 2 1 0 -1 -2 -3 -6 d c -4 -2 a 5.5 8 f f a 0 Fig. 5. The caveat illustrated in Figure 1 where different networks results in identical multi-dimensional scaling results could be solved by considering the induced sample space where we utilize the same predetermined sampling strategy -- taking midpoints for all edges -- in the network. Multi-dimensional scaling by adding interiors would distinguish different networks. The dissimilarities between nodes a and f are not illustrated in the respective induced network due to space limit. Theorem 2 The function dPE, S : N ×N → R+ defined in (16) is an embedding metric in the space N and yields the same distance as the function dPE defined in (5), dPE, S(NX , NY ) = dPE(NX , NY ), for all NX , NY . (17) The statement in Theorem 2 justifies comparing networks via their respective induced space. Similar as in Definition 6, defining max{dPE, S(NX , NY ), dPE, S(NY , NX)} would yield a metric in the space N mod ∼= and this maximum is the same as dE defined in (6). Since the induced spaces incorporate more information of the original networks while at the same time dPE, S(NX , NY ) = dPE(NX , NY ), an approximation to dPE, S(NX , NY ) via the in- duced space would be a better approximation to dPE(NX , NY ). It may appear that the evaluation of the induced space is costly. However, we demonstrate in the next subsection that the partial embedding distances have a nice property that if we sample a number of points in the induced spaces respectively according to the same rule, the distance between the sampled induced space is the same as the original distance. Despite that the definition of interiors of networks is somewhat arbitrary, its practical usefulness can be justified from Theorem 2. B. Sampling Of Interiors In this section, we consider a practical scenario where we only take several samples in the induced space. We show that comparing the combination of nodes in the respective original networks and sampled nodes in the induced space would yield the same result as comparing the original networks. Given a network NX = (X, rX ), our aim is to define a sampled induced space (QX , rX ) where QX ⊃ X includes more nodes compared to X. An example is in Figure 5, where the original node space is given by {a, b, c}, and one version of sampled induced node space is QX = {a, b, c, e, f, g}, the union of the original nodes and the nodes in the midpoints of the edges in the original networks. The distance in the sampled induced space rX : QX × QX → R+ should preserve the distance of original points in X. A natural choice for rX is the restriction of the distance sX defined for the induced space SX : i.e. given any pair of points x, x′ ∈ QX , let rX (x, x′) := sX (x, x′). Our key observation for such construction is that if the nodes in the induced spaces of a pair of networks are sampled according to the same strategy, then the distance between the sampled induced space is identical to the original distance. We start by formally describing what do we mean by a pair of networks sampled according to the same rule as next. Definition 9 Given a pair of networks NX = (X, rX ) and NY = (Y, rY ), their respective sampled space (QX , rX ) and (QY , rY ) form a regular sample pair, if for any mapping φ : X → Y in the original node set, we have φ(x) ∈ QY for any x ∈ QX , where φ : SX → SY is the map induced from φ such that φ : x 7→ φ(x) whose the i-th element in the tuple representation [φ(x)]i is [φ(x)]i = Xj∈X 1n φ(j) = io xj, (18) and for any mapping ψ : Y → X in the original node set, we have ψ(y) ∈ QX for any x ∈ QX where ψ : SY → SX is the map induced from ψ such that the j-th element in the tuple representation of ψ(y) is [ψ(y)]j =Xi∈Y 1n ψ(i) = jo yi. (19) In the definition, 1{ φ(j) = i} is the indicator function such that it equals one if φ maps j ∈ X to i ∈ Y and 1{ φ(j) = i} = 0 otherwise. The notation [φ(x)]i denotes the proportion of φ(x) coming from i-th node in Y . It is easy to see that φ in (18) is well-defined. Firstly, [φ(x)]i ≥ 0 for any i ∈ Y , and Xi∈Y [φ(x)]i =Xi∈Y Xj∈X 1n φ(j) = io xj = Xj∈X xj = 1, (20) ensuring φ(x) is in the induced convex hull space SY . Secondly, for any j ∈ X in the original nodespace, its mapping φ(j) would have the tuple representation with [φ(j)]i = 1{ φ(j) = i}, a node in the original node space of Y . Consequently, for any j ∈ X, we have that φ(j) ∈ Y . Combining these two observations imply that φ : SX → SY is well-defined. By symmetry, ψ induced from ψ is also well-defined from SY to SX . Definition 9 states that for any point x in QX , no matter how we relate points in QX to points in QY , the mapped node φ(x) should be in the induced sample space QY . An example of regular sample pair is illustrated in Figure 4, where QX = {a, b, c, x1, x2, x3, x4, x5, x6, q} is the collection of original node space and points that are combination of one-third of original nodes and QY = {u, v, y1, y2}. Figure 4 exemplifies the scenario for a specific mapping φ with φ(a) = φ(b) = u and φ(c) = v; it is apparent that φ(x) ∈ QY for any x ∈ QX . We note that QX = QX/{q} also form a regular sample pair with QY . A pair of networks NX and NY can be compared by evaluating their difference in their respective sampled induced space as next. Definition 10 Given two networks NX = (X, rX ) and NY = (Y, rY ) with their respective sampled induced space (QX , rX ) and (QY , rY ), for a map φ : QX → QY such that φ(x) ∈ Y for any x ∈ X, define the difference with respect to φ as ∆QX ,QY (φ) := max x,x′∈QX(cid:12)(cid:12)(cid:12) rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12)(cid:12) . (21) The partial embedding distance from NX to NY measured with respect to the sampled induced spaces is then defined as dPE, Q(NX , NY ) := φ:QX →QY φ(x)∈Y,∀x∈Xn∆QX ,QY (φ)o. (22) min Our key result is that dPE, Q(NX , NY ) is the same as the partial embedding distance dPE(NX , NY ) defined in (5) when the sampled space form a regular sample pair. Theorem 3 When the sampled spaces QX and QY form a regular sample pair, the function dPE, Q : N ×N → R+ defined in (21) is an embedding metric in the space N . Moreover, it yields the same distance as the function dPE defined in (5), i.e. dPE, Q(NX , NY ) = dPE(NX , NY ), (23) for any networks NX and NY . differentiating their sampled The statement networks as previous in Theorem 3 gives proper via treatments, we reasoning induced for space. Similar could define max{dPE, Q(NX , NY ), dPE, Q(NY , NX )} as a metric in the space N mod ∼=. Since the sampled induced spaces incorporate more information of the original networks, an approximation to dPE, Q(NX , NY ) via the sampled induced space would be a better approximation to dPE(NX , NY ). Moreover, since we can construct the sampled induced space following some predetermined strategy -- taking midpoints for all edges in the networks, comparing networks via their sampled induced space is plausible in terms of complexity. Figure 5 illustrate the same network considered in Figure 1 where the multi-dimensional scaling based on the sampled induced points would succeed in distinguishing networks that are different. We illustrate the practical usefulness of such methods in the next section. V. APPLICATION We first illustrate the usefulness of considering interiors of networks. We consider 10 networks in the form Figure 6 (a) where γ = 1, 2, . . . , 10. Approximations of network embedding distances are evaluated. Figure 6 (b) and (c) illustrate the heat- maps of the distance approximations where the indices in both horizontal and vertical directions denote the value of γ in the networks. When interiors are considered by adding midpoints of edges, e.g. nodes e, f , and g in Figure 6 (a), network distance approximations illustrated in Figure 6 (b) yield more desired results, as networks with similar γ are close to each other with respect to their network distance approximations. This is more apparent for networks with γ ≤ 5, where the relationships in the original networks fail to satisfy triangle inequality. A detailed analysis indicates that adding interior points in the networks (i) preserve the desired property of embedding distance when interiors are not considered (the distance approximations in Figure 6 (b) and (c) are very similar for γ > 5 where triangle inequalities are satisfied) and (ii) fix the undesired issue when the relationships in the original networks fail to satisfy triangle inequality. We next consider the comparison and classification of three types of synthetic weighted networks. Edge weights in all three types of networks encode proximities. The first type of networks are with weighted Erdos-R´enyi model [28], where the edge weight between any pair of nodes is a random number uniformly selected from the unit interval [0, 1]. In the second type of networks, the coordinates of the vertices are generated uniformly and randomly in the unit circle, and the edge weights are evaluated with the 7 Gaussian radial basis function exp(−d(i, j)2/2σ2) where d(i, j) is the distance between vertices i and j in the unit circle and σ is a kernel width parameter. In all simulations, we set σ to 0.5. The edge weight measures the proximity between the pair of vertices and takes value in the unit interval. In the third type of networks, we consider that each vertex i represents an underlying feature ui ∈ Rd of dimension d, and examine the Pearson's linear correlation coefficient ρij between the corresponding features ui and uj for a given pair of nodes i and j. The weight for the edge connecting the pair is then set as ρij /2 + 0.5, a proximity measure in the unit interval. The feature space dimension d is set as 5 in all simulations. We want to see if network comparison tools proposed succeed in distinguishing networks generated from different processes. We start with networks of equal size X = 25 and construct 20 random networks for each aforementioned type. We then use the multi-dimensional scaling methods introduced in [17], [18] to approximate the embedding network distance dE defined in Definition 6. To evaluate the effectiveness of considering interiors of networks described in Section IV, we add midpoints for all edges in a given network; it is apparent that any pair of networks with interiors defined in this way would form a regular sample pair. Approximations of the embedding network distance dE between these networks with midpoints added are then evaluated. Figure 7 (a) and (b) plot the two dimensional Euclidean embeddings [29] of the network metric approximations with and without interiors respectively. All embeddings in the paper are constructed with respect to minimizing the sum of squares of the inter-point distances; other common choices to minimize the sum of four power of the inter-point distances yields similar results. Networks constructed with different models form clear separate clusters (1 out of 60 errors with 1.67%) with respect to approximation of network distances between networks with interior points added, where networks with Erdos-R´enyi model are denoted by red circles, networks with unit circle model are described by blue diamonds, and correlation model represented as black squares. The clustering structure is not that clear (4 out of 60 errors with 6.67%) in terms of with respect to approximation of network distances between networks without interior points, but networks constructed from different models are in general much more different compared to networks from the same model. Next we consider networks with number of nodes ranging between 20 and 25. Two networks are randomly generated for each network type and each number of nodes, resulting in 60 networks in total. Interiors are examined similarly as before by adding midpoints for all edges in a given network. Figure 7 (c) and (d) illustrate the two dimensional Euclidean embeddings of the network metric approximations with and without interiors respectively. Despite the fact that networks with same model have different number of nodes, dissimilarities between network dis- tance approximations are smaller when their underlying networks are from the same process. Similar as in the case with same number of nodes, considering interiors result in a more distinctive clustering pattern. An unsupervised classification with two linear boundaries would yield 1 out of 60 errors (1.67%) for networks with interiors added and 5 errors (8.33%) without interiors. These results illustrate that (i) comparing networks by using embedding distance succeeds in identifying networks with differ- ent properties, and (ii) adding interiors to networks to form regular sample pair as in Section IV would yield better approximations to the actual network distances. Admittedly, other methods to a g rX (a, b) = γ e rX (b, c) = 11 b f rX (a, c) = γ c 1 2 3 4 5 6 7 8 9 10 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 1 2 3 4 5 6 7 8 9 10 8 0.6 0.5 0.4 0.3 0.2 0.1 0 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 (a) 10 networks with γ = 1, 2, . . . , 10 (b) with interiors (c) without interiors Fig. 6. Example of the usefulness of considering the interior of networks. We consider 10 networks in the form (a) where γ = 1, 2, . . . , 10. Approximations of network embedding distances are evaluated. (b) and (c) illustrate the heat-maps of the distance approximations where the indices in both horizontal and vertical directions denote γ in the networks. When interiors are considered by adding midpoints of edges, e.g. nodes e, f , and g in (a), network distance approximations (b) yield more desired results, especially for γ ≤ 5 where the relationships in the original networks fail to satisfy triangle inequality. 15 10 5 0 -5 -10 -15 -100 15 10 5 0 -5 20 15 10 5 0 -5 -10 -50 0 50 100 -10 -30 -20 -10 0 10 20 30 40 -15 -40 -30 -20 -10 0 10 20 30 40 50 20 15 10 5 0 -5 -10 -15 -30 -20 -10 0 10 20 30 (a) with interiors, 25 nodes (b) without interiors, 25 nodes (c) with interiors, 20 to 25 nodes (d) without interiors, 20 to 25 nodes Fig. 7. Two dimensional Euclidean embeddings of the networks constructed from three different models with different number of nodes with respect to the approximation to the network embedding distance. In the embeddings, red circles denote networks constructed from the Erdos-R´enyi model, blue diamonds represent networks constructed from the unit circle model, and black squares the networks from the correlation model. compare networks may also succeed in distinguishing networks, after some proper treatment towards the issue of different sizes. Nonetheless, interior and embedding method would be more universal, not only for the reason that it establishes an approxi- mation to the actual network metrics, but also since it provides a systematic way to analyze if one network can be well matched to a subset of another network. VI. CONCLUSION We present a different perspective to consider networks by defining a semimetric space induced from all the relationships in a given network. We demonstrate that comparing the respective induced space between a pair of networks outputs the identical dis- tance as evaluating the discrepancy between the original network by embedding one network into another network, which we prove to be a valid metric in the space of all networks. Therefore, better approximations to the network metric distances can be constructed by examining the respective induced space. We illustrate that such methods succeed in classifying weighted pairwise networks constructed from different processes. APPENDIX A PROOFS IN SECTION III Proof of Proposition 1: To prove that dPE is an embedding metric in the space of networks, we prove the (i) nonnegativity, (ii) embedding identity, and (iii) triangle inequality properties in Definition 4. Since rX (x, x′) − Proof of nonnegativity property: rY (φ(x), φ(x′)) is nonnegative, ∆X,Y (φ) defined in (4) also is. The partial embedding distance must then satisfy dPE(NX , NY ) ≥ 0 because it is a minimum of nonnegative numbers. (cid:4) Proof of embedding identity property: First, we need to show that if NX can be isometrically embedded into NY , we must have dPE(NX , NY ) = 0. To see that this is true recall that for isometric embeddable networks, there exists a mapping φ : X → Y that preserves distance functions (1). Then, under this mapping, we must have ∆X,Y (φ) = 0. Since φ is a particular mapping, taking a minimum over all mappings as in (5) yields dPE(NX , NY ) ≤ ∆X,Y (φ) = 0. (24) Since dPE(NX , NY ) ≥ 0, it must be that dPE(NX , NY ) = 0 when NX can be isometrically embedded into NY . Second, we need to prove dPE(NX , NY ) = 0 must imply that NX can be isometrically embedded into NY . If dPE(NX , NY ) = 0, there exists a mapping φ : X → Y such that rX (x, x′) = rY (φ(x), φ(x′)) for any x, x′ ∈ X. This implies that φ is an isometric embedding and therefore NX can be isometrically embedded into NY . (cid:4) Proof of triangle inequality: To show that the triangle inequality, let the mapping φ between X and Z and ψ between Z and Y be the minimizing mappings in (5). We can then write dPE(NX , NZ) = ∆X,Z (φ), dPE(NZ , NY ) = ∆Z,Y (ψ). (25) Since both φ and ψ are mappings, ψ ◦φ would be a valid mapping from X to Y . The mapping ψ ◦ φ may not be the minimizing mapping for the distance dPE(NX , NY ). However since it is a valid mapping with the definition in (5) we can write dPE(NX , NY ) ≤ ∆X,Y (ψ ◦ φ). (26) Adding and subtracting dZ (φ(x), φ(x′)) in the absolute value of ∆X,Y (ψ ◦ φ) = maxx,x′∈X(cid:12)(cid:12)rX (x, x′) − rY (ψ(φ(x)), ψ(φ(x′ )))(cid:12)(cid:12) and using the triangle inequality of the absolute value yields ∆X,Y (ψ ◦ φ) ≤ max x,x′∈Xn(cid:12)(cid:12)rX (x, x′) − dZ(φ(x), φ(x′))(cid:12)(cid:12) dZ (φ(x), φ(x′)) − rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12)o. +(cid:12)(cid:12)(cid:12) (27) We can further bound (27) by taking maximum over each sum- mand, (28) ∆X,Y (ψ ◦ φ) ≤ max x,x′∈X(cid:12)(cid:12)rX (x, x′) − dZ (φ(x), φ(x′))(cid:12)(cid:12) dZ (φ(x), φ(x′))−rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12) . + max x,x′∈X(cid:12)(cid:12)(cid:12) The first summand in (28) is nothing different from ∆X,Z(φ). Since φ(x), φ(x′) ∈ Z, the second summand in (28) can be further bounded by max dZ (φ(x), φ(x′)) − rY(cid:0)ψ(cid:0)φ(x)(cid:1), ψ(cid:0)φ(x′)(cid:1)(cid:1)(cid:12)(cid:12)(cid:12) x,x′∈X(cid:12)(cid:12)(cid:12) z,z ′∈Z(cid:12)(cid:12)dZ (z, z′) − rY(cid:0)ψ(z), ψ(z′)(cid:1)(cid:12)(cid:12) = ∆Z,Y (ψ). ≤ max These two observations implies that (29) ∆X,Y (ψ ◦ φ) ≤ ∆X,Z (φ) + ∆Z,Y (ψ). (30) Substituting (25) and (26) into (30) yields triangle inequality. (cid:4) Having proven all statements, the global proof completes. (cid:4) Proof of Theorem 1: To prove that dE is a metric in the space of networks modulo isomorphism, we prove the (i) nonnegativity, (ii) symmetry, (iii) identity, and (iv) triangle inequality properties in Definition 3. Proof of nonnegativity property: Since dPE(NX , NY ) as well as dPE(NY , NX) are both nonnegative, the embedding distance must then satisfy dE(NX , NY ) ≥ 0. (cid:4) symmetry property: Since dE(NX , NY ) = Proof of dE(NY , NX ) = max{dPE(NX , NY ), dPE(NY , NX )}, the symme- try property follows directly. (cid:4) Proof of identity property: First, we need to show that if NX and NY are isomorphic, we must have dE(NX , NY ) = 0. To see that this is true recall that for isomorphic networks there exists a bijective map φ : X → Y that preserves distance functions (1). This implies φ is also an injection, and we can find an injection ψ : Y → X that preserves distance functions (1). Then, under the injection φ, we must have ∆X,Y (φ) = 0. Since φ is a particular mapping, taking a minimum over all mappings as in (5) yields dPE(NX , NY ) ≤ ∆X,Y (φ) = 0. (31) Since dPE(NX , NY ) ≥ 0, as already shown, it must be that dPE(NX , NY ) = 0 when NX are isomorphic to NY . By symmetry we have dPE(NY , NX ) = 0, which combines with previous observation implies that dE(NX , NY ) = 0. Second, we need to prove dE(NX , NY ) = 0 must imply that NX and NY are isomorphic. By the definition of embedding distance, dE(NX , NY ) = 0 means dPE(NX , NY ) = 0 and dPE(NY , NX) = 0. If dPE(NX , NY ) = 0, there exists a mapping φ : X → Y such that rX (x, x′) = rY (φ(x), φ(x′)) for any x, x′ ∈ X. Moreover, this also implies the function φ must be injective. If it were not, there would be a pair of nodes x 6= x′ with φ(x) = φ(x′) = y for some y ∈ Y . By the definition of networks, we have that rX (x, x′) > 0, rY (φ(x), φ(x′)) = rY (y, y) = 0, (32) the contradicts observation = which rY (φ(x), φ(x′)) for any x, x′ ∈ X and shows that φ must be injective. By symmetry, simultaneously, if dPE(NY , NX ) = 0, there exists an injective mapping ψ : Y → X such that rY (y, y′) = rX (ψ(y), ψ(y′)) for any y, y′ ∈ Y . By applying that rX (x, x′) 9 the Cantor-Bernstein-Schroeder Theorem [30, Section 2.6] to the reciprocal injections φ : X → Y and ψ : Y → X, the existence of a bijection between X and Y is guaranteed. This forces X and Y to have same cardinality and φ and ψ being bijections. Pick the bijection φ and it follows rX (x, x′) = rY (φ(x), φ(x′)) for all nodes x, x′ ∈ X. This shows that NX ∼= NY and completes the proof of the identity statement. (cid:4) Proof of triangle inequality: To show that the triangle inequality holds, from the definition of embedding distance, we have that dE(NX , NY ) = max {dPE(NX , NZ), dPE(NZ , NY )} . (33) Since partial embedding distance is a valid embedding metric, it satisfies triangle inequality in Definition 4, therefore, we can bound (33) by dE(NX , NY ) ≤ max(cid:8)dPE(NX , NZ)+dPE(NZ, NY ), dPE(NY , NZ)+dPE(NZ , NX)(cid:9). To further bound (34) we utilize the relationship as next. (34) Fact 1 Given real numbers a, b, c, d, it holds that max{a, c} + max{b, d} ≥ max{a + b, c + d}. (35) Proof: If a ≥ c and b ≥ d, the inequality holds since the left hand side is a+b and the right hand side is also a+b. Similarly, if c ≥ a and d ≥ b, the inequality also holds. What remains to consider are scenarios of a ≥ c, d ≥ b as well as c ≥ a, b ≥ d. By symmetry, it suffices to consider the first scenario with a ≥ c, d ≥ b. Under this scenario, the statement becomes a + d ≥ max{a + b, c + d}. (36) It follows that the state is correct following the assumption. Since we have considered all scenarios, the proof concludes. (cid:4) Back to the proof of triangle inequality, applying Fact 1 onto (34) yields dE(NX , NY ) ≤ max(cid:8)dPE(NX , NZ), dPE(NZ, NX )(cid:9) + max(cid:8)dPE(NY , NZ ), dPE(NZ, NY )(cid:9). Substituting the definition of dE(NX , NZ) and dE(NZ , NY ) into (37) yields (37) dE(NX , NY ) ≤ dE(NX , NZ) + dE(NZ , NY ), (38) which is the triangle inequality and completes the proof. Having proven all statements, the global proof completes. (cid:4) (cid:4) Denote d′ C(NX , NY ) Proof of Lemma 2: to represent minφ:X→Y,ψ:Y →X max{∆X,Y (φ), ∆Y,X (ψ), δX,Y (φ, ψ)}. In or- der to prove prove the statement, we show that given any networks NX and NY , we have that (i) d′ C(NX , NY ) ≤ dC(NX , NY ) and that (ii) dC(NX , NY ) ≤ d′ Proof of d′ From the defini- tion of dC(NX , NY ), there exists a correspondent C such that rX (x, x′) − rY (y, y′) ≤ dC(NX , NY ) for any (x, y), (x′, y′) ∈ C. Define a function φ : X → Y that associates x with an arbitrary y chosen from the set that form a pair with x in C, C(NX , NY ) ≤ dC(NX , NY ): C(NX , NY ). φ : x 7→ y0 ∈ {y (x, y) ∈ C}. (39) Since C is a correspondence the set {y (x, y) ∈ C} is nonempty for any x implying that φ is well-defined for any x ∈ X. Hence, (cid:12)(cid:12)rX (x, x′) − rY (φ(x), φ(x′))(cid:12)(cid:12) ≤ dC(NX , NY ), (40) for any x, x′ ∈ X. Since (40) is true for any x, x′ ∈ X, it also true for the maximum pair, and therefore ∆X,Y(φ) =max x,x′∈X(cid:12)(cid:12)rX (x,x′)−rY (φ(x),φ(x′))(cid:12)(cid:12)≤ dC(NX ,NY). (41) Define a function ψ : Y → X that associates y with an arbitrary x chosen from the set that form a pair with y in C, ψ : y 7→ x0 ∈ {x (x, y) ∈ C}. Following the similar argument as above would yield us ∆Y,X (ψ) ≤ dC(NX , NY ). (42) (43) recall Finally, as maxx∈X,y∈Y rX (x, ψ(y)) − rY (φ(x), y). In the same time, we have (x, ψ(y)) ∈ C as well as (φ(x), y) ∈ C, and therefore δX,Y (φ, ψ) defined that is max x∈X,y∈Y rX (x, ψ(y)) − rY (φ(x), y) ≤ dC(NX , NY ). (44) Taking a maximum on both sides of inequlities (41), (43), and (44) yields max{∆X,Y (φ), ∆Y,X (ψ), δX,Y (φ, ψ)} ≤ dC(NX , NY ). (45) The specific φ and ψ may not be the minimizing mappings for the left hand side of (45). Nonetheless, they are valid mappings and therefore taking a minimum over all mappings yields the desired inequality d′ (cid:4) C(NX , NY ) ≤ dC(NX , NY ). Proof of dC(NX , NY ) ≤ d′ C(NX , NY ): From the definition of d′ C(NX , NY ), there exists a pair of mappings φ : X → Y and ψ : Y → X such that rX (x, x′) − rY (φ(x), φ(x′)) ≤ d′ rX (ψ(y), ψ(y′)) − rY (y, y′) ≤ d′ rX (x, ψ(y)) − rY (φ(x), y) ≤ d′ C(NX , NY ), C(NX , NY ), C(NX , NY ), (46) (47) (48) for any x, x′ ∈ X and y, y′ ∈ Y . Define a correspondence by taking the union of the pairs associated by φ and ψ such that C = {(x, φ(x)) x ∈ X} ∪ {(ψ(y), y) y ∈ Y } . (49) Since φ(x) is defined for any x and ψ(y) is defined for any y, C is a well-defined correspondence. Notice that any pair (x, y) ∈ C in the correspondence would be one of the follow- ing two forms: (x, φ(x)) or (ψ(y), y). Therefore, for any pairs (x, y), (x′, y′) ∈ C, they must be from one of the following three forms (i) (x, φ(x)), (x′, φ(x′)), (ii) (ψ(y), y), (ψ(y′), y′), or (iii) (x, φ(x)), (ψ(y), y). If they are in the form (i), from (46), we can bound the difference between the respective relationship as rX (x, x′) − rY (y, y′) ≤ d′ C(NX , NY ). (50) If the pairs are in the form (ii), (47) also implies the correct- ness of (50). Finally, if the pairs are in the form (iii), (50) would be established from (48). Consequently, (50) holds for any (x, y), (x′, y′) ∈ C. Therefore, they must also hold true for the bottleneck pairs achieving the maximum ΓX,Y (C) in (2) which implies that ΓX,Y (C) ≤ d′ C(NX , NY ). The specific correspondence C may not be the minimizing one in defining dC(NX , NY ). Nonetheless, they are valid mappings and therefore taking a minimum over all mappings yields the desired inequality dC(NX , NY ) ≤ d′ (cid:4) C(NX , NY ). Since we have proven the two inequalities, it follows that dC ≡ d′ C and this completes the proof of the statement. (cid:4) 10 Proof of Corollary 1: The network distance dC(NX , NY ) would be no smaller than the right hand side of (7), if we remove the term δX,Y (φ, ψ) in the maximum, i.e. dC(NX ,NY ) ≥ min max{∆X,Y (φ),∆Y,X (ψ)}. (51) φ:X→Y,ψ:Y →X The right hand side of (51) would become smaller if we take the respective minimum for mappings φ and ψ before taking the maximum, yielding us dC(NX ,NY ) ≥ max(cid:26) min φ:X→Y ∆X,Y (φ), min φ:Y →X ∆Y,X (ψ)(cid:27). (52) and (6) in Definitions 6 and 5, is not From (5) hard to observe is (52) max{dPE(NX , NY ), dPE(NY , NX )} =: dE(NX , NY ), yielding the desired result dE(NX , NY ) ≤ dC(NX , NY ). (cid:4) it right hand side of that the APPENDIX B PROOFS IN SECTION IV Proof of Proposition 3: To prove that space (SX , sX ) induced from NX = (X, rX ) is a semimetric space, we prove the (i) nonnegativity, (ii) symmetry, (iii) identity properties in Definition 3 and (iv) sX (p, m) = rX (p, m) when p, m ∈ X. Since rX (i, j) > 0 for Proof of nonnegativity property: any different nodes in the original networks i, j ∈ X, i 6= j, w⋆ the induced distance (cid:4) ij rX (i, j) ≥ 0 in (14). Therefore, ij rX (i, j) ≥ 0. sX (p, m) =Pi6=j w⋆ Proof of symmetry property: Given a pair of nodes p, m ∈ SX , we would like to demonstrate that sX (p, m) = sX (m, p). Denote {w⋆ ij} as the collection of units of transformation along the direction from i to j in the original network. These vectors together make up the path from p to m with smallest amount of transformation. By definition, {w⋆ ij } is the optimal solution to (13). Denote {v⋆ ij} as the collection of units of transformation along the direction from i to j which makes up the path from m to p with the smallest amount of transformation. By definition, {v⋆ ij} is the optimal solution to the following problem ij(cid:9) = argmin Xi,j∈X,i<j (cid:8)v⋆ vij s. t. pi = mi − Xj∈X,j>i (53) vji, ∀i vij + Xj∈X,j<i Comparing (13) with (53), it is easy to observe that if we take vij = −wij for any i < j, the two problems becomes identical. Therefore, for the optimal solutions, we have the relationship v⋆ ij = −w⋆ ij for any i < j. By definition in (14), this implies the two relationships are the same sX (p, m) = Xi,j∈X, i<j ij(cid:12)(cid:12) rX (i, j) = Xi,j∈X, (cid:12)(cid:12)w⋆ i<j and completes the proof. (cid:12)(cid:12)v⋆ ij(cid:12)(cid:12) rX (i, j) = sX (m, p), (54) (cid:4) Proof of identity property: First we want to show that if m and p are identical points, their induced relationship sX (p, m) = 0. In such scenario, m and p must have same tuple representation (m1, . . . , mn) and (p1, . . . , pn) with mi = pi for any i ∈ X. In this case, it is apparent that the optimal solution {w⋆ ij} in (13) is w⋆ ij = 0 for any i 6= j. Therefore, sX (p, m) = 0 shows the first part of the proof for identity property. 2 2 1 1 1 3 2 3 4 1 0-simplex 1-simplex 2-simplex 3-simplex Fig. 8. Examples of (n − 1)-simplex used in the proof of Proposition 3. The induced space is the simplex with interior. Points in the original spaces are vertices of the simplex. The shortest path connecting two vertices is the edge joining them. can be written sX (p, m) =Pi6=j w⋆ Second, we need to prove sX (p, m) = 0 must imply that p and m are the same. By definition in (14), the induced relationship ij rX (i, j), where the original relationship is always positive with rX (i, j) > 0 for any i 6= j. Therefore, sX (p, m) = 0 must imply that w⋆ ij given any i 6= j. Combining this observation with the constraints in (13) imply that pi = mi for any i ∈ X. Therefore, p and m are identical point in the induced space, and this completes the proof. (cid:4) Proof of the property that sX (p, m) = rX (p, m) when p, m ∈ X: When both p, m ∈ X, the respective tuple representation in the space is p = (p1, . . . , pn) with pi = 1 if i = p and pi = 0 otherwise, and m = (m1, . . . , mn) with mi = 1 if i = m and mi = 0. It is apparent that the path with the smallest amount of transformation from p into m is the exact vector from p to m. Here we give a geometric proof using Figure 8. The induced space is the (n − 1)-simplex with interior defined. Nodes p and m correspond to the vertices in the simplex with their coordinates given by the tuple representations p = (p1, . . . , pn) and m = (m1, . . . , mn). The problem in (13) searches for the shortest path in the simplex joining p to m. It is then apparent that the shortest path should be the edge joining then; consequently w⋆ pm = 1 for the edge and w⋆ ij = 0 for any other edges ij. Taking this observation into (14) implies that sX (p, m) = rX (p, m) and concludes the proof. (cid:4) Having proven all statements, the global proof completes. (cid:4) Proof of Theorem 2: To prove the statements, it suffices to show dPE, S ≡ dPE. Then the fact that dPE, S is an embedding metric in the space N follows since dPE is an embedding metric in N . To prove the equivalence of the pair of distances, we show that given any networks NX and NY , we have that (i) dPE(NX , NY ) ≤ dPE, S(NX , NY ) and (ii) dPE, S(NX , NY ) ≤ dPE(NX , NY ). Proof of dPE(NX , NY ) ≤ dPE, S(NX , NY ): From the definition of dPE, S(NX , NY ), there exists a mapping φ : SX → SY in the induced space such that sX (x, x′) − sY (φ(x), φ(x′)) ≤ dPE, S(NX , NY ), (55) for any x, x′ ∈ SX . Define a map φ : X → Y with φ : i 7→ φ(i) for all i ∈ X. The map φ is well defined since φ(x) ∈ Y for any x ∈ X. Proposition 3 guarantees that rX (i, j) = sX (i, j) when i ∈ X and j ∈ X. Therefore, we also have rY ( φ(i), φ(j)) = sY ( φ(i), φ(j)). Substituting these two observations in (55) and searching for the maximum over all nodes i, j ∈ X yields ≤dPE, S(NX ,NY ). (56) ∆X,Y( φ)=max i,j∈X(cid:12)(cid:12)(cid:12) rX (i,j)−rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12) The specific φ may not be the minimizing mapping for the left hand side of (56). Nonetheless, it is a valid mapping and therefore taking a minimum over all mappings φ : X → Y yields the desired inequality dPE(NX , NY ) ≤ dPE, S(NX , NY ). (cid:4) 11 Proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ): From the definition of dPE(NX , NY ), there exists a mapping φ : X → Y in the original node space such that ≤ dPE(NX , NY ), (57) (cid:12)(cid:12)(cid:12) rX (i, j) − rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12) for any i, j ∈ X. Denote the cardinality of the node sets as X = n and Y = n′. For any x ∈ SX , it has the tuple representation of (x1, . . . , xn), and any y ∈ SY possess the tuple representation of (y1, . . . , yn′). Define a map φ : SX → SY as in (18). We showed in (20) that φ is a well-defined mapping. For a given pair of points x, x′ ∈ SX , denote {w⋆ ij} as the collection of weights consisting the shortest path from x to x′ solving the problem in (13). By (14), the distance between x and x′ in the induced space SX is ij rX (i, j). For the mapped pair φ(x) and φ(x′) in the induced space SY , we show in the next fact that the optimal path between φ(x) and φ(x′) is the optimal path between x and x′ mapped under φ. then given by sX (x, x′) = Pi<j w⋆ Fact 2 Given a pair of networks (X, rX ) and (Y, rY ) with their respective induced space (SX , sX ) and (SY , sY ), for any pair of nodes x, x′ in the induced space SX , if {w⋆ ij} is the collection of weights consisting the optimal path from x to x′ solving the problem in (13), then {w⋆ φ(i)φ(j)} is the collection of weights consisting the optimal path from φ(x) to φ(x′) solving the problem in (13), where w⋆ φ(i)φ(j) is the length traversed along the path parallel to the direction from φ(i) to φ(j). Proof : Notice that the map φ may not be surjective; in other words, if we define SY = {φ(x) x ∈ SX } as the image under φ, then it is likely that SY ( SY . We first show that the entire path of the shortest path from φ(x) to φ(x′) must lie entirely inside the space SY . To see this, define n′′ = { φ(i) i ∈ X} ⊆ Y as the number of unique elements in Y hit by nodes in X under the map φ. It then follows that SY is the (n′′ − 1)-simplex (convex hull) defined by vertices of φ(i) for all i ∈ X. It follows naturally that n′′ ≤ n′. Therefore, in the language of topology, the (n′′ − 1) simplex describing SY would be a face of the larger (n′ − 1)- simplex SY . As an example, if SY is the 3-simplex on the right of Figure 8 given by vertices [0, 1, 2, 3], then SY would be the face of this 3-simplex: it may be one of the 2-simplices [0, 1, 2], [0, 1, 3], [0, 2, 3], or [1, 2, 3], or one of the 1-simplices [0, 1], [0, 2], [0, 3], [1, 2], [1, 3] or [2, 3], or one of the 0-simplices [0], [1], [2], or [3]. Both φ(x) and φ(x′) are on this (n′′ − 1)-simplex. It then follows geometrically that the optimal path transforming φ(x) into φ(x′) would also be on this (n′′ − 1)-simplex. This implies that the entire path of the optimal path from φ(x) to φ(x′) must lie entirely inside the space SY . Now, suppose the statement in Fact 2 is false, that the optimal path transforming φ(x) into φ(x′) is not given by {w⋆ φ(i)φ(j)} as the collection of weights. Since this path is entirely inside the space SY , it needs to be of the form φ(x) → φ(k0) → φ(k1) · · · → φ(kL) → φ(x′) for some φ(k0), . . . , φ(kL) ∈ SY . Denote the collection of weights for this path as {v⋆ φ(i)φ(j)}, where v⋆ φ(i)φ(j) is the length traversed along the path parallel to the direction from φ(i) ∈ SY to φ(j) ∈ SY . The assumption that Fact 2 is false implies that Xi,j∈X,i<j(cid:12)(cid:12)(cid:12) v⋆ φ(i)φ(j)(cid:12)(cid:12)(cid:12) < Xi,j∈X,i<j(cid:12)(cid:12)(cid:12) w⋆ φ(i)φ(j)(cid:12)(cid:12)(cid:12) Since φ(k0), . . . , φ(kL) ∈ SY , we have that k0, . . . , kL ∈ SX , and therefore the path of the form x → k0 → k1 · · · → kL → x′ . (58) k-dimensional subspace P1 c2 k-dimensional subspace P2 c1 x a d1 x′′ b1 k + 1-dimensional subspace P d2 x′ b2 Fig. 9. Illustration for the proof of Fact 3. In order to prove the statement for k+1 from k, we consider x and x′ living in some (k + 1)-dimensional subspace P . We can then find a point x′′ sharing n − k tuple coefficients with x and therefore residing in some k-dimensional subspace P1 with x such that the length of the path from x to x′′ is upper bounded by 1 − Pn i=k+1 xi and the length of the path from x′′ to x′ is upper bounded by xk+1. The existence of the path from x to x′ via x′′ shows the validity of the statement for k + 1. would be a path in SX from x to x′. This path has the collection of weights as {v⋆ ij is the length traversed along the path parallel to the direction from i ∈ X to j ∈ X. Moreover, utilizing the relationship in (58) yields ij}, where v⋆ Xi,j∈X,i<j(cid:12)(cid:12)v⋆ ij(cid:12)(cid:12) < Xi,j∈X,i<j(cid:12)(cid:12)w⋆ ij(cid:12)(cid:12) , (59) which contradicts the assumption beforehand that the optimal path from x to x′ is given by the collection of weights {w⋆ ij}. Therefore, it must be that the statement in Fact 2 is true and that {w⋆ φ(i)φ(j)} is the collection of weights consisting the optimal path from φ(x) to φ(x′) solving the problem in (13). (cid:4) Back to the proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ), leveraging the relationship established in Fact 2, for any pair x, x′ ∈ X, the distance between their mapped points φ(x) and φ(x′) in the induced space is given by sY (φ(x), φ(x′)) = φ(i)φ(j)rY (φ(i), φ(j)). Therefore, w⋆ sX (x, x′) − sY (φ(x), φ(x′)) Xi,j∈X,i<j(cid:12)(cid:12)w⋆ ij(cid:12)(cid:12) rX (i, j)−Xi,j∈X,i<j(cid:12)(cid:12)(cid:12) Pi<j w⋆ =(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) sX (x, x′)−sY (φ(x), φ(x′)) =Xi<j(cid:12)(cid:12)w⋆ w⋆ from w⋆ hand side of in (60) yields . (60) φ(i)φ(j)(cid:12)(cid:12)(cid:12) rY (φ(i), φ(j))(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ij(cid:12)(cid:12) rX (i, j)−rY (φ(i), φ(j)). φ(i)φ(j) is for notation purposes and its value is no different ij on the right ij . Therefore, combining terms for each w⋆ (61) Note that φ(i) = φ(i) and φ(j) = φ(j) by construction. Substituting (57) into (61) yields an inequality as sX (x, x′) − sY (φ(x), φ(x′)) ≤Xi<j(cid:12)(cid:12)w⋆ To finish the proof we further boundPi<j w⋆ ij(cid:12)(cid:12) dPE(NX , NY ). the following important observation for the induced space. ij ≤ 1 by utilizing (62) Fact 3 Consider a network (X, rX ) with its induced space (SX , sX ) and X = n, for any pair of nodes x, x′ ∈ SX in the induced space with their respective tuple representation n). Suppose that x and x′ x = (x1, . . . , xn) and x′ = (x′ share at least n − k of their tuple coefficient such that for any 0 ≤ k ≤ n, we have xl1 = x′ for 1 ≤ li ≤ n − k, then if l1 ij } from x to x′ solving 1, . . . , x′ the problem in (13) satisfies that P1≤i≤n−k xlk = α, the optimal path {w⋆ ij(cid:12)(cid:12) ≤ 1 − α. Xi<j(cid:12)(cid:12)w⋆ 12 1, x′ i=1 xi = 1. 1 = x2 and x′ 2, x3, . . . , xn), then it is apparent x′ The case with k = 1 do not exist, since Pi xi = Pi x′ Proof: We prove the statement by induction. The base case with k = 0 is trivial since x and x′ would be the identical points. i = 1 and therefore we cannot have a single tuple coefficient being different. For the case with k = 2, without loss of generality, suppose the two tuple coefficients being different for x and x′ are the first and second, i.e. x = (x1, x2, x3, . . . , xn) and x′ = (x′ 2 = x1 and that the optimal path from x to x′ only involves a path from i=3 xi from node 1 to node 2 with length w12 = x1 − x2 ≤ 1 −Pn requirement Pn For the induction, suppose the statement is true for k, we would like to show the validity of the statement for k + 1. Without loss of generality, suppose the last n − (k + 1) coefficients in the tuple representations of x and x′ are the same. Hence, they can be represented as x = (x1, . . . , xk, xk+1, xk+2, . . . , xn) and x′ = (x′ k+1, xk+2, . . . , xn). x and x′ can therefore be considered as points in some k + 1-dimensional subspace P , see Figure 9. Without loss of generality, we further assume that xk+1 ≥ x′ k+1. For any node x′′ ∈ SX with tuple representation x′′ = (x′′ k, xk+1, . . . , xn), it shares the last n − k coeffi- cients with x and therefore x and x′′ can be considered as some point in the k-dimensional subspace P1. The statement holds true for k; consequently, there exists a path with collection of weights {v⋆ ij} from x to x′′ solving the problem in (13) such that 1 , . . . , x′′ 1, . . . , x′ k, x′ n Xi<j(cid:12)(cid:12)v⋆ ij(cid:12)(cid:12) ≤ 1 − Xi=k+1 xk. (64) We argue that we can find one such x′′ sharing n − k coefficients with x in the subspace P1 such that there exists a path from x′′ to x′ that only consists of one vector parallel with the direction from the (k + 1)-th node in X to some node i ∈ X. We give a proof by geometry here: for the subspace P1, from any points at its vertices (e.g. b1, c1, or d1 in Figure 9), we could reach a corresponding point at the vertices (e.g. b2, c2, or d2) of the subspace P2 via a link parallel to the direction from node the (k + 1)-th node in X to some node i ∈ X. For example, from b1, we can reach b2 simply via the vector from b1 to b2. This means the subspace P1 can cover the subspace P2 by moving along the direction only consists of one vector parallel to the direction from node the (k + 1)-th node in X to some node i ∈ X. Hence, we can find one such x′′ sharing n − k coefficients with x in P1 which can reach x′ via a path only consisting of one vector with length xk+1 − x′ k+1). Therefore, we can construct a path with collection of weights {wij} from x to x′ by transversing the path from x to x′′ with collection of ij} followed by the line segment from x′′ to x′. This weights {v⋆ collection of path would have the property that k+1 (recall we assume xk+1 ≥ x′ Xi<j wij =Xi<j(cid:12)(cid:12)v⋆ ≤ 1 − n ij(cid:12)(cid:12) +(cid:12)(cid:12)xk+1 − x′ Xi=k+1 k+1(cid:12)(cid:12) ≤Xi<j(cid:12)(cid:12)v⋆ ij(cid:12)(cid:12) + xk+1 Xi=k+2 xi. xi! + xk+1 = 1 − n (65) The path from x to x′ via x′′ with collection of weights {wij } may not be the optimal path from x to x′, but since it is a valid path, i=k+2 xk, which shows the statement for k +1. This completes the induction step and therefore concludes the proof. (cid:4) we can safely boundPi<j w⋆ ij ≤Pi<j wij ≤ 1−Pn (63) Back to the proof of dPE, S(NX , NY ) ≤ dPE(NX , NY ), con- sidering the case with k = n and α = 0 in Fact 3 yields ij ≤ 1 for any pair of nodes x, x′ ∈ SX . Substituting this relationship into (62) yields Pij w⋆ sX (x, x′) − sY (φ(x), φ(x′)) ≤ dPE(NX , NY ). (66) Since (66) holds true for any x, x′ ∈ SX , it must also be for the pair of nodes yielding the maximum discrepancy be- tween sX (x, x′) and sY (φ(x), φ(x′)); consequently, this implies dPE, S(NX , NY ) ≤ dPE(NX , NY ) and concludes the proof. (cid:4) Since we have proven the two inequalities, it follows that dPE, S ≡ dPE and this completes the proof of the statements. (cid:4) Proof of Theorem 3: To prove the statements, it suffices to show dPE, Q ≡ dPE. Then the fact that dPE, Q is an embedding metric in the space N follows since dPE is an embedding metric in N . To prove the equivalence of the pair of distances, we show that given any networks NX and NY with the sample spaces form a regular sample pair, we have that (i) dPE(NX , NY ) ≤ dPE, Q(NX , NY ) and (ii) dPE, Q(NX , NY ) ≤ dPE(NX , NY ). Proof of dPE(NX , NY ) ≤ dPE, Q(NX , NY ): Utilizing rX (i, j) = sX (i, j) = rX (i, j) for i, j ∈ X by the definition the sampled the proof follows from the proof of dPE(NX , NY ) ≤ space, dPE, S(NX , NY ) in the first part of proof for Theorem 2 in Appendix B. (cid:4) Proof of dPE, Q(NX , NY ) ≤ dPE(NX , NY ): From the definition of dPE(NX , NY ), there exists a mapping φ : X → Y in the original node space such that ≤ dPE(NX , NY ), (67) (cid:12)(cid:12)(cid:12) rX (i, j) − rY ( φ(i), φ(j))(cid:12)(cid:12)(cid:12) for any i, j ∈ X. Define a mapping φ : SX → SY induced from φ as in (18). The fact that QX and QY form a regular sample pair implies that φ′(x) ∈ QY for any x ∈ QX and any mapping φ′ : QX → QY . Therefore, the specific mapping φ : QX → QY formed by restricting φ : SX → SY onto QX ⊂ SX is also well- defined. In the second part of proof for Theorem 2 in Appendix B, we have demonstrated that ≤ dPE(NX , NY ). (68) (cid:12)(cid:12)(cid:12) sX (x, x′) − sY ( φ(x), φ(x′))(cid:12)(cid:12)(cid:12) for any pair of nodes x, x′ ∈ SX and φ : SX → SY . Restricting (68) on pair of nodes x, x′ ∈ QX ⊂ SX and the mapping φ = φQX and utilizing the fact that rX (x, x′) = sX (x, x′), rY (φ(x), φ(x′)) = sY (φ(x), φ(x′)), (69) yields the following relationship rX (x, x′) − rY (φ(x), φ(x′)) ≤ dPE(NX , NY ). (70) Since (70) holds true for any x, x′ ∈ QX , it must also be the case for the pairs yielding the maximum discrepancy between rX (x, x′) and rY (φ(x), φ(x′)); hence, this implies dPE, Q(NX , NY ) ≤ dPE(NX , NY ) and completes the proof. (cid:4) Since we have proven the two inequalities, it follows that dPE, Q ≡ dPE and this concludes the proof of the statements. (cid:4) REFERENCES [1] S. Wasserman and K. Faust, Social Network Analysis: Methods And Applica- tions, ser. Structural Analysis in the Social Sciences. Cambridge University Press, 1994. [2] O. Sporns, Networks Of the Brain. MIT press, 2011. [3] T. Wang and H. Krim, "Statistical classification of social networks," in Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE Int. Conf. on, Mar 2012, pp. 3977 -- 3980. 13 [4] S. Choobdar, P. Ribeiro, S. Bugla, and F. Silva, "Comparison of co- authorship networks across scientific fields using motifs," in Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM Int. Conf. on. IEEE, Aug 2012, pp. 147 -- 152. [5] R. Singh, J. Xu, and B. Berger, "Global alignment of multiple protein interaction networks with application to functional orthology detection." Proc. Nat. Acad. Sci., vol. 105, no. 35, pp. 12 763 -- 12 768, Sep 2008. [6] L. Peng, L. Liu, S. Chen, and Q. Sheng, "A network comparison algorithm for predicting the conservative interaction regions in protein-protein inter- action network," in 2010 IEEE Fifth Int. Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA), Sep 2010, pp. 34 -- 39. [7] L. Yong, Z. Yan, and C. Lei, "Protein-protein interaction network comparison based on wavelet and principal component analysis," in 2010 IEEE Int. Conf. on Bioinformatics and Biomedicine Workshops (BIBMW), Dec 2010, pp. 430 -- 437. [8] N. Shervashidze, S. Vishwanathan, T. H. Petri, K. Mehlhorn, and K. M. Borgwardt, "Efficient graphlet kernels for large graph comparison," in Int. Conf. on Artificial Intelligence and Statistics, vol. 5, Apr 2009, pp. 488 -- 495. [9] E. Bullmore and O. Sporns, "Complex brain networks: graph theoretical analysis of structural and functional systems," Nature Reviews Neuroscience, vol. 10, no. 3, pp. 186 -- 198, Mar 2009. [10] H. Lee, H. Kang, M. K. Chung, B.-N. Kim, and D. S. Lee, "Persistent brain network homology from the perspective of dendrogram," IEEE Trans. Medical Image., vol. 31, no. 12, pp. 2267 -- 2277, Dec 2012. [11] A. C. Wilkerson, T. J. Moore, A. Swami, and H. Krim, "Simplifying the homology of networks via strong collapses," in Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE Int. Conf. on. IEEE, May 2013, pp. 5258 -- 5262. [12] J.-P. Onnela, J. Saramaki, J. Hyvonen, G. Szab´o, D. Lazer, K. Kaski, J. Kert´esz, and A.-L. Barab´asi, "Structure and tie strengths in mobile communication networks." Proc. Nat. Acad. Sci., vol. 104, no. 18, pp. 7332 -- 6, May 2007. [13] G. Kossinets and D. J. Watts, "Empirical analysis of an evolving social network," Science, vol. 311, no. 5757, pp. 88 -- 90, Jan. 2006. [14] D. Khmelev and F. Tweedie, "Using markov chains for identification of writer," Literary and Linguistic Computing, vol. 16, no. 3, Sep 2001. [15] F. Memoli, "Gromov-Hausdorff distances in Euclidean spaces," in 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2008, pp. 1 -- 8. [16] F. M´emoli, G. Sapiro, and S. Osher, "Solving variational problems and partial differential equations mapping into general target manifolds," J. of Computational Physics, vol. 195, no. 1, pp. 263 -- 292, Mar 2004. [17] A. M. Bronstein, M. M. Bronstein, and R. Kimmel, "Efficient computation of isometry-invariant distances between surfaces," SIAM J. on Scientific Computing, vol. 28, no. 5, pp. 1812 -- 1836, Oct 2006. [18] -- -- , "Generalized multidimensional scaling: a framework for isometry- invariant partial surface matching," Proc. Nat. Acad. Sci., vol. 103, no. 5, pp. 1168 -- 1172, Jan 2006. [19] -- -- , "Robust expression-invariant face recognition from partially missing Springer, May 2006, pp. data," in European Conf. on Computer Vision. 396 -- 408. [20] F. Chazal, D. Cohen-Steiner, L. J. Guibas, F. M´emoli, and S. Y. Oudot, "GromovHausdorff Stable Signatures for Shapes using Persistence," Euro- graphics Symp. on Geometry Processing, vol. 28, no. 5, pp. 1393 -- 1403, Jul 2009. [21] G. Carlsson, F. Memoli, A. Ribeiro, and S. Segarra, "Axiomatic construction of hierarchical clustering in asymmetric networks," Sep 2014. [Online]. Available: http://arxiv.org/abs/1301.7724 [22] W. Huang and A. Ribeiro, "Metrics in the space of high order networks," IEEE Trans. Signal Process., vol. 64, no. 3, pp. 615 -- 629, Feb 2016. [23] -- -- , "Persistent homology lower bounds on high order network distances," IEEE Trans. Signal Process., vol. 65, no. 2, pp. 319 -- 334, Jan 2017. [24] -- -- , "Persistent homology lower bounds on network distances," in Acous- tics, Speech and Signal Processing (ICASSP), 2016 IEEE Int. Conf. on, Shanghai, China, Mar 2016, pp. 4845 -- 4849. [25] D. Burago, Y. Burago, and S. Ivanov, A Course In Metric Geometry. American Mathematical Society Providence, 2001, vol. 33. [26] N. J. Kalton and M. I. Ostrovskii, "Distances between banach spaces," Forum Math, vol. 11, no. 17-48, 1997. [27] N. Linial, E. London, and Y. Rabinovich, "The geometry of graphs and some of its algorithmic applications," Combinatorica, vol. 15, no. 2, pp. 215 -- 245, Jun 1995. [28] P. Erdos and A. R´enyi, "On the evolution of random graphs," Publ. Math. Inst. Hungar. Acad. Sci, vol. 5, pp. 17 -- 61, Jan 1960. [29] M. A. A. Cox and T. F. Cox, "Multidimensional scaling," in Handbook Springer of Data Visualization, ser. Springer Handbooks Comp.Statistics. Berlin Heidelberg, 2008, pp. 315 -- 347. [30] A. N. Kolmogorov, S. V. Fomine, and R. A. Silverman, Introductory Real Analysis. Dover, 1975.
1807.07761
1
1807
2018-07-20T09:47:35
Controllability of Social Networks and the Strategic Use of Random Information
[ "cs.SI", "physics.soc-ph" ]
This work is aimed at studying realistic social control strategies for social networks based on the introduction of random information into the state of selected driver agents. Deliberately exposing selected agents to random information is a technique already experimented in recommender systems or search engines, and represents one of the few options for influencing the behavior of a social context that could be accepted as ethical, could be fully disclosed to members, and does not involve the use of force or of deception. Our research is based on a model of knowledge diffusion applied to a time-varying adaptive network, and considers two well-known strategies for influencing social contexts. One is the selection of few influencers for manipulating their actions in order to drive the whole network to a certain behavior; the other, instead, drives the network behavior acting on the state of a large subset of ordinary, scarcely influencing users. The two approaches have been studied in terms of network and diffusion effects. The network effect is analyzed through the changes induced on network average degree and clustering coefficient, while the diffusion effect is based on two ad-hoc metrics defined to measure the degree of knowledge diffusion and skill level, as well as the polarization of agent interests. The results, obtained through simulations on synthetic networks, show a rich dynamics and strong effects on the communication structure and on the distribution of knowledge and skills, supporting our hypothesis that the strategic use of random information could represent a realistic approach to social network controllability, and that with both strategies, in principle, the control effect could be remarkable.
cs.SI
cs
Controllability of Social Networks and the Strategic Use of Random Information Marco Cremonini1, Francesca Casamassima2, 1 University of Milan, Italy 2 Sogetel, Italy * [email protected] Abstract This work is aimed at studying realistic social control strategies for social networks based on the introduction of random information into the state of selected driver agents. Deliberately exposing selected agents to random information is a technique already experimented in recommender systems or search engines, and represents one of the few options for influencing the behavior of a social context that could be accepted as ethical, could be fully disclosed to members, and does not involve the use of force or of deception. Our research is based on a model of knowledge diffusion applied to a time-varying adaptive network, and considers two well-known strategies for influencing social contexts. One is the selection of few influencers for manipulating their actions in order to drive the whole network to a certain behavior; the other, instead, drives the network behavior acting on the state of a large subset of ordinary, scarcely influencing users. The two approaches have been studied in terms of network and diffusion effects. The network effect is analyzed through the changes induced on network average degree and clustering coefficient, while the diffusion effect is based on two ad-hoc metrics defined to measure the degree of knowledge diffusion and skill level, as well as the polarization of agent interests. The results, obtained through simulations on synthetic networks, show a rich dynamics and strong effects on the communication structure and on the distribution of knowledge and skills, supporting our hypothesis that the strategic use of random information could represent a realistic approach to social network controllability, and that with both strategies, in principle, the control effect could be remarkable. 1 Introduction Structural controllability of networked systems [31] has been extensively studied since the end of the past decade, following the growing interest in network science [40]. The property of structural controllability is central in the study of how the dynamic of a complex system can be controlled [30]. In short, from control theory, a dynamic system is said to exhibit structural controllability if, with a suitable selection of inputs, it can be driven from one state to any other state in finite time. Inputs to the system are represented by driver nodes receiving external perturbations. Liu et al. in a seminal paper demonstrated how the problem of determining the minimum set of driver nodes required for structural controllability can be mapped into a maximum matching problem [32]. Some remarkable theoretical results have been recently demonstrated for complex networks [10, 12, 38, 53]. In complex physical, biological and social networks the same goal of controlling the behavior of large populations of interacting entities has been studied with models of pinning control regulating networks of coupled dynamical systems. In this case, nodes are dynamical systems coupled according to the network topology. Direct actions are implemented with a certain strength over a subset of selected pinned nodes, whose reactions propagate into the network [22, 51]. The notion of pinning controllability, conceptually similar to the structural controllability already mentioned, has been introduced by specifying a reference temporal evolution of the network and two parameters: a coupling gain and a vector of control gains [47]. Adaptive (or coevolving) networks are models of complex networks characterized by a mutual interaction between a time-varying network topology and nodes own dynamics [23]. These are networks whose behavior is mostly driven by the coevolution of two feedback loops: Nodes dynamics modify the network topology by creating or removing edges (or changing their weight), and at the same time, the modified topology influences the dynamics of nodes. Many real-world complex networks exhibit the coevolution between topology and nodes dynamics, such as in epidemics [24, 36], opinion and community formation [26], or socioeconomics networks [18] and relations among investors [16]. Adaptive networks represent the conceptual framework for this work, which is based on a network model of knowledge diffusion that presents a coevolution between nodes and network topology [9]. Nodes interact based on some local preferences and on a question-answer protocol driven by the difference of some key attribute values between neighbors. Interaction between nodes modifies the network topology, which assumes non trivial properties. In its turn, the dynamically evolving topology changes neighborhood relations among nodes. It is in this context that we have studied the practical limitations affecting the selection of the theoretically best suited driver nodes - as we will discuss, under 2 certain circumstances it is possible that the only realistic strategy is the opposite of what structural/pinning controllability theory would suggest - and on the type of actions that could be realistically performed in a social context for controlling an adaptive network. A relevant theoretical contribution to the problem of controlling adaptive networks, which takes into account physical and economic constraints, has been recently presented [33]. Structural permeability is the metric of the propensity of a network to be controlled. Differently from previous approaches and because of this closer to our work, the optimal driver nodes selection is studied in presence of a richer set of constraints: Only some nodes are admissible as driver nodes and some other nodes should not be directly perturbed by control actions. This theoretical framework permits to generalize different problems, including ours (called problem 2 in [33]), which can be formalized as the selection of the set of driver nodes of minimum cardinality among the set of admissible nodes, satisfying the constraints that controllable nodes are all nodes and no one is excluded from perturbation. However, demonstrating structural/pinning controllability for a social network is neither always necessary nor sufficient when realistic scenarios are considered [19, 39]. It is not strictly necessary because often it is not required to be able to drive a social context from an arbitrary initial state to a specific final state. In most practical situations, there is the need to tune the dynamical evolution from one trajectory driving the population towards a negative outcome to another trajectory, possibly unknown but leading to a better outcome with respect to the welfare. So, in many practical situations, it is not an optimization problem the one we should solve when social networks are considered (i.e., applying the best inputs to the smallest set of driver nodes in order to reach the optimal final state), rather it is a problem of finding heuristics for maximizing the welfare. A possibility is to perturb the system evolution for modifying the basin of attraction (i.e., modify the dynamics so that the system that was attracted towards a certain space of final states becomes attracted towards a different one) [11, 46]. The property of structural controllability is also not sufficient as a requirement, because often there are practical limitations to the type of perturbations that could be injected into the system through driver nodes and also limitations to the accessibility of driver nodes. In many real cases, we are neither free to choose the best inputs nor to observe and manipulate all agents. Most important of all constraints, the individuals subject of the social control observe, judge, and possibly react to the control measures if they are perceived as unethical, unfair, abusive, or oppressive. The long experience with advertising campaigns that ultimately produced adverse reactions (i.e. reactance) [49] or the many criticisms concerning the lack of ethics in the social experiment run by Facebook [27] are well known. The human individual and social rich behavior represents the fundamental difference between control theory for generic complex systems and a control theory for social 3 networks [50]. Goal and Motivations Different from structural permeability, in our work we consider two peculiar constraints derived from empirical observations that fundamentally change the approach. The first is on the nature of admissible direct actions operated on driver nodes, while the second is on the possibility to engage optimal driver nodes. With respect to the nature of direct actions, we assume that in a social context no explicit direct action controlling the behavior of some individuals is possible unless a contract is enforced, like establishing a sponsorship or signing for a professional service. Indirect actions are instead admissible by exposing individuals to new information, either random information or recommendations, which may or may not produce a change in future activities. We have considered the effects of random information enlarging the knowledge base of driver nodes as a control strategy. With the second constraint, we question the assumption, common in structural/pinning control and network permeability, that the minimal and optimal set of driver nodes could be practically engaged for network control actions. We observe instead that there are situations where this is not the case, one of the more common is when driver nodes charge a fee for propagating control actions to their neighbors, for example if they are celebrities or so called 'influencers' in a social network because of their centrality. In these cases, the price for enrolling a driver node could be high and budget constraints could restrict their engagement to a sub-optimal number. It is even conceivable that the price tag that network celebrities would impose could be so high that in practice none of the driver node that control theory would prescribe can be actually enrolled. On the contrary, the opposite strategy could become feasible: To enroll as driver nodes a large number of nodes with limited ability to propagate control actions, such as common users and lay people, which however may have unit cost almost irrelevant and could be addressable in bulk through mass campaigns. This is the common scenario for propaganda and mass manipulation through a popular media and, anecdotally, a strategy that has proved effective in several historical occasions. The considerations regarding the limitations of structural controllability are the core motivations for the present paper that extends and improves a previous one, in which we had set the basis for the analysis and provided an initial discussion of our hypothesis for a realistically acceptable control of social networks [7]. Here we focus more explicitly on the two well known strategies for influencing social contexts: The one based on few 'influencers' and the other based on many ordinary users. The approaches have been studied in terms of network and diffusion effects, two concepts that we have adapted to our scenario to discuss the rich dynamics produced by the use of random information for social network control. The 4 network effect is analyzed through the changes induced on the network average degree and the clustering coefficient, while the diffusion effect is based on two ad-hoc metrics defined to measure the degree of knowledge diffusion and skill level, and of the polarization of agent interests [48]. More specifically, randomness in agent behavior has been modeled as new topics exogenously inserted in agents' state during a simulation: This event wish to represent the typical "unsought encounter" of serendipity and modifies both an agent's criterion of choice of the peers in knowledge diffusion communication. A first study regarding how to adapt the serendipity concept to a social network model has been presented in [14]. Finally, the ultimate goal of our work is to demonstrate that exposing selected agents to random information could be practically used to modify the evolution of a social network, nudging it towards behaviors that improve the welfare, and that different strategies to achieve that goal could be realistically elaborated. Examples of problematic behaviors spontaneously emerging from social networks abound, for which the ability to exert a control on the dynamics could be justified. It is well known and documented that in several situations, agents exhibit a strong polarization [8, 13]. Agents often form tight communities with few, if any, weak ties between them, heterogeneity of traits and characteristics of connected agents tend to disappear with the increase of homophily [21, 37]. In practice, it was often observed how people on social networks tend to slide into "filter bubbles" [17, 45] - i.e., self-reinforcing social contexts dominated by information homogeneity with few occasions to have contacts with critical analyses, information from unaligned sources or contrasting opinions - or, in knowledge diffusion and networked learning, how knowledge sometimes diffuses unevenly, for instance agents showing strong tendency towards specialization like when students/recipients of information grow strong interests only in a narrow set of topics disregarding the richness of the full information spectrum [3, 35]. 1 Model Our model of social network is inspired by question-answer networks [54] where knowledge is shared from expert agents (with respect to a certain topic) answering questions received from less skilled ones. We assume a set of agents and a set of topics to be given. Each agent has a certain level of interest and skill on each topic, both parameters could change interacting with other agents. More formally, let N be the set of nodes in the network, T be a set of topics and K be a set of time steps. Let 1 and K indicate the first and last time step. For each i ∈ N, t ∈ T and k ∈ K, let lk it ≥ 0 be the level of interest and skill, respectively, on topic t for node i at time k. For each i, j ∈ N and i j ≥ 0 be the amount of interaction between nodes i and j at time k, k ∈ K, let xk expressed in terms of number of question-answer interactions. it ≥ 0 and sk 5 j∈T k i (t j,lk it,sk i =((cid:83) it)), where T k i (what i knows at time step k) and a Friend state FSk Each agent i has a state characterized by two state-vectors called Personal state PSk i (who i knows at time step k). For each i ∈ N, t ∈ T and k ∈ K, the Personal state has the form i ⊆ T is the subset of topics that agent i knows PSk at time step k. In other words, the Personal state holds the list of topics an agent knows together with the corresponding level of interest and skill. The Friend i ⊆ N is the subset of agents with state has the form FSk whom agent i had interacted up to time step k. For each peer j of agent i, the number of question-answer interactions xk directed and weighted graph G (k) = {V , E k} describing the network at time step k, where V := N is the set of nodes, and E k =(cid:83) Together, Friend states define the time-varying adjacency matrix A (k) of the i j up to time step k is recorded. i j)), where Nk i =((cid:83) j∈Nk i i∈N FSk i is the set of weighted edges recorded by nodes' Friend states. The element of the adjacency matrix A (k) is computed as follows: (xk if (i,j)∈ E k otherwise (cid:40) xk i j 0 ai j(k) = 1.1 Network Construction A network is dynamically created according to the following steps: 1. Setup: At setup (time step 0), for each agent i, the Personal state PS0 i and corresponding qualities s0 it is the same for all topics T 0 i has it selected randomly, i . The Friend state i , instead, is empty, because we don't assume any preset network a number of topics T 0 while the level of interest l0 FS0 structure. 2. Topic Selection: At each time step, an agent i(cid:48) is randomly selected and for that agent a certain topic (t∗ ∈ T k i(cid:48) ) is selected from its Personal state. The choice of the topic is a weighted random selection with values of the associated interests lk i(cid:48)t∗ as weights, this way topics with higher interest are more likely to be selected; 3. Peer Selection: Among agent i(cid:48) friends and friends-of-friends holding topic t∗, the agent i(cid:48)(cid:48) with the higher skill in topic t∗ is selected (max(sk jt∗∀ j ∈ FSk i(cid:48) ∧ FSk )); FSk i(cid:48) 4. Successful Communication: The communication between requester agent i(cid:48) and the selected peer i(cid:48)(cid:48) succeeds if the peer is more skilled than the requester in topic t∗. The condition for establishing a communication involves the skill parameter: sk i(cid:48)(cid:48)t∗ > sk i(cid:48)t∗; 6 5. Failed Communication, Random Selected Peer: Otherwise, if either Step 3 or 4 fail (i.e., no peer holds topic t∗ or the selected peer is less skilled than the requester) then select an agent i(cid:48)(cid:48)(cid:48) at random; 6. Communication with Random Selected Peer: If the randomly selected node holds the selected topic and has a skill greater than that of the requester agent, the communication succeeds (WHILE (t∗ ∈ T k sk i(cid:48)(cid:48)(cid:48)t∗ > sk i(cid:48)t∗) Communication Succeed). i(cid:48)(cid:48)(cid:48) AND For sake of clarity, it is worth noting that the inclusion of friend-of-friend agents in Step 2 (Peer Selection) is key for network transitivity and the closure of triangles, two peculiar characteristics of social networks. The network formation mechanism at start up, instead, with agents having no friends, is purely random. In particular, considering the six steps just described, a communication attempt always fails at start up because there is no peer to select; Step 5 (Failed Communication, Random Selection) and Step 6 (Condition for Communication with Random Selection) are then executed and the initial ties are created by those interactions with randomly selected peers that succeed. 1.2 Skill and Interest Update After a successful interaction, the agent that started the communication is updated. For simplicity no change in the respondent's state is produced, assuming that knowledge, being an intangible good, does not decrease when shared, and there is no cost of processing and transmission. Skill and interest are always non negative quantities. For the skill parameter associated to each topic an agent owns, we assumes that it simply increases in chunks calculated as a fraction of the knowledge difference between two interacting agents. This implies that in subsequent interactions between two agents, the less skilled one accumulates knowledge in chunks of diminishing size. In this simple model of knowledge transmission, skill is a monotonic positive function with diminishing marginal increments. For completeness, although not specifically relevant for this work, the model also considers the effect of trust as an enabling factor for sharing knowledge: The more trust between the two agents, the better the diffusion of knowledge. Here the assumption is that trust between two interacting agents is built with successful communication. In this case, when agents interact for the first time, the chunk of knowledge transferred is reduced by a discounting factor representing the absence of trust. This discount factor progressively vanishes with subsequent communications. This is a simplified form of trust (and distrust) modeling, but motivations could be found in the literature about collective behavior [15, 20] and refers both to the prevalence of egocentrism in assimilating new information and to trust dynamics. The function modeling how agent i(cid:48) improves the skill associated to a certain 7 topics t∗ by interacting with agent i(cid:48)(cid:48) is: δ si(cid:48)t∗ = si(cid:48)(cid:48),t∗ − si(cid:48),t∗ γ + ρe− ν θ (1) with: • si(cid:48)(cid:48),t∗ − si(cid:48),t∗ is the difference of skill level associated to topic t∗ between agent i(cid:48) and i(cid:48)(cid:48); • γ ≥ 1 is the control factor for the size of the chunk of knowledge δ skill that agent i(cid:48) could learn from agent i(cid:48)(cid:48); θ is the discount factor representing trust; i(cid:48)i(cid:48)(cid:48) represents the number of successful communication between agent ni(cid:48) had with agent ni(cid:48)(cid:48) at time step k; • ρe− ν • ν = xk • − ν θ controls the slope of the trust function between the two agents, with θ the control factor. • ρ is the control factor for the actual value of the trust component; In short, the skill function says that one agent improves its skill with respect of a certain topic by learning from someone more skilled. The improvement is always a fraction of the difference of skills between the two and this passage of knowledge could be influenced by trust relations. From this derives the monotonicity with decreasing marginal gains. The dynamics we have assumed for the interest associated to the topic for which the interaction takes place is slightly different with respect to skills. The difference is the assumption of bounded total interest an agent could have. In other words, one cannot extend indefinitely the number of topics he's interested in or the amount of interest in a certain topic, for the simple reason that time and efforts are finite quantities. Beside the common sense, motivations for this assumption can be found in cognitive science studies, which have shown the tendency of people to shift their attention and interest, rather than behave incrementally [20], and in associating the interest for a topic to the time spent dealing with that topic (studying, experimenting, etc.). With respect to the model and how agent's state parameters are managed, this assumption means that either interest in topics are simply assumed as fixed quantities (a grossly unrealistic assumption) or when the interest associated to a certain topic increases, some other interests associated to all other topics should decrease. We have modeled this second case letting interests to dynamically change, and for simplicity, we assume that the the increase of the interest in one topic is compensated by uniformly decreasing all other interests. A full discussion of these model assumptions was presented in [3]. 8 The function modeling the interest function, for agent i(cid:48) and associated to topic t∗ depends on the gain in skill defined by function (1), meaning that the more one learn the more is interested to learn with respect to that topic. δ li(cid:48),t∗ = α(1− e− δ si(cid:48),t∗ β ) (2) with: α > 1 and β > 1 being the two parameters that control, respectively, the scale and the slope of the interest function, which, again, present diminishing marginal increments. A specific analysis of self-organization strategies based on a manipulation of these two parameters could be found in a previous work [3]. Finally, as mentioned before, to a gain in one interest should correspond a proportional loss in all other interests. Together these feature of skill and interest functions produce a rich dynamics that exhibits interesting effects with regard to knowledge diffusion into the network. In particular, agents acquire different roles with respect to communication, with a core of tightly connected agents and hubs, and a large periphery. The network tends to form a giant component, but specific setups may broke it into several independent ones. In general, the diffusion of knowledge produced is typically uneven and locally skewed on just few topics. These are the basic characteristics often debated for real case studies with populations showing a strong tendency to polarization of interests, echo chambers, and forms of cultural isolation even in presence of a social network with a high-degree of connectivity, as the online space now provide. These are also the key observations that have driven this work, which is focused on studying how, realistically, a social network with the characteristics just presented could be controlled in order to govern the process of knowledge diffusion, if the goal is to achieve a less skewed distribution of skills, a larger pool of interests shared by agents, and a more effective knowledge diffusion process. 2 Control Strategies with Random Information 2.1 Goal and Motivations Based on the model of social network described so far, in this work we study ways to control the dynamic behavior resulting from simulations. Differently from traditional control theory that defines controllability of complex systems as the ability to drive a system from an arbitrary initial state A to an arbitrary final state B [30, 31], for knowledge diffusion in a social network, explicit control mechanisms are typically considered unacceptable, unethical, or severely questioned by the public opinion. This is the case of propaganda, media manipulation, or mass indoctrination. In a social network the notion of controllability must necessarily be weaker and more nuanced than in control 9 theory: It should be an action of nudging the system dynamics with the goal of improving the welfare, rather then an action of tuning a set of inputs that drives a system from any initial state to any desired final state within finite time [32]. In this vein, an external controller has a limited set of mechanisms and those mechanisms must be made explicit to the population, otherwise ethical concerns are likely to prevail or the recipients of those influence attempts could revolt against them, as sometimes happened for advertising [49]. With respect to the goal of a control strategy in social networks, it is unlikely to be as precise as in control theory, which is assumed to be able to drive a system from one arbitrary state to any other one. Rather, the realistic goal could be to adjust some macro characteristics of the system, expressed by some metrics, in order to drive the social network from one basin of possible states to another one [11, 39]. This is, for instance, the way public policies are produced and enforced by public authorities for health, education, employment, or safety reasons. This difference is important, because it permits to discriminate control strategies that are not realistic from those that could possibly be considered acceptable in a social context. Acceptability of a control in a social context depends both on the control mechanism (i.e., how the control is exerted) and the control goal (i.e., what the control wishes to achieve). In the former case, we exclude from our analysis all mechanisms that involves the use of force upon a population and all social controls based on deception and trickery. There could be exceptional situations when the use of force is acceptable (e.g., for riots, wars, catastrophes, etc.), but they are out of the scope of this work. In our scenario, a control strategy should always be announced as a public policy to the involved population. For the latter aspect, the goal of the control in a social context should be aimed at enforcing a public policy to improve the welfare, like reducing inequalities, improving education or social inclusion, or the access to public services. More specifically, we assume that a social control strategy is aimed at modifying the dynamics of a social network to drive it from a certain expected basin of resulting states, if the network is left free to evolve for a certain time and based on present configuration, to a different, desired basin of final states that increases the welfare. In our case study, the control goal is to achieve a better distribution of knowledge among the agents by reducing polarization, augmenting the average skill level and the average number of topics held by agents. The control mechanism, which we consider acceptable in practice, is the strategic use of random information. Selected agents will be exposed to new random information at certain time steps. The hypothesis is that the controlled exposure to random information, which would not happen if the network is left free to evolve autonomously, can be opportunistically managed to nudge the network evolution. Network metrics and some ad-hoc diffusion metrics are monitored to evaluate the effectiveness of a control strategy. Examples of a 10 similar idea applied to different contexts can be retrieved in recommender systems [1, 25] and search engine studies [5, 52], which have the related problem of producing recommendations or search results too heavily influenced by the personal profile of the requester. 2.2 Network and Diffusion Metrics To evaluate the effectiveness of control strategies, we consider how exposing a subset of agents to random information may influence some basic metrics. This represents our interpretation of acceptable control mechanism applied to a social network: Some key parameters of the network topology and its dynamics are influenced in a predictable way and change the original evolution trajectory. The structure of the network might be modified, as well as the relevance of some agents with respect to the connectivity or the diffusion of knowledge; it could also be reduced the polarization of agents and the average number of topics that agents learn from interactions with others. In short, an acceptable control mechanism should be able to influence in a predictable way (at least stochastically) the coevolution of the adaptive network. In this work, we evaluate two classes of metrics: network metrics and diffusion metrics. Among the many network metrics defined in the literature, we focus the analysis on the average degree and the clustering coefficient. Together these two metrics provide many information about the network topology and the communication infrastructure. For instance, the type of network can be inferred, as well as the connectivity distribution between the core and periphery 1. Some agents typically becomes hubs and exert a strong influence over the communication and distribution of information in the network. The ability to modify network metrics such as the average degree and the clustering coefficient has influence over the hub agents, for instance their prominence could decline in favor of a more decentralized communication. The second class of metrics are defined ad-hoc. We have called them diffusion metrics because their aim is to measure some important attributes of the spread of topics and interest among the agents. Two metrics have been defined: Average Knowledge (AK) and Knowledge Diffusion (KD), used to evaluate different characteristics of the knowledge diffusion dynamics. AK is calculated as the average skill with respect to the topics actually owned by agents. In this sense, AK contributes to measure the specialization/polarization of agents, because AK could be high when agents knows few topics with high skill levels. 1Network core and periphery are typically defined in terms of assortative mixing. For assortative networks, as social networks typically are [44], high-degree nodes tend to link together forming a group of higher mean degree than the network as a whole. This subnetwork is called the core. Low-degree nodes, instead, being the majority of nodes, form a generic periphery of lower mean degree than the core [41, 42]. 11 KD, instead, is the average skill of agents with respect to the total number of topics in the network. This means that, implicitly, a topic that an agent does not own is averaged with skill zero. The meaning of KD is to evaluate the actual diffusion of knowledge with respect to the case of perfect diffusion, when all agents hold all topics with maximum knowledge. In this sense, KD is relevant because it gives an indication of how effectively topics are spread over the population and with which skill level. AK = PSi ∑N i=1 ∑ j=1 si, j i=1PSi ∑N PSi ∑N i=1 ∑ j=1 si, j N × T (3) (4) With PSi the number of topics of agent i's' Personal state and T the total KD = number of topics in the population. 2.3 Social Control Strategies For the social network control based on random topics, we assume that, with a given frequency, a certain subset of agents is selected and a variable number of random topics, among the ones existing in the network, is inserted into their Personal state with an average level of interest. The goal is to force the exposure of some agents to a larger set of topics and exploit the mechanisms of topic and peer selection described in Section 1.1 to modify the dynamic network behavior. With regard to network structure, with new random topics, the network construction mechanism strictly based on topology is occasionally bypassed and a bridge effect is produced. Recalling the terminology typical of control theory, we call driver agents the agents selected for being exposed to new random topics. The key parameters for defining a social control strategy are: The selection criteria of driver nodes, the number of random new topics introduced, and the frequency of introduction of new topics. The simulations and results discussed in the following will be based on different choices of these parameters. We made some assumptions with respect to the parameters choice. For the selection criteria of driver agents, in this work we focused on just two particularly relevant options: Driver agents are selected as a fraction of total agents ranked based on the node degree, either in decreasing on increasing order. 2.3.1 Selection of high-degree driver agents In this case, driver agents are a certain subset of agents with higher degree (1% or 10% are the values used in tests). This means that agents exposed to new 12 topics, and whose behavior will be directly perturbed, are those that mostly centralize the communication in the network. They are the hubs and the nodes of the network core, typically densely connected. Therefore, with this choice, very intuitive and similar to strategies adopted in social media and advertising (e.g., targeting the network influencers), it is the core of the network and the hub nodes to be directly manipulated. With respect to our metrics, we expect that few nodes will have a strong influence over the network dynamics and that hub nodes will increase their degree. Overall, though, this should stimulate a better communication, with positive effects on the knowledge diffusion. 2.3.2 Selection of low-degree driver agents In this other case, instead, driver agents are chosen among those with lower degree. This option may seem counterintuitive, being these agents the least connected nodes of the periphery of the network, those that typically have the least influence on communication and spreading processes. It has, however, some interesting properties. At network level, targeting the periphery of the network means to directly stimulate the closure of more triangles. This means to raise the clustering coefficient and foster a more rich decentralized communication, which may have effects on the network topology. Regarding diffusion, these nodes are likely those that had fewer connections, typically connected with other low-degree nodes (i.e., social networks are typically assortative [4], although some recent experiments have showed that during the evolution a network could transit from assortative to disassortative [29]), thus they have a limited choice of peers for exchanging knowledge. Exposing them to random topics very likely profoundly change their pattern of interaction, much more than what happen to hub nodes, which were and remain highly connected. On the other side, the influence that a typical low-degree node has on communication is very limited, for this reason the number of low-degree agents that must be selected to produce a clear control effect on the network is much higher than in the previous case. In our examples we have showed results with 50% and 70% of agents selected as driver agents. The choice of 50 and 70% is qualitative and motivated by presentation simplicity. The goal here is to show that, in principle, targeting ordinary users instead of influencers may produce relevant effects on the coevolving network dynamics, but whether in one case the driver nodes are a small subset with respect to the whole network (potentially requiring a high price to be engaged), in the other case the number of driver nodes is on a different scale, likely a large subset of nodes (possibly with low unit cost). 2.3.3 Number of new topics The second important parameter for defining a social control strategy represents the amount of perturbation that we are introducing in driver agent's Personal 13 state. Instead of an actual number of topics, it is expressed as a rate of new topics a driver node will receive with respect to the ones already present in its Personal state. Typical values we have considered are 1%, 10% or 30%, defined empirically as simply the rate that, on average, gives just one new topic and two rates that permit to incrementally add new topics during a simulation. For simplicity, we have assumed that all driver agents receive the same rate of new topics. Alternatives would have been possible, like simulating fixed amounts of new topics (we have tried this approach, but preliminary results were not as interesting as for the fixed rate option), or adjusting the number/rate of new topics based on contextual information for each agent (we did not explore this possibility, because it further complicates the model and the dynamics, but it is promising for developing a "personalized control strategy"). 2.3.4 Frequency of new topics The considerations for the frequency of introduction of new topics are similar to what discussed for the number of new topics. In this work, for simplicity we have considered fixed time intervals (measured in number of simulation steps, called ticks). 1000 ticks is the value used in the examples, for simulations that typically span over 100000 ticks. As in the previous case, the value is selected empirically, mostly for sake of presentation. Again, similar to the previous case, more elaborate time-based strategies were possible and interesting to study. The action of inserting new topics, instead of being a fixed frequency, could be triggered by contextual information, like a particular state of the network or particular values of the metrics, for instance when the overall communication stagnates. Another, even more elaborate strategy, could be to trigger the addition of new topics at agent level, when the specific driver agent exhibits a particular state or behavior (again, another form of "personalized control strategy"). 3 Model Instances and Simulation Results 3.1 Basic Settings The model of knowledge diffusion with social control mechanism is implemented in Netlogo 2, a multi-agent programmable modeling environment, which has a proprietary script language and permits to run simulations of complex networks through the GUI or the API. All simulations we present here have the basic setting listed in Table 1 (Parameters shared by all instances), chosen mainly for presentation sake, but still representative of network behaviors observed during tests with a large number of settings. 2https://ccl.northwestern.edu/netlogo/ 14 For the dynamics produced by our model, the rate between the number of agents and the number of topics N T is key, because it directly influences the average number of topics the agents are assigned at setup and the ability to select peers. It is to simplify the analysis and the presentation that we fixed the number of topics T and the maximum number of topics assigned to agents at setup λT , and varied the number of agents N to analyze, at least partially, how larger populations affect the results (see Table 1 (Network sizes)). In this study, we focused on small-to-medium sized populations, possibly representing situations like network learning for traditional academic courses (or even local subgroups of participants to large online courses interacting in dedicated forums), or online social networks built around restricted cultural or professional contexts. Very large communities represent a structurally different case study, which needs a specific analysis, out of the scope of this study. The duration of simulations, defined as the maximum number of time steps K, instead, has been decided empirically as the number of time steps sufficient for networks produced by our model to reach a steady state. 3.2 Model Instances Model instances presented in this work are aimed at discussing how the two strategies for driver agents selection, one selecting a subset based on agents with higher node degree and the other agents with lower node degree, could be exploited for controlling the network behavior. The two options have been compared also with the case of network evolving without any perturbation. The choice of node degree as the attribute for selecting driver agents has several references in control theory literature and is an attribute typically analyzed in social network studies. Several alternatives to degree centrality exist for selecting driver agents, like betweenness and eigenvector centrality, or more elaborate criteria based on community detection. However, we feel that before exploring alternative strategies and study which one could optimize the outcome, the goal should be to acquire a better understanding with respect to the possibility to use random information as a social control mechanism in practical situations. The simple criteria based on node degree has the important benefit of being intuitive in practice (i.e., selection of leaders/influencers or of common users/participants) and already exploited for different applications. Specifically, for the case of high-degree nodes, driver agents are either the 1% or the 10% of the population (see Table 1 (High-degree agent selection)). For low-degree nodes, driver agents are either the 50% or the 70% of the population (see Table 1 (Low-degree agent selection)). As previously discussed, the different characteristics of high- and low-degree nodes with respect connectivity and controllability makes the comparison of equally sized subsets not meaningful. 15 Table 1. Parameters for the model instances. Parameters shared by all instances Total Number of topics in the system: T = 100 Max Number of topics per agent at setup: λT = 10 Max Number of time steps (max #ticks): K = 100000 Number of New Random Topics per driver agent (% over Ti): 30% Time interval of New Random Topics Insertion (in #ticks): 1000 Network sizes Number of agents: N = [100,200,500,1000] High-degree agent selection Number of Driver Agents (% over N): [1%, 10%] Low-degree agent selection Number of Driver Agents (% over N): [50%, 70%] 3.3 Network and diffusion effects With simulations we wish to show two distinct effects that together contribute to define the effectiveness and feasibility of a social control strategy based on random topics: the network effect and the diffusion effect. Network effect describes how the addition of new random topics permits to modify the topology structure of the social network. This effect is one of the most fundamental for a social control strategy, because by interfering with the process that produces the network topology, some critical parameters of the network structure are affected, like the degree and type of assortativity, the size of independent components, the weight and number of hub nodes in centralizing the overall communication, and the relation between the core and the periphery of the network. From these parameters many emerging behaviors and features depend, for instance the community structure together with the prevalence of segregation or of echo chambers, the robustness with respect to failures, attacks, or deception, and the speed and the spread of a diffusion phenomena [34]. The network effect is measured by typical social network metrics like centrality metrics, homophily degree, density degree, the analysis of structural holes and of tie strength among the others. In this work we focused on two metrics among the most basic ones: average node degree and clustering coefficient, which let to consider some fundamental aspects of network topology. With diffusion effect, instead, we mean how the new random topics modify 16 the specific mechanism of knowledge transmission defined by our model. Our knowledge transmission is ad hoc, but it wishes to represent a general social context where agents have different skills and different willingness to acquire new knowledge. Skills are improved based on personal one-to-one contacts supported by the network topology. This effect is the one interfering with the topic selection mechanism of driver agents, which in turn affects the peer selection criteria and consequently changes how likely is a driver agent to maximize the skills on few topics only or to distribute the interactions on an extended set of topics. Also, the diffusion effect influences the average communication efficiency of agents, because by easing the creation of new interactions, communication congestions and spikes are less likely. We measure the diffusion effect with the two previously defined ad hoc metrics called Average Knowledge (AK) and Knowledge Diffusion (KD). AK represents the average skill level of agents with respect only to the topics they possess. KD measures the average skill level of agents with respect to all possible topics. Then, by design, AK is an upper bound for KD. In particular, KD necessarily starts very low at the beginning of a simulation because in our settings the number of topics assigned to agents at start up is limited and the total amount of skill is bounded (i.e., in these simulations, on average, agents at start up have 5% of the total number of topics T ). Then KD monotonically increases with the exchanges of knowledge among agents and the diffusion of topics, up to a value max(KD), which depends on the specific settings. It represents a measure of the erudition of the social network and gives an indication of how effectively skills are spread over the population and the level of knowledge. For our analysis, it is important how fast it approaches AK. On the contrary, the meaning of AK depends on the run time network state and it can either increase or decrease. For the same reason KD always starts low, AK always starts with a value close to the middle of the scale (i.e., at start up agents have a fixed total amount of skills spread over few topics). From that point, AK measures how much the proportion of the two quantities varies. It stay constant if the two change proportionally during the execution; it increases when agents acquire skill level faster than they acquire new topics; and it decreases vice versa. Given these ad hoc metrics, we say that an agent is polarized when it concentrates its best skills on just very few topics. Polarization of the social network is another important global characteristics, together with erudition. Taking into account AK and KD together, the degree of network polarization can be evaluated. We say that a network tends to polarize when the difference between AK and KD is increasing, because it means that agents are gaining skills mostly on the same subset of topics without a corresponding increase in erudition. On the contrary, a network tends to heterogeneity when the difference between AK and KD decreases, meaning that agents are starting to spread their interests on more topics. 17 3.4 Simulation Results Results of simulations are presented in Figure 1 and Figure 2, which show, respectively, the network and the diffusion effects of the strategic use of random topics. For the network effect, Figure 1 presents how the average node degree and the clustering coefficient change with respect to the benchmark represented by the typical network behavior with no injection of random topics in nodes (label C0 in Figure 1) for three network sizes (N = [100,500,1000]). The settings involving the addition of random topics are the ones previously introduced and whose parameters are summarized in Table 1: • Label HIGH 1% represents the selection of the 1% of high-degree nodes as driver agents; • Label HIGH 10% represents the selection of the 10% of high-degree nodes as driver agents; • Label LOW 50% represents the selection of the 50% of low-degree nodes as driver agents; • Label LOW 70% represents the selection of the 70% of low-degree nodes as driver agents; As discussed, the two general strategies tested could be interpreted as the selection of influencer agents the one labeled as HIGH and the selection of ordinary users the one labeled as LOW. The choice of the rate of driver agents is mostly for presentation sake. However, we note that the values of the selection of high-degree nodes are aligned with the ones for network controllability of social communication networks analyzed in [32]. 3.4.1 Network effect results For the average degree, the results of Figure 1 present what is called dynamic average degree, a representation specific for dynamic network behaviors, which calculates the average node degree taken on certain time step periods (e.g., in Figure 1, time step periods are [0,100], [100,5000], [5000,10000], [10000,20000], [20000,40000], [40000,60000],[60000,80000], and [80000,100000]). The value for each time step period is the average degree corresponding to active links (new or reused) in that specific period 3. The form of the dynamic average degree function produce a rich representation of network behaviors. One aspect that clearly emerges is the 3The values of the dynamic average degree are not calculated with the traditional formula < d >= 2∗E N , with E the number of links and N the number of nodes in the network. Instead, for each time step period (ti−1,ti), with Eti the number of active links in (ti−1,ti), the dynamic average degree for each time period is < dti >= 2∗Eti N . 18 spiky behavior of the original network C0 that tends to quickly saturate all possible connections. The injection of random topics, instead, in all situations, even for very few driver nodes (e.g., for N = 100, the setting HIGH 1% means that the node with the highest degree is the only driver agent) is able to produce a sensible reduction of the average degree with respect to the benchmark C0. In tests labeled HIGH, driver agents certainly include hub nodes and the large influence these nodes have on the network structure is clearly demonstrated by the fact that it suffices to modify the state of a few of them to obtain a wide effect on the degree metric. The average degree drops from 50 to 80%. This is a strong network effect and potentially a powerful way of controlling a network behavior, because it signals a reconfiguration of the communication within the network. At first sight, a strong reduction of average node degree might be interpreted as a sensible reduction of the weight of hub nodes. However, inspecting the outcome at agent level, it could be observed that this is not the case. The average degree of hub nodes actually increases, which is reasonable giving the fact that they receive new topics. The global reduction of average degree is driven by the average degree reduction in the large periphery of the network. The communication is even more centralized by few hub nodes and overall the network tends to become disassortative, similar to the effects discussed in [29]. With respect to the clustering coefficient, the tests show a general increment compared to the benchmark. This signals that more triangles have formed, a direct effect of the new connections produced by the introduction of random topics in hub nodes. Together, the reduction of the average degree and the increase of the clustering coefficient tends to enhance the small-worldiness of the network, a characteristic previously not present, which is an important effect in terms of controllability [28, 43]. Considering the different network sizes, we observe that the degree reduction is systematic, with results very similar for the larger networks. The case of N = 100 represents a peculiar situation because in that setting the communication efficiency is very high and agents establish quickly many connections. This is the reason for the initial spikes of the average degree in all situations. Another interesting result that emerged from these tests is that with respect to the ability to influence network metrics, both strategies HIGH and LOW could be effective. However, to have comparable strength, the number of driver nodes must be necessarily very different in the two cases, as showed in our simulations. However, there is an important difference between the LOW and the HIGH strategy with respect to hub nodes. By selecting low-degree nodes as driver agents, the formation of hub nodes is more difficult and the communication becomes more decentralized and local. The effect on the communication structure of the LOW strategy is the opposite of the HIGH one. This difference appears very clearly in the following diffusion effect. 19 In general, these observations present an interesting practical control problem still not fully investigated in the literature. While some theoretical results have been studied for reference network topologies [11, 32, 38], few studies exist that consider mechanisms for dynamically adjusting the degree of control during the evolution of a social network. Figure 1. Network results for the selection of high or low-degree driver agents. Dynamic Average Degree and Clustering Coefficient simulation results for N = [100, 500, 1000]. Label C0 represents results of the natural system dynamics with no addition of random topics. 1% HIGH and 10% HIGH labels represent results of, respectively, the 1% and the 10% of the high-degree nodes. 50% LOW and 70% LOW labels represent results of, respectively, the 50% and the 70% of the low-degree nodes. The x-axis represents time steps as ticks of the simulation; y-axis represents the average degree (left) and the clustering coefficient (right). 3.4.2 Diffusion effect results With these tests we have studied how the control strategies affected the diffusion of topics and of skills in the agent population. Here the goal is to modify the dynamics in order to reduce the polarization and increase the erudition of the network. The results are showed in Figure 2 and describe two very different scenarios for HIGH and LOW strategies. With respect to the HIGH strategy, the results do not provide evidence of a clear improvement compared with the benchmark. For N = 100 there is a slight improvement in the actual values of AK and KD, meaning a larger diffusion of topics and skills (higher erudition), 20 but same high level of polarization. For N = 500 the outcome is opposite: Actual values are worse than the benchmark, thus a reduced diffusion of topics and skills, but also a smaller level of polarization. For N = 1000 the results of both 1% and 10% HIGH are very close to C0 for both AK and KD. In this regard, selecting the few hub nodes as driver agents do not seems particularly effective for a better diffusion of knowledge measured as increased erudition and reduced polarization. Opposite is the outcome of the LOW strategy. In this case, it appears a systematic improvement with respect to the benchmark. For all network sizes and in both settings, 50% and 70%, KD approaches AK very fast as a result of the addition of new random topics to many nodes. This is a clear sign of no polarization, meaning that agents are able to distribute their skill over the enlarged set of topics. For N = 100 there is also a clear improvement in absolute values of AK and KD, while for N = 500 and N = 1000 AK grows slowly or tends to stay flat. This behavior signals that skills increase slowly and with difficulty. The reason is that many nodes with low-degree receive new random topics, but, after the initial burst of activity with neighbors, most of the time they are unable to find a peer within the few friends or friends-of-friends. Overall, for N = 100 we are able to both improve erudition and have no polarization, the optimal combination for the welfare. For larger networks, instead, adding new random topics quickly removes polarization because locally the communication flow efficiently, but the positive effect is then limited by the fact that with few hub nodes in the network, agents are unable to easily find new peers. To summarize, with these tests we have showed two possible effects of a social control strategy based on the addition of new random topics to selected driver agents. The results are not conclusive, but we have presented some important differences between addressing the influencers or the ordinary users. We have also seen how important is to define the goal of a control strategy, because the ability of manipulating some network metrics does not necessarily imply to be able of improving context-dependent features like the diffusion of knowledge, and vice versa. 4 Conclusions In this paper we discussed a possible use of random topics as control inputs for driver nodes, based on an adaptive network model for knowledge diffusion, and two realistic control strategies, one based on high-degree nodes commonly analyzed in studies of structural/pinning controllability, the other based on low-degree nodes, which instead had received few attention in controllability studies, but has practical application in several situations. The idea of using random information in control strategies has a long tradition in control theory and could be also retrieved in recommender systems and search engine research, which share the same problem of excessive polarization of interest and the need 21 Figure 2. Diffusion results for the selection of high or low-degree driver agents. Average Knowledge (AK) and Knowledge Diffusion (KD) simulation results for N = [100, 500, 1000]. Label C0 represents results of the natural system dynamics with no addition of random topics. 1% HIGH and 10% HIGH labels represent results of, respectively, the 1% and the 10% of the high-degree nodes. 50% LOW and 70% LOW labels represent results of, respectively, the 50% and the 70% of the low-degree nodes. The x-axis represents time steps as ticks of the simulation; y-axis represents the value of AK and KD, which always ranges in [0,100] for these tests. to improve diversity that we consider for knowledge diffusion [2, 6]. However, explicitly considering random information as a control input for social networks is a new idea worth exploring, in our opinion. The two general strategies for influencing the coevolving dynamics are based, respectively, on the selection of few influencers and the manipulation of their behavior in order to drive the network; and on the selection of many ordinary users as the driver of the network as a whole. The two approaches have been studied in terms of network and diffusion effects. The problem of controlling social networks presents striking differences with respect to the study of structural controllability for generic complex networks. The social context introduces many limitations (ethical, operational, functional), and often does not strictly require full structural controllability, rather the ability to nudge the network evolution towards a certain basin of results improving the welfare. For these reasons, the application of control theory to social networks could be a source of inspiration, but it cannot be applied as-is, because 22 important adaptations are required, which represents a promising and still largely unexplored research strand. There are many situations in which it would be important to know how to handle the level of random information that agents possibly receive. For instance, in learning situations, in social media, journalism, knowledge diffusion, skill acquisition, experience dissemination, epidemics, and possibly risk management. In all these situations, there could be the problem of an excessive polarization (of interests, attention, analyses) and lack of erudition, but the solution cannot be to simply change what individuals prefer or believe or regard as important/interesting. Increasing information heterogeneity and serendipity could be effective approaches for improving the controllability of social contexts. Furthermore, considering that in practical situations it could be impractical to either recognize all theoretical driver nodes, accessing them with external perturbations, or sustaining the cost to engage them, we have presented some empirical solutions based on network metrics for selecting nodes that might have practical usage. The results of our work look promising to us and encourage more analyses, tests, and verifications with respect to real social networks. Other future works will include a theoretical grounding to the results, the definition of an analytical model and a statistical analysis of a larger test set to better evaluate the performance of control strategies. Finally, a socioeconomic study of the conditions leading to prefer a strategy based on high-degree or on low-degree nodes would perhaps produce new insights with respect to practical constraints for adaptive network controllability. References 1. P. Adamopoulos and A. Tuzhilin. On unexpectedness in recommender systems: Or how to better expect the unexpected. ACM Transactions on Intelligent Systems and Technology (TIST), 5(4):54, 2015. 2. G. Adomavicius and Y. Kwon. Improving aggregate recommendation diversity using ranking-based techniques. IEEE Transactions on Knowledge and Data Engineering, 24(5):896–911, 2012. 3. L. Allodi, L. Chiodi, and M. Cremonini. Self-organizing techniques for knowledge diffusion in dynamic social networks. In Proceedings of Complex Networks Conference 2014 (CompleNet14). Bologna, Italy, 2014. 4. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani. The architecture of complex weighted networks. Proceedings of the National Academy of Sciences of the United States of America, 101(11):3747–3752, 2004. 23 5. E. Bozdag. Bias in algorithmic filtering and personalization. Ethics and information technology, 15(3):209–227, 2013. 6. K. Bradley and B. Smyth. Improving recommendation diversity. In Proceedings of the Twelfth Irish Conference on Artificial Intelligence and Cognitive Science, Maynooth, Ireland, pages 85–94. Citeseer, 2001. 7. F. Casamassima and M. Cremonini. Use of random topics as practical control signals in a social network model. In International Workshop on Complex Networks and their Applications, pages 539–550. Springer, 2016. 8. D. Centola, J. C. Gonzalez-Avella, V. M. Eguiluz, and M. San Miguel. Homophily, cultural drift, and the co-evolution of cultural groups. Journal of Conflict Resolution, 51(6):905–929, 2007. 9. A. Ceselli and M. Cremonini. Models and methods for the analysis of the diffusion of skills in social networks. In Proceedings of International Conference in Operation Research (OR2015). Wien, Austria, 2015. 10. Y.-Z. Chen, L. Wang, W. Wang, and Y.-C. Lai. The paradox of controlling complex networks: control inputs versus energy requirement. arXiv preprint arXiv:1509.03196, 2015. 11. S. P. Cornelius, W. L. Kath, and A. E. Motter. Realistic control of network dynamics. Nature communications, 4, 2013. 12. N. J. Cowan, E. J. Chastain, D. A. Vilhena, J. S. Freudenberg, and C. T. Bergstrom. Nodal dynamics, not degree distributions, determine the structural controllability of complex networks. PloS one, 7(6):e38398, 2012. 13. D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 160–168. ACM, 2008. 14. M. Cremonini. Introducing serendipity in a social network model of knowledge diffusion. Chaos, Solitons & Fractals, 90:64–71, 2016. 15. J. da Gama Batista, J.-P. Bouchaud, and D. Challet. Sudden trust collapse in networked societies. The European Physical Journal B, 88(3):55, 2015. 16. P. DeLellis, A. DiMeglio, F. Garofalo, and F. Lo Iudice. The evolving cobweb of relations among partially rational investors. PloS one, 12(2):e0171891, 2017. 24 17. D. Easley, J. Kleinberg, et al. Networks, crowds, and markets: Reasoning about a highly connected world. Significance, 9:43–44, 2012. 18. G. C. Ehrhardt, M. Marsili, and F. Vega-Redondo. Phenomenological models of socioeconomic network dynamics. Physical Review E, 74(3):036106, 2006. 19. J. Gao, Y.-Y. Liu, R. M. D'Souza, and A.-L. Barab´asi. Target control of complex networks. Nature communications, 5, 2014. 20. R. L. Goldstone and T. M. Gureckis. Collective behavior. Topics in Cognitive Science, 1(3):412–438, 2009. 21. B. Golub and M. O. Jackson. How homophily affects the speed of learning and best response dynamics. 2012. 22. R. Grigoriev, M. Cross, and H. Schuster. Pinning control of spatiotemporal chaos. Physical Review Letters, 79(15):2795, 1997. 23. T. Gross and B. Blasius. Adaptive coevolutionary networks: a review. Journal of the Royal Society Interface, 5(20):259–271, 2008. 24. T. Gross, C. J. D. D'Lima, and B. Blasius. Epidemic dynamics on an adaptive network. Physical review letters, 96(20):208701, 2006. 25. L. Iaquinta, M. De Gemmis, P. Lops, G. Semeraro, M. Filannino, and P. Molino. Introducing serendipity in a content-based recommender system. In Hybrid Intelligent Systems, 2008. HIS'08. Eighth International Conference on, pages 168–173. IEEE, 2008. 26. G. Iniguez, J. Kert´esz, K. K. Kaski, and R. A. Barrio. Opinion and community formation in coevolving networks. Physical Review E, 80(6):066119, 2009. 27. J. Kleinsman and S. Buckley. Facebook study: a little bit unethical but worth it? Journal of Bioethical inquiry, 12(2):179–182, 2015. 28. G. Kossinets and D. J. Watts. Empirical analysis of an evolving social network. science, 311(5757):88–90, 2006. 29. M. Li, S. Guan, C. Wu, X. Gong, K. Li, J. Wu, Z. Di, and C.-H. Lai. From sparse to dense and from assortative to disassortative in online social networks. Scientific reports, 4, 2014. 30. C.-T. Lin. Structural controllability. IEEE Transactions on Automatic Control, 19(3):201–208, 1974. 25 31. Y.-Y. Liu and A.-L. Barab´asi. Control principles of complex networks. arXiv preprint arXiv:1508.05384, 2015. 32. Y.-Y. Liu, J.-J. Slotine, and A.-L. Barab´asi. Controllability of complex networks. Nature, 473(7346):167–173, 2011. 33. F. Lo Iudice, F. Garofalo, and F. Sorrentino. Structural permeability of complex networks to control signals. Nature communications, 6, 2015. 34. Z.-M. Lu and X.-F. Li. Attack vulnerability of network controllability. PloS one, 11(9):e0162289, 2016. 35. S. Maglajlic. Engineering social networks using the controllability approach applied to e-learning. In Advanced Learning Technologies (ICALT), 2012 IEEE 12th International Conference on, pages 276–280. IEEE, 2012. 36. V. Marceau, P.-A. Noel, L. H´ebert-Dufresne, A. Allard, and L. J. Dub´e. Adaptive networks: Coevolution of disease and topology. Physical Review E, 82(3):036116, 2010. 37. M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, pages 415–444, 2001. 38. G. Menichetti, L. Dall'Asta, and G. Bianconi. Network controllability is determined by the density of low in-degree and out-degree nodes. Physical review letters, 113(7):078701, 2014. 39. A. E. Motter. Networkcontrology. Chaos: An Interdisciplinary Journal of Nonlinear Science, 25(9):097621, 2015. 40. M. Newman. Networks: an introduction. Oxford university press, 2010. 41. M. E. Newman. Assortative mixing in networks. Physical review letters, 89(20):208701, 2002. 42. M. E. Newman. Mixing patterns in networks. Physical Review E, 67(2):026126, 2003. 43. M. E. Newman. The structure and function of complex networks. SIAM Review, 45(2):167–256, 2003. 44. M. E. Newman and J. Park. Why social networks are different from other types of networks. Physical Review E, 68(3):036122, 2003. 45. E. Pariser. The filter bubble: What the Internet is hiding from you. Penguin UK, 2011. 26 46. D. Pennacchioli, G. Rossetti, L. Pappalardo, D. Pedreschi, F. Giannotti, and M. Coscia. The three dimensions of social prominence. In International Conference on Social Informatics, pages 319–332. Springer, 2013. 47. F. Sorrentino, M. di Bernardo, F. Garofalo, and G. Chen. Controllability of complex networks via pinning. Physical Review E, 75(4):046103, 2007. 48. P. G. Sun. Controllability and modularity of complex networks. Information Sciences, 325:20–32, 2015. 49. C. E. Tucker. Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5):546–562, 2014. 50. J. M. Vardaman, J. M. Amis, B. P. Dyson, P. M. Wright, and R. Van de Graaff Randolph. Interpreting change as controllable: The role of network centrality and self-efficacy. Human Relations, 65(7):835–859, 2012. 51. X. F. Wang and G. Chen. Pinning control of scale-free dynamical networks. Physica A: Statistical Mechanics and its Applications, 310(3):521–531, 2002. 52. R. White. Beliefs and biases in web search. In Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, pages 3–12. ACM, 2013. 53. P. Yao, B.-Y. Hou, Y.-J. Pan, and X. Li. Structural controllability of temporal networks with a single switching controller. PloS one, 12(1):e0170584, 2017. 54. J. Zhang, M. S. Ackerman, and L. Adamic. Expertise networks in online communities: structure and algorithms. In Proceedings of the 16th international conference on World Wide Web, pages 221–230. ACM, 2007. 27
1507.02103
3
1507
2017-04-12T13:35:33
Measuring centrality by a generalization of degree
[ "cs.SI", "physics.soc-ph" ]
Network analysis has emerged as a key technique in communication studies, economics, geography, history and sociology, among others. A fundamental issue is how to identify key nodes, for which purpose a number of centrality measures have been developed. This paper proposes a new parametric family of centrality measures called generalized degree. It is based on the idea that a relationship to a more interconnected node contributes to centrality in a greater extent than a connection to a less central one. Generalized degree improves on degree by redistributing its sum over the network with the consideration of the global structure. Application of the measure is supported by a set of basic properties. A sufficient condition is given for generalized degree to be rank monotonic, excluding counter-intuitive changes in the centrality ranking after certain modifications of the network. The measure has a graph interpretation and can be calculated iteratively. Generalized degree is recommended to apply besides degree since it preserves most favourable attributes of degree, but better reflects the role of the nodes in the network and has an increased ability to distinguish among their importance.
cs.SI
cs
Measuring centrality by a generalization of degree∗ L´aszl´o Csat´o† Department of Operations Research and Actuarial Sciences Corvinus University of Budapest MTA-BCE "Lendulet" Strategic Interactions Research Group Budapest, Hungary April 13, 2017 Abstract Network analysis has emerged as a key technique in communication studies, economics, geography, history and sociology, among others. A fundamental issue is how to identify key nodes, for which purpose a number of centrality measures have been developed. This paper proposes a new parametric family of centrality measures called generalized degree. It is based on the idea that a relationship to a more interconnected node contributes to centrality in a greater extent than a connection to a less central one. Generalized degree improves on degree by redistributing its sum over the network with the consideration of the global structure. Application of the measure is supported by a set of basic properties. A sufficient condition is given for generalized degree to be rank monotonic, excluding counter-intuitive changes in the centrality ranking after certain modifications of the network. The measure has a graph interpretation and can be calculated iteratively. Generalized degree is recommended to apply besides degree since it preserves most favourable attributes of degree, but better reflects the role of the nodes in the network and has an increased ability to distinguish among their importance. JEL classification number: D85, Z13 AMS classification number: 15A06, 91D30 Keywords: Network; centrality measure; degree; axiomatic approach 1 Introduction In recent years there has been a boom in network analysis. One fundamental concept that researchers try to capture is centrality: a quantitative measure revealing the importance of nodes in the network. The first efforts to formally define centrality were made by Bavelas ∗ We are grateful to Herbert Hamers for drawing our attention to centrality measures, and to Dezso Bednay, Pavel Chebotarev and Tam´as Sebesty´en for useful advices. The research was supported by OTKA grant K 111797 and MTA-SYLFF (The Ryoichi Sasakawa Young Leaders Fellowship Fund) grant 'Mathematical analysis of centrality measures', awarded to the author in 2015. † e-mail: [email protected] 1 (1948) and Leavitt (1951). Since then, a lot of centrality measures have been suggested (for a survey, see Wasserman and Faust (1994); for a short historical account, see Boldi and Vigna (2014); for some applications, see Jackson (2010)). Despite the agreement that centrality is an important attribute of networks, there is no consensus on its accurate meaning (Freeman, 1979). The central node of a star is obviously more important than the others but its role can be captured in several ways: it has the highest degree, it is the closest to other nodes (Bavelas, 1948), it acts as a bridge along the most shortest paths (Freeman, 1977), it has the largest number of incoming paths (Katz, 1953; Bonacich, 1987), or it maximizes the dominant eigenvector of a matrix adequately representing the network (Seeley, 1949; Brin and Page, 1998). An important question is the domain of centrality measures. We examine symmetric and unweighted networks, i.e. links have no direction and they are equally important, but non-connectedness is allowed. The goal of current research is to introduce a centrality concept on the basis of degree by taking into account the whole structure of the network. It is achieved through the Laplacian matrix of the network. This idea has been adopted earlier. For instance, Chebotarev and Shamis (1997) introduce a connectivity index from which a number of centrality measures can be de- rived. Klein (2010) defines an edge-centrality measure exhibiting several nice features. Avrachenkov et al. (2015) propose a new concept of betweenness centrality for weighted networks with the Laplacian matrix. Masuda et al. (2009), Masuda and Kori (2010) and Ranjan and Zhang (2013) also use it in order to reveal the overall position of a node in a network. We will consider a less known paired comparison-based ranking method called gener- alized row sum (Chebotarev, 1989, 1994) for the purpose.1 In fact, our centrality measure redistributes the pool of aggregated degree (i.e. sum of degrees over the network) by considering all connections among the nodes, therefore it will be called generalized degree. The impact of indirect connections is governed by a parameter such that one limit of generalized degree results in degree, while the other leads to equal centrality for all nodes (in a connected graph). While there is a large literature in mathematical sociology on centrality measures, their comparison and evaluation clearly requires further investigation. We have chosen the axiomatic approach, a standard path in cooperative game and social choice theory, in order to confirm the validity of generalized degree for measuring the importance of nodes. This line is followed by the following authors, among others. Freeman (1979) states that all centrality measures have an implicit starting point: the center of a star is the most central possible position. Sabidussi (1966) defines five properties that should be satisfied by a sensible centrality on an undirected graph. These axioms are also accepted by Nieminen (1974). Landherr et al. (2010) analyse five common centrality measures on the basis of three simple requirements concerning their behaviour. Boldi and Vigna (2014) introduce three axioms for directed networks, namely size, density and score monotonicity, and check whether they are satisfied by eleven standard centrality measures. Though, characterizations of centrality measures are scarce. Kitti (2012) provides an axiomatization of eigenvector centrality on weighted networks. Garg (2009) characterizes some measures based on shortest paths and shows that degree, closeness and decay cen- 1 Chebotarev and Shamis (1997, p. 1511) note that 'there exists a certain relation between the problem of centrality evaluation and the problem of estimating the strength of players from incomplete tournaments'. The similarity between the two areas is mentioned by Monsuur and Storcken (2004), too. 2 trality belong to the same family, obtained by adding only one axiom to a set of four. Dequiedt and Zenou (2015) present axiomatizations of Katz-Bonacich, degree and eigen- vector centrality founded on the consistency axiom, which relates the properties of the measure for a given network to its behaviour on a reduced network. Similarly to our paper, Garg (2009) and Dequiedt and Zenou (2015) use the domain of symmetric, unweighted networks. Centrality measures are often used in order to identify the nodes with the highest importance, i.e. the center of the network. Monsuur and Storcken (2004) present an axiomatic characterization of three different center concepts for connected, symmetric and unweighted networks. However, a complete axiomatization of generalized degree will not be provided. While it is not debated that such characterizations are a correct way to distinguish between centrality measures, we think they have limited significance for applications. If one should determine the centrality of the nodes in a given network, he/she is not much interested in the properties of the measure on smaller networks. Characterizations can provide some aspects of the choice but the consequences of the axioms on the actual network often remain obscure. From this viewpoint, the normative approach of Sabidussi (1966), Landherr et al. (2010), or Boldi and Vigna (2014) seems to be more advantageous. Our axiomatic scrutiny is mainly based on a property from Sabidussi (1966) with some modification (in fact, strengthening) to eliminate the possibility of counter-intuitive changes in the centrality ranking of nodes. This requirement is well-known in paired comparison-based ranking (see, for instance, Gonz´alez-D´ıaz et al. (2014)). In the case of centrality measures, it has been discussed by Chien et al. (2004) (with a proof that PageRank satisfies it) and proposed by Boldi and Vigna (2014) as an essential counterpoint to score monotonicity. Landherr et al. (2010) analyse similar properties of centrality measures, however, they mainly concentrate on the change of centrality scores (with the exception of Property 3, not discussed here). Given the aim of most applications, i.e. to distinguish the nodes with respect to their influence, it makes sense to take this relative point of view. This requirement is called adding rank monotonicity. A sufficient condition is given for the proposed measure to satisfy them, which is an important contribution of us. It will also be presented that in a star network, generalized degree associates the highest value to its center, and it means a good tie-breaking rule of degree with an appropriate parameter choice. On the basis of these results, the measure is recommended to use besides degree since the measure preserves most favourable attributes of degree but better reflects the role of the nodes in the network and has a much higher differential level. The axiomatic point of view is not exclusive. Borgatti and Everett (2006) criticize Sabidussi (1966)'s approach because it does not 'actually attempt to explain what cen- trality is'. Instead of this, Borgatti and Everett (2006) present a graph-theoretic review of centrality measures that classifies them according to the features of their calculation. Thus a clear interpretation of generalized degree on the network graph will also be given, revealing that it is similar to degree-like walk-based measures: a node's centrality is a function of the centrality of the nodes it is connected to, and a relationship to a more in- terconnected node contributes to the own centrality to a greater extent than a connection to a less central one. The paper proceeds as follows. Section 2 defines the framework, introduces the cen- trality measure and presents its properties. In Section 3, we discuss the parameter choice 3 by an axiomatic analysis, and highlight the differences to degree. Section 4 gives an inter- pretation for generalized degree on the network graph through an iterative decomposition. Finally, Section 5 summarizes the main results and draws the directions of future research. Because of a new measure is presented, the paper contains more thoroughly investigated examples than usual. 2 Generalized degree centrality We consider a finite set of nodes N = {1, 2, . . . , n}. A network defined on N is an unweighted, undirected graph (without loops or multiple edges) with the set of nodes N. The adjacency matrix representation is adopted, the network is given by (N, A) such that A ∈ Rn×n is a symmetric matrix, aij = 1 if nodes i and j are connected and aij = 0 otherwise. If it does not cause inconvenience, the underlying graph will also be referred to as the network. Two nodes i, j ∈ N are called symmetric if a relabelling is possible such that the positions of i and j are interchanged and the network still has the same structure. A path between two nodes i, j ∈ N is a sequence (i = k0, k1, . . . , km = j) of nodes such that akℓkℓ+1 = 1 for all ℓ = 0, 1, . . . , m − 1. The network is called connected if there exists a path between two arbitrary nodes. The network graph should not be connected. A maximal connected subnetwork of (N, A) is a component of the network. Let N denote the finite set of networks defined on N, and N n denote the class of all networks (N, A) ∈ N with N = n. Vectors are indicated by bold fonts and assumed to be column vectors. Let e ∈ Rn be given by ei = 1 for all i = 1, 2, . . . , n and I ∈ Rn×n be the identity matrix, i.e., Iii = 1 for all i = 1, 2, . . . , n and Iij = 0 for all i 6= j. Definition 1. Centrality measure: Let (N, A) ∈ N n be a network. Centrality measure f is a function that assigns an n-dimensional vector of nonnegative real numbers to (N, A) with fi(N, A) being the centrality of node i. A centrality measure will be denoted by f : N n → Rn. We focus on the centrality ranking, so centrality measures are invariant under multiplication by positive scalars (nor- malization): node i is said to be at least as central as node j in the network (N, A) if and only if fi(N, A) ≥ fj(N, A). Definition 2. Degree: Let (N, A) ∈ N n be a network. Degree centrality d : N n → Rn is given by d = Ae. A network is called regular if all nodes have the same degree. Degree is probably the oldest measure of importance ever used. It is usually a good baseline to approximate centrality. The major disadvantage of degree is that indirect connections are not considered at all, it does not reflect whether a given node is connected to central or peripheral nodes (Landherr et al., 2010). This attribute is captured by the following property. Definition 3. Independence of irrelevant connections (IIC): Let (N, A), (N, A′) ∈ N n be two networks and k, ℓ ∈ N be two distinct nodes such that A and A′ are identical but a′ ℓk = 1 − aℓk). Centrality measure f : N n → Rn is called independent of irrelevant connections if fi(N, A) ≥ fj(N, A) ⇒ fi(N, A′) ≥ fj(N, A′) for all i, j ∈ N \ {k, ℓ}. kℓ = 1 − akℓ (and a′ 4 Independence of irrelevant connections is an adaptation of the axiom independence of irrelevant matches, defined for general tournaments (Rubinstein, 1980; Gonz´alez-D´ıaz et al., 2014). It is used in a modified form for a characterization of the degree center (i.e. nodes with the highest degree) under the name partial independence (Monsuur and Storcken, 2004). Lemma 1. Degree satisfies IIC. Example 1 shows that independence of irrelevant connections is an axiom one would rather not have. Figure 1: Networks of Example 1 (a) Network (N, A) 3 (b) Network (N, A′) 3 2 2 4 4 1 1 5 5 Example 1. Consider the networks (N, A), (N, A′) ∈ N 5 on Figure 1. Note that nodes 1 and 4, and 2 and 3 are symmetric in (N, A), moreover, nodes 1 and 5, and 2 and 4 are symmetric in (N, A′). d2 = d3 = 2 in both cases, but node 3 seems to be more central in (N, A′) than node 2. The following centrality measure will be able to eliminate this shortcoming of degree. It uses the Laplacian matrix L = (ℓij) ∈ Rn×n of the network (N, A), given by ℓij = −aij for all i 6= j and ℓii = di for all i = 1, 2, . . . , n. Definition 4. Generalized degree: Let (N, A) ∈ N n be a network. Generalized degree centrality x(ε) : N n → Rn is given by (I + εL)x(ε) = d, where ε > 0 is a parameter. Parameter ε reflects the role of indirect connections, it is responsible for taking into account the centrality of neighbours, hence for breaking IIC. Remark 1. A straightforward formula for the generalized degree of node i is di = xi(ε) + ε Xj∈N \{i} aij [xi(ε) − xj(ε)] . (1) Example 2. Consider the networks (N, A), (N, A′) ∈ N 5 on Figure 1. Generalized degree centrality is as follows: x(ε)(N, A) = (cid:20) 1 + 3ε 1 + 2ε , 2 + 3ε 1 + 2ε , 2 + 3ε 1 + 2ε , 1 + 3ε 1 + 2ε , 0(cid:21)⊤ ; x(ε)(N, A′) = 1 1 + 8ε + 21ε2 + 20ε3 + 5ε4 Thus x2(ε)(N, A) = x3(ε)(N, A) but x2(ε)(N, A′) < x3(ε)(N, A′). 1 + 9ε + 27ε2 + 30ε3 + 8ε4 2 + 15ε + 37ε2 + 33ε3 + 8ε4 2 + 16ε + 40ε2 + 34ε3 + 8ε4 2 + 15ε + 37ε2 + 33ε3 + 8ε4 1 + 9ε + 27ε2 + 30ε3 + 8ε4 .     5 Remark 2. Generalized degree violates IIC for any ε > 0. Some basic attributes of generalized degree are listed below. Proposition 1. Generalized degree satisfies the following properties for any fixed param- eter ε > 0: 1. Existence and uniqueness: a unique vector x(ε) exists for any network (N, A) ∈ N . 2. Anonymity (ANO): if the networks (N, A), (σN, σA) ∈ N are such that (σN, σA) is given by a permutation of nodes σ : N → N from (N, A), then xi(ε)(N, A) = xσi(ε)(σN, σA) for all i ∈ N. 3. Degree preservation: Pi∈N xi(ε) = Pi∈N di for any network (N, A) ∈ N . 4. Zero presumption (ZP ): xi(ε) = 0 if and only if di = 0, i is an isolated node. 5. Independence of disconnected parts (IDCP ): if the networks (N, A), (N, A′) ∈ N ik = 0 for all i ∈ N 1, ij for all i, j ∈ N 1, then xi(ε)(N, A) = xi(ε)(N, A′) for all are such that N 1 ∪ N 2 = N, N 1 ∩ N 2 = ∅ and aik = 0, a′ k ∈ N 2 and aij = a′ i ∈ N 1 and Pi∈N 1 xi(ε)(N, A) = Pi∈N 1 xi(ε)(N, A′) = Pi∈N 1 di.2 6. Boundedness: min{di : i ∈ N} ≤ xj(ε) ≤ max{di : i ∈ N} for all j ∈ N and for any network (N, A) ∈ N . 7. Agreement: limε→0 x(ε) = d and limε→∞ x(ε) = (Pi∈N di/n) e for any connected network (N, A) ∈ N . 8. Flatness preservation (F P ): xi(ε) = xj(ε) for all i, j ∈ N if and only if the network is regular. Proof. The statements above will be proved in the corresponding order. 1. The Laplacian matrix of an undirected graph is positive semidefinite (Mohar, 1991, Theorem 2.1), hence I + εL is positive definite. 2. Generalized degree is invariant under isomorphism, it depends just on the structure of the graph and not on the particular labelling of the nodes. 3. Sum of columns of L is zero. 4. If di = 0, then xi(ε) = 0 since the corresponding row of L contains only zeros. If xi(ε) = 0 then xj(ε) ≥ xi(ε) for any j ∈ N, so di = 0 due to formula (1). 5. Formula (1) gives the same equation for node i ∈ N 1 in the case of (N, A) and (N, A′), and generalized degree is unique. Sum of equations concerning nodes in N 1 gives Pi∈N 1 xi(ε)(N, A) = Pi∈N 1 xi(ε)(N, A′) = Pi∈N 1 di. 6. Let xj(ε) = min{xi(ε) : i ∈ N}. Equation (1) results in ajk [xj(ε) − xk(ε)] = dj, xj(ε) + ε Xk∈N where the second term of the sum on the left-hand side is non-positive and dj ≥ min{di : i ∈ N}. The other inequality can be shown analogously. 2 Degrees in the component given by the set of nodes N 1 are the same in (N, A) and (N, A′) due to the condition aij = a′ ij for all i, j ∈ N 1. 6 7. The first identity, limε→0 x(ε) = d, is obvious. Let limε→∞ xj(ε) = max{limε→∞ xi(ε) : i ∈ N}. If limε→∞ xj(ε) > limε→∞ xh(ε) for any h ∈ N, then exists k, m ∈ N such that limε→∞ xk(ε) = limε→∞ xj(ε) = max{limε→∞ xi(ε) : i ∈ N} > limε→∞ xm(ε) and akm = 1 due to the connectedness of (N, A).3 But dk = xk(ε) + εPℓ∈N akℓ [xk(ε) − xℓ(ε)] ≥ ε [xk(ε) − xm(ε)] from formula (1), which is impossible when ε → ∞. 8. It can be verified that xi(ε) = di satisfies (I +εL)x(ε) = d if di = dj for all i, j ∈ N. xi(ε) = xj(ε) for all i, j ∈ N implies Lx(ε) = 0, so x(ε) = d. ❏ ANO contains symmetry (Garg, 2009), namely, two symmetric nodes have equal cen- trality. It provides that all nodes have the same centrality in a complete network, too. The name of the measure comes from the property degree preservation, it can be perceived as a centrality measure redistributing the sum of degree among the nodes. ZP and INRP address the issue of disconnected networks. ZP is an extension of the axiom isolation (Garg, 2009), demanding that an isolated node has zero centrality. INRP shows that the centrality in a component of the network are independent from other components. Boundedness means that centrality is placed on an interval not broader than in the case of degree. It is easy to prove that the stronger condition of min{di : i ∈ N} < xj(ε) or xj(ε) < max{di : i ∈ N} is also satisfied if node j is at least indirectly connected to a node with a greater or smaller degree, respectively. According to agreement, the limits of generalized degree are degree and equal central- ity on all connected components of a network (because of independence of disconnected parts). F P means that generalized degree results in a tied centrality between any nodes if and only if degree also gives equal centrality for all nodes. Note that it is true for any fixed ε, so it could not occur that generalized degrees are tied between any two nodes only for certain parameter values. It also shows that two nodes may have the same generalized degree for any ε > 0 not only if they are symmetric as there exists regular graphs with non-symmetric pairs of nodes. Degree also satisfies the properties listed in Proposition 1 (except for agreement). Figure 2: Network of Example 3 2 1 3 5 4 6 3 There exists a path from node j to node h due to connectedness. Along this path one should find such k, m ∈ N , for example, k = j and m = h if ajh = 1. 7 Example 3. Consider the network on Figure 2 where both normal and dashed lines indicate connections. Generalized degrees with various values of ε are given on Figure 3. Nodes 1 and 2, and 4 and 5 are symmetric thus the two pairs have the same centrality for any parameter values. Degree gives the ranking 3 ≻ (4 ∼ 5) ≻ 6 ≻ (1 ∼ 2). Generalized degrees of nodes 3, 4 and 5 monotonically decrease, while the generalized degree of nodes 1 and 2 increases. However, the centrality of node 6 is not monotonic, for certain ε-s it becomes larger than its limit of 7/3 (see the property agreement in Proposition 1). It results in two changes in the centrality ranking with the watersheds of ε1 = 1/2 and ε2 = (cid:16)2 + √6(cid:17) /2. In the case of 0 < ε < ε1 the central node is 3, while for ε > ε1 the suggestion is 4 and 5. If ε > ε2, then node 6 becomes more central than node 3. Figure 3: Generalized degrees in Example 3 4 3.5 x3(ε) 3 x4(ε) 2.5 x6(ε) 2 1.5 x1(ε) 1 10−2 10−1 100 101 Value of ε (logarithmic scale) x1(ε) = x2(ε) x3(ε) x4(ε) = x5(ε) x6(ε) Remark 3. According to Chebotarev and Shamis (1997), the diagonal entries qii of the matrix Q = (I + αL)−1, α > 0 may serve as a measure of solitariness, that is, an 'inverse' centrality index. Despite its similar formula, this measure is not concordant with generalized degree. Consider the network on Figure 4, which is a 3-regular graph with 8 vertices. According to the property F P of Proposition 1, generalized degree gives the ranking (1 ∼ 2 ∼ · · · ∼ 8), while 1 − qii results in (1 ∼ 3 ∼ 5) ≻ (2 ∼ 4) ≻ (6 ∼ 7 ∼ 8). The latter method 'punishes' nodes 2 and 4 because they have a difficulty in reaching 6, 7 and 8, and vice versa. However, it is not clear whether this differentiation is desirable in a regular graph. 3 An axiomatic review of generalized degree The interpretation of generalized degree on the network gives few information about the appropriate value of parameter ε. Here we use the axiomatic approach in order to get an 8 Figure 4: Network of Remark 3 1 2 8 7 3 4 6 5 insight into it. Freeman (1979) states that all centrality measures have an implicit starting point: the central node of a star is the most central possible position. Definition 5. Star center base (SCB): Let (N, A) ∈ N n be a star network with i ∈ N at the center, that is, aij = 1 for all j 6= i and ajk = 0 for all j, k ∈ N \ {i}. Centrality measure f : N n → Rn is star center based if fi(N, A) > fj(N, A) for all j ∈ N \ {i}. The following requirement capture the essence of 'dynamic' monotonicity with respect to the centrality ranking. Definition 6. Adding rank monotonicity (ARM): Let (N, A), (N, A′) ∈ N n be two networks and i, j ∈ N be two distinct nodes such that A and A′ are identical but aij = 0 and a′ ij = 1. Centrality measure f : N n → Rn is adding rank monotonic if fi(N, A) ≥ fk(N, A) ⇒ fi(N, A′) ≥ fk(N, A′) and fi(N, A) > fk(N, A) ⇒ fi(N, A′) > fk(N, A′) for all k ∈ N \ {i, j}. ARM implies that, other nodes cannot benefit more from adding an edge between i and j than the nodes involved with respect to the centrality ranking. The supplementary condition excludes the possibility that node i is more central than another node in the network (N, A) but they are tied in (N, A′). A version of ARM, focusing on the nodes with the highest centrality, appeared in Sabidussi (1966) and Nieminen (1974). According to our knowledge, in this form ARM was first introduced by Chien et al. (2004) for directed graphs. Boldi and Vigna (2014) argue for the use of rank monotonicity in order to exclude pathological, counter-intuitive changes in centrality. However, they leave the study of such an axiom for future work. A review of other monotonicity axioms can be found in Landherr et al. (2010) and Boldi and Vigna (2014). Note that the centrality measure associating a constant value to every node of every network satisfies ARM but does not meet SCB. Degree is star center based and adding rank monotonic. Proposition 2. Generalized degree satisfies SCB. 9 Proof. Let xℓ = xℓ(ε)(N, A) for all ℓ ∈ N. Due to anonymity (see Proposition 1), xj = xk for any j, k ∈ N \ {i}. Formula (1) gives two conditions for the two variables: [1 + ε(n − 1)] xi − ε(n − 1)xj = n − 1 (1 + ε) xi − εxj = 1. It can be checked that the solution is xi = (n − 1)(1 + 2ε) 1 + εn and xj = 1 + ε(2n − 1) + 2ε2(n − 1) (1 + ε)(1 + εn) , hence xi − xj = n − 2 1 + εn > 0.4 ❏ SCB means only a validity test, it is a 'natural' requirement for any centrality measure. Now a sufficient condition is given for generalized degree to be adding rank monotonic. Let d = max{di : i ∈ N} be the maximal and d = min{dk : k ∈ N} be the minimal degree, respectively, in a network (N, A) ∈ N . Theorem 1. Generalized degree satisfies ARM if (d − d)h(2d + 4)ε3 + 2ε2 + εi ≤ 1. The proof of this statement is not elegant, therefore one can see it in the Appendix. In a certain sense, Theorem 1 is not surprising because degree satisfies ARM and x(ε) is close to it when ε is small.5 Our main contribution is the calculation of a sufficient condition. Note that it depends only on the minimal and maximal degree as well as on ε but not on the the number of nodes. Nevertheless, since the network graph is unweighted, d − d ≤ n − 1, therefore the condition (n − 1) [(2d + 4)ε3 + 2ε2 + ε] ≤ 1 provides ARM, too. Parameter ε is called reasonable if it satisfies (d − d) [(2d + 4)ε3 + 2ε2 + ε] ≤ 1 for the network (N, A) ∈ N . It is always satisfied for a regular network where d = d. The value of ε is decreasing in the maximal degree and, especially, in the difference of maximal and minimal degree. However, it does not become extremely small for sparse networks, where the difference of maximal and minimal degrees can be significantly smaller than the number of nodes. Note the analogy to the (dynamic) monotonicity of generalized row sum method (Cheb- otarev, 1994, Property 13). Similarly to Sabidussi (1966), strict inequalities can be demanded in ARM (i.e. adding an edge between nodes i and j eliminates all ties – except for against j – with i in the centrality ranking) but it does not affect our discussion, all results remain valid with a corresponding modification of inequalities. According to the following example, violation of ARM can be a problem in practice. 4 n ≥ 3 is necessary to get a meaningful start network. 5 There exists an appropriately small ε satisfying the condition of Theorem 1 for any d and d. 10 Example 4. Consider the networks (N, A), (N, A′) ∈ N 6 on Figure 2 such that (N, A) is given by the normal edges and (N, A′) is obtained from (N, A) by adding the two dashed edges between nodes 1 and 3, and nodes 2 and 3. Axiom ARM demands that xi(ε)(N, A) ≥ xk(ε)(N, A) ⇒ xi(ε)(N, A′) ≥ xk(ε)(N, A′) and xi(ε)(N, A) > xk(ε)(N, A) ⇒ xi(ε)(N, A′) > xk(ε)(N, A′) for all i = 1, 2, 3 and j = 4, 5, 6. However, x3(ε = 3)(N, A) = x6(ε = 3)(N, A) since nodes 3 and 6 are symmetric in (N, A) but x3(ε = 3)(N, A′) < x6(ε = 3)(N, A′) as can seen on Figure 3. It is difficult to argue for this ranking since nodes 1 and 2 are only connected to node 3.6 The root of the problem is the excessive influence of neighbours' degrees: the low values of d1 and d2 decrease generalized degree of node 3 despite its degree becomes greater. For large ε-s this effect is responsible for breaking of the property ARM. Theorem 1 gives the condition of reasonableness as 30ε3 + 6ε2 + 3ε ≤ 1, because d = d3 = d4 = d5 = 3 and d = d1 = 0 before connecting nodes 1 and 3 (ARM allows for adding only one edge). It is satisfied if 3s 266 + 15√334 4 − ε ≤ 1 15   13 3q532 + 30√334 − 1  ≈ 0.1909. This upper bound of ε is indicated by the vertical line on Figure 3. Note that ARM is violated only if ε > (cid:16)2 + √6(cid:17) /2 according to Example 3, Theorem 1 does not give a necessary condition for ARM. It is worth to scrutinize the connection of degree and generalized degree further. Ex- ample 3 verifies that generalized degree (with an appropriate value of ε) is not only a tie-breaking rule of degree, there exists networks where a node with a smaller degree has a larger centrality by x(ε). A special type of networks is provided by a given degree sequence. Then degree of nodes is fixed along with the reasonableness of ε (depending only on degrees), while generalized degree may result in different rankings. Example 5. Consider the degree sequence d = [4, 2, 2, 1, 1, 1, 1]⊤. There exist three networks with this attribute up to isomorphism, depicted on Figure 5.7 It can be checked that ε = 0.1 is reasonable. Generalized degrees with this value are presented on Figure 6. Degree provides the centrality ranking 1 ≻ (2 ∼ 3) ≻ (4 ∼ 5 ∼ 6 ∼ 7) in all networks. For (N, A) (Figure 5.a), generalized degree results in 1 ≻ 2 ≻ 3 ≻ (4 ∼ 5 ∼ 6) ≻ 7 as nodes 4, 5 and 6 are symmetric, they are closer to the center 1 than 7, which is also the case with nodes 2 and 3. For (N, A′) (Figure 5.b), generalized degree gives the ranking 1 ≻ (2 ∼ 3) ≻ (5 ∼ 6) ≻ (4 ∼ 7) as nodes 2 and 3, 4 and 7, and 5 and 6 are symmetric, and the last pair is closer to the center than the middle pair. For (N, A′′) (Figure 5.c), generalized degree results in the ranking 1 ≻ (2 ∼ 3) ≻ (5 ∼ 6 Nevertheless, the lower rank of node 3 may be explained. Landherr et al. (2010) mention cannibal- ization and saturation effects, which sometimes arise when an actor can devote less time to maintaining existing relationships as a result of adding new contacts. Similarly, the edges can represent not only opportunities, but liabilities, too. For example, a service provider may have legal constraints to serve unprofitable customers. Investigation of these models is leaved for future research. 7 See the proof at http://www.math.unm.edu/loring/links/graph_s09/degreeSeq.pdf. 11 Figure 5: Networks of Example 5 (a) Network (N, A) (b) Network (N, A′) 4 6 1 5 4 3.5 3 2.5 2 1.5 1 0.5 0 6 1 5 3 7 2 3 7 4 2 (c) Network (N, A′′) 6 5 1 3 2 4 7 Figure 6: Centralities in Example 5 1 2 3 4 Node 5 6 7 Degree x(0.1)(N, A) x(0.1)(N, A′) x(0.1)(N, A′′) 12 6) ≻ (4 ∼ 7) as nodes 2 and 3, 4 and 7, and 5 and 6 are symmetric, and the last pair is connected to the center contrary to the middle pair. Note that generalized degree is only a tie-breaking rule of degree but all changes can be justified. Centrality values may also have a meaning: x1(0.1)(N, A′) > x1(0.1)(N, A) as node 1 can more easily communicate with node 7 in the network (N, A′), for example. It is also remarkable that x2(0.1)(N, A) > x2(0.1)(N, A′) and x5(0.1)(N, A) < x5(0.1)(N, A′) < x5(0.1)(N, A′′) (nodes 5 and 6 are symmetric in all cases). 4 An interpretation of the measure In this section we present the meaning of the proposed measure on the network. Let C ∈ Rn×n be a matrix such that cij = aij for all i 6= j and cii = d − di for all i = 1, 2, . . . , n. C is a modified adjacency matrix with equal row sums, its diagonal elements In other words, C = dI − L and are nonnegative but at least one of them is zero. x(ε) = [I + ε (dI − C)]−1 d. Let introduce the notation β = ε . 1 + εd It gives x(ε) = 1 1 + εd (I − βC)−1 d = (1 − βd) (I − βC)−1 d. Matrix (I − βC)−1 can be written as a limit of an infinite sequence according to its Neumann series (Neumann, 1877) if all eigenvalues of βC are in the interior of the unit circle (Meyer, 2000, p. 618). Proposition 3. Let (N, A) ∈ N n be a network. Then x(ε) = (1 − βd) ∞ Xk=0 (βC)k d = (1 − βd)(cid:16)d + βCd + β2C 2d + β3C 3d + . . .(cid:17) . Proof. According to the Gersgorin theorem (Gersgorin, 1931), all eigenvalues of L lie within the closed interval [0, 2d], so eigenvalues of βC are within the unit circle if β < 1/d. It is guaranteed due to β = ε/(1 + εd). ❏ Multiplier (1 − βd) > 0 in the decomposition of x(ε) is irrelevant for the centrality ranking, it just provides that Pn i=1 xi(ε) = Pn i=1 di. Lemma 2. Generalized degree centrality measure x(ε) = limk→∞ x(ε)(k) where x(ε)(0) = (1 − βd) d, x(ε)(k) = x(ε)(k−1) + (1 − βd) (βC)k d, Proof. It is the immediate consequence of Proposition 3. k = 1, 2, . . . .8 ❏ Lemma 2 has an interpretation on the network. In the following description the multiplier (1 − βd) is disregarded for the sake of simplicity. Let G′ be a graph identical to the network except that d − di loops are assigned for node i. In this way balancedness is achieved with the minimal number of loops, at least one node (with the maximal degree) 8 Superscript (k) indicates the centrality vector obtained after the kth iteration step. 13 has no loops. Graph G′ is said to be the balanced network of G. It is the same procedure as balancing a multigraph by loops in Chebotarev (2012, p. 1495) and in Csat´o (2015), where G′ is called the balanced-graph and balanced comparison multigraph of the original graph, respectively. Initially all nodes are endowed with an own estimation of centrality by their degree. In the first step, degree of nodes connected to the given one is taken into account: Cd corresponds to the sum of degree of neighbours (including the nodes available on loops). Adding d − di loops provides that the number of 1-long paths from node i is exactly d.9 Then this aggregated degree of objects connected to the given one is added to the original estimation with a weight β, resulting in d + βCd. In the kth step, the summarized degree of nodes available on all k-long paths (including loops) C kd is added to the previous centrality, weighted by βk according to the length of the paths. This iteration converges to the generalized degree ranking due to Lemma 2. Example 6 illustrates the decomposition. Figure 7: Network of Example 6 1 2 4 3 6 5 Example 6. Consider the network whose balanced network is shown on Figure 7, where the number of loops are determined by the differences d− di. Nodes 3 and 4, and 5 and 6 are symmetric, the two pairs have the same centrality for any ε. Generalized degree gives the rather natural ranking of (3 ∼ 4) ≻ (5 ∼ 6) ≻ 2 ≻ 1. various k-s, that is, d(k) = [(1/d) C]k d. Their sum is equal to Pn that, for instance, x(ε)(2) = (1 − βd)hd(0) + βdd(1) + β2d2d(2)i. It reveals that nodes 5 Figure 8 shows the average degree of neighbours available along a k-long path for i=1 di. Lemma 2 means and 6 are connected to more central nodes than 3 and 4. Another interesting fact is that d(k) is monotonic only in its first coordinate. The elements of d(25) are almost equal, large powers do not count much. Now x(ε)(1) immediately gives the final ranking of nodes. Two observations can be taken on the basis of examples discussed. The first is that ties in degree are usually eliminated after taking the network structure into account, which can 9 In the limit it corresponds to the average degree of neighbours in G′ since limε→∞ β = 1/d. 14 Figure 8: Iterated degrees d(k) in Example 6 4 3.5 3 2.5 2 1.5 1 0.5 0 0 1 2 3 10 25 Number of iterations (k) Node 1 Node 2 Node 3 and 4 Node 5 and 6 be advantageous in practical applications: in the analysis of terrorist networks, a serious problem can be that standard centrality measures struggle to identify a given number of key thugs because of ties (Lindelauf et al., 2013). In other words, generalized degree has a good level of differentiation. The second is the possibly slow convergence. In a sparse graph, long paths should be considered in order to get the final centrality ranking of the nodes, however, it is not clear why they still have some importance. Since the iteration depends on the network structure, it will be challenging to give an estimate for how many steps are necessary to approach the final centrality. 5 Conclusion The paper has introduced a new centrality measure called generalized degree. It is based on degree and uses the Laplacian matrix of the network graph. The method carries out a redistribution of a pool filled with the sum of degrees. The effect of neighbours centrality is controlled by a parameter, placing our method between degree and equal centrality for Inspired by the idea of Sabidussi (1966), a rank all nodes of a connected component. monotonicity axiom has been defined, and a sufficient condition has been provided in order to satisfy it. Besides PageRank (Chien et al., 2004), we do not know any other centrality measure with this property. Furthermore, an iterative formula has been given for the calculation of generalized degree along with an interpretation on the network. The main advantage of our measure is its degree-based concept. It is recommended to use with a low value of ε instead of degree, which preserves most favourable properties of degree but has a much stronger ability to differentiate among the nodes and better reflect 15 their role in the network (see Example 6). It is especially suitable to be a tie-breaking rule for degree, possible applications involve all fields where degree is used in order to measure centrality. It is also suggested to test various parameters and follow all changes in the centrality ranking. The interval examined is not necessary to restrict to reasonable values, gen- eralized degree may give an insight about the importance of nodes even if adding rank monotonicity is not guaranteed as its other properties remain valid. The research has opened some ways for future work. Generalized degree can be com- pared with other centrality measures, for example, through the investigation of their behaviour on randomly generated networks. Rank monotonicity is worth to consider in an axiomatic comparison of centrality measures in the traces of Landherr et al. (2010) and Boldi and Vigna (2014). The iterative formula and the graph interpretation may also inspire a characterization of generalized degree. Finally, some papers have used centrality measures just to describe the network by a single value of centrality index. For instance, Sabidussi (1966) has suggested that 1/ max{fi(N, A) : i ∈ N} is a good centrality index if centrality measure f : N n → Rn sat- isfies some axioms. Generalized degree improves on a failure of degree: 1/ max{di : i ∈ N} is the same in a complete and a star network of the same order but 1/ max{xi(ε) : i ∈ N} is larger in a complete one. We think this observation deserves more attention. Appendix ℓ = xℓ(ε)(N, A′) for all ℓ ∈ N. It can be j − xj, m−xm. Assume to the contrary that t < u. The difference of equations from (1) for node k Proof of Theorem 1. Let xℓ = xℓ(ε)(N, A) and x′ assumed without loss of generality that x′ u = max{x′ It will be verified that t ≥ u. gives: ℓ−xℓ : ℓ ∈ N \{i, j}} = x′ j − xj. Let s = x′ i − xi, t = x′ ℓ−xℓ : ℓ ∈ N \{i, j} = x′ k−xk and v = min{x′ i − xi ≥ x′ akℓ [(x′ (x′ k − xk) + ε Xℓ∈N \{i,j,k} k − xk) − (x′ i − xi)] + εakjh(x′ k − xk) − (x′ k − xk) −(cid:16)x′ ℓ − xℓ)] + j − xj(cid:17)i = d′ +εaki [(x′ k − dk = 0. Since u = x′ k − xk ≥ x′ ℓ − xℓ for all ℓ ∈ N \ {i, j} and u ≥ t, we get u ≤ εaki(s − u) ⇔ u ≤ εaki 1 + εaki s. (2) Now take the difference of equations from (1) for node i: s + ε Xℓ∈N \{i,j} aiℓ [s − (x′ ℓ − xℓ)] + ε(cid:16)x′ i − x′ j(cid:17) = d′ i − di = 1. Since u ≥ x′ ℓ − xℓ for all ℓ ∈ N \ {i, j}, we get s + ε Xℓ∈N \{i,j} aiℓ(s − u) + ε(cid:16)x′ i − x′ j(cid:17) = s + εdi(s − u) + ε(cid:16)x′ i − x′ j(cid:17) ≤ 1. An upper bound for u is known from (2), thus 1 + ε(cid:16)x′ j − x′ i(cid:17) ≥ s + εdi(s − u) ≥ s + εdi(cid:18)1 − εaki 1 + εaki(cid:19) s = 1 + εaki + εdi 1 + εaki s. (3) 16 By combining (2) and (3): u ≤ εaki 1 + εaki 1 + εaki 1 + εaki + εdi h1 + ε(cid:16)x′ εaki i − x′ j(cid:17)i = 1 + εaki + εdi h1 + ε(cid:16)x′ j − x′ i(cid:17)i . (4) Take the difference of equations from (1) for node m: (x′ m − xm) + ε Xℓ∈N \{i,j} amℓ [(x′ m − xm) − (x′ m − xm) −(cid:16)x′ ℓ − xℓ)] + j − xj(cid:17)i = d′ m − dm = 0. +εami [(x′ m − xm) − (x′ m − xm ≤ x′ Since v = x′ i − xi)] + εamjh(x′ ℓ − xℓ for all ℓ ∈ N \ {i, j} and s ≥ t, we get v ≥ εami(s − v) + εamj(t − v) ⇒ v ≥ ε (ami + amj) 1 + ε (ami + amj) t. (5) The difference of equations from (1) for node j results in: t + ε Xℓ∈N \{i,j} ajℓ [t − (x′ ℓ − xℓ)] + ε(cid:16)x′ j − x′ i(cid:17) = d′ j − dj = 1. Since v ≤ x′ ℓ − xℓ for all ℓ ∈ N \ {i, j}, we get t + ε Xℓ∈N \{i,j} ajℓ(t − v) + ε(cid:16)x′ j − x′ i(cid:17) = t + εdj(t − v) + ε(cid:16)x′ j − x′ i(cid:17) ≥ 1. A lower bound for v is known from (5), thus 1 + ε(cid:16)x′ i − x′ j(cid:17) ≤ t + εdj"1 − ε (ami + amj) 1 + ε (ami + amj)# t = 1 + ε (ami + amj) + εdj 1 + ε (ami + amj) t. (6) According to our assumption t < u, therefore from (4) and (6): 1 + ε (ami + amj) 1 + ε (ami + amj) + εdj h1 + ε(cid:16)x′ i − x′ j(cid:17)i < εaki 1 + εaki + εdi h1 + ε(cid:16)x′ j − x′ i(cid:17)i . Obviously, it does not hold if ε → 0. Now an upper bound is determined for the parameter ε. After some calculations we get: 1 + ε (ami + amj + di) + ε2 [di (ami + amj) − akidj] 1 + ε (ami + amj + 2aki + di) + ε2 [(2aki + di) (ami + amj) + akidj] < ε(cid:16)x′ i(cid:17) . j − x′ Introduce the notation α = ε (ami + amj + di) + ε2 [di (ami + amj) − akidj] and y = 1 + 2εaki + ε2 [2aki (ami + amj + dj)] > 1. Then the fraction on the left-hand side can be written as (1 + α)/(y + α). However, (1 + α)/(y + α) > 1/y because y + α > 0 and y > 1, hence 1 1 + 2εaki + ε2 [2aki (ami + amj + dj)] < ε(cid:16)x′ i(cid:17) . j − x′ Here aki, ami, amj ≤ 1 and dj ≤ d. As x′ (Proposition 1): j − x′ i ≤ xj − xi ≤ d − d from boundedness which contradicts to the condition of Theorem 1. 1 < (d − d)h(2d + 4)ε3 + 2ε2 + εi , ❏ 17 References Avrachenkov, K. E., Mazalov, V. V., and Tsynguev, B. T. (2015). Beta current flow centrality for weighted networks. In Thai, M. T., Nguyen, N. P., and Shen, H., editors, Computational Social Networks, volume 9197 of Lecture Notes in Computer Science. Springer. Bavelas, A. (1948). A mathematical model for group structures. Human Organization, 7(3):16–30. Boldi, P. and Vigna, S. (2014). Axioms for centrality. Internet Mathematics, 10(3-4):222– 262. Bonacich, P. (1987). Power and centrality: a family of measures. American Journal of Sociology, 92(1):1170–1182. Borgatti, S. P. and Everett, M. G. (2006). A graph-theoretic perspective on centrality. Social Networks, 28(4):466–484. Brin, S. and Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, 30(1):107–117. Chebotarev, P. (1989). Generalization of the row sum method for incomplete paired comparisons. Automation and Remote Control, 50(8):1103–1113. Chebotarev, P. (1994). Aggregation of preferences by the generalized row sum method. Mathematical Social Sciences, 27(3):293–320. Chebotarev, P. (2012). The walk distances in graphs. Discrete Applied Mathematics, 160(10):1484–1500. Chebotarev, P. and Shamis, E. (1997). The matrix-forest theorem and measuring relations in small social groups. Automation and Remote Control, 58(9):1505–1514. Chien, S., Dwork, C., Kumar, R., Simon, D. R., and Sivakumar, D. (2004). Link evolution: analysis and algorithms. Internet Mathematics, 1(3):277–304. Csat´o, L. (2015). A graph interpretation of the least squares ranking method. Social Choice and Welfare, 44(1):51–69. Dequiedt, V. and Zenou, Y. (2015). Local and consistent centrality measures in networks. Manuscript. https://www.gate.cnrs.fr/IMG/pdf/Dequiedt2015.pdf. Freeman, L. C. (1977). A set of measures of centrality based on betweenness. Sociometry, 40(1):35–41. Freeman, L. C. (1979). Centrality in social networks: conceptual clarification. Social Networks, 1(3):215–239. Garg, M. (2009). Axiomatic foundations of centrality in networks. Manuscript. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1372441. 18 Gersgorin, S. (1931). Uber die Abgrenzung der Eigenwerte einer Matrix. Bulletin de l'Acad´emie des Sciences de l'URSS. Classe des sciences math´ematiques et naturelles, 6:749–754. Gonz´alez-D´ıaz, J., Hendrickx, R., and Lohmann, E. (2014). Paired comparisons analysis: an axiomatic approach to ranking methods. Social Choice and Welfare, 42(1):139–169. Jackson, M. O. (2010). Social and economic networks. Princeton University Press. Katz, L. (1953). A new status index derived from sociometric analysis. Psychometrika, 18(1):39–43. Kitti, M. (2012). Axioms for centrality scoring with principal eigenvectors. Manuscript. http://www.ace-economics.fi/kuvat/dp79.pdf. Klein, D. J. (2010). Centrality measure in graphs. Journal of Mathematical Chemistry, 47(4):1209–1223. Landherr, A., Friedl, B., and Heidemann, J. (2010). A critical review of centrality mea- sures in social networks. Business & Information Systems Engineering, 2(6):371–385. Leavitt, H. J. (1951). Some effects of certain communication patterns on group perfor- mance. The Journal of Abnormal and Social Psychology, 46(1):38. Lindelauf, R. H. A., Hamers, H. J. M., and Husslage, B. G. M. (2013). Cooperative game theoretic centrality analysis of terrorist networks: the cases of Jemaah Islamiyah and Al Qaeda. European Journal of Operational Research, 229(1):230–238. Masuda, N., Kawamura, Y., and Kori, H. (2009). Analysis of relative influence of nodes in directed networks. Physical Review E, 80(4):046114. Masuda, N. and Kori, H. (2010). Dynamics-based centrality for directed networks. Phys- ical Review E, 82(5):056107. Meyer, C. D. (2000). Matrix analysis and applied linear algebra. Society for Industrial and Applied Mathematics, Philadelphia. Mohar, B. (1991). The Laplacian spectrum of graphs. In Alavi, Y., Chartrand, G., Oellermann, O. R., and Schwenk, A. J., editors, Graph Theory, Combinatorics, and Applications, volume 2, pages 871–898. Wiley, New York. Monsuur, H. and Storcken, T. (2004). Centers in connected undirected graphs: an ax- iomatic approach. Operations Research, 52(1):54–64. Neumann, C. (1877). Untersuchungen uber das logarithmische und Newton'sche Potential. B. G. Teubner, Leipzig. Nieminen, J. (1974). On the centrality in a graph. Scandinavian Journal of Psychology, 15(1):332–336. Ranjan, G. and Zhang, Z.-L. (2013). Geometry of complex networks and topological centrality. Physica A: Statistical Mechanics and its Applications, 392(17):3833–3845. 19 Rubinstein, A. (1980). Ranking the participants in a tournament. SIAM Journal on Applied Mathematics, 38(1):108–111. Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4):581–603. Seeley, J. R. (1949). The net of reciprocal influence: a problem in treating sociometric data. Canadian Journal of Psychology, 3(4):234–240. Wasserman, S. and Faust, K. (1994). Social network analysis: methods and applications. Cambridge University Press. 20
1906.06531
1
1906
2019-06-15T11:42:38
Media Environment, Dual Process and Polarization: A Computational Approach
[ "cs.SI" ]
News articles of varying degrees of truthfulness and political alignment, and their influences on the political opinions of the media consumers are modeled as a Bayesian network incorporating a mixture of ideas from dual-reasoning models of Motivated Reasoning and Analytic/Intuitive Reasoning. The result shows that as the media environment moves towards the Post-Truth world, the problem of political polarization becomes exacerbated.
cs.SI
cs
Media Environment, Dual Process and Polarization: A Computational Approach In-Ho Yi New York University News articles of varying degrees of truthfulness and political alignment, and their influences on the political opinions of the media consumers are modeled as a Bayesian network incorporating a mixture of ideas from dual-reasoning models of Motivated Reasoning and Analytic/Intuitive Reasoning. The result shows that as the media environment moves towards the Post-Truth world, the problem of political polarization becomes exacerbated. Introduction "Fake News" came to the spotlight in a recent surge of the use of the term. It has been at least partially attributed to for recent upsets in elections (Rose (2017)), Anti-Vaxxers and other movements based on false medical information (Waszak et al. (2018)), and global warming denial (van der Linden et al. (2017)). Fake News is also blamed for the radi- calization of fringe movements and the rise of racially and religiously motivated hate-crimes (Townsend (2017); Her- mansson (2018)). In this introductory section, we first will set the scene by characterizing the recent development of Fake News and the new media environment. Then, we will cite studies that are of particular interest to the present study. Finally, we will give an overview of the plan to model and measure the effect of the media. The new media environment Two features of the new development are of interest to us. First is the relativization of the concept of Truth. In the post- truth politics, the line between assertions and emotional fleas and the truth is blurred. With the advent of the new media environment, traditional journalists are no longer seen as the gatekeepers of the fact-based public opinion, and the notion of Truth has lost its privileged in the media landscape, and we have seen an increase in media outlets that capitalizes on various propaganda of questionable truthfulness. (Suiter (2016), Gorrell et al. (2019)). Second is the polarization effect. It has long been ob- served that the advent of the new media environment has the effect of accelerating the polarization of public opinion (Spohr (2017)). From the "One-Step flow" point of view that the news readers exposure to the media directly shape the news reader's own opinion (Bennett & Manheim (2006)), as the political alignment of post-truth media approaches fringe politics, readers of such news media become more polar- ized. On top of that, various back-firing effects have been observed, whereby readers of particular political mindset ex- ercise Motivated Reasoning in discarding the opposite side of the story and further reinforces the existing belief. These two characteristics of the new media have pushed the political landscape to an alarming level of radicalization, as observed from various election upsets to the rise of hate crime and other consequences of the fringe movements. In this paper, we will model the different media environments by allocating media consumption to premium centrist media, premium partisan media and Fake News media. We will dis- cuss the media environment model in detail in the Methods section. Recent studies on political information consump- tion We list recent studies to draw inspiration from, to model the behavior of the media consumers. Taber et al. (2009) show the effect of dis-confirmation bias of Motivated Reasoning. The result suggests that, when pro- cessing political news, readers tend not to exercise the same level of scrutiny to determine the truthfulness of the news item. Pennycook & Rand (2018) found that the ability to tell factually accurate news from Fake News is positively corre- lated to the participants' performance in the Cognitive Re- flection Test. This result suggests that Motivated Reasoning alone is not sufficient to account for the discrepancies be- tween individual media consumer's ability to single out Fake News. Rather than completely replacing the existing observa- tions on Motivated Reasoning, we will use the result as a complementary force in determining the probabilistic degree to which the agent will allow factual inaccuracies, as we shall see in the following section. Bail et al. (2018) found evidence for the backfiring effect, whereby participants who were regularly exposed to the op- posing views were found to be even more polarized. In this study, to account for such backfiring, we will count those that the agent will deem as Fake News to have the opposite effect. This Fake News backfiring effect, combined with the Motivated Reasoning phenomena, should be able to account for the backfiring effect in general. We won't introduce a sub-module for backfiring in general, however, as we believe that Motivated Reasoning + Fake News Backfiring should 2 IN-HO YI suffice to account for the backfiring results in general, given the current media environment. Now that we have examined a couple of recent empirical studies, we will turn to the theoretical underpinning of the present study. Polarization and Bayesian network Jern et al. (2014) found that Bayesian networks that have root nodes other than the hypothesis node can capture the po- larization or convergence effect, where two agents of diverg- ing effects will either be polarized or converge to the center after examining the same data point. As we shall see later in this paper, the topology of the Bayesian network presented in this paper has the "truth judgment" intervening node that en- compasses Motivated Reasoning and Fake News Backfiring. Unlike Jern et al. (2014), however, we use explicit program- ming constructs available to us in a probabilistic program- ming language to model the backfiring effect, and we do so on a continuous distribution. Nevertheless, the basic idea that the intervening root node in a Bayesian network can account for polarization remains intact. Methods In this section, we explain the design of the model and give the rationale for design decisions. On the media side, we will first examine the definition of a news item. Then we will discuss the abstraction of a media outlet, and we will finally discuss the media environment. On the agent side, we will discuss a Bayesian network in which the truthfulness of a news item is determined by an agent. News item A news item has two numerical properties: politics (pn) and truth (tn). pn value is centered at 0. The further away from the cen- ter the politics value is, the more extreme the political align- ment of the news item is. If the absolute value is close to 1 or above, the politics of the news item is considered pretty extreme. tn value is 0 or above. Truth value of 1 or above is con- sidered factually accurate in every detail. Being true to the concept of Post-Truth politics, nt is a continuous variable, rather than a Boolean value. Media outlet Each type of media outlet emits a news item of probabilis- tic politics and truth values. We define three different types of media outlets and their pn and tn distributions. Outlet pn tn Premium Centrist Premium Partisan Fake News Partisan N (0.8, 0.2) N (0.8, 0.2) N (0.4, 0.5) For partisan media outlets, their pn is bi-modal with equal N (0, 0.5) N (±0.7, 0.3) N (±0.9, 0.1) weight on both sides i.e. for Premium Partisan media: P (pn X = 1) ∼ N (0.7, 0.3) P (pn X = 0) ∼ N (−0.7, 0.3) 1 P (X = 0) =P (X = 1) = 2 Similarly, Fake News Partisan media is also bi-modal, with more extreme means. Media environment Media environment defines a mixture of media outlets. At each observation, the media environment makes a weighted random choice among its mixture of outlet, and let the chosen outlet to generate a news item. Here are the media environ- ments and their mixtures: Media Environment Premium Centrist Premium Partisan Fake News Partisan ME1 ME2 ME3 70% 40% 30% 20% 50% 10% 10% 10% 60% ME1 represents an ideal media environment, with a ma- jority of centrist media, with a few partisan media outlets and very few Fake News media. ME2 represents an environ- ment where media outlets are more opinionated. ME3 rep- resents a post-truth media environment with an alarmingly large amount of Fake News circulation. Such shift of media environments from ME1 to ME3 over time can be attributed to the economic reality for news media to find an audience in the increasingly crowded media industry (Bernhardt et al. (2008); Posner (2005)). Now we turn to explain how agent processes news items. Agent model An agent has two numerical properties: politics (pa) and analytic (aa). Following Pennycook & Rand (2018), we as- sign the aa value as an intrinsic property of an agent. While pa gets updates as the agent processes news items, the ana- lytic value stays the same throughout the process. Like news item, the prior distribution of pa of an agent is centered around 0. The prior distribution is pa ∼ N (0, 1). aa value is sampled from aa ∼ Uniform (0.5, 1). Truth and politics judgment by agent Upon observing a news item, the agent makes a Boolean decision of whether the news item is true or false. In order to make the decision, the agent first calculates the motivational discount dm: dm = 0.2 · 0.2pn−pa That is, the discount exponentially decays as the pn gets further away from pa. This reflects the observations of Mo- tivated Reasoning that agents are less likely to call out Fake News that are more aligned to their own politics. MEDIA ENVIRONMENT, DUAL PROCESS AND POLARIZATION: A COMPUTATIONAL APPROACH 3 Two variables are sampled: truth judgment is true iff xn > xa: xn ∼ Uniform (0, min (0, tn)) xa ∼ Uniform (0, min (0, aa − dm)) (cid:16) t j ∈ {true, false}(cid:17) P(cid:16) P(cid:16) t j = true xn > xa t j = true xn ≤ xa (cid:16) (cid:17) (cid:17) = 1 = 0 Politics judgment reflects the agent's perception of the political effect of the news item. When t j is false, p j is the reverse of pn. p j (cid:17) (cid:40)pn p j = −pn t j is true t j is false This formulation reflects the backfiring effect of perceived Fake News. Updating pa p j is the observation value with which pa is updated. The formulation of the Bayesian update is as following: P(cid:16) (cid:17) ∝ P (pa) P(cid:16) where the likelihood function P(cid:16) pa p j p j pa (cid:17) p j pa (cid:17) is the pdf of dis- In summary, Figure 1 shows the model as a Bayesian net- tribution P ∼ N (pa, 0.25) work. Implementation of the model We used Anglican probabilistic programming language (van de Meent et al. (2018)) to program the model. In order to obtain the resulting distribution, we have run the model with Parallel Lighweight Metropolis-Hastings algo- rithm with 5,000 particles, and obtained the first 200,000 it- erations and drew the histograms of the results1. Results Figures 2 shows Pa distributions after 1, 10 and 100 ob- servations of news item for given media environments. ME1 shows a Gaussian distribution of pa after prolonged exposure to the environment. The strong majority of opin- ions are formed within a moderate range of the political spec- trum (i.e. within ±0.5) This is hardly a surprising result given the majority of the media outlet in ME1 falls under such po- litical spectrum. ME2 is a more interesting case. Early distributions af- ter 1 and 10 observations show a clear bi-modality of the distribution, which is not surprising given the large portion of the partisan media. After 100 observations, however, the Figure 1. Bayesian network depicting the model distribution looks a lot like ME1 distribution, with a strong majority opinion formed within a moderate range. From this result, it stands to reason that media taking editorial stances on issues are healthy phenomena given that they are factual, and the overall distribution of the partisan media is equally distributed on both sides of the argument. ME3 results show a high degree of polarization in the ex- treme range of the political spectrum. After 10 observations, an alarming level of concentration of the opinion is found on both extremes. This is different from ME1 and ME2 results where you can still find a strong majority within the moderate band. This shows the loss of common ground in the public discourse in a Post-Truth politics. After 100 observations, a moderate opinion does gain some of the shares back. How- ever, the majority is opinions are still outside of the moderate band, with a very high concentration found on each of the extreme sides. Overall, the result shows a detrimental effect that Fake News has on public discourse according to our model. The result can account for an unusually high level of opinion con- centration on fringe opinion, and an upsetting result of the public poll when the proposal is a rather extreme one. Discussion and Conclusion The biggest limitation of this study is the lack of any data fitting in designing the model. Although we did consider em- pirical results from other studies for inspiration, the model 1 Source code for the model is available at https://gitlab .com/chajath/polarize-fakenews-model Media EnvironmentMedia OutletNews item politicspnNew item truthtnAgent analyticaaAgent politicspaMotivational discountdmTruth judgmenttjPolitics judgmentpj 4 IN-HO YI itself is largely hand-wired with our subjective view and un- derstanding of the matter. In order to tune our model to re- flect the reality better, many of the magic numbers appearing in our model need to be parameterized: • prior distribution of pa and aa • scale and decay rate in dm formulation • standard deviation in likelihood function To fit those values, in the future study, we shall gather statis- tics from existing surveys of the media environment, and design controlled experiment to determine the parameters within the model. Finally, another experiment shall be con- ducted to determine the accuracy of the model compared to real-world experimental results. Although the prescriptive analysis was not the main theme of this study, the study can be further extended to account for such analysis. The conclusion from studies with a prescrip- tive focus such as van der Linden et al. (2017) and McClain (2017) suggest that an antidote to Fake News is the effective communication of scientific consensus. Given the recurrent structure of our model, this can be translated to observing moderate news items with high truth values prior to being exposed to Fake News items. In this study, we have essentially abstracted out news items as two variables: politics and truthfulness. In the future study, it will be interesting to give a more detailed account of the semantics of news item. Given the recurrent structure of the model, it will be natural to extend the model to interface with other types of Bayesian recurrent neural network (For- tunato et al. (2017)) that focuses on natural language process- ing. Doing so will allow us to train the model from primary sources of the data, namely the news items themselves. What we have presented here is a way to model the behav- ior of individual news-consuming agents. Given the advent of personal media and the prevalence of social media, it will be interesting to devise a multi-agent model (following Ay- manns et al. (2017)) where the interaction between the agents are modeled after social networks, with varying degrees of reaches and influences from multiple individuals. The present study showcases an interesting use of prob- abilistic programming to model complex social phenomena from the cognitive perspective of individual agents. Future work ideas discussed in this section will further the use of probabilistic programming and other computational cogni- tive methods in the realms of computational social sciences. References Aymanns, C., Foerster, J., & Georg, C.-P. (2017). Fake news in social networks. SSRN Electronic Journal. doi: 10.2139/ ssrn.3023320 Political and Social Science, 608, 213 -- 232. 0002716206292266 doi: 10.1177/ Bernhardt, D., Krasa, S., & Polborn, M. (2008). Political polar- ization and the electoral effects of media bias. Journal of Public Economics, 92(5), 1092 - 1104. doi: 10.1016/j.jpubeco.2008.01 .006 Fortunato, M., Blundell, C., & Vinyals, O. (2017). Bayesian re- current neural networks. Retrieved from https://arxiv.org/ abs/1704.02798 Gorrell, G., Bakir, M. E., Roberts, I., Greenwood, M. A., Iavarone, B., & Bontcheva, K. (2019). Partisanship, propaganda and post-truth politics: Quantifying impact in online debate. CoRR, abs/1902.01752. Retrieved from http://arxiv.org/abs/ 1902.01752 Hermansson, P. (2018). muslim message on social media. https://hopenothate.com/2018/11/16/bots-fake -news-anti-muslim-message-social-media/ Bots, fake news and the anti- Retrieved from Jern, A., K Chang, K.-M., & Kemp, C. (2014, 04). Belief polariza- tion is not always irrational. Psychological review, 121, 206-24. doi: 10.1037/a0035941 McClain, C. R. (2017, 06). Practices and promises of facebook for science outreach: Becoming a "nerd of trust". PLOS Biology, 15(6), 1-9. doi: 10.1371/journal.pbio.2002020 Pennycook, G., & Rand, D. G. (2018). Lazy, not biased: Suscep- tibility to partisan fake news is better explained by lack of rea- soning than by motivated reasoning. Cognition. doi: 10.1016/ j.cognition.2018.06.011 Posner, R. A. The New York Times. Retrieved from https://www.nytimes.com/2005/ 07/31/books/review/bad-news.html Bad news. (2005). Rose, J. (2017). Brexit, trump, and post-truth politics. Public In- tegrity, 19(6), 555-558. doi: 10.1080/10999922.2017.1285540 Spohr, D. (2017). Fake news and ideological polarization: Fil- Busi- 10.1177/ ter bubbles and selective exposure on social media. ness Information Review, 34(3), 150-160. 0266382117722446 doi: Suiter, J. (2016). Post-truth politics. Political Insight, 7(3), 25-27. doi: 10.1177/2041905816680417 Taber, C. S., Cann, D., & Kucsova, S. (2009). The motivated pro- cessing of political arguments. Political Behavior, 31(2), 137 -- 155. Townsend, M. (2017). by fake accounts. https://www.theguardian.com/media/2017/nov/26/ anti-muslim-online-bots-fake-acounts The Guardian. Anti-muslim online surges driven Retrieved from Bail, C. A., Argyle, L. P., Brown, T. W., Bumpus, J. P., Chen, H., Hunzaker, M. B. F., . . . Volfovsky, A. (2018). Exposure to opposing views on social media can increase political polariza- tion. Proceedings of the National Academy of Sciences, 115(37), 9216 -- 9221. doi: 10.1073/pnas.1804840115 Bennett, W. L., & Manheim, J. B. (2006). The one-step flow of communication. The Annals of the American Academy of van de Meent, J.-W., Paige, B., Yang, H., & Wood, F. (2018). An introduction to probabilistic programming. Retrieved from http://arxiv.org/abs/1809.10756 van der Linden, S., Leiserowitz, A., Rosenthal, S., & Maibach, E. (2017). Inoculating the public against misinformation about cli- mate change. Global Challenges, 1(2), 1600008. doi: 10.1002/ gch2.201600008 MEDIA ENVIRONMENT, DUAL PROCESS AND POLARIZATION: A COMPUTATIONAL APPROACH 5 Waszak, P. M., Kasprzycka-Waszak, W., & Kubanek, A. (2018). The spread of medical fake news in social media - the pilot quan- titative study. Health Policy and Technology, 7(2), 115 - 118. doi: 10.1016/j.hlpt.2018.03.002 6 IN-HO YI Figure 2. Political Opinion after observations. From left: ME1, ME2 and ME3. From top to bottom: 1, 10 and 100 observations. -3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,000-4-3-2-1012305,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-3.0-2.5-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,00045,00050,000-2.0-1.5-1.0-0.50.00.51.01.52.02.53.005,00010,00015,00020,00025,00030,00035,00040,000-2.0-1.5-1.0-0.50.00.51.01.52.0010,00020,00030,00040,00050,00060,00070,00080,00090,000-1.5-1.0-0.50.00.51.01.52.02.5010,00020,00030,00040,00050,00060,00070,000-1.5-1.0-0.50.00.51.01.52.02.505,00010,00015,00020,00025,00030,00035,00040,00045,00050,00055,00060,000-1.0-0.50.00.51.01.505,00010,00015,00020,00025,00030,00035,00040,00045,00050,000
1909.03543
2
1909
2019-09-10T02:48:33
An Experimental Study of Structural Diversity in Social Networks
[ "cs.SI", "physics.soc-ph" ]
Several recent studies of online social networking platforms have found that adoption rates and engagement levels are positively correlated with structural diversity, the degree of heterogeneity among an individual's contacts as measured by network ties. One common theory for this observation is that structural diversity increases utility, in part because there is value to interacting with people from different network components on the same platform. While compelling, evidence for this causal theory comes from observational studies, making it difficult to rule out non-causal explanations. We investigate the role of structural diversity on retention by conducting a large-scale randomized controlled study on the Twitter platform. We first show that structural diversity correlates with user retention on Twitter, corroborating results from past observational studies. We then exogenously vary structural diversity by altering the set of network recommendations new users see when joining the platform; we confirm that this design induces the desired changes to network topology. We find, however, that low, medium, and high structural diversity treatment groups in our experiment have comparable retention rates. Thus, at least in this case, the observed correlation between structural diversity and retention does not appear to result from a causal relationship, challenging theories based on past observational studies.
cs.SI
cs
An Experimental Study of Structural Diversity in Social Networks Jessica Su Facebook, Inc.∗ Krishna Kamath Twitter, Inc. Aneesh Sharma Google, Inc.† Johan Ugander Stanford University Sharad Goel Stanford University 9 1 0 2 p e S 0 1 ] I S . s c [ 2 v 3 4 5 3 0 . 9 0 9 1 : v i X r a Abstract Several recent studies of online social networking platforms have found that adoption rates and engagement levels are pos- itively correlated with structural diversity, the degree of het- erogeneity among an individual's contacts as measured by network ties. One common theory for this observation is that structural diversity increases utility, in part because there is value to interacting with people from different network com- ponents on the same platform. While compelling, evidence for this causal theory comes from observational studies, mak- ing it difficult to rule out non-causal explanations. We investi- gate the role of structural diversity on retention by conducting a large-scale randomized controlled study on the Twitter plat- form. We first show that structural diversity correlates with user retention on Twitter, corroborating results from past ob- servational studies. We then exogenously vary structural di- versity by altering the set of network recommendations new users see when joining the platform; we confirm that this de- sign induces the desired changes to network topology. We find, however, that low, medium, and high structural diversity treatment groups in our experiment have comparable reten- tion rates. Thus, at least in this case, the observed correlation between structural diversity and retention does not appear to result from a causal relationship, challenging theories based on past observational studies. From farmers adopting agricultural methods (Ryan and Gross 1943) to runners deciding to exercise (Aral and Nico- laides 2017), people often consider the actions of their social contacts when making decisions (Coleman, Katz, and Menzel 1957; Bass 1969; Schelling 1971; Granovetter 1978; Bikhchandani, Hirshleifer, and Welch 1992; Watts and Dodds 2007; Bakshy et al. 2012). A basic theme in this lit- erature is that an individual's likelihood to take an action increases with the number of their contacts who have taken that action. For example, those with more friends who exer- cise are more likely to exercise themselves (Aral and Nico- laides 2017). The recently proposed theory of structural diver- sity (Ugander et al. 2012) enriches this core idea by sug- gesting that individuals consider not merely the number of contacts who have engaged in some action, but also ∗Work done when the author was at Stanford University. †Work done when the author was at Twitter, Inc. Copyright c(cid:13) 2018, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. the network structure of those individuals (i.e., the so- cial relationships between them). There are multiple ways to quantify structural diversity, but the original and per- haps simplest measure is the number of connected com- ponents among one's contacts who have adopted. Accord- ing to this theory, an individual is more likely to exer- cise if two college friends and two work colleagues exer- cise than if four college friends exercise but no work col- leagues do. Several observational studies are consistent with the structural diversity hypothesis, finding that one's propen- sity to act is predicted by the structural diversity of one's contacts who have acted (Spiliotopoulos and Oakley 2013; Weng, Menczer, and Ahn 2013; Backstrom et al. 2013; Aral and Nicolaides 2017). There are compelling theoretical arguments for structural diversity affecting behavior. For example, individuals might prefer the diversity of opinions expressed on an online plat- form that includes people across their social circles over the narrowly tailored content on a service that caters to a sin- gle group (Page 2008). Further, individuals may personally benefit from mediating relationships between otherwise dis- connected groups (Burt 2000). Finally, with high structural diversity one might be more likely to encounter the single individual or group whose actions are influential, with di- versity thus acting as a hedging mechanism: if some indi- viduals would join a service only if their family members have joined, and others only if their friends have, we would expect to see adoption increase with structural diversity. These explanations all suggest that exogenously increas- ing structural diversity would increase adoption, retention, and engagement. There is, however, an alternative class of purely correlational explanations for why adoption, reten- tion, and engagement would be associated with increased structural diversity. For example, if retention is exclusively a function of age, and younger individuals have more struc- turally diverse networks, structural diversity would correlate with retention despite being incidentally related to it. A more subtle example stems from the popular "strength of weak ties" theory (Granovetter 1973; Aral and Walker 2014) of information flow. Suppose individuals with structurally di- verse contact networks are socially farther from the popula- tion of existing adopters than those with structurally homo- geneous networks. Then, if non-adopters in the core of the network (with homogeneous networks) have actively cho- sen to abstain, while those on the periphery (with diverse networks) are still deciding whether to adopt, we would expect structural diversity to correlate with adoption -- but there would again be no causal connection. Past studies of structural diversity have all been obser- vational or quasi-experimental, and so it has been difficult to disentangle causation from correlation. As we describe below, experimental tests of structural diversity must ad- dress serious theoretical challenges in defining the causal estimand of interest, as well as difficult logistical hurdles in carrying out a suitable experiment at scale -- two issues that have received relatively little attention in the literature. After discussing these high-level concerns, we detail our general approach, and then describe the results of a random- ized controlled experiment on the Twitter platform that di- rectly tests for a causal link between structural diversity and retention. In line with results from past observational stud- ies, we first show that structural diversity indeed correlates with user retention on Twitter. We then exogenously vary structural diversity by altering the set of network recommen- dations new users see when joining the platform. We show that this randomization strategy induces the desired changes to network topology. However -- and this is our key result -- low, medium, and high structural diversity treatment groups in our experiment have comparable retention rates. Thus, at least in this case, the correlation we observe between struc- tural diversity and retention does not appear to result from a causal relationship. Our results accordingly challenge causal explanations of the link between structural diversity and be- havior that stems from past observational studies, and high- light the importance of randomized experiments in network analysis. Related Work The role of network structure in social decision making is at the foundation of the vast literature on the diffusion of innovations, and many studies have examined this relation- ship. (Coleman, Katz, and Menzel 1957; Rogers 1962). The growth of the internet and online services over the last 20 years have provided a particularly well-instrumented and fruitful research environment for studying decision mak- ing on networks. The present work is motivated by the fact that most prior studies leveraging the opportunities of online data are observational, and thus can generally only provide correlational -- not causal -- evidence for the role of network structure in decision making. Our focus in this work is on the role of structural diver- sity in new user engagement, in line with the original pa- per on structural diversity (Ugander et al. 2012). Beyond user engagement, related work on prediction problems in- volving network diversity have found evidence that more di- verse networks among Twitter hashtag participants (Weng, Menczer, and Ahn 2013; Romero, Tan, and Ugander 2013), Sina Weibo message distribution networks (Bao et al. 2013), and Facebook conversation thread participants (Backstrom et al. 2013) all predict greater growth of the hashtag usage, message distribution, and conversation, respectively. A recent study of decisions to exercise through a running application provides important causal evidence of social in- fluence between friends (Aral and Nicolaides 2017). That study examines the role of structural diversity as part of its work, and finds that structural diversity is correlated with more social influence. While the estimates of social influ- ence are causal -- achieved through an instrumental variables approach using weather as an instrument -- the evidence for a relationship between the outcome and structural diversity is only correlational. Further, recent work examining cellular phone networks in a south Asian country found that structural diversity, mea- sured as the fraction of open triads in an ego-network, is positively correlated with individual income (Jahani et al. 2017). This finding highlights the importance of understand- ing demographic correlates of structural diversity that may explain findings that previously have been understood as be- ing caused by structural diversity. Finally, we highlight an early examination of the role of network structure in the adoption of online products that studied users choosing to join groups within the blogging service LiveJournal (Backstrom et al. 2006). This study found that a high edge density within a user's friends that were already in a group -- which could be interpreted as a contact neighborhood with low structural diversity -- predicted that they would join that group. This predictive finding is consistent with the idea of users valuing social cohesion (Burt 1987) in choosing groups; but it is in op- position to the role of structural diversity identified in the work discussed above. A subsequent meta-analysis of on- line social applications reported a mixture of positive and negative predictive relationships between edge density and adoption (Kloumann et al. 2015). Two Challenges for Experimental Studies of Structural Diversity Any experimental study of structural diversity faces two key challenges, one conceptual and the other operational. First, it is conceptually unclear how even to define the causal ef- fect of interest in this case. Typically one investigates the causal effect of a specific treatment, like taking a particular drug, and to make progress one must make assumptions that exclude certain causal pathways, like assuming the temper- ature outside does not affect a patient's response. These as- sumptions may not hold exactly, but they are often relatively weak and acceptably approximate reality. However, experi- mental tests of complex social phenomena typically require comparatively strong assumptions (Sobel 2006). We could, for example, assume that adoption is affected only by the degree of structural diversity in an individual's network -- and exclude the effect of all other network features. But this assumption is unrealistic: a contact network comprised of work colleagues and college friends is likely very different than one comprised of family members and one's bowling league, even if the two have comparable structural diversity. In general, if one believes that network membership -- and not just network structure -- matters, standard exclusion re- strictions are hard to justify. In light of this limitation, one might consider holding con- stant the members in one's contact network, and then study what happens as connections between those members vary. While theoretically interesting, this formulation encapsu- lates a somewhat narrow view of structural diversity -- and also one that is particularly difficult to test.1 The common causal explanations for the structural diversity phenomenon are mediated by membership, and hence do not admit a nat- ural separation of membership and structure. The second, operational challenge is to exogenously in- duce structural changes to an individual's network of social contacts. Random team assignment has been used to alter network membership (Hasan and Koning 2017), and random roommate assignment to alter single dyads in student dor- mitory populations (Lyle 2007). But studying structural di- versity inherently involves much larger changes to network structure, and studying the consequences of such changes requires running experiments at scales that are typically in- feasible with traditional designs. Experiment Design One cannot completely circumvent the conceptual and op- erational obstacles identified above. In this work, however, we were able to mitigate them by carrying out the following randomized experiment on the Twitter social network. Our study population consists of a sample of 4.2 million new users who joined Twitter during a particular period in 2016. Users were selected into the sample at random from among all new users who joined during the study period, and so our study population is approximately representative of new Twitter members during 2016. Our outcome variable of interest is 3-month retention, meaning that the user visited Twitter at least once in the 30- day period 90 -- 120 days after joining. Our primary goal is to understand the causal relationship between structural di- versity and retention defined in this manner. This measure of activity is a common benchmark -- both at Twitter and elsewhere -- though we note that our results are qualitatively similar if we look at related metrics (e.g., 6-month or 12- month retention). Defining structural diversity In designing our experiment and evaluating the results, we use a variant of average pairwise cosine similarity (Sharma, Seshadhri, and Goel 2017) -- defined below -- as our mea- sure of structural diversity. With this measure, lower sim- ilarity corresponds to higher diversity. Though our defini- tion of structural diversity differs somewhat from the orig- inal component-based metric (Ugander et al. 2012), it fa- cilitates finer-grained analysis, particularly in larger contact networks where component counts can be overly coarse. To start, we define the similarity sim(v, w) for any two users v and w. Specifically, sim(v, w) is the cosine similarity of the binary incidence vectors for v and w, where these vectors indicate which users are following them. That is, sim(v, w) = A · B A · B , (1) 1Arguably, changing an individual's network connections also changes that individual's persona, so even this formulation cannot completely escape the entanglement of structure and membership. Figure 1: In a stylized example, a new user (gray node) has 9 candidate recommendations connected by a similar- ity graph consisting of three weakly connected components. The goal is to recommend 3 users. (A) To choose a high- similarity (low-diversity) set, we select three nodes (red) from the same component. (B) To choose a low-similarity (high-diversity) set, we select one node (red) from each weakly connected component in the similarity graph. where A and B are the incident vectors for v and w, re- spectively. Thus, v and w are considered similar if they are followed by a similar set of users. In theory, to find the average pairwise similarity for a set of users, we would compute and average the similarity scores over all pairs of users in the set. However, due to lim- itations in Twitter's production system, for any user v we are only able to compute similarity scores for the 40 users most similar to v. We thus set sim(v, w) = 0 for w outside this set of 40 when computing the average.2 Randomizing structural diversity We now describe how we exogenously varied structural di- versity to test for a causal link between diversity and re- tention. Users who create an account on Twitter are taken through an onboarding process, and account recommenda- tions for the user are a key part of this process. The on- boarding process evolves continually, but at the time of run- ning our experiment, new users were shown recommenda- tions on two different pages. First, users were asked to se- lect topics that they might be interested in (e.g., "Science & Technology"), and were then shown recommendations re- lated to those topics (e.g., the accounts of well-known scien- tists). Users would bypass this screen if they did not select any topics of interest. Then, the user was given the choice to import their phone and email contacts. Whether a user chose to import their contacts or not, they were taken to a second screen where they were given another set of account recommendations, this time focused on their social circle. Our experiment only affected the recommendations on this second screen, which we term the set of "contact recommen- dations". 2In order to use similarity scores that reflect the current state of the graph at the time that the user is signing up, we use the near- real time similarity scores available through a caching service with a limited capacity. AB The contact recommendations shown to a user were based on a machine-learned ranking that took a base set of candi- dates, and ranked them by probability of generating friend (bi-directional follow) relationships. The set of candidates was generated by taking the list of phone and email con- tacts for the user, as well as a subset of their topical fol- lows from the first screen3, and running a SALSA-like algo- rithm on the friend graph of these users (Gupta et al. 2013; Su, Sharma, and Goel 2016). In essence, contact recommen- dations were a mix of a user's direct phone/email contacts and friends of these contacts. Since these are arguably social contacts, our diversity experiment focused on these in order to stay close to the prior work on diversity, which is mostly on social networks. From among the dozens of personalized contact recom- mendations C generated for each new user by Twitter's in- ternal algorithm, we attempted to select three different sub- sets of 20 users to promote: subsets with low, medium, and high structural diversity, as operationalized by average pair- wise similarity. Among these candidates, we first considered the induced "similarity graph" GC on the candidates, where we drew a directed edge from user u to user v if v was one of the 40 most similar users (measured by cosine similarity, as discussed above) to u at the time of the experiment. Now, given the directed similarity graph GC, we then found the three largest weakly connected components in GC. In order to be deemed eligible for the experiment, we required that a user have at least one component of size ≥ 20, two components of size ≥ 10, and three components of size ≥ 7. (This restriction was enforced so that we could induce the desired structural changes, as described below.) If a user was deemed eligible for the experiment, we assigned the user uniformly at random to one of four treatment con- ditions: "control," "high similarity," "medium similarity," or "low similarity". In the "high similarity" condition, we recommended the 20 most relevant users from the largest component, where relevance was based on Twitter's internal ranking. In the "medium similarity" condition, we recommended the 10 most relevant users from the largest component and the 10 most relevant users from the second-largest component. In the "low similarity" condition, we recommended the 7 most relevant users from each of the two largest components, and the 6 most relevant users from the third-largest component. This design is based on the idea that recommendations cho- sen from different connected components are likely to be more diverse than those chosen from the same connected component. Figure 1 shows a stylized visualization of this strategy. In the "control" condition, we displayed the users that Twitter would have ordinarily shown (i.e., we did not al- ter the standard recommendations). We note that users in the "control" group were eligible users, and thus could have been randomly assigned to any of the other three conditions. As a result, we can compare "control" users to ineligible users to understand differences between eligible and ineligi- ble populations that all receive the standard, unaltered rec- 3Especially if they had no existing contacts on Twitter. ommendations. Approximately 500,000 users (12% of our study popu- lation of 4.2 million) were ultimately deemed eligible for the experiment. That is, we could construct low-, medium-, and high-similarity recommendation sets for these 500,000 users. As an example of when this set construction failed, we generally could not create low-similarity (i.e., high- diversity) sets from the recommendations generated for users with few known social contacts on Twitter, as most recommended users in this case were in a single, large con- nected component. After constructing these recommendation sets, we ran- domly assigned each eligible user to one of four treatment arms (low, medium, high, or control), and then promoted that arm's subset of 20 users to the top of the recommenda- tion list; in the control condition we did not alter the standard recommendations. Recommendations were shown to eligi- ble users 20 at a time, and they were free to follow as many or as few of the recommendations as they wished. As our experiment involves human subjects, we sought (and received) approval from Stanford University's Insti- tutional Review Board. We note that our intervention con- sisted only of altering the set of recommendations presented to new Twitter users -- with these recommendations chosen from Twitter's standard personalized set of candidates. Our experiment protocol was deemed to pose minimal risk to users, and was thus evaluated under expedited review. Assessing the Assignment Mechanism Induced structural changes Our experimental design is not guaranteed to induce the desired changes to network structure; even if we encour- age new users to follow a structurally diverse set of people, they might nevertheless elect to follow a low-diversity set. Some users, however, opted to follow exactly the 20 users we selected, in part because of a "follow all" option that ap- peared on the recommendation page. Among these "follow all" users, Figure 2 (left) shows that our treatment condi- tions indeed induced significant changes to structural diver- sity. (The peak at 40 is due to a similar effect, with users accepting all suggestions on another page of recommenda- tions. The number of users following 40 recommendations is small -- less than 1% of eligible users -- and we do not con- sider them as part of our population of "follow all" users.) In contrast, among those who ultimately chose to follow 30 users, the structural diversity of their resulting networks did not vary substantially across our three treatment conditions, because they followed a combination of accounts we recom- mended and those that we did not, hampering our ability to measure the causal effect of structural diversity on retention. the high-similarity (low- diversity) group has mean pairwise similarity that is 64% higher than the low-similarity (high-diversity) group (0.084 vs. 0.051), and Figure 2 (right) shows that the induced gap in structural diversity persists over time.4 Figure 3 shows the full distribution of pairwise similarity for follow-all users in Among follow-all users, 4For follow-all users, the 95% confidence interval on mean similarity for the high-similarity group is [0.075, 0.093]; for the Figure 2: Left: Among those users who followed all our 20 recommendations (i.e., the "follow all" users), the treatments induce significant changes to structural diversity, as measured by average pairwise similarity computed on a user's initial social network. Right: Average pairwise similarity over time, by treatment condition, for the "follow all" users, where similarity is based on the network at the point in time indicated on the horizontal axis. the low-, medium-, and high-diversity treatment arms, in- dicating that there is significant heterogeneity within each treatment arm, as one would expect given the design of the experiment. The set of follow-all users likely differs in many ways from the overall population of new Twitter users. Impor- tantly, however, the correlational relationship between struc- tural diversity and retention holds in this subset of users, as we discuss below. Thus, though follow-all users are not rep- resentative of new Twitter users, they exhibit the key associ- ation between structural diversity and retention that we seek to investigate, and are accordingly a suitable sub-population for our study. Post-treatment selection Among those who followed our network recommenda- tions, our treatment conditions induced sizable differences in structural diversity. But one might worry that the type of user who elected to follow our recommendations may have differed across treatment arms. Those who followed our rec- ommendations when assigned to the low-diversity condition might not have done so if assigned to the high-diversity condition. As a result, conditioning on the post-treatment follow-all outcome could in theory bias our estimates of causal effects (Imbens and Rubin 2015; Montgomery, Ny- han, and Torres 2018). There is no complete solution to this problem, but we note three factors that mitigate such concerns in our study. First, approximately the same proportion of eligible users in each condition followed our 20 recommendations: 1.8% in the medium-similarity group it is [0.055, 0.070]; and for the low- similarity group it is [0.044, 0.058]. In particular, the three treat- ment groups are generally well separated. control and low-diversity conditions, 2.1% in the medium- diversity condition, and 2.0% in the high-diversity condi- tion. Second, as shown in Figure 4, the follow-all users in each treatment group are nearly identical on several ob- servable dimensions: client platform (e.g., Android or iOS), country, email domain, and language.5 Finally, concerns of selection bias are most salient when outcomes differ across treatment arms, in which case differences may result from selection on unobservables rather than any causal effect of the treatment. However, as we describe below, we find that outcomes are nearly identical across treatment arms, and so if a true causal effect exists in our case it would require near- perfect cancellation with the "follow-all" selection mecha- nism to explain our results. In sum, restricting to the subpopulation of follow-all users likely introduces some selection bias, but the magnitude of the effect appears small and unlikely to affect our qualita- tive conclusions. We also note that two common approaches for dealing with post-treatment selection, Heckman correc- tion (Heckman 1977) and principal stratification (Frangakis and Rubin 2002), cannot be easily applied in our setting be- cause follow-all behavior is not strongly predicted by the available covariates and we lack a suitable instrument to cir- cumvent this issue. Design summary Though admittedly imperfect, our methodology helps over- come the key design challenges described above, opera- tionally inducing significant changes to structural diversity 5This covariate check is only meant to assess post-treatment bias. As we have discussed above, the subset of follow-all users that we consider is not representative of the broader population of new Twitter users. lllllllllllllll0.000.010.020.030.040.050.060.070.080.090.100.000.010.020.030.040.050.060.070.080.090.10010203040500306090120Network sizeDays since joiningAverage pairwise similarityTreatment grouplllHigh similarityMedium similarityLow similarity Figure 3: The distribution of average pairwise similarity (based on a user's initial social network) across users in each treatment group, for users who followed exactly 20 people. The dashed lines mark the mean for each treatment group. while conceptually satisfying a version of exclusion. Among the follow-all users, we have considerable ability to exoge- nously vary the structural diversity of their contact networks. And because follow-all users have a fixed network size of 20, we eliminate network size as a potentially significant factor. As discussed above, any change to network topol- ogy necessarily alters more than structural diversity, but con- trolling for network size is arguably the most important, and is in line with the approach taken in past observational studies (Ugander et al. 2012). Of course, our restriction to follow-all users limits the generalizability of our results to the full population of Twitter users, but we believe that de- sign choice represents a suitable compromise. Results Replicating results of past observational studies We begin by examining the relationship between structural diversity and retention on a randomly selected sample of Twitter users who signed up for the service while our ex- periment was running but who were not themselves part of the experiment. As a result, this population contains both eli- gible and ineligible users, in representative proportions, and all received recommendations from the standard algorithm also used for our control condition. We throughout consider structural diversity computed on a user's network immedi- ately after joining Twitter, to facilitate direct comparisons to the results from our experiment, in which this initial network structure was randomized. In Figure 5 (top), users are binned according to the struc- tural diversity of their initial networks, where we use pair- wise similarity to quantify diversity. For each point on the horizontal axis, the vertical axis indicates the fraction of users in that bin who were active on Twitter three months after signing up. The top-left panel of Figure 5 is based on all users with an initial network size of at least 10, where this lower limit ensures pairwise similarity can be reliably computed; the top-right panel is based on the subset of "fol- low all" users, with an initial network size of exactly 20. In both cases, the solid lines show that retention is positively correlated with structural diversity (i.e., retention decreases with pairwise similarity), corroborating past observational results in other domains. In accordance with Twitter's re- porting policies we show only relative retention rates, with 1.0 in both panels corresponding to the overall retention rate among follow-all users. Our study differs from past work in the population we study (Twitter users, particularly those who followed our 20 recommendations); the outcome we measure (30-day reten- tion); and our specific measure of structural diversity (av- erage pairwise similarity). Nonetheless, the patterns we see are consistent with the theory that engagement is positively correlated with structural diversity. Importantly, this consis- tency with past work indicates that both our setting and our design choices are well-suited to examining structural diver- sity. Had we not been able to replicate past findings, one might reasonably worry that idiosyncrasies in the particular setting we study were driving the results. Restricting to eligible users We next repeat our analysis for eligible users -- the 12% of the population, as discussed above, for whom we could gen- erate recommendations having low, medium, and high struc- tural diversity. These eligible users come from our control condition, and they see the standard recommendations Twit- ter provides. The results are again shown in Figure 5 (top panels, dashed lines). On this eligible subpopulation, we find that the strength of the relationship between retention and structural diversity is significantly attenuated. Thus, simply controlling for the possibility of selecting into structurally diverse or homogeneous networks, much of the apparent di- versity effect on retention disappears. TreatmentControl020040060000.050.100.150.200.250.3000.050.100.150.200.250.30Average pairwise similarityNumber of usersHigh similarityMedium similarityLow similarity Figure 4: Covariate distributions across treatment conditions for the subpopulation of users who followed all our 20 recommen- dations. Treatment arms have nearly identical distributions, mitigating concerns of selection bias due to conditioning on the post-treatment "follow all" behavior. The contrast between all users (solid lines) and eligible users (dashed lines) is indeed one of our key findings. Once we restrict to a population for whom one can reasonably talk about the causal effects of network structure (i.e., our set of eligible users, who could plausibly enter into low or high diversity contact networks), the relationship between structural diversity and engagement is considerably smaller. Thus, even without running a randomized trial, these prelim- inary results indicate that the observed correlation between structural diversity and retention in the full Twitter popula- tion is driven in part by selection rather than causation. Notably, eligible users have lower overall engagement than the broader population. Though we cannot definitively say what is driving that result, the pattern illustrates the importance of considering only eligible users when testing causal theories of structural diversity. The structural diver- sity of ineligible users, by definition, cannot be easily varied, and so the meaning of causation is ill-posed in that subpop- ulation. Because ineligible users are qualitatively different from those that are eligible -- for examle, having higher re- tention rates -- it is important to filter out such users when estimating causal effects. The randomized trial Finally, we present the results from our randomized trial. The three colored points in Figure 5 (top right) indicate that retention rates for follow-all users are comparable in the low-, medium-, and high-diversity treatment groups. The locations of these points on the horizontal axis in- dicate the mean pairwise similarity of each condition, as shown in Figure 3. The 95% confidence interval for the difference between the high- and low-similarity treatment groups is (−0.04, 0.07) -- indicating a lack of statistical significance -- where we report these numbers in the units of relative retention rates as in the figure.6 We similarly find no statistically significant difference between treatment con- ditions for the number of Tweets posted or the number of Tweets "liked" by new users in their first 30 days on the platform (Figure 5, bottom panels). Thus, at least for the subpopulation we study, we do not find evidence of a causal effect of structural diversity on adoption or engagement. Conclusion Our results corroborate the correlational relationship be- tween structural diversity and behavior found in past obser- vational studies. But, at least in the setting we consider, we also find that this pattern is driven by selection rather than causation. In particular, we find that the connection between structural diversity and retention (and engagement) is signif- icantly weaker in the subpopulation of eligible users, who might reasonably form either homogeneous or diverse net- works. In the randomized low-, medium- and high-diversity experiment groups we find no significant difference in re- tention or engagement rates. It thus appears that those who organically form diverse networks differ systematically from those who form homogeneous networks in ways that affect behavior. In establishing these results, we hope to have clarified both the theoretical underpinnings and the practical chal- lenges of testing for a causal link between network struc- ture and behavior. Our work leaves unanswered several im- portant questions, including the extent to which these find- 6Many papers aim to find statistically significant differences be- tween treatment conditions. In this case, however, the null result is our main finding. Past work has posited that structural diversity and engagement are causally related (based on observational evidence), but we find no evidence of that link in our randomized experiment, as indicated by the lack of statistical significance. CountryEmailLanguagePlatformllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0%20%40%60%United StatesIndiaBrazilJapanGermanyTurkeyAlgeriaOthergmail.comhotmail.comyahoo.comNo domainOtherEnglishSpanishRussianPortugueseFrenchArabicTurkishOtherWebAndroidMobile webiOSOtherProportionllllControl High similarity Medium similarity Low similarity Figure 5: Top Left: Among both the full population of Twitter users and the subpopulation of eligible users (from the control condition), structural diversity is correlated with retention, though the effect is attenuated in the latter group. Top Right: Anal- ogous results for "follow all" users, who have an initial network size of exactly 20. Despite the observed correlation between structural diversity and retention, retention is comparable across all experiment conditions (colored points, with 95% confidence intervals), suggesting that structural diversity does not causally affect retention in this case. Bottom: Alternative engagement metrics (number of likes and number of Tweets by new users) as a function of pairwise similarity, again for the subpopulation of users who follow exactly 20 people. We plot the geometric mean of the values after adding 1 to each user's activity measure to account for zeros. In all cases, average pairwise similarity is computed based on a user's initial network. These plots corroborate our primary finding that structural diversity does not appear to be causally connected to engagement. ings generalize to other domains, populations, and strategies for inducing structural changes. For example, our specific methodological approach required us to focus on a small, non-representative subset of new Twitter users who followed our recommendations, and for whom we could thus exoge- nously vary structural diversity. We hope future studies can design experiments to investigate larger subsets of the pop- ulation. Further, as implied by our discussion of exclusion, there are multiple ways to exogenously vary structural di- versity and other methods -- including those based on more complete social network information -- might yield different results. Looking forward, we hope our results and our ap- proach spur further exploration of the often subtle causal role that network structure may play in social behavior. We also hope our results help demonstrate the value of random- ized experiments in social network studies (Manski 1993; Shalizi and Thomas 2011). Acknowledgements We thank Christopher Chang, Dean Eckles, Avi Feller and Jennifer Pan for their comments. We also thank the Rec- ommendations and Notifications team at Twitter, including Bruce Deng, Jerry Jiang, Jinsong Lin, and Zhijun Yin, for their help with implementing the experiment. Our study de- sign was reviewed and approved by Stanford University's Institutional Review Board (Protocol #: 36150). AllEligiblelllAllEligibleAll new users"Follow all" users00.020.040.060.080.100.020.040.060.080.10.50.60.70.80.91.01.11.21.31.41.51.61.7Average pairwise similarityRetentionlllHigh similarityMedium similarityLow similaritylllAllEligiblelllAllEligibleLikesTweets00.020.040.060.080.100.020.040.060.080.10.02.55.07.510.0Average pairwise similarityEngagement (geometric mean)lllHigh similarityMedium similarityLow similarity References [Aral and Nicolaides 2017] Aral, S., and Nicolaides, C. 2017. Exercise contagion in a global social network. Na- ture Communications 8. [Aral and Walker 2014] Aral, S., and Walker, D. 2014. Tie strength, embeddedness, and social influence: A large-scale networked experiment. Management Science 60(6):1352 -- 1370. [Backstrom et al. 2006] Backstrom, L.; Huttenlocher, D.; Kleinberg, J.; and Lan, X. 2006. Group formation in large social networks: membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD International Con- ference on Knowledge Discovery and Data Mining, 44 -- 54. ACM. [Backstrom et al. 2013] Backstrom, L.; Kleinberg, J.; Lee, L.; and Danescu-Niculescu-Mizil, C. 2013. Characteriz- ing and curating conversation threads: expansion, focus, vol- ume, re-entry. In Proceedings of the sixth ACM international conference on Web search and data mining, 13 -- 22. ACM. [Bakshy et al. 2012] Bakshy, E.; Eckles, D.; Yan, R.; and Rosenn, I. 2012. Social influence in social advertising: ev- idence from field experiments. In Proceedings of the 13th ACM Conference on Electronic Commerce, 146 -- 161. ACM. [Bao et al. 2013] Bao, P.; Shen, H.-W.; Huang, J.; and Cheng, X.-Q. 2013. Popularity prediction in microblog- ging network: a case study on sina weibo. In Proceedings of the 22nd International Conference on World Wide Web, 177 -- 178. ACM. [Bass 1969] Bass, F. M. 1969. A new product growth for model consumer durables. Management science 15(5):215 -- 227. [Bikhchandani, Hirshleifer, and Welch 1992] Bikhchandani, S.; Hirshleifer, D.; and Welch, I. 1992. A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of political Economy 100(5):992 -- 1026. [Burt 1987] Burt, R. S. 1987. Social contagion and inno- vation: Cohesion versus structural equivalence. American journal of Sociology 92(6):1287 -- 1335. [Burt 2000] Burt, R. S. 2000. The network structure of social capital. Research in organizational behavior 22:345 -- 423. [Coleman, Katz, and Menzel 1957] Coleman, J.; Katz, E.; and Menzel, H. 1957. The diffusion of an innovation among physicians. Sociometry 20(4):253 -- 270. [Frangakis and Rubin 2002] Frangakis, C. E., and Rubin, D. B. 2002. Principal stratification in causal inference. Bio- metrics 58(1):21 -- 29. [Granovetter 1973] Granovetter, M. S. 1973. The strength of weak ties. American Journal of Sociology 78(6):1360 -- 1380. [Granovetter 1978] Granovetter, M. 1978. Threshold mod- els of collective behavior. American journal of sociology 83(6):1420 -- 1443. [Gupta et al. 2013] Gupta, P.; Goel, A.; Lin, J.; Sharma, A.; Wang, D.; and Zadeh, R. 2013. WTF: The who to follow service at Twitter. In Proceedings of the 22nd international conference on World Wide Web, 505 -- 514. ACM. [Hasan and Koning 2017] Hasan, S., and Koning, R. 2017. Conversational peers and idea generation: Evidence from a field experiment. Harvard Business School Working Paper 17-101. [Heckman 1977] Heckman, J. J. 1977. Sample selection bias as a specification error (with an application to the estimation of labor supply functions). [Imbens and Rubin 2015] Imbens, G. W., and Rubin, D. B. 2015. Causal inference in statistics, social, and biomedical sciences. Cambridge University Press. [Jahani et al. 2017] Jahani, E.; Saint-Jacques, G.; Sundsøy, P.; Bjelland, J.; Moro, E.; et al. 2017. Differential net- work effects on economic outcomes: A structural perspec- tive. In International Conference on Social Informatics, 41 -- 50. Springer. [Kloumann et al. 2015] Kloumann, I.; Adamic, L.; Klein- berg, J.; and Wu, S. 2015. The lifecycles of apps in a social ecosystem. In Proceedings of the 24th International Con- ference on World Wide Web, 581 -- 591. International World Wide Web Conferences Steering Committee. [Lyle 2007] Lyle, D. S. 2007. Estimating and interpreting peer and role model effects from randomly assigned social groups at west point. The Review of Economics and Statis- tics 89(2):289 -- 299. [Manski 1993] Manski, C. F. 1993. Identification of endoge- nous social effects: The reflection problem. The review of economic studies 60(3):531 -- 542. [Montgomery, Nyhan, and Torres 2018] Montgomery, J. M.; Nyhan, B.; and Torres, M. 2018. How conditioning on post- treatment variables can ruin your experiment and what to do about it. American Journal of Political Science 62(3):760 -- 775. [Page 2008] Page, S. E. 2008. The difference: How the power of diversity creates better groups, firms, schools, and soci- eties. Princeton University Press. [Rogers 1962] Rogers, E. M. 1962. Diffusion of innovations. Free Press of Glencoe. [Romero, Tan, and Ugander 2013] Romero, D. M.; Tan, C.; and Ugander, J. 2013. On the interplay between social and topical structure. In ICWSM. [Ryan and Gross 1943] Ryan, B., and Gross, N. C. 1943. The diffusion of hybrid seed corn in two iowa communities. Rural Sociology 8(1):15. [Schelling 1971] Schelling, T. C. 1971. Dynamic models of segregation. Journal of mathematical sociology 1(2):143 -- 186. [Shalizi and Thomas 2011] Shalizi, C. R., and Thomas, A. C. 2011. Homophily and contagion are generically confounded in observational social network studies. Sociological meth- ods & research 40(2):211 -- 239. [Sharma, Seshadhri, and Goel 2017] Sharma, A.; Seshadhri, C.; and Goel, A. 2017. When hashes met wedges. In Proceedings of the 26th International Conference on World Wide Web. ACM Press. [Sobel 2006] Sobel, M. E. 2006. What do randomized stud- ies of housing mobility demonstrate? causal inference in the face of interference. Journal of the American Statistical As- sociation 101(476):1398 -- 1407. [Spiliotopoulos and Oakley 2013] Spiliotopoulos, T., and Oakley, I. 2013. Understanding motivations for facebook use: Usage metrics, network structure, and privacy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 3287 -- 3296. ACM. [Su, Sharma, and Goel 2016] Su, J.; Sharma, A.; and Goel, S. 2016. The effect of recommendations on network struc- ture. In Proceedings of the 25th International Conference on World Wide Web, 1157 -- 1167. [Ugander et al. 2012] Ugander, J.; Backstrom, L.; Marlow, C.; and Kleinberg, J. 2012. Structural diversity in social contagion. Proceedings of the National Academy of Sciences 109(16):5962 -- 5966. [Watts and Dodds 2007] Watts, D. J., and Dodds, P. S. 2007. Influentials, networks, and public opinion formation. Jour- nal of Consumer Research 34:441 -- 458. [Weng, Menczer, and Ahn 2013] Weng, L.; Menczer, F.; and Ahn, Y.-Y. 2013. Virality prediction and community struc- ture in social networks. Scientific Reports 3:2522.
1805.02411
2
1805
2018-05-28T18:36:42
Prioritizing network communities
[ "cs.SI", "cs.LG", "q-bio.MN", "stat.AP" ]
Uncovering modular structure in networks is fundamental for systems in biology, physics, and engineering. Community detection identifies candidate modules as hypotheses, which then need to be validated through experiments, such as mutagenesis in a biological laboratory. Only a few communities can typically be validated, and it is thus important to prioritize which communities to select for downstream experimentation. Here we develop CRank, a mathematically principled approach for prioritizing network communities. CRank efficiently evaluates robustness and magnitude of structural features of each community and then combines these features into the community prioritization. CRank can be used with any community detection method. It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRank can incorporate domain-specific information to further boost performance. Experiments on many large networks show that CRank effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization.
cs.SI
cs
Prioritizing network communities Marinka Zitnik,1 Rok Sosic,1 and Jure Leskovec1,2,⇤ 1 Computer Science Department, Stanford University, Stanford, CA, USA 2 Chan Zuckerberg Biohub, San Francisco, CA, USA ⇤ To whom correspondence should be addressed; E-mail: [email protected] Uncovering modular structure in networks is fundamental for systems in biology, physics, and engineering. Community detection identifies candidate modules as hypotheses, which then need to be validated through experiments, such as mutagenesis in a biological labora- tory. Only a few communities can typically be validated, and it is thus important to prioritize which communities to select for downstream experimentation. Here we develop CRANK, a mathematically principled approach for prioritizing network communities. CRANK ef- ficiently evaluates robustness and magnitude of structural features of each community and then combines these features into the community prioritization. CRANK can be used with any community detection method. It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRANK can incorporate domain-specific information to further boost performance. Experiments on many large networks show that CRANK effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization. 1 Networks exhibit modular structure1 and uncovering it is fundamental for advancing the un- derstanding of complex systems across sciences2, 3. Methods for community detection4, also called node clustering or graph partitioning, allow for computational detection of modular structure by identifying a division of network's nodes into groups, also called communities5–10. Such com- munities provide predictions/hypotheses about potential modules of the network, which then need to be experimentally validated and confirmed. However, in large networks, community detection methods typically identify many thousands of communities6, 7 and only a small fraction can be rigorously tested and validated by follow-up experiments. For example, gene communities de- tected in a gene interaction network11 provide predictions/hypotheses about disease pathways2, 3, but to confirm these predictions scientists have to test every detected community by performing experiments in a wet laboratory3, 8. Because experimental validation of detected communities is resource-intensive and generally only a small number of communities can be investigated, one must prioritize the communities in order to choose which ones to investigate experimentally. In the context of biological networks, several methods for community or cluster analysis have been developed2, 3, 12–15. However, these methods crucially rely and depend on knowledge in external databases, such as Gene Ontology (GO) annotations16, protein domain databases, gene expression data, patient clinical profiles, and sequence information, in order to calculate the quality of communities derived from networks. Furthermore, they require this information to be available for all communities. This means that if genes in a given community are not present in a gene knowledge database then it is not possible for existing methods to even consider that community. This issue is exacerbated because knowledge databases are incomplete and biased toward better- studied genes11. Furthermore, these methods do not apply in domains at the frontier of science where domain-specific knowledge is scarce or non-existent, such as in the case of cell-cell similar- ity networks17, microbiome networks18, 19, and chemical interaction networks20. Thus, there is a need for a general solution to prioritize communities based on network information only. Here, we present CRANK, a general approach that takes a network and detected communities as its input and produces a ranked list of communities, where high-ranking communities represent promising candidates for downstream experiments. CRANK can be applied in conjunction with any community detection method (Supplementary Notes 2 and 5) and needs only the network struc- ture, requiring no domain-specific meta or label information about the network. However, when 2 domain-specific supervised information is available, CRANK can integrate this extra information to boost performance (Supplementary Notes 9 and 10). CRANK can thus prioritize communities that are well characterized in knowledge bases, such as GO annotations, as well as poorly char- acterized communities with limited or no annotations. Furthermore, CRANK is based on rigorous statistical methods to provide an overall rank for each detected community. Results Overview of CRANK community prioritization approach CRANK community prioritization approach consists of the following steps (Figure 1). First, CRANK finds communities using an existing, preferred community detection method (Figure 1a). It then computes for each community four CRANK defined community prioritization metrics, which capture key structural features of the community (Figure 1b), and then it combines the community metrics via a aggregation method into a single overall score for each community (Fig- ure 1c). Finally, CRANK prioritizes communities by ranking them by their decreasing overall score (Figure 1d). CRANK uses four different metrics to characterize network connectivity features for each detected community (see Methods). These metrics evaluate the magnitude of structural features as well as their robustness against noise in the network structure. The rationale here is that high priority communities have high values of metrics and are also stable with respect to network pertur- bations. If a small change in the network structure-an edge added here, another deleted there- significantly changes the value of a prioritization metric then the community will not be considered high priority. We derive analytical expressions for calculating these metrics, which make CRANK computationally efficient and applicable to large networks (Supplementary Note 2). Because indi- vidual metrics may have different importance in different networks, a key element of CRANK is a rank aggregation method. This method combines the values of the four metrics into a single score for each community, which then determines the community's rank (see Methods and Supplemen- tary Note 4). CRANK's aggregation method adjusts the impact of each metric on the ranking in a principled manner across different networks and also across different communities within a net- work, leading to robust rankings and a high-quality prioritization of communities (Supplementary Note 5). 3 Synthetic networks We first demonstrate CRANK by applying it to synthetic networks with planted community struc- ture (Figure 2a). The goal of community prioritization is to identify communities that are most promising candidates for follow-up investigations. Since communities provide predictions about the modular structure of the network, promising candidates are communities that best correspond to the underlying modules. Thus, in this synthetic example, the aim of community prioritization can be seen as to rank communities based on how well they represent the underlying planted communi- ties, while only utilizing information about network structure and without any additional informa- tion about the planted communities. We quantify prioritization quality by measuring the agreement between a ranked list of communities produced by CRANK and the gold standard ranking. In the gold standard ranking, communities are ordered in the decreasing order of how accurately each community reconstructs its corresponding planted community. We experiment with random synthetic networks with planted community structure (Fig- ure 2a), where we use a generic community detection method7 to identify communities and then prioritize them using CRANK. We observe that CRANK produces correct prioritization-using only the unlabeled network structure, CRANK places communities that better correspond to planted communities towards the top of the ranking (Figure 2b), which indicates that CRANK can identify accurately detected communities by using the network structure alone and having no other data about planted community structure. Comparing the performance of CRANK to alternative rank- ing techniques, such as modularity5 and conductance21, we observe that CRANK performs 149% and 37% better than modularity and conductance, respectively, in terms of the Spearman's rank correlation between the generated ranking and the gold standard community ranking (Figure 2c). Moreover, we observed no correlation with the gold standard ranking when randomly ordering the detected communities. Although zero correlation is expected, poor performance of random order- ing is especially illuminating because prioritization of communities is typically ignored in current network community studies. Networks of medical drugs with shared target proteins Community rankings obtained by CRANK provide a rich source of testable hypotheses. For exam- ple, we consider a network of medical drugs where two drugs are connected if they share at least one target protein (Figure 3a). Because drugs that are used to treat closely related diseases tend 4 to share target proteins22, we expect that drugs belonging to the same community in the network will be rich in chemicals with similar therapeutic effects. Identification of these drug communi- ties hence provides an attractive opportunity for finding new uses of drugs as well as for studying drugs' adverse effects22. After detecting drug communities using a standard community detection method7, CRANK relies only on the network structure to prioritize the communities. We evaluate ranking perfor- mance by comparing it to metadata captured in external chemical databases and not used by the ranking method. We find that CRANK assigns higher priority to communities whose drugs are pharmacogenomically more similar (Figure 3b), indicating that higher-ranked communities contain drugs with more abundant drug-drug interactions, more similar chemical structure, and stronger textual associations. In contrast, ranking communities by modularity score gives a poor correspondence with information in the external chemical databases (Figure 3c). We observe that the top ranked communities are composed from an unusual set of drugs (Figure 3a and Supplementary Table), yet drugs with unforeseen community assignment may rep- resent novel candidates for drug repurposing22. Examining the highest ranked communities, we do not expect mifepristone, an abortifacient used in the first months of pregnancy, to appear together with a group of drugs used to treat inflammatory diseases. Another drug with unanticipated com- munity assignment is minaprine, a psychotropic drug that is effective in the treatment of various depressive states23. Minaprine is an antidepressant that antagonizes behavioral despair; however, it shares target proteins with several cholinesterase inhibitors. Two examples of such inhibitors are physostigmine, used to treat glaucoma, and galantamine, a drug investigated for the treatment of moderate Alzheimer's disease24. In the case of minaprine, an antidepressant, it was just recently shown that this drug is also a cognitive enhancer that may halt the progression of Alzheimer's disease25. It is thus attractive that CRANK identified minaprine as a member of a community of primarily cholinesterase inhibitors, which suggests minaprine's potential for drug repurposing for Alzheimer's disease. The analysis here was restricted to drugs approved for medical use by the U.S. Food and Drug Administration, because these drugs are accompanied by rich metadata that was used for evaluating community prioritization. We find that when CRANK integrates drug metadata into its prioritization model, CRANK can generate up to 55% better community rankings, even when 5 the amount of additional information about drugs is small (Supplementary Note 10). However, approved medical drugs represent less than one percent of all small molecules with recorded in- teractions. Many of the remaining 99% of these molecules might be candidates for medical usage or drug repurposing but currently have little or no metadata in the chemical databases. This fact further emphasizes the need for methods such as CRANK that can prioritize communities based on network structure alone while not relying on any metadata in external chemical databases. Gene and protein interaction networks CRANK can also prioritize communities in molecular biology networks, covering a spectrum of physical, genetic, and regulatory gene interactions11. In such networks, community detection is widely used because gene communities tend to correlate with cellular functions and thus provide hypotheses about biological pathways and protein complexes2, 3. CRANK takes a network and communities detected in that network, and produces a rank- ordered list of communities. As before, while CRANK ranks the communities purely based on network structure, the external metadata about molecular functions, cellular components, and bio- logical processes is used to assess the quality of the community ranking. Considering highest ranked gene communities, CRANK's ranking contains on average 5 times more communities whose genes are significantly enriched for cellular functions, compo- nents, and processes16 than random prioritization, and 13% more significantly enriched commu- nities than modularity- or conductance-based ranking (Supplementary Note 11). For example, in the human protein-protein interaction network, the highest ranked community by CRANK is com- posed of 20 genes, including PORCN, AQP5, FZD6, WNT1, WNT2, WNT3, and other members of the Wnt signaling protein family26 (Supplementary Note 11). Genes in that community form a bi- ologically meaningful group that is functionally enriched in the Wnt signaling pathway processes (p-value = 6.4⇥ 1023), neuron differentiation (p-value = 1.6⇥ 1015), cellular response to retinoic acid (p-value = 2.9 ⇥ 1014), and in developmental processes (p-value = 9.2 ⇥ 1010). Functional annotation of molecular networks is largely unavailable and incomplete, espe- cially when studied objects are not genes but rather other entities, e.g., miRNAs, mutations, single nucleotide variants, or genomic regions outside protein-coding loci27. Thus it is often not possible to simply rank the communities by their functional enrichment scores. In such scenarios, CRANK can prioritize communities reliably and accurately using only network structure without necessitat- 6 ing any external databases. Gene communities that rank at the top according to CRANK represent predictions that could guide scientists to prioritize resource-intensive laboratory experiments. Megascale cell-cell similarity networks Single-cell RNA sequencing has transformed our understanding of complex cell populations28. While many types of questions can be answered using single-cell RNA-sequencing, a central fo- cus is the ability to survey the diversity of cell types and composition of tissues within a sample of cells. To demonstrate that CRANK scales to large networks, we used the single-cell RNA-seq dataset containing 1,306,127 embryonic mouse brain cells29 for which no cell types are known. The dataset was preprocessed using standard procedures to select and filter the cells based on quality-control metrics, normalize and scale the data, detect highly variable genes, and remove un- wanted sources of variation9. The dataset was represented as a weighted graph of nearest neighbor relations (edges) among cells (nodes), where relations indicated cells with similar gene expression patterns calculated using diffusion pseudotime analysis30. To partition this graph into highly in- terconnected communities we apply a community detection method proposed for single-cell data8. The method separates the cells into 141 fine-grained communities, the largest containing 18,788 (1.8% of) and the smallest only 203 (0.02% of) cells. After detecting the communities, CRANK takes the cell-cell similarity network and the detected communities, and generates a rank-ordered list of communities, assigning a priority to each community. CRANK's prioritization of communi- ties derived from the cell-cell similarity network takes less than 2 minutes on a personal computer. In the cell-cell similarity network, one could assume that top-ranked communities contain highly distinct marker genes31, while low-ranked communities contain marker genes whose ex- pression levels are spread out beyond cells in the community. To test this hypothesis, we identify marker genes for each detected community. In particular, for each community we find genes that are differentially expressed in the cells within the community9 relative to all cells that are not in the community. We find that high-ranked communities in CRANK contain cells with distinct marker genes, confirming the above hypothesis (average z-score of marker genes with respect to the bulk mean gene expression was above 200 and never smaller than 150) (Figure 4a-b). In contrast, cells in low-ranked communities show a weak expression activity diffused across the entire network and 7 no community-specific expression activity (Figure 4c-d). Examining cells assigned to the highest- ranked community (rank 1 community) in CRANK, we find that most differentially expressed genes are TYROBP, C1QB, C1QC, FCER1G, and C1QA (at least a 200-fold difference in normal- ized expression with respect to the bulk mean expression9). It is known that these are immuno- regulatory genes and that they play important roles in signal transduction in dendritic cells, osteo- clasts, macrophages, and microglia32. In contrast, low-ranked communities (Figure 4 visualizes rank 139, rank 140, and rank 141 communities) contain predominantly cells in which genes show no community-specific expression. Genes in communities ranked lower by CRANK hence do not have localized mRNA expression levels, suggesting there are no good marker genes that define those communities28. Since the expression levels of mRNA are linked to cellular function and can be used to define cell types28, the analysis here points to the potential of using highest-ranked communities in CRANK as candidates to characterize cells at the molecular level, even in datasets where no cells are yet classified into cell types. Analysis of CRANK prioritization approach The CRANK approach can be applied with any community detection method and can operate on directed, undirected, and weighted networks. Furthermore, CRANK can also use external domain- specific information to further boost prioritization performance (Supplementary Note 10). Results on diverse biological, information, and technological networks and on different community detec- tion methods show that the second best performing approach changes considerably across net- works, while CRANK always produces the best result, suggesting that it can effectively harness the network structure for community prioritization (Supplementary Note 8). CRANK automatically adjusts weights of the community metrics in the prioritization, resulting in each metric participat- ing with different intensity across different networks (Supplementary Figure 6). This is in sharp contrast with deterministic approaches, which are negatively impacted by heterogeneity of network structures and network community models employed by different community detection methods. The four CRANK community prioritization metrics are essential and complementary. CRANK met- rics considered together perform on average 45% better than the best single CRANK metric, and 26% better than any subset of three CRANK metrics (Supplementary Note 8). CRANK performs on average 38% better than approaches that combine alternative community metrics (Supplementary Note 8). Furthermore, CRANK can easily integrate any number of additional and domain-specific 8 community metrics2, 12–15, and performs well in the presence of low-signal and noisy metrics (Sup- plementary Note 9). Furthermore, CRANK outperforms alternative approaches that combine the metrics by approximating NP-hard rank aggregation objectives (Supplementary Note 8). Discussion The task of community prioritization is to rank-order communities detected by a community detec- tion method such that communities with best prospects in downstream analysis are ranked towards the top. We demonstrated that prioritizing communities in biological, information, and technologi- cal networks is important for maximizing the yield of downstream analyses and experiments. Prior efforts crucially depend on external meta information to calculate the quality of communities with an additional constraint that this information has to be available for all communities. We devised a principled approach for the task of community prioritization. Although the approach does not need any meta information, it can utilize such information if it is available. Furthermore, CRANK is applicable even when the meta information is noisy, incomplete, or available only for a subset of communities. The CRANK community ranking is based on the premise that high priority communities produce high values of community prioritization metrics and that these metrics are stable with respect to small perturbations of the network structure. Our findings support this premise and sug- gest that both the magnitude of the metrics and the robustness of underlying structural features have an important role in the performance of CRANK across a wide range of networks (Supple- mentary Note 8). CRANK can easily be extended using existing network metrics and can also consider new domain-specific scoring metrics (Supplementary Notes 9 and 10). Thus, it would be especially interesting to apply it to networks, where rich meta information exists and interesting domain-specific scoring metrics can be developed, such as protein interaction networks with dis- ease pathway meta information33, and molecular networks with genome-wide associations34. We believe that the CRANK approach opens the door to principled methods for prioritizing commu- nities in large networks and, when coupled with experimental validation, can help us to speed-up scientific discovery process. 9 Methods Community prioritization model CRANK prioritizes communities based on the robustness and magnitude of multiple structural features of each community. For each feature f, we specify a corresponding prioritization metric rf, which captures the magnitude and the robustness of f. Robustness of f is defined as the change in the value of f between the original network and its randomly perturbed version. The intent here is that high quality communities will have high values of f and will also be robust to perturbations of the network structure. We define and discuss specific prioritization metrics later. Here, we first present the overall prioritization model. Random perturbations of the network are based on rewiring of ↵ fraction of the edges in a degree preserving manner35 (Supplementary Note 2). Parameter ↵ measures perturbation intensity; a value close to zero indicates that the network has only a few edges rewired whereas a value close to one corresponds to a maximally perturbed network, which is a random graph with the same degree distribution as the original network. Even though the prioritization model is framed conceptually in terms of perturbing the net- work by rewiring its edges, CRANK never actually rewires the network when calculating the pri- oritization metrics. Network rewiring is a computationally expensive operation. Instead, we derive analytical expressions that evaluate the metrics in a closed form without physically perturbing the network (Supplementary Note 2), which leads to a substantial increase in scalability of CRANK. Given structural feature f, we define prioritization metric rf to quantify the change in the value of f between the original and the perturbed network. We want rf to capture the magnitude of feature f in the original network as well as the change in the value of f between the network and its perturbed version. We define prioritization metric rf for community C as: rf (C; ↵) = f (C) 1 + df (C, ↵) , (1) where f (C) is the feature value of community C in the original network, ↵ measures perturbation intensity, df (C, ↵) = f (C)f (C↵) is the change of the feature value for community C between the network and its ↵-perturbed version, and f (C↵) is the value of feature f in the ↵-perturbed version of the network. 10 Generally, higher priority communities will have higher values of rf. In particular, as f can take values between zero and one, then rf also takes values between zero and one. rf at- tains value of zero for community C whose value of f (C) is zero. When f (C) is nonzero, then rf (C; ↵) down-weights it according to the sensitivity of community C to network rewiring. f (C) is down-weighted by the largest amount when it changes as much as possible under the network perturbation (i.e., df (C, ↵) = 1). And, f (C) remains unchanged when community C is maximally robust to network perturbation (i.e., df (C, ↵) = 0). Community prioritization metrics Prioritization metric rf (C) captures the magnitude as well as the robustness of structural feature f of community C. We define four different community prioritization metrics rf. Through empirical analysis we show that these metrics holistically and non-redundantly quantify different features of network community structure (Supplementary Note 8). Each metric is necessary and contributes positively to the performance of CRANK. We combine these metrics into a global ranking of communities using a rank aggregation method that we describe later. Given a network G(V,E,C) with nodes V, edges E, and detected communities C, CRANK can be applied in conjunction with any statistical community detection method that allows for com- puting the following three quantities: (1) the probability of node u belonging to a given community C, pC(u) = p(u 2 C), (2) the probability of an edge p(u, v) = p((u, v) 2E ), and (3) a contribu- tion of community C towards the existence of an edge (u, v), pC(u, v) = p((u, v) 2E u, v 2 C). Many commonly used community detection methods allow for computing the above three quanti- ties (Supplementary Note 5). Our rationale in defining the prioritization metrics is to measure properties that determine a high quality community, which is also robust and stable with respect to small perturbations of the network. For example, a genuine high quality community should provide good support for the existence of edges between its members in the original network as well as in the perturbed version. If a small change in the network structure-an edge added here, another deleted there- can completely change the value of the prioritization metric then the community should not be considered high quality. Analogously, a high quality community should have low confidence for edges pointing outside of the community both in the original as well as in the perturbed network. 11 Community likelihood The community likelihood metric quantifies the overall connectivity of a given community. It measures the likelihood of the network structure induced by the nodes in the community. Note that the metric does not simply count the edges but considers them in a probabilistic way. As such it quantifies how well the observed edges can be explained by the community C. The intuition is that high quality community will contribute a large amount of likelihood to explain the observed edges. We formalize the community likelihood for a given community C as follows: pC(u)Yv2C sC(u, v↵), (2) where sC(u, v↵) is defined as follows: fl(C↵) =Yu2C sC(u, v↵) =8<: pC(v)pC(u, v↵) if (u, v) 2E pC(v)(1 pC(u, v↵)) if (u, v) /2E . Here, pC(u, v↵) is a contribution of community C towards the creation of edge (u, v) under net- work perturbation intensity ↵. We derive analytical expressions for pC(u, v↵) which allows us to compute their values without ever actually perturbing the network (Supplementary Note 2). Here (and for the other three prioritization metrics) we evaluate the feature in the origi- nal network (fl(C) = fl(C↵ = 0)) as well as in the slightly perturbed version of the network (fl(C↵ = 0.15)). We then combine the two scores using the prioritization metric formula in Eq. (1). Community density In contrast to community likelihood, which quantifies the contribution of a community to the over- all edge likelihood, community density simply measures the overall strength of connections within the community. By considering edge probabilities that are not conditioned on the community C, density implicitly takes into consideration potentially hierarchical and overlapping community structures. When a community is nested inside other communities, these enclosing communities contribute to the increased density of community's internal edges. Formally, we define the density of a community as the joint probability of the edges between community members. Assuming network perturbation intensity ↵, density of community C is 12 defined as: fd(C↵) = Y(u,v)2E u2C,v2C p(u, v↵), (3) where p(u, v↵) is the probability of edge (u, v) under network perturbation intensity ↵. We derive analytical expression for p(u, v↵) which allows us to compute their values without ever actually perturbing the network (Supplementary Note 2). Community boundary To complement the internal connectivity measured by community density, community boundary considers the strength of edges leaving the community. A structural feature of a high quality community is its good separation from the surrounding parts of the network. In other words, a high quality community should have sharp edge boundary, i.e. BC = {(u, v) 2E ; u 2 C, v /2 C}4. This intuition is captured by accumulating the likelihood against edges connecting the community with the rest of the network: fb(C↵) = Yu2C v2V\C (1 p(u, v↵)). (4) The evaluation of Eq. (4) takes computational time linear in the size of the network, which is impractical for large networks with many detected communities. To speed up the calculations, we use negative sampling (Supplementary Note 2) to calculate the value of Eq. (4), and thereby reduce the computational complexity of the boundary metric to time that depends linearly on the number of edges leaving the community. Community allegiance Last we introduce community allegiance. We define community allegiance as the preference for nodes to attach to other nodes that belong to the same community. Allegiance measures the fraction of nodes in a community for which the total probability of edges pointing inside the community is larger than probability of edges that point to the outside of the community. For a given community C and network perturbation intensity ↵, community allegiance is defined as: fa(C↵) = 1 CXu2C (Xv2Nu\C p(u, v↵) Xv2Nu\C p(u, v↵)), (5) where Nu is a set of network neighbors of u and is the indicator function, (x) = 1 if x is true, and (x) = 0, otherwise. 13 Community has high allegiance if nodes in the community tend to be more strongly con- nected to other members of the community than to the rest of the network. In a community with no significant allegiance this metric takes a value that is close to zero or changes substantially when the network is only slightly perturbed. However, in the presence of substantial community allegiance, the metric takes large values and is not sensitive to edge perturbation. Combining community prioritization metrics We just defined four community prioritization metrics: likelihood, density, boundary, and alle- giance. Each metric on its own provides a useful signal for prioritizing communities (Supplemen- tary Note 8). However, scores of each metric might be biased, have high variance, and behave differently across different networks (Supplementary Figure 6). It is thus essential to combine the values of individual metrics into a single aggregated score. We develop an iterative unsupervised rank aggregation method that, without requiring an external gold standard, combines the prioritization metrics into a single aggregated prioritization of communities. The method is outlined in Figure 5. It naturally takes into consideration the fact that importance of individual prioritization metrics varies across networks and across community detection methods. The aggregation method starts by representing the values of each prioritization metric with a ranked list. In each ranked list, communities are ordered by the decreasing value of the metric. The method then determines the contribution of each ranked list to the aggregate prioritization by calculating importance weights. The calculation is based on Bayes factors36–38, an established tool in statistics. Each ranked list has associated a set of importance weights. Im- portance weights can vary with rank in the list. The method then calculates the aggregated prior- itization of communities in an iterative manner by taking into account uncertainty that is present across different ranked lists and within each ranked list. To calculate the weights without requiring gold standard, the method uses a two-stage itera- tive procedure. After initializing the aggregated prioritization, the method alternates between the following two stages until no changes in the aggregated prioritization are observed: (1) use the ag- gregated prioritization to calculate the importance weights for each ranked list, and (2) re-aggregate the ranked lists based on the importance weights calculated in the previous stage. The model for aggregating community prioritization metrics, the algorithm, and the analysis of its computational time complexity are detailed in Supplementary Notes 4 and 5. The complete 14 algorithm of CRANK approach is provided in Supplementary Note 5. Code and data availability. All relevant data are public and available from the authors of orig- inal publications. The project website is at: http://snap.stanford.edu/crank. The website contains preprocessed data used in the paper and additional examples of CRANK's use. Source code of the CRANK method is available for download from the project website. 15 Figure 1: Prioritizing network communities. (a) Community detection methods take as input a network and output a grouping of nodes into communities. Highlighted are five communities, (Ca, . . . , Ce), that are detected in the illustrative network. (b) After communities are detected, the goal of community prioritization is to identify communities that are most promising targets for follow-up investigations. Promising targets are communities that are most associated with external network functions, such as cellular functions in protein-protein interaction networks, or cell types in cell-cell similarity networks. CRANK is a community prioritization approach that ranks the detected communities using only information captured by the network structure and does not require any external data about the nodes or edges of the network. However, when external information about communities is available, CRANK can make advantage of it to further improve performance (Supplementary Notes 9 and 10). CRANK starts by evaluating four different structural features of each community: the overall likelihood of the edges in the community (Likelihood), internal connectivity (Density), external connectivity (Boundary), and relationship with the rest of the network (Allegiance). CRANK can also integrate any number of additional user-defined metrics into the prioritization without any further changes to the method. (c) CRANK then applies a rank aggregation method to combine the metrics and (d) produce the final ranking of communities. 16 d n e o t a i t g a e z r i g t i r g o A i r p 4 2 3 1 5 Rank aggregation y Allegiance Prioritization metrics r a d n u o B 45 3 2 3 1 4 2 3 2 1 1 4 5 5 d Density o o h i l e k i L 4 1 3 2 5 Communities 1 5 Community rank a b c d a b c Random Conductance Modularity CRank Figure 2: Synthetic networks with planted community structure. (a)-(c) In networks with known modular structure we can evaluate community prioritization by quantifying the correspon- (a) Benchmark networks dence between detected communities and the planted communities. on N = 300 nodes are created using a stochastic block model with 10 planted communities10. Each planted community has 30 nodes, which are colored by their planted community assign- ment. Planted communities use different values for within-community edge probability pin, five use pin = 0.6 and five use pin = 0.2. As a result, planted communities with smaller within-community probability pin are harder to detect. For each benchmark network we apply a community detec- tion method6 to detect communities and then use CRANK to prioritize them. CRANK produces a ranked list of detected communities. The gold standard rank of each community is determined by how accurately it corresponds to its planted counterpart. (b) Each bar represents one detected community and the bars are ordered by CRANK's ranking with the highest ranked community located at the top and the lowest ranked community located at the bottom. As a form of valida- tion, the width of each bar corresponds to the fraction of nodes in a community that are correctly classified into a corresponding planted community, with error bars showing the 95% confidence in- tervals over 500 benchmark networks. A perfect prioritization ranks the bars by decreasing width. Notice that CRANK perfectly prioritizes the communities even though it only uses information about the network structure, and has no access to information about the planted communities. (c) Prioritization performance is measured using Spearman's rank correlation ⇢ between the gener- ated ranking and the gold standard ranking of communities. A larger value of ⇢ indicates a better performance. Across all benchmark networks, CRANK achieved average Spearman's rank corre- lation of ⇢ = 0.82. Alternative approaches resulted in poorer average performance: ranking based on modularity and conductance achieved ⇢ = 0.33 and ⇢ = 0.60, respectively, whereas random prioritization obtained ⇢ = 0.00. 17 Community rank in CRank prioritization Fraction of correctly assigned nodes Spearman's rank correlation ρ 1 2 3 4 5 6 7 8 9 10 0.2 0.4 0.6 0.8 0.0 a b c Figure 3: Prioritizing network communities in the network of medical drugs. (a) The network of medical drugs connects two drugs if they share at least one target protein. Communities were detected by a community detection method7, and then prioritized by CRANK. Highlighted are five highest ranked communities as determined by CRANK. Nodes of the highlighted communities are sized by their score of the Likelihood prioritization metric (Supplementary Note 3). Investigation reveals that these communities contain drugs used to: treat asthma and allergies (e.g., prednisone, ciclesonide; yellow nodes), induce anaesthesia or sedation (e.g., clobazam, etomidate, sevoflurane, acamprosate; magenta nodes), block neurotransmitters in central and peripheral nervous systems (e.g., physostigmine, minaprine, gallamine triethiodide; red nodes), block the activity of mus- carinic receptors (e.g., acidinium; green nodes), and activate dopamine receptors (e.g., ropinirole; blue nodes). (b-c) We evaluate community prioritization against three external chemical databases (Supplementary Note 6) that were not used during community detection or prioritization. For each community we measure: (1) drug-drug interactions between the drugs ("Epistasis"), (2) chemical structure similarity of the drugs ("Chemistry"), and (3) associations between drugs derived from text data ("Text"). We expect that a true high-priority community will have more drug-drug in- teractions, higher similarity of chemical structure, and stronger textual associations between the drugs it contains. Taking this into consideration, the external chemical databases define three gold standard rankings of communities against which CRANK is evaluated. Bars represent communi- ties; bar height denotes similarity of drugs in a community with regard to the gold standard based on external chemical databases. In a perfect prioritization, bars would be ordered such that the heights would decrease from left to right. (b) CRANK ranking of drug communities outperforms ranking by modularity (c) across all three chemical databases (as measured by Spearman's rank correlation ⇢ with the gold standard ranking). CRANK ranking achieves ⇢ = 0.38, 0.31, 0.53, while modularity obtains ⇢ = 0.03,0.06,0.35. 18 Gallamine Triethiodide Mifepristone Acamprosate Etomidate Ciclesonide Prednisone Sevoflurane Clobazam Minaprine Physostigmine Aclidinium Ropinirole Epistasis Chemistry Text Drug communities ranked by Modularity Drug communities ranked by CRank ρ=0.38 p-value=3.3 x 10-4 ρ=0.31 p-value=9.1 x 10-4 ρ=0.53 p-value=4.3 x 10-8 ρ=-0.03 p-value=8.1 x 10-1 ρ=-0.35 p-value=1.5 x 10-3 Epistasis Chemistry Text ρ=-0.06 p-value=5.9 x 10-1 Figure 4: Prioritizing network communities in the megascale cell-cell similarity network. The network of embryonic mouse brain has 1,306,127 nodes representing brain cells29. Communities are detected using a community detection method developed for single-cell RNA-seq data8 and prioritized using CRANK, generating a rank-ordered list of detected communities. (a-c) Shown are three communities that are ranked high by CRANK; (a) rank 1, (b) rank 2, and (c) rank 3 community. t-SNE projections39 show cells assigned to each community. t-SNE is a dimensional- ity reduction technique that is particularly well suited for visualization of high-dimensional data. Cells assigned to each community are distinguished by color, and all other cells are shown in grey. We investigate the quality of community ranking by examining gene markers for cells in each community28. We use the single-cell RNA-seq dataset to obtain a gene expression profile for each cell, indicating the activity of genes in the cell. For each community we then identify marker genes, i.e., genes with the strongest differential expression between cells assigned to the community and all other cells9. In the t-SNE projection we then color the cells by how active the marker genes are. This investigation reveals that communities ranked high by CRANK are represented by clusters of cells whose marker genes have a highly localized expression. For example, marker genes for rank 1 community in (a) (the highest community in CRANK ranking) are TYROBP, C1QB, C1QC, FCER1G and C1QA. Expression of these genes is concentrated in cells that belong to the rank 1 community. Similarly, marker genes for rank 2 and rank 3 communities are specifically active in cell populations that match well the boundary of each community. (d-f) t-SNE projections show cells assigned to 3 low-ranked communities; (d) rank 139, (e) rank 140, and (f) rank 141 com- munity. t-SNE projections are produced using the same differential analysis as in (a-c). Although these communities correspond to clusters of cells in the t-SNE projections, their marker genes have diluted gene expression that is spread out over the entire network, indicating that CRANK has cor- rectly considered these communities to be low priority. For example, marker genes for rank 141 community in (f) are OPCML, TMSB4X, NYM, CCK, and CNTN2, which show a weak expression pattern that is diffused across the entire network. 19 Figure 5: Combining community prioritization metrics without an external gold standard. (a) The rank aggregation algorithm starts with four ranked lists of communities, Rr, each one arising from the values of a different community prioritization metric r (where r is one of "l" – likelihood, "d" – density, "b" – boundary, "a" – allegiance). Communities are ordered by the decreasing value of the metric. We use C to indicate the rank of an illustrative community by the community prioritization metrics and at different stages of the algorithm. (b) Each ranked list is partitioned into equally sized groups, called bags. Each bag i in ranked list Rr has attached importance weight r whose initial values are all equal (represented by black bars all of same width). CRANK K i uses the importance weights K i r to initialize aggregate prioritization R as a weighted average of community ranks Rl, Rd, Rb, Ra. (c) The top ranked communities (denoted as dotted cells) in the aggregated prioritization R serve as a temporary gold standard, which is then used to iteratively r. (d) In each iteration, CRANK updates importance weights update the importance weights K i using the Bayes factor calculation36 (Supplementary Note 4). Given bag i and ranked list Rr, CRANK updates importance weight K i r, based on how many communities from the temporary gold standard appear in bag i. Updated importance weights then revise the aggregated prioritization in r Rr(C), where K ir(C) indicates the importance weight of bag ir(C) of community C for metric r, and Rr(C) is the rank of C according to r. By using an iterative approach, CRANK allows for the importance of a metric not to be predetermined and to vary across communities. which the new rank R(C) of community C is expressed as: R(C) =Pr log K ir(C) r 20 Acknowledgements. M.Z., R.S., and J.L. were supported by NSF, NIH BD2K, DARPA SIM- PLEX, Stanford Data Science Initiative, and Chan Zuckerberg Biohub. Author contribution. M.Z., R.S. and J.L. designed and performed research, contributed new analytic tools, analyzed data, and wrote the paper. Author information. The authors declare no conflict of interest. Correspondence should be addressed to J.L. ([email protected]). Additional information. Supplementary Notes contain a detailed description of the community prioritization approach, descriptions of datasets, experimental setup, and additional experiments. Supplementary Table 1 contains detailed community prioritization results for the medical drug network. Code to run CRANK and examples are at: http://snap.stanford.edu/crank. 1. Benson, A. R., Gleich, D. F. & Leskovec, J. Higher-order organization of complex networks. Science 353, 163–166 (2016). 2. Menche, J. et al. Uncovering disease-disease relationships through the incomplete interac- tome. Science 347, 1257601 (2015). 3. Costanzo, M. et al. A global genetic interaction network maps a wiring diagram of cellular function. Science 353, 1381 (2016). 4. Fortunato, S. Community detection in graphs. Physics Reports 486, 75–174 (2010). 5. Newman, M. E. Modularity and community structure in networks. Proceedings of the National Academy of Sciences 103, 8577–8582 (2006). 6. Gopalan, P. K. & Blei, D. M. Efficient discovery of overlapping communities in massive networks. Proceedings of the National Academy of Sciences 110, 14534–14539 (2013). 7. Yang, J., McAuley, J. & Leskovec, J. Detecting cohesive and 2-mode communities indirected and undirected networks. In Proceedings of the 7th ACM International Conference on Web Search and Data Mining, 323–332 (2014). 8. Levine, J. H. et al. Data-driven phenotypic dissection of aml reveals progenitor-like cells that correlate with prognosis. Cell 162, 184–197 (2015). 9. Satija, R., Farrell, J. A., Gennert, D., Schier, A. F. & Regev, A. Spatial reconstruction of single-cell gene expression data. Nature Biotechnology 33, 495–502 (2015). 10. Newman, M. & Clauset, A. Structure and inference in annotated networks. Nature Communi- cations 7, 11863 (2016). 11. Rolland, T. et al. A proteome-scale map of the human interactome network. Cell 159, 1212– 1226 (2014). 21 12. Subramanian, A. et al. Gene set enrichment analysis: a knowledge-based approach for inter- preting genome-wide expression profiles. Proceedings of the National Academy of Sciences 102, 15545–15550 (2005). 13. Glaab, E., Baudot, A., Krasnogor, N., Schneider, R. & Valencia, A. EnrichNet: network-based gene set enrichment analysis. Bioinformatics 28, 451–457 (2012). 14. Baryshnikova, A. Systematic functional annotation and visualization of biological networks. Cell Systems 2, 412–421 (2016). 15. Hofree, M. et al. Network-based stratification of tumor mutations. Nature Methods 10, 1108– 1115 (2013). 16. Ashburner, M. et al. Gene Ontology: tool for the unification of biology. Nature Genetics 25, 25–29 (2000). 17. Regev, A. et al. The Human Cell Atlas. bioRxiv 121202 (2017). 18. da Silva, R. R., Dorrestein, P. C. & Quinn, R. A. Illuminating the dark matter in metabolomics. Proceedings of the National Academy of Sciences 112, 12549–12550 (2015). 19. Layeghifard, M., Hwang, D. M. & Guttman, D. S. Disentangling interactions in the micro- biome: a network perspective. Trends in Microbiology 25, 217–228 (2017). 20. Aksenov, A. A., da Silva, R., Knight, R., Lopes, N. P. & Dorrestein, P. C. Global chemical analysis of biology by mass spectrometry. Nature Reviews Chemistry 1, s41570–017 (2017). 21. Schaeffer, S. E. Graph clustering. Computer Science Review 1, 27–64 (2007). 22. Guney, E., Menche, J., Vidal, M. & Bar´abasi, A.-L. Network-based in silico drug efficacy screening. Nature Communications 7 (2016). 23. Law, V. et al. DrugBank 4.0: shedding new light on drug metabolism. Nucleic Acids Research 42, 1091–1097 (2014). 24. Erkinjuntti, T. et al. Efficacy of Galantamine in probable vascular dementia and Alzheimer's disease combined with cerebrovascular disease: a randomised trial. The Lancet 359, 1283– 1290 (2002). 25. Cecilia Rodrigues Simoes, M. et al. Donepezil: an important prototype to the design of new drug candidates for Alzheimer's disease. Mini Reviews in Medicinal Chemistry 14, 2–19 (2014). 26. Kessenbrock, K. et al. Diverse regulation of mammary epithelial growth and branching mor- phogenesis through noncanonical Wnt signaling. Proceedings of the National Academy of Sciences 114, 3121–3126 (2017). 27. Kellis, M. et al. Defining functional DNA elements in the human genome. Proceedings of the National Academy of Sciences 111, 6131–6138 (2014). 28. Trapnell, C. Defining cell types and states with single-cell genomics. Genome Research 25, 1491–1498 (2015). 22 29. Zheng, G. X. et al. Massively parallel digital transcriptional profiling of single cells. Nature Communications 8, 14049 (2017). 30. Haghverdi, L., Buettner, M., Wolf, F. A., Buettner, F. & Theis, F. J. Diffusion pseudotime robustly reconstructs lineage branching. Nature Methods 13, 845–848 (2016). 31. Zeisel, A. et al. Cell types in the mouse cortex and hippocampus revealed by single-cell RNA-seq. Science 347, 1138–1142 (2015). 32. Ma, J., Jiang, T., Tan, L. & Yu, J.-T. TYROBP in Alzheimer's disease. Molecular Neurobiol- ogy 51, 820–826 (2015). 33. Agrawal, M., Zitnik, M. & Leskovec, J. Large-scale analysis of disease pathways in the human interactome. In Pacific Symposium on Biocomputing, vol. 23, 111 (World Scientific, 2018). 34. Choobdar, S. et al. Open community challenge reveals molecular network modules with key roles in diseases. bioRxiv 265553 (2018). 35. Karrer, B., Levina, E. & Newman, M. E. Robustness of community structure in networks. Physical Review E 77, 046119 (2008). 36. Kass, R. E. & Raftery, A. E. Bayes factors. Journal of the American Statistical Association 90, 773–795 (1995). 37. Berger, J. O. & Pericchi, L. R. The intrinsic bayes factor for model selection and prediction. Journal of the American Statistical Association 91, 109–122 (1996). 38. Casella, G. & Moreno, E. Assessing robustness of intrinsic tests of independence in two-way contingency tables. Journal of the American Statistical Association 104, 1261–1271 (2012). 39. Maaten, L. v. d. & Hinton, G. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 2579–2605 (2008). 23 Supplementary materials for Prioritizing network communities Marinka Zitnik,1 Rok Sosic,1 Jure Leskovec1,2,⇤ 1Computer Science Department, Stanford University 2Chan Zuckerberg Biohub, San Francisco, CA ⇤Corresponding author. E-mail: [email protected] This PDF file includes: Supplementary Notes 1 to 11 Supplementary Figures 1 to 8 Supplementary Tables 1 to 9 References Other supporting material for this manuscript includes the following: Supplementary Table with prioritization results for the medical drug network Supplementary Note 1 Document outline In this document, we present a detailed description of the community prioritization approach, dis- cussion of the datasets used and their analysis. First, we describe a network perturbation model used by CRANK and then derive expressions for edge probabilities in this model (Supplementary Note 2). The derived expressions enable us to estimate edge probabilities in a perturbed network in a closed form manner. These estimates are essential components of CRANK community priori- tization metrics. We then provide details on computing the metrics, beyond those presented in the main text (Supplementary Note 3). We proceed by describing CRANK rank aggregation method (Supplementary Note 4). Its role is to combine the metric scores and form an aggregated prior- itization of communities. We then provide a detailed description of complete CRANK approach (Supplementary Note 5). We describe network data used in experiments (Supplementary Note 6). We outline experi- mental setup, overview community detection methods considered in the paper, and describe alter- native techniques for community prioritization and for rank aggregation (Supplementary Note 7). Finally, we present further results of empirical evaluations. In Supplementary Note 8 we report additional experiments on real-world networks, and we further investigate CRANK's prop- erties. In Supplementary Note 9 we show how to integrate any number of additional user-defined metrics into CRANK without requiring further technical changes to the CRANK model. In Sup- plementary Note 10 we show how CRANK can use domain-specific or other meta and label infor- mation to supervise community prioritization. In Supplementary Note 11 we describe additional experiments on medical, social, and information networks, beyond those presented in the main text. Supplementary Note 2 Network perturbation model Our goal in this note is to find closed form expressions that will enable us to analytically quantify how stable are communities if the network is perturbed. These expressions are important because they allow us to avoid instantiating any of the perturbed networks when computing community prioritization metrics. Consequently, CRANK easily scales to large networks. Notice that our ability to analytically compute perturbation effects offers significant improve- ment over established methods, such as, for example, methods for evaluating the quality of network community structure1–6. Methods of this kind explicitly perturb the network many times. They evaluate the quality of community structure by partitioning an entire network, applying the net- work rewiring model many times, materializing hundreds of perturbed networks and then running S2 community detection repeatedly on all perturbed network versions. Such methods, however, can suffer from expensive computation and are computationally prohibitive for large networks. Details are provided next. Supplementary Note 2.1 Network perturbation We start by describing a network perturbation model that can perturb an arbitrary network by an arbitrary amount based on network's node degree distribution. To formulate the probabilities of edges potentially arising when perturbing an arbitrary network by an arbitrary amount we consider a network rewiring model. We restrict our perturbed networks to have the same number of nodes and edges as the original unperturbed network, only edges are randomly rewired. We measure perturbation intensity by a parameter ↵, where a value of ↵ close to zero indicates that a network is perturbed by only a small amount and has only a few edges rewired. Perturbation intensity close to one corresponds to a perturbed network, which is almost completely random and uncorrelated with the original network. Given a network G(V,E), whose nodes are given by V and edges by E, we denote the net- work resulting from ↵-perturbing edges in G as: G(↵) = G(V,E(↵)), 0  ↵  1. ↵ denotes perturbation intensity. This means that G(0) (i.e., ↵ = 0) is identical to the original network, G(0) = G, since no edge has changed its position in the network, whereas G(1) (i.e., ↵ = 1) is a maximally perturbed network obtained by rewiring all edges in G such that node degree distribu- tion of G is preserved in G(1). Given ↵, we specify the network G(↵) by perturbing the network G as follows2. We consider each edge (u, v) 2E in network G in turn and either: • with probability ↵ we add an edge (u0, v0) to G(↵) such that the probability of edge falling between nodes u0 and v0 is eu0v0/m, or • with probability 1 ↵ we add an edge (u, v) to G(↵). Here, eu0v0 = ku0kv0/(2m), where ku0 is the degree of node u0 in G, denoted also as ku0 = Nu0, and m is the number of edges in network G, m = E. This network rewiring model generates networks G(↵) that not only have the same number of edges as the original network G, but in which the expected degrees of nodes are the same as the original degrees2. Supplementary Note 2.2 Statistical community detection model Let us suppose we are given a network G(V,E), and a community detection model M that detects communities C, C = {C; C ✓V} , in network G. Here, every community C is given by a set of its member nodes. S3 We assume that M is a statistical community detection model (e.g.,7–19). In that case, M allows us to evaluate: (1) the probability of node u belonging to a community C, pC(u) = p(u 2 C), (2) the probability of an edge, p(u, v) = p((u, v) 2E ), and (3) the probability of an edge from node u to node v conditioned on nodes' joint affiliation with a community C. We denote the latter probability as pC(u, v) = p((u, v) 2E u 2 C, v 2 C) and view it as a contribution of community C towards the creation of edge (u, v). Commonly used community detection methods, like the Stochastic Block Model7, 10, 16, 20, 21, Affiliation Graph Model8, 9, Latent Feature Graph Model11–15, and Attributed Graph Model17–19 all allow for computing the above three quantities. Next, we use the quantities (1)–(3) to specify edge probabilities and node-community affili- ation probabilities arising under the network perturbation model from Supplementary Note 2.1. Supplementary Note 2.3 Edge probabilities in perturbed network We express the probability of an edge (u, v) appearing in a perturbed network G(↵) as a function of the probability of edge (u, v) appearing in the original network G and of perturbation intensity ↵. The expressed probability is denoted as p(u, v↵). There are two ways by which nodes u and v can be connected with an edge (u, v) in the perturbed network G(↵). If an edge (u, v) exists in G, then with probability 1 ↵ the edge is retained during perturbation. Otherwise, nodes u and v can connect in G(↵) as a result of network rewiring as described in Supplementary Note 2.1. In the latter case, edge (u, v) appears in G(↵) if it is a replacement for any of the expected ↵m edges that change their original positions in network G. This reasoning gives us the probability of edge (u, v) emerging in perturbed network G(↵) as: p(u, v↵) = p(u, v)(1 ↵) + (1 p(u, v))(1 (1 euv m )↵m), (1) where euv is equal to euv = kukv/(2m). Notice that expression in Eq. (1) approximates probability of an edge in a perturbed network. This is because it considers the expected fraction of rewired edges in a perturbed network, but it ignores variance and skewness of rewiring distribution. We empirically validated the expression by comparing it with results obtained by explicitly perturbing the network many times. We observed that analytical expression for the edge probability in Eq. (1) led to an accurate estimation of empirical results for most considered real-world networks. An approach, analogous to the derivation of probability p(u, v↵), also gives us the proba- bility that a community C detected in the original network G generates a particular edge in the perturbed network G(↵). Probability pC(u, v↵) that an edge (u, v) whose both endpoints belong S4 to community C is included in the perturbed network can be written as: pC(u, v↵) = pC(u, v)(1 ↵) + (1 pC(u, v))(1 (1 euv m )↵m). (2) We use expressions in Eq. (1) and Eq. (2) to specify the probability of an edge (u, v) whose endpoints belong to community C as: s(1) C (u, v↵) = p((u, v) 2E (↵), u 2 C, v 2 C) = pC(u)pC(v)pC(u, v↵). (3) Likewise, the probability of a non-edge between nodes u and v that are both assigned to a commu- nity C is equal to: s(2) C (u, v↵) = p((u, v) 62 E(↵), u 2 C, v 2 C) = pC(u)pC(v)(1 pC(u, v↵)). (4) Recall that ↵ measures the intensity of network perturbation. By varying the value for ↵, the intensity of network perturbation is interpolated between two extreme cases: • ↵ = 1 corresponds to a perturbation that generates a network G(1), whose edge probabilities as returned by Eq. (1–2) are completely determined by the perturbation model. • ↵ = 0 corresponds to a perturbation the regenerates the original network, G(0) = G, meaning that edge probabilities as returned by Eq. (1–2) are exactly the same as in the original network, e.g., p(u, v↵ = 0) = p(u, v). Supplementary Note 3 Structural features of network communities CRANK prioritizes communities based on the robustness and magnitude of multiple structural features of each community. CRANK defines community prioritization metrics, which capture key structural features and characterize network connectivity for each community. In this note we provide further details on two metrics, beyond those presented in the main text. Supplementary Note 3.1 Further details on computing community likelihood The main text defines community likelihood that is calculated for each community. We also define likelihood score of every node in a given community. Likelihood score of a node u in a community C is the product of community-dependent probabilities of both edges and non-edges adjacent to node u: sC(u, v↵) (5) nl(uC, ↵) = pC(u)Yv2C S5 where sC(u, v↵) is defined as follows: sC(u, v↵) =( s(1) C (u, v↵)/pC(u) if (u, v) 2E s(2) C (u, v↵)/pC(u) if (u, v) /2E , C and s(2) where s(1) C are defined in Eq. (3) and Eq. (4), respectively. The node likelihood formula nl gives us an alternative way to express community likelihood. That is, likelihood of community C, fl(C↵), can be seen as a product of likelihood scores for all the nodes that are affiliated with C: fl(C↵) =Qu2C nl(uC, ↵). Supplementary Note 3.2 Further details on computing community boundary The evaluation of formula for community boundary fb(C↵) takes computational time linear in the size of the network, which is impractical for large networks with many detected communities. To speed up the calculations, we use negative sampling to calculate the value of fb(C↵), and thereby reduce the computational complexity of the boundary metric to time that depends linearly on the number of edges leaving the community. We use negative sampling22–24 to obtain a computationally efficient approximation of com- munity boundary. In general, negative sampling can be used to approximate a function whose evaluation takes into consideration the entire universe of objects in a domain, such as all nodes in a large network. We calculate community boundary fb using the negative sampling as: fb(C↵) = Yu2C v2V\C,(u,v)2E (1 p(u, v↵)) k Y u2C i=1 (1 p(u, vi↵)), (6) where PC is a noise distribution from which k nodes vi are drawn, vi ⇠ PC. Formula Eq. (6) is used to replace community boundary formula given in the main text. Noise distribution PC is a uniform distribution defined over the non-edge boundary TC = {v; v 2V \ C, @u 2 C : (u, v) 2 E}. Formula fb considers k non-edges for each node in community C. Our experiments indicate that values of k in the range 5–20 are useful for small networks, while for large networks the value of k can be as small as 2–5. This observation is aligned with the previous work in negative sampling22–24. In other words, Eq. (6) says that when computing community boundary fb, for a given node u 2 C, we consider all nodes that lie outside of C but are connected with node u (i.e., first product term in Eq. (6)), and also randomly selected nodes that are neither assigned to C nor linked with u (i.e., second product term in Eq. (6)). The latter nodes are selected uniformly at random from the set TC. This formulation posits that a high quality community should have sharp edge boundary25. S6 Importantly, the formula in Eq. (6) allows us to reduce computational time complexity of community boundary for a given node u from being proportional to the number of nodes in the network (i.e., V) to being proportional to the size of community C plus the number of random non-edges (i.e., C+k). Since communities in real-world settings are much smaller than the entire network, negative sampling allows us to scale community boundary to large networks. Supplementary Note 4 Rank aggregation model Prioritization of communities involves measuring different network structural features of commu- nities. The features are measured by four prioritization metrics: community likelihood, community density, community boundary and community allegiance. Next, we describe how to combine the scores of different metrics into an aggregated prioritization of communities. The simplest approach to combining the metrics is to treat all the metrics equally and av- erage their scores. While such an approach does not need any external gold standard ranking of communities it can be unacceptably sensitive to noise and outliers (Supplementary Note 8.4). One alternative is to evaluate individual metrics against an external gold standard ranking. However, we need to examine all the communities and rank them in order to obtain the gold standard, which is precisely the task we try to avoid. We adopt a statistical approach and propose a rank aggregation method that combines the scores of different metrics. Furthermore, our proposed rank aggregation method operates without requiring a gold standard ranking of communities. Details are provided next. Supplementary Note 4.1 Ranked lists of communities The rank aggregation method starts with four ranked lists, one from each of the four prioritization metrics, where communities are ordered by their scores such that communities with the highest score are at the beginning of each list. The rank of a community is its position in the list. Given the scores rf for a network structural feature f, the ranked list Rr is: Rr(C) = 1 +XD6=C I(rf (C; ↵)  rf (D; ↵)) for C 2C , (7) signifying that Rr(C) is the rank of community C according to the scores of metric r. The function I is the indicator function, such that I(X) = 1 if X is true and I(X) = 0 otherwise, and C is the set of all communities found in a given network by a given community detection method. To assign ranks to communities with tied scores, we consider the average of the ranks that would have been assigned to all the tied communities and assign this average to each community. Given the ranked lists Rl, Rd, Rb and Ra, we wish to combine the ranked lists into a single S7 ranked list R. The ranked list R is CRANK's final result representing the aggregated prioritization of communities. Supplementary Note 4.2 Background on Bayes factors We proceed by describing the Bayes factors, a tool in statistics26–30, that is the centerpiece of our method for combining prioritization metrics. We use Bayes factors to estimate the weights to be attached to the ranked lists of communities so that we can obtain the aggregated prioritization of communities that takes account of uncertainty present in the ranked lists arising from different prioritization metrics. Supplementary Note 4.2.1 The Bayes factor of one ranked list We begin with a single ranked list Rr, assumed to have arisen under one of the two hypotheses H 1 r and H 2 r ), respectively. Using the Bayesian formulation30, the two hypotheses are: r according to probability density p(RrH 1 r ) and p(RrH 2 H 1 r H 2 r – Scores of metric r match the gold standard R⇤, – Scores of metric r do not match the gold standard R⇤. (8) (9) Here, R⇤ is a ranked list representing the gold standard ranking of communities. For now, we assume that the gold standard R⇤ is given, we will later in Supplementary Note 4.4 discuss how to r ) when the gold standard R⇤ is not avail- determine probability densities p(RrH 1 able. r ) and p(RrH 2 Given prior probabilities p(H 1 r ) and p(H 2 rRr) and p(H 2 probabilities p(H 1 rRr) = 1 p(H 1 the prior probability using the Bayes' theorem as: p(RrH i r )p(H 1 rRr) = p(H i r)p(H i r) r ) = 1p(H 1 r ), the ranked list Rr produces posterior rRr). The posterior probability can be related to p(RrH 1 r ) + p(RrH 2 r )p(H 2 r ) . (i = 1, 2) (10) In the odds scale30 (odds = probability / (1 - probability)), the relation of posterior probability to prior probability takes the following form: p(H 1 p(H 2 rRr) rRr) = p(RrH 1 r ) p(RrH 2 r ) p(H 1 r ) p(H 2 r ) . (11) This means that transformation of the prior odds to the posterior odds involves multiplication by a factor: Kr = , (12) p(RrH 1 r ) p(RrH 2 r ) S8 which is known as the Bayes factor26, 28, 31, 32 for comparing hypotheses H 1 Eq. (11) is equal to: r and H 2 r . Thus, in words, posterior odds = Bayes factor ⇥ prior odds, (13) which means that the Bayes factor Kr can also be written as the ratio of the posterior odds to the prior odds: Kr = p(H 1 p(H 2 rRr) rRr) p(H 2 r ) p(H 1 r ) , (14) and can be used to quantify the evidence26 provided by ranked list Rr in favor of hypothesis H 1 r . We use the Bayes factor Kr to measure the relative success of H 1 r at predicting the gold standard ranking R⇤: a Bayes factor greater than 1 means that the ranked list Rr provides greater evidence for H 1 r , whereas a Bayes factor less than 1 means that the ranked list Rr provides greater evidence for H 2 r . r and H 2 Supplementary Note 4.3 Aggregating ranked lists We adopt a statistical approach to combine the ranked lists arising from different prioritization metrics. The approach specifies the Bayes factor for each ranked list following the exposition in Supplementary Note 4.2.1. a, H 2 When several metrics are considered, the Bayes factors are obtained as follows. Given ranked b ), and lists Rl, Rd, Rb and Ra, we consider pairs of hypotheses (H 1 a). The meaning of a hypothesis pair for metric r is described in Eq. (8) and Eq. (9). We (H 1 a as compare each of H 1 described in Supplementary Note 4.2.1. Using the formula in Eq. (12), this procedure yields the Bayes factors Kl, Kd, Kb and Ka. Following Eq. (10), we then calculate the posterior probability of H 1 r , i.e., the posterior probability that ranked list Rr matches the gold standard R⇤, as: a in turn with the corresponding hypothesis H 2 d ), (H 1 l ), (H 1 b , H 2 l , H 2 d, H 2 b , H 2 b , H 1 l , H 1 d , H 1 l , H 2 d , H 2 p(H 1 rRl, Rd, Rb, Ra) = , (15) ↵rKrPr0 ↵r0Kr0 r )/p(H 2 r ) is the prior odds for H 1 where ↵r = p(H 1 r , and r0 goes over all considered metrics, r0 2{ l, d, b, a}. In this paper, we take all the prior odds ↵r equal to 1. Although this is a natural choice, we note that other values of ↵r may be used to reflect prior information about the relative plausibility of different ranked lists. r against H 2 The probabilities given by Eq. (15) lead directly to the prediction that takes account of uncer- tainty in the metrics26, 30. Recall that we want to aggregate ranked lists Rl, Rd, Rb, Ra into a single ranked list R representing the aggregated prioritization of communities, i.e., the final prediction of S9 CRANK. This means we would like to calculate the probability of the aggregated prioritization R conditioned on the information provided by the ranked lists. This probability can be written as: p(RRl, Rd, Rb, Ra) =Xr0 p(RRl, Rd, Rb, Ra, H 1 r0)p(H 1 r0Rl, Rd, Rb, Ra), (16) where we account for uncertainty by weighting each ranked list by how well it matches the gold standard R⇤. We specify the posterior probability p(H 1 r0Rl, Rd, Rb, Ra) using the Bayes factor from Eq. (15). Finally, combining Eq. (15) and Eq. (16), we can write the probability for aggre- gated prioritization R as: R = Pr0 Kr0Rr0 Pr0 Kr0 p(RRl, Rd, Rb, Ra) = Pr0 Kr0 p(RRl, Rd, Rb, Ra, H 1 r0) Pr0 Kr0 The posterior probabilities expressed through Bayes factors favor those ranked lists that better match the gold standard R⇤. Examining Eq. (17), we see that ranked lists are aggregated as a weighted average with weights being equal to the Bayes factors of the ranked lists, i.e., weight for ranked list Rr is equal to Kr/(Pr0 Kr0). This means that the aggregated prioritization R is a weighted average of the ranked lists Rl, Rd, Rb, and Ra: . (17) . (18) In the next section, we describe how to determine the aggregated prioritization when the gold standard R⇤ is not available, and how to learn the weights for each ranked list that vary with rank (i.e., position) in the list. Supplementary Note 4.4 Estimating importance weights We proceed by explaining how to estimate in practice the Bayes factors needed to calculate the aggregated prioritization. For that, we introduce importance weights, which follow directly from the Bayes factors described above. Supplementary Note 4.4.1 Lack of gold standard community ranking In order to aggregate the ranked lists of communities we need to calculate the Bayes factors that appear in the aggregated prioritization formula in Eq. (17) and Eq. (18). The evaluation of the Bayes factors entails computing the posterior probability for each ranked list. As we explain next, the calculation of the posterior probability requires a priori knowledge, which is practically impossible to obtain. The Bayes factor Kr of ranked list Rr is defined as the evidence provided by the ranked list Rr in favor of the gold standard R⇤ (see Supplementary Note 4.2). Here, the gold standard R⇤ is a S10 ranked list that orders communities found in a network in the decreasing order of their importance for further investigation in the follow-up studies. Intuitively, community that ranks higher in R⇤ should be better at representing a structure that carries a meaning in a given network (e.g., a disease causing pathway of proteins in a protein-protein interaction network, or, a group of functionally similar products in the Amazon product co-purchasing network) than community that ranks lower in R⇤. However, it is practically impossible to a priori know which detected communities rank at the top of the gold standard R⇤. In order to obtain such a gold standard ranking of communities, we need to examine all the communities by performing potentially costly and time consuming experiments. These experiments would allow us to determine for each community whether it corresponds to a meaningful network structure. Afterwards, we would construct the gold standard R⇤ by ranking the communities based on the outcomes of the experiments. These experiments may render construction of the gold standard R⇤ difficult or even impossible in practice. Furthermore, as the aim of community prioritization is to avoid the need to perform all the experiments, the ability to prioritize communities should not depend on the availability of R⇤. We therefore resort to a different approach. Supplementary Note 4.4.2 Bootstrapping the importance weights We describe an approach that resolves the problem of aggregating ranked lists when the gold standard community ranking is not available. The approach takes as its input the ranked lists and it estimates the weights (i.e., Bayes factors Kr) for each ranked list, which vary with rank in the list, in an unsupervised manner. This means the approach does not require communities with top aggregated ranks to be known a priori. The approach uses a two-stage bootstrapping process to estimate the weights for each ranked list. This is achieved based on the ranked list decomposition rather than based on a gold standard community ranking. Details are provided next. Decomposing ranked lists into bags. Each ranked list is partitioned into equally sized groups of communities that we call bags. Formally, bags correspond to sets of communities. The ranked list Rr is partitioned into B bags. The j-th bag contains a subset of communities: Bj r = {C 2C ;dRr(C) · b/Ce = j/C} for j = 1, 2, . . . , B, (19) where d·e is the ceiling operator. It is possible that the last bag BB r contains more than C/B communities. Within a bag, the ordering of communities is not important. Additionally, each community in bag Bj r has the same value of the importance weight K j r, which we explain next. S11 Two-stage bootstrapping process. The approach consists of two stages: 1. Compute the importance weights for each ranked list using the current aggregated prioritization, 2. Re-aggregate the ranked lists based on the importance weights computed in the previous stage. After initializing the aggregated prioritization, the approach alternates between the two stages until no changes in the aggregated prioritization are observed. Stage 1: Estimating importance weights of bags. In each iteration, the bootstrapping approach uses the current aggregated prioritization to re-compute the importance weight for each bag. This is done as follows. First, a temporary gold standard is constructed based on top ranked communities in the current aggregated prioritization. A temporary gold standard T is a set containing ⇡C communities that rank at the top in the current aggregated prioritization R: T = {C 2C ; R(C)  ⇡C}, where R(C) is the rank of community C in the current aggregated prioritization R. Here, ⇡, 0 < ⇡< 1, is a parameter representing the fraction of highest ranked communities used to construct the temporary gold standard T . We formulate the importance weight for each bag following the Bayes factor formulation r for ranked list Rr and bag j compares r,j. The hypotheses given in Supplementary Note 4.2. The importance weight K j the hypotheses H 1 H 1 r,j are defined as in Supplementary Note 4.2 and have the following meaning: r,j by evaluating the evidence in favor of hypothesis H 1 r,j and H 2 r,j and H 2 H 1 r,j H 2 r,j – Bag Bj – Bag Bj r matches the temporary gold standard T , r does not match the temporary gold standard T . The importance weight K j r is the ratio of the posterior odds of hypothesis H 1 r,j to its prior odds: K j r = p(H 1 p(H 2 r,jRr) r,jRr) p(H 2 p(H 1 r,j) r,j) . (20) r = T \ Bj r. This means that, in each iteration, N j r the overlap between communities assigned to bag Bj Let us denote by N j r and communities in the temporary gold standard T , that is, N j r contains all the temporarily gold standard communities that rank as the j-th bag in ranked list Rr. Following Eq. (20), we calculate the importance weight K j r for ranked list Rr and bag j as: N j r + 1 r N j S12 r + 1 · 1 ⇡ ⇡ Bj K j r = . (21) Comparing the formula for the Bayes factor in Eq. (20) with the formula in Eq. (21), we can r,jRr) by the fraction of com- r,jRr) = (N j r + 1). r,jRr) by the fraction of communities in r+1). Additionally, r N j see the following. Equation (21) approximates the probability p(H 1 munities in bag Bj r that are in the temporary gold standard T , p(H 1 Similarly, Equation (21) approximates the probability p(H 2 bag Bj r,jRr) = (Bj a smoothing value of one is added to prevent a division by zero. r that are not in the gold standard T , p(H 2 r + 1)/(Bj r+1)/(Bj It can also be seen from Eq. (21) that ⇡, defined above as the relative size of temporary gold standard T , ⇡ = T/C, actually corresponds to the prior probability of hypothesis H 1 r,j. Stage 2: Aggregating ranked lists. In the second stage of the bootstrapping process, the approach aggregates the ranked lists based on the calculated importance weights. Following the rank aggre- gation model presented in Supplementary Note 4.3, the ranked lists are aggregated according to Eq. (17). More concretely, ranked lists are combined into the aggregated prioritization R using the formula: log K ir(C) r Rr(C), (22) R(C) =Xr r where K ir(C) is the importance weight of the bag ir(C) to which community C is assigned in ranked list Rr. Here, R(C) represents the aggregated rank of community C. Note that the ag- gregation formula uses the log importance weights, which correspond to predictive scores26, 28 that favor those bags in the ranked lists that better match the temporary gold standard. Upon convergence of the two-stage bootstrapping procedure, the normalized value R(C) gives the final aggregated rank of community C. Supplementary Note 5 CRANK approach Following the presentation of the formal aspects of our approach for prioritizing network commu- nities, we proceed by describing the complete CRANK algorithm. Supplementary Note 5.1 Overview of CRANK The CRANK method consists of four steps. (1) First, a community detection algorithm is run on the network to identify communities. (2) In the second step, four community prioritization metrics are computed for each of the detected communities. This step yields four lists, each list containing scores of all communities for one prioritization metric. Scores in each list are then converted into ranks, producing ranked lists of communities. (3) In the third step, ranked list are aggregated resulting in the aggregated prioritization of communities. (4) Finally, in the fourth step, CRANK prioritizes the communities by ranking them by their decreasing aggregated score. S13 Supplementary Figure 1: Community prioritization metrics and their combination. Outlined are the second and the third step of CRANK (see Supplementary Note 5.1). (a) CRANK computes a score rf (C) for each detected community C and each community prioritization metric rf (where f is one of network structural features: "l" – likelihood, "d" – density, "b" – boundary, "a" – allegiance). (b) Scores r are then sorted in a decreasing order into ranked list Rr. (c) Each ranked list is decomposed into equally sized bags. An importance weight K i r (black vertical strip) is associated with each bag i and each ranked list Rr. The weights are initially equal, denoting the aggregated prioritization R as an equally weighted average of community ranks Rl, Rd, Rb and Ra at this point. (d) The highest ranked communities in R form a temporary gold standard T (dotted cells), which is used to update importance weights in the follow up steps. (e) For each bag i and each ranked list Rr, a new importance weight K i r is calculated according to the current aggregated prioritization R using Eq. (21). CRANK proceeds by updating the aggregated prioritization R according to the revised importance weights using Eq. (22). Calculations in (d) and (e) are repeated until aggregated prioritization R converges. We proceed by explaining the aggregation phase (i.e., the third step) in more detail (Supple- mentary Figure 1). At the start, CRANK sorts scores from each metric r (Supplementary Figure 1a) into a list Rr of community ranks (Supplementary Figure 1b), and it then partitions these lists into bags, which are equally sized sets of communities described in Supplementary Note 4.4.2 (Sup- plementary Figure 1c). Next, an initial aggregated prioritization of communities is generated as an equally weighted average of community ranks Rl, Rd, Rb and Ra (Supplementary Figure 1d). The algorithm then iterates until the aggregated prioritization converges (i.e., community ranks do not change between two consecutive iterations) or the maximum number of iterations is reached (Supplementary Figure 1d-e). In each iteration, a set of the highest ranked communities (i.e., a "temporary gold standard" S14 a Score prioritization metrics b Construct ranked lists c Decompose ranked lists d Aggregate ranked lists e Update importance weights Temporary gold standard bag Importance weight Repeat until converges described in Supplementary Note 4.4.2) is formed based on the current aggregated prioritization R (Supplementary Figure 1d). The approach then calculates the importance weight K i r for each bag i and each ranked list Rr using Eq. (21) by considering communities in the temporary gold standard as a point of reference (Supplementary Figure 1e). CRANK determines the importance weight of a bag based on the number of communities in the bag that are also contained in the temporary gold standard. CRANK applies Tukey's running median smoothing procedure33 to make the importance weights robust. Finally, CRANK uses Eq. (22) to update the current aggregated prioritization R. This is done by combining community ranks Rl, Rd, Rb and Ra into the aggregated prioritization R according to the importance weights. Repeating this procedure to iteratively refine the aggregated prioritization R underlies CRANK. Supplementary Note 5.2 CRANK algorithm A complete description of the CRANK algorithm follows. • Input: Network G(V,E), community detection algorithm A • Parameters: Network perturbation intensity ↵, number of bags B, relative size of temporary gold standard ⇡ • Output: Aggregated prioritization R 1. Step: Community detection • Apply community detection algorithm A on network G to detect communities C: 2. Step: Community prioritization metrics M (V,E,C) A(G) 2, 3, 4)) • Compute edge probabilities under ↵-perturbation of network G using M (V,E,C) (Eqs. (1, • For each detected community C 2C , compute the scores: – likelihood rl(C; ↵) – density rd(C; ↵) – boundary rb(C; ↵) – allegiance ra(C; ↵) • For each metric r 2{ rl, rd, rb, ra}, form a ranked list Rr such that Rr(C) is the rank (i.e., position) of community C in Rr: Rr(C) = 1 +XD6=C I(r(C; ↵)  r(D; ↵)) S15 (23) 3. Step: Combining community prioritization metrics • Decompose each ranked list Rr into B equally sized bags such that j-th bag contains a set of communities: Bj r = {C 2C ;dRr(C) · B/Ce = j/C} for j = 1, 2, . . . , B • Initialize the importance weights K j • Repeat until the aggregated prioritization R does not change between two consecutive itera- r for each ranked list Rr and each bag j as K j tions or a maximum number of iterations is reached: – Construct the aggregated prioritization R by combining the ranked lists as: r = 1 4 R(C) =Xr log K ir(C) r Rr(C), (24) where K ir(C) in ranked list Rr r is the importance weight of the bag ir(C) to which community C is assigned – Convert the aggregated prioritization R into rank order as: R(C) 1 +XD6=C I(R(C)  R(D)) (25) To deal with ties, the average of the ranks that would have been assigned to all the tied communities is assigned to each community – Form a temporary gold standard T consisting of ⇡C highest ranked communities in R: T = {C 2C ; R(C)  ⇡C}, where R(C) is the rank of community C in the aggregated prioritization R – Update the importance weight K j r for each metric r and each bag j using the formula: K j r = N j r + 1 r N j r + 1 · Bj 1 ⇡ ⇡ (26) where N j r = T \ Bj r – Smooth the importance weights of each ranked list Rr and bag Bj r using the Tukey's run- ning median procedure33 with window size three: K j r =8<: median(K 1 r, K b1 r median(K b median(K j1 r , K j r , K j+1 r r , 3K 2 r , K 2 r 2K 3 , 3K b1 r 2K b2 r ) if j 6= 1, B r ) if j = 1 ) if j = B Continue to apply the median smoothing to the importance weights of metric r until no more changes are observed S16 4. Step: Generating community ranking • Return the rank-ordered aggregated prioritization R Community detection algorithms. CRANK can be applied to communities detected with a num- ber of statistical community detection methods. Examples include community detection methods based on Affiliation Graph Model8, 9, Stochastic Block Model7, Latent Feature Graph Model10–16, 34 and Attributed Graph Model17–19. Additionally, CRANK works with non-statistical methods like modularity optimization and spectral methods, where edge probabilities are given by an auxiliary network model. Other parameters of CRANK. The CRANK algorithm has three parameters: network perturbation intensity ↵, number of bags B, and relative size of temporary gold standard ⇡. We find empirically that CRANK rank aggregation method always converges in less than 20 iterations of the algorithm and it takes on average less than 10 iterations for the aggregated ranking to converge. In the algorithm we track the change of the aggregated ranking between two consecutive iterations and stop the algorithm when no change in the ranking is observed. At that point the ranking has completely stabilized, it will not change in future iterations, and thus the aggregation is said to converge. Although we use the most strict stopping criterion in our experiments, we note that we have not observed any convergence issues, even when aggregating large ranked lists with more than ten thousand communities. We find that for rank-based aggregation of CRANK metrics, a choice for bag size of around 50 is appropriate. That means that the number of bags is set to B = C/50, where C denotes the number of communities detected in a network, and that all bags are of equal size. We use that value for the number of bags in all experiments reported in the paper, unless the experiment involves prioritizing fewer than 50 communities. In the latter case, we require at least three bins. We have evaluated the sensitivity of CRANK to different perturbation intensities ↵ of a net- work. All results reported in this paper are obtained by assuming a small perturbation of the network structure, ↵ = 0.15. This means that CRANK metrics capture the magnitude and the robustness of network structural features, which is important for good prioritization performance. We have investigated a number of values for the relative size ⇡ of temporary gold standard. We observe that setting the relative size to ⇡ = 0.05 performs well across different datasets and community detection algorithms and we use that value in all our experiments. S17 Supplementary Note 5.3 Computational time complexity of CRANK We separately analyze computational complexity of each of the fours CRANK steps. The runtime of the first step is the time needed to detect communities in the network G. We denote this time as O(A) . In the second step, CRANK calculates community prioritization metrics for all detected communities. This step takes time O(C · E + C · maxi Ci2 + C · E), where the first term is due to computation of edge probabilities based on CRANK network perturbation model, the second term is due to computation of likelihood metric scores and the third term is due to computations of community density, boundary, and allegiance metric scores. This means that computing metric scores in the second step requires time, which is linear in the size of network G. The third step is computationally straightforward and requires O(niter · C · log C) time, where niter is the maximum number of iterations needed for aggregation of community metric scores. We note that niter < 20 was sufficient for convergence of the aggregated prioritization in all our studies. The fourth step of CRANK is similarly straightforward: it involves sorting the communities based on their overall score in the aggregated prioritization R. Altogether, the time complexity of CRANK is the sum of the times needed to complete all four steps of CRANK algorithm, O(A + C · E + C · maxi Ci2 + niter · C · log C). Notice that, in the second step, a traditional, explicit approach to computing edge prob- abilities in the perturbed network would first perform many physical perturbations of the input network and would then run a community detection algorithm on each of the perturbed networks. This procedure would take time O(npert · (E + O(A))), where npert counts network perturbations, typically2 npert 100. However, by computing edge probabilities in the perturbed network analyt- ically rather than empirically, CRANK only needs time O(C · E), which substantially increases CRANK's scalability for large networks. CRANK naturally allows for parallelization, which further increases its scalability. Calcula- tions of prioritization metric scores are independent for each metric and each community and thus can be computed in parallel. Supplementary Note 6 Details about datasets Next, we describe datasets considered in this study. Supplementary Note 6.1 Network datasets We consider twelve networks from biological, social, and information realms (Supplementary Ta- ble 1). S18 Supplementary Table 1: Statistics of network datasets. N: number of nodes, E: number of edges, C: number of ground-truth communities, S: average ground-truth community size, A: average ground-truth community memberships per node. The Medical drugs network has three types of ground-truth information: Text35, Chemistry35, Epistasis36, given in the form of drug- drug relationships (C: number of drug-drug relationships, A: average relationships per node). The HSDN network has three types of ground-truth information: Pathway37, Genes37, Chemistry37, also given in the form of disease-disease relationships (C: number of disease-disease relationships, A: average relationships per node). Dataset Google+38 Facebook38 Twitter38 DBLP38 Amazon38 N E C S 143.5 0.11 m 27.3 m 437 28.8 4.04 k 0.18 m 193 81.31 k 3.5 m 3.1 k 15.5 0.32 m 1.0 m 13.5 k 429.8 0.33 m 0.9 m 151 k 99.9 Human Net39 16.24 k 0.48 m 4.1 k Human IntAct40 23.68 k 0.11 m 4.3 k Yeast GI41 4.46 k 0.17 m 1.2 k Human BioGRID42 19.56 k 0.17 m 3.9 k Human STRING43 815 5.42 k 50.8 k Medical drugs36 1.32 k 16.7 k HSDN44 1.23 k 6.5 k 28.6 k 1.4 k 21.8 k 164.9 k 172.5 k 145.1 k 16.9 14.7 9.8 15.9 59.9 / / / / / / A 0.3 1.4 0.4 2.6 14.8 8.4 9.0 8.9 9.5 9.0 43.5 2.1 33.1 268.8 281.1 236.6 We consider five gene networks: Human Net, Human Int Act, Yeast GI, Human BioGRID, and Human STRING. Human STRING is a protein-protein interaction network of experimentally determined interactions between human proteins from STRING v9.1 database43. The nodes are limited to proteins associated with biological pathways in the Reactome database45. Human Net39 is a human-specific gene network that combines gene co-citation, gene co-expression, curated physical protein interactions, genetic interactions, and co-occurrence of protein domains from four species. We also consider human genetic and physical interaction network (Human IntAct)40, S19 experimentally derived genetic interaction network in yeast S. cerevisiae (Yeast GI)41, and human protein-protein interaction network (Human BioGRID)42. All networks are provided as part of relevant publications. We consider two non-gene/non-protein networks: Medical drugs and HSDN. Medical drug network contains drugs approved by the U.S. Food and Drug Administration (FDA), which are listed in the DrugBank database36. Two drugs are linked in the network if they have at least one target protein in common. The HSDN network contains human diseases, where two diseases are linked if their clinical symptoms are significantly similar44. Both networks are provided as part of relevant publications. We consider five social and information networks representing standard benchmark datasets in network science. We consider a collaboration network from the DBLP computer science bibli- ography46, the Amazon product co-purchasing network46, and a collection of ego-networks from online social networks of Google+, Twitter and Facebook13. All networks are downloaded from the SNAP database38 and are publicly available at: http://snap.stanford.edu/data. Supplementary Note 6.2 Ground-truth community datasets For all considered networks, we have explicit ground-truth membership of nodes to communities (Supplementary Table 1). This means that in all networks ground-truth community memberships of nodes have been externally validated and verified. Ground-truth communities for the Human STRING protein-protein interaction network is given by curated biological pathways from the Reactome database45. For other gene/protein net- works we obtain ground-truth communities from the Gene Ontology47 in the form of gene groups that correspond to biological processes, cellular components and molecular functions (see Sup- plementary Note 7.4). For the HSDN network we have three types of ground-truth information from the Comparative Toxicogenomics Database: information about molecular pathways that are common to disease pairs37, knowledge about disease genes that are common to disease pairs37, and chemical associations that are common to disease pairs37. For the medical drug network we also obtain three types of ground-truth information: text associations between chemicals from the STITCH database35, drug-drug relationships from the STITCH35 based on similarity of drug's chemical structure, and drug-drug interactions from the DrugBank36. In the Amazon product co-purchasing network, ground-truth communities are defined by product categories on the Amazon website13, 46. In the DBLP network, ground-truth communities are defined by publication venue,e.g., journal or conference, meaning that authors who published S20 to a certain journal or conference form a ground-truth community46. In the online social networks, ground-truth communities are defined by users' social circles13. Supplementary Note 7 Details about experimental setup We describe community detection approaches that are used to find network communities, which we then prioritize. We then describe the experimental design and the metrics used for performance evaluation. Supplementary Note 7.1 Community detection methods We use the following community detection methods: CoDA (Communities through Directed Aff- iliations)9, BigCLAM8 and MMSB (Mixed Membership Stochastic Blockmodels)16, 34. These methods implement different statistical models of community detection and are hence appropriate for use with CRANK. We use publicly available implementations of the methods. Implementations of CoDA and BigCLAM are provided as part of the SNAP library48. MMSB is implemented in Chang et al.49 Values for model parameters of the methods were selected based on method's au- thors recommendation. Estimates of edge and node-community membership probabilities, which are needed by CRANK, were obtained with tools for examining posterior distributions, which are included in the SNAP48 and in Chang et al.49. Supplementary Note 7.2 Baseline community metrics For comparison we consider Conductance50 and Modularity51 community scoring functions. In or- der to make a higher value better, we reverse Conductance as (1 Conductance). We also consider two simple baselines: random prioritization of communities, and prioritization by the increasing size of communities. Conductance of a community C is defined as Conductance(C) = BC/(2EC + BC), where EC are edges within community C, EC = {(u, v) 2E ; u 2 C, v 2 C}, and BC are edges leaving community C (i.e., community's edge boundary), BC = {(u, v) 2E ; u 2 C, v 62 C}. If Conductance is used for community ranking then the highest ranked communities are those with the smallest fraction of total edge volume pointing outside them. Modularity of a community C is defined as Modularity(C) = 1/4(EC E[EC]). It measures the difference between the number of edges in a community and the expected number of such edges in a random graph with identical degree distribution. In prioritization, modularity prefers communities that are denser (i.e., with many internal edges) than what is expected under the configuration random network model2, 51. We also considered several other community scoring functions46: Flake-ODF (Out-Degree S21 Fraction), Cut Ratio, TPR (Triangle Participation Ratio) and FOMD (Fraction Over Median De- gree). We reversed metrics Cut Ratio and Flake-ODF as (1 Cut Ratio) and (1 Flake-ODF), respectively, to make a higher value indicate higher priority. In our experiments these scoring functions were typically outperformed by either Conductance or Modularity or both. When this was the case, their results are not reported. We also evaluate CRANK against its several simplified variants: • We compare different subsets of CRANK's prioritization metrics to each other. For example, we use CRANK's rank aggregation method to aggregate the scores of community likelihood, com- munity density and community boundary, but we leave out the scores of community allegiance. • We compare CRANK's rank aggregation method to methods that aggregate metric scores via simple quadratic mean, Borda method52, Footrule approach53, and Pick-a-Perm54. • We compare CRANK's prioritization metrics to different combinations of the baseline scoring functions. For example, we use CRANK's rank aggregation method to combine Cut Ratio, Conductance, TPR and FOMD scoring functions. Supplementary Note 7.3 Prioritization performance evaluation Next we describe gold standard rankings that are used to evaluate prioritization performance. The intuition behind our experiments is the following: We want communities with higher pri- oritization scores (i.e., communities that rank closer to the top of a ranked list) to provide a more accurate reconstruction of the ground-truth communities. More precisely, given only a network, we first detect communities and then prioritize them with the goal to establish which detected communities are the most accurate without actually knowing the ground-truth community labels. A perfect prioritization would order communities by decreasing accuracy, such that detected com- munities, which best match the ground-truth communities, are ranked at the top. We would like to note that community detection methods detect communities using only net- work structure and community prioritization methods prioritize communities using only informa- tion about community structure. This means that community detection and prioritization methods do not consider any external metadata or labels. We can thus quantitatively evaluate performance of a prioritization method by comparing community rankings generated by the method with gold standard community rankings determined by the ground-truth information. We evaluate prioritization of communities by quantifying its correspondence with the gold standard ranking of communities. We determine the gold standard ranking by computing the ac- curacy of every detected community by matching it to ground-truth communities. We adopt the S22 following evaluation procedure previously used in Yang et al.46: Every detected community C is matched with its most similar ground-truth community C⇤. Given C⇤, the set of all ground-truth communities that is explicitly provided by an external data resource, such as the SNAP38, C⇤ is de- fined as: C⇤ = arg maxD⇤2C⇤ (D⇤, C), where (D⇤, C) measures the Jaccard similarity between ground-truth community D⇤ and detected community C. C⇤ is thus the ground-truth community that is the best match for a given detected community C. The accuracy of community C is sim- ply the Jaccard similarity, (C⇤, C), between C and its corresponding ground-truth community C⇤. The gold standard ranking is then defined as the ranking of the detected communities by decreasing accuracy. A perfect prioritization matches the gold standard ranking exactly and ranks communities in decreasing order of accuracy. In this case, the Spearman's rank correlation ⇢ between the gold standard ranking and the estimated prioritization is one. The Spearman's rank correlation ⇢ is close to zero when the prioritization of communities does not carry any signal, and negative when the predicted prioritization tends to order the detected communities by the increasing accuracy rather than by the decreasing accuracy. Supplementary Note 7.4 Functional enrichment analysis Functional enrichment analysis55 is an established computational procedure in biology for the rig- orous assessment of statistical significance of gene sets. The input to functional enrichment anal- ysis consists of (1) a gene set, i.e., a community detected in a gene network given by its member genes, and (2) known gene functional annotation data. The output is statistical significance of their association. We obtain known sets of functionally related genes from the Gene Ontology (GO)47. GO terms are organized hierarchically such that higher level terms, e.g., "regulation of biological pro- cess", are assigned to more genes and more specific descendant terms, e.g. "positive regulation of eye development", are related to parent by "is a" or "part of" relationships. We consider high confidence experimentally validated GO annotations (i.e., annotations associated with the evidence codes: EXP, IDA, IMP, IGI, IEP, ISS, ISA, ISM or ISO) that cover all three aspects in the GO: biological processes, molecular functions and cellular components. Since the obtained GO data only contain the most specific annotations explicitly, we retrieve the relevant GO annotations and propagate them upwards through the GO hierarchy, i.e., any gene annotated to a certain GO term is also explicitly included in all parental terms56, 57. We evaluate the significance of the association between each detected community and the GO S23 using PANTHER tool58 in February 2015 (i.e., "PANTHER Over-representation Analysis" using Fisher's exact test). The Bonferroni correction was used to account for multiple testing. Given a detected community, the over-representation analysis tests which GO terms are most associated with the community and evaluates if their association is significantly different (p-value < 0.05, Bonferroni correction for multiple testing) from what is expected by chance. The basic question answered by this test is: when sampling X genes (a detected community) out of N genes (all nodes in the network), what is the probability that x or more of these genes belong to a particular GO term shared by n of the N genes in the network? The Fisher's exact test answers this question in the form of a p-value. We say that a community is functionally enriched in a given GO term if it is significantly associated with that GO term. Intuitively, this means that a community contains surprisingly large number of genes that perform the same cellular function, are located in the same cellular component, or act together in the same biological process, as defined by a given GO term. We say that a community is functionally enriched if it is functionally enriched in at least k GO terms, where k is pre-selected value (i.e., kC = C for a community C). To evaluate the quality of community prioritization we report how many communities that rank among the top 5% of all communities are functionally enriched. A larger number of func- tionally enriched communities at the top of a community ranking indicates better prioritization performance. Supplementary Note 8 Experiments on CRANK and its properties In this note, we investigate CRANK's properties. We study CRANK metrics and CRANK rank ag- gregation method, two major components of CRANK approach. We start by applying CRANK in conjunction with different community detection methods (Supplementary Note 8.1) and evaluating CRANK's sensitivity to network perturbation intensity (Supplementary Note 8.2). We then evalu- ate the contribution of each CRANK metric towards the performance of CRANK (Supplementary Note 8.3). We then compare CRANK against combinations of baseline community metrics in order to better understand the impact of CRANK metrics on performance (Supplementary Note 8.4). Fi- nally, we evaluate how the proposed rank aggregation method performs in comparison to existing rank aggregation methods (Supplementary Note 8.5). All experiments reported in this note are done on social and information networks (Supple- mentary Note 6.1) because of available high-quality (i.e., complete) ground-truth information that is used to evaluate prioritization performance. S24 Supplementary Note 8.1 CRANK in conjunction with different community detection meth- ods We consider five social and information networks. For each network, we used a community de- tection method to detect communities, and then we prioritized the detected communities using CRANK. To demonstrate that CRANK can be used with any community detection method, we here use CRANK in conjunction with three state-of-the-art community detection methods (i.e., CoDA9, BigCLAM8, and MMSB16, see Supplementary Note 7.1). For the purpose of evaluation we consider networks with ground-truth information on com- munities46. Notice that this information is not available to methods during community detection or community prioritization. However, it enables us to compile a gold standard ranking of commu- nities, which ranks communities based on how well they reconstruct ground-truth, i.e., externally validated, communities. Spearman's rank correlation ⇢ is used to measure how well a generated ranking approximates the gold standard ranking (see Supplementary Note 7.3). We compare per- formance of CRANK to alternative metrics potentially useful for prioritization: modularity, con- ductance, and random prioritization. Tables Supplementary Table 2-Supplementary Table 4 show the performance of CRANK and other baseline community metrics on five networks under the BigCLAM, MMSB, and CoDA community detection methods. Overall, we find that across all datasets and community detec- tion methods, CRANK is always the best performing method to prioritize communities. CRANK outperforms Modularity by up to 128% and generates on average 57% more accurate community rankings as measured by the Spearman's rank correlation between a generated ranking and the gold standard ranking. Similarly, CRANK outperforms Conductance by up to 107% and generates on average 38% more accurate community rankings. Furthermore, CRANK performs on average 32% better than the second best community metric. The second best performing community metric changes considerably across the datasets, while CRANK always performs best, suggesting that it can effectively exploit the network structural features to become aware of a particular configuration of a dataset and a community detection model. CRANK outperforms other community metrics, and we hypothesize that the scoring functions of those metrics are unable to model heterogeneity of datasets and community detection algorithms. Importantly, results in Tables Supplementary Table 2-Supplementary Table 4 show that CRANK performs substantially better than the approach, which is nowadays typically employed when no other domain-specific meta or label information besides the network structure is available (i.e., Random). On average, CRANK improves the random ordering of the detected communities by S25 more than 10 folds as measured by the Spearman's rank correlation. These results suggest that the notion of community priority employed by CRANK agrees well with a gold standard ranking that is measured via ground-truth community information; in fact, CRANK does so in a completely unsupervised manner. Supplementary Table 2: Prioritization of communities detected by the BigCLAM method. We measure Spearman's rank correlation between the generated ranking of communities and the gold standard ranking of communities. Higher values indicate better performance. Communities were detected by the BigCLAM algorithm8 and prioritized using one of four different approaches. Higher value indicates better performance. Method Facebook Amazon Google+ Twitter DBLP Random Modularity Conductance CRANK 0.003 0.225 0.287 0.342 -0.019 0.158 0.216 0.089 0.307 0.293 0.031 0.277 0.319 0.025 0.252 0.333 0.278 0.325 0.442 0.358 Supplementary Table 3: Prioritization of communities detected by the MMSB method. We measure Spearman's rank correlation between the generated ranking of communities and the gold standard ranking of communities. Higher values indicate better performance. Communities were detected by the MMSB algorithm16 and prioritized using one of four different approaches. Higher value indicates better performance. Method Facebook Amazon Google+ Twitter DBLP Random Modularity Conductance CRANK 0.087 0.281 0.329 0.356 0.013 0.183 0.218 0.295 -0.016 0.295 0.329 -0.010 0.302 0.417 0.008 0.251 0.281 0.384 0.439 0.371 Based on these results we conclude that CRANK consistently achieves good performance measured in terms of Spearman's rank correlation on the ground-truth community information. Furthermore, the results indicate that CRANK can be successfully applied to popular and state-of- the-art community detection methods. S26 Supplementary Table 4: Prioritization of communities detected by the CoDA method. We measure Spearman's rank correlation between the generated ranking of communities and the gold standard ranking of communities. Higher values indicate better performance. Communities were detected by the CoDA algorithm9 and prioritized using one of four different approaches. Higher value indicates better performance. Method Facebook Amazon Google+ Twitter DBLP Random Modularity Conductance CRANK -0.016 0.149 0.257 0.340 0.012 0.195 0.161 0.267 0.005 0.166 0.187 0.312 -0.013 0.213 0.226 0.009 0.301 0.212 0.465 0.411 Supplementary Note 8.2 Network perturbation intensity in CRANK We evaluate the sensitivity of CRANK to different perturbation intensities ↵ of a network. Recall that CRANK defines prioritization metrics as follows. Given a structural feature f, CRANK defines prioritization metric rf such that it captures the magnitude of feature f in the network as well as the change in the value of f between the network and its ↵-perturbed version: rf (C; ↵) = f (C)/(1 + df (C, ↵)) (Supplementary Note 3). It can thus be expected that perturbation intensity ↵ might influence CRANK's prioritization performance. We here vary the value for ↵ and study its impact on CRANK's performance. Supplementary Figure 2 shows the performance achieved on the Amazon, DBLP, and STRING networks for different values of perturbation intensity ↵ varying from ↵ = 0.05 to ↵ = 0.95 with an increasing step of 0.05. We observe that varying ↵ influences the overall performance across different networks and community detection algorithms. Results in Supplementary Figure 2 are consistent with the accepted definition of stability and robustness of community structure in networks4, 59–62. It is generally posited2, 5 that, at the network level, significant community structure should be robust to small perturbations of the network (i.e., for low values of ↵). This notion corresponds to the robustness of community structure against noise and data incompleteness6. In other words, if a small change in the network can completely change the outcome of community detection algorithm, then the communities found should not be considered significant. However, when perturbation intensity is beyond a certain threshold, i.e., when the network is perturbed to such extent that it resembles a random network (i.e., for large values of ↵), then S27 Supplementary Figure 2: Prioritization performance of CRank when varying the value of network perturbation intensity. Network communities are found using the CoDA community detection algorithm9. Perturbation intensity ↵ affects the estimates of edge probabilities that are computed by CRank and used to analytically determine community structure in the perturbed net- work based on communities detected in the original network. All results of CRank reported in this paper are obtained by assuming a small perturbation of the network structure2, ↵ = 0.15 (black vertical line). a good metric should assign community structure detected in the perturbed network a low score even if community structure in the original network is significant2. This notion corresponds to the specificity of the community structure that should be captured by a good community metric. Therefore, in CRANK, the adjusted prioritization metrics should be most informative for small values of perturbation intensity ↵. This indeed holds for CRANK, as can be seen in Supplementary Figure 2. For values of perturbation intensity beyond a reasonably small threshold (e.g., ↵ = 0.3), prioritization performance typically slowly deteriorates. An especially interesting case is to investigate CRANK's performance when ↵ = 0. When ↵ = 0, the formula for prioritization metric rf becomes rf (C; 0) = f (C). In other words, when ↵ = 0, prioritization metric rf only captures the magnitude of feature f in the network. This means that the metric rf ignores any information, which comes from the change in the value of f between the original network and its perturbed version. On average, on Amazon, DBLP, and STRING networks we observe that setting ↵ to ↵ = 0 results in 27% lower Spearman's rank correlation with the gold standard ranking as compared to Spearman's rank correlation when ↵ = 0.15. These findings suggest that both the magnitude and the robustness of network structural features have an important role in CRANK's performance. S28 0.05 0.15 0.25 0.35 0.45 0.55 0.65 0.75 0.85 0.95 Network perturbation intensity Amazon DBLP STRING 0.5 0.4 0.3 0.2 0.1 0.0 gold standard ranking Rank correlation with the Supplementary Table 5: Complementarity of CRANK community prioritization metrics. We leave out one of the four CRANK community prioritization metrics at a time and evaluate per- formance of the reduced CRANK by measuring Spearman's rank correlation between predicted prioritization of communities and the gold standard ranking of communities. We also report the accuracy of individual community metrics. Communities were detected by the CoDA algorithm9. The "\" sign denotes prioritization metric that was left out in the experiment. Higher value indi- cates better performance. Ranking method Facebook Amazon Google+ Twitter DBLP Average rl rd rb ra CRANK \ rl CRANK \ rd CRANK \ rb CRANK \ ra CRANK 0.277 0.301 0.245 0.289 0.303 0.267 0.278 0.311 0.340 0.187 0.209 0.178 0.189 0.203 0.189 0.193 0.245 0.267 0.247 0.199 0.188 0.245 0.262 0.241 0.283 0.271 0.312 0.211 0.255 0.288 0.188 0.423 0.367 0.316 0.474 0.309 0.276 0.213 0.311 0.312 0.353 0.347 0.323 0.465 0.411 0.246 0.248 0.222 0.244 0.300 0.274 0.283 0.283 0.359 In other words, high priority communities have high values of community prioritization metrics, which are also stable with respect to small perturbations of the network structure. Supplementary Note 8.3 Incremental contribution of CRANK metrics We examine the degree of contribution of each of the four CRANK metrics to the final performance of CRANK. Recall that CRANK metrics are: (1) Community likelihood rl, which scores each com- munity based on the overall likelihood of edges and non-edges in the community; (2) Community density rd, which scores each community based on the probability of community's internal network connectivity; (3) Community boundary rb, which scores each community based on the sharpness of its edge boundary; and (4) Community allegiance ra, which scores each community based on the difference between internal and external network connectivity of each community member. We want to test whether the four CRANK metrics are truly necessary or would CRANK perform just as well with only a subset of them. To answer this question, we consider in turn different subsets of CRANK metrics and apply CRANK with each of the subsets. Supplementary Table 5 shows that considering all CRANK metrics improved average Spear- S29 man's rank correlation obtained by considering only one metric by 50%. It improved Spearman's rank correlation of the best single CRANK metric considered in isolation by 45%. Additionally, all four CRANK metrics performed on average 26% better than any subset of three metrics. These observations suggest that each prioritization metric by itself carries a substantial predictive signal, and that combining all the metrics results in superior performance. We hence conclude that the proposed metrics are complementary, and that good performance of CRANK depends on consider- ation of all of them. Supplementary Note 8.4 Combinations of baseline community metrics To better understand the impact of CRANK aggregation method and CRANK metrics on perfor- mance, we compare CRANK against standard and commonly used community metrics. We evalu- ate the accuracy of community rankings obtained by combining six baseline community metrics as well as all combinations of five out of the six the metrics (i.e., Cut Ratio46, Conductance50, TPR46, FOMD46, Flake-ODF46, Modularity51; see Supplementary Note 7.2). Baseline community metrics in each combination are aggregated by averaging the metrics' scores. Results are reported in Supplementary Table 6. We can learn two things by examining results of this experiment. First, comparing performance of the aggregated metric scores in Supplemen- tary Table 6 with performance of the non-aggregated metric scores reveals that the aggregated metric scores consistently performed better than any one metric by itself. For example, aggrega- tion of Conductance with FOMD, TPR, Cut Ratio and Modularity metrics improved performance of Conductance considered by itself by 83% on Twitter network (⇢ = 0.413 vs. ⇢ = 0.226) and by more than 54% on DBLP network (⇢ = 0.327 vs. ⇢ = 0.212) (cf. Supplementary Table 6 and Supplementary Table 4). This observation suggests that different metrics considered together can more accurately predict community ranks than any one metric by itself. Second, while performance of baseline community metrics was improved by aggregation, CRANK achieved better performance than aggregated baseline community metrics on all five datasets. CRANK performed up to 80% better than combinations of baseline metrics and generated on average 38% better community rankings. This result is also interesting because the baselines aggregate five or even six community metrics but CRANK aggregates only four CRANK metrics (Supplementary Table 6). With these results, we conclude that improvement of CRANK's perfor- mance does not come solely from the aggregation itself, but rather also from CRANK metrics. S30 Supplementary Table 6: Performance of CRANK vs. combinations of baseline community metrics. Each experiment combined baseline community metrics by averaging their scores. We measure Spearman's rank correlation between the generated prioritization of communities and the gold standard ranking of communities. Communities were detected by the CoDA algorithm9. Cnd: Conductance50, Mod: Modularity51, FOMD: Fraction over median degree46, TPR: Triangle participation ratio46, Flake-ODF: Out degree fraction46. Higher value indicates better performance. Baseline community metrics {FOMD, TPR, Cut Ratio, Cnd, Mod} {FOMD, TPR, Cut Ratio, Flake-ODF, Mod} {FOMD, TPR, Flake-ODF, Cnd, Mod} {FOMD, Flake-ODF, Cut Ratio, Cnd, Mod} {Flake-ODF, TPR, Cut Ratio, Cnd, Mod} {FOMD, Flake-ODF, TPR, Cut Ratio, Cnd} {FOMD, Flake-ODF, TPR, Cut Ratio, Cnd, Mod} CRANK Facebook Amazon Google+ Twitter DBLP Average 0.253 0.144 0.225 0.228 0.204 0.211 0.249 0.202 0.152 0.178 0.211 0.207 0.217 0.213 0.219 0.173 0.202 0.211 0.226 0.231 0.233 0.413 0.327 0.283 0.208 0.317 0.199 0.298 0.367 0.254 0.408 0.379 0.287 0.351 0.333 0.264 0.372 0.342 0.275 0.364 0.381 0.288 0.340 0.267 0.312 0.465 0.411 0.359 Supplementary Note 8.5 Comparison with other rank aggregation approaches So far, we learned that CRANK metrics are complementary and that each of them contributes to the performance of CRANK. We would also like to understand the role of another component of CRANK, that is, CRANK rank aggregation method. To assess the contribution of CRANK rank aggregation method to the overall performance of CRANK, we compare CRANK to its simplified version. Simple CRANK considers exactly the same prioritization metrics but aggregates the metrics using a simple quadratic mean. Given a community C, simple CRANK computes the aggregated score R(C) for community C as: R(C) = qPf rf (C)2/4. We observe that CRANK rank aggregation method consistently out- performs quadratic mean by 20-46% on various datasets (Supplementary Table 7). Next, we test how CRANK rank aggregation method compares against established rank ag- gregation approaches53, 63. Recall that rank aggregation is concerned with how to combine several independently constructed rankings into one final ranking that represents the collective opinion of all the rankings53. The classical consideration for specifying the final ranking is to maxi- mize the number of pairwise agreements between the final ranking and each input ranking. Un- fortunately, this objective, known as the Kemeny consensus, is NP-hard to compute53, 64, which has motivated the development of methods that either use heuristics or aim to approximate the S31 Supplementary Table 7: Performance of CRANK aggregation method and other rank aggre- gation methods. Simple CRANK considers exactly the same prioritization metrics as CRANK but aggregates the scores using the quadratic mean. We measure Spearman's rank correlation between the generated prioritization and the gold standard ranking of communities. Communities were detected by the CoDA algorithm9. Higher value indicates better performance. Rank aggregation Facebook Amazon Google+ Twitter DBLP Average Borda Footrule Pick-a-Perm Simple CRANK CRANK 0.291 0.289 0.245 0.250 0.340 0.242 0.187 0.209 0.190 0.267 0.234 0.226 0.247 0.213 0.312 0.417 0.426 0.288 0.341 0.387 0.405 0.276 0.340 0.465 0.411 0.314 0.301 0.253 0.267 0.359 NP-hard objective52–54, 65. We compare CRANK rank aggregation method with three other rank aggregation methods that offer guarantees on approximating the Kemeny consensus. We con- sider a 5-approximation algorithm of the Kemeny optimal ranking called Borda's method52, a 2-approximation Footrule aggregation53 and a 2-approximation Pick-a-Perm algorithm54. Results in Supplementary Table 7 show that rank aggregation in CRANK is effective as it ei- ther matched or outperformed alternative rank aggregation approaches although CRANK does not approximate the Kemeny consensus. CRANK outperformed Borda's method, the best performing alternative approach, by at least 6%. Across all datasets, CRANK achieved 14% higher average Spearman's rank correlation than Borda's method. This observation is interesting, since Borda's method is the most natural and usual choice for rank aggregation53. Pick-a-Perm generally per- formed the worst among the considered methods. Pick-a-Perm operates by returning one of the input rankings selected at random. Although it is a 2-approximation algorithm to the Kemeny op- timal ranking52, it may be of limited practical value when the goal is to maximize coherence of the final ranking with all the input rankings (which is the case in our study). We note that since finding the optimal Kemeny solution is NP-hard, none of the algorithms, including CRANK, guarantees to provide the optimal solution, and different algorithms typically find different solutions. However, CRANK achieved on average 27% higher Spearman's rank correlation than alternative approaches that combine metric scores by approximating the NP-hard objective. In addition to consistently producing better results, CRANK rank aggregation method has two important advantages over alternative rank aggregation methods. First, CRANK handles in- consistencies between the ranked lists (i.e., input rankings) by estimating the importance weights S32 for each ranked list. It combines different metrics such that the weight of each metric varies with community rank. As such, CRANK allows a practitioner to explore, for each community, the weight of each metric in the aggregated community ranking. The importance weights also take ac- count of uncertainty in a ranked list. When combining the ranked lists into a final ranking, CRANK uses the weights to down-weight uninformative parts of each ranked list and up-weight informa- tive parts of each ranked list (Supplementary Note 4). Experiments suggest that the importance weight-based approach plays a role in good performance of CRANK. Second, CRANK rank aggregation method can consider meta or other label information when combining the metrics. This capability is important because meta information can guide the method toward producing more useful results (Supplementary Note 10). This is in sharp con- trast with other rank aggregation methods, which are unsupervised methods. Inclusion of additional community metrics into CRANK Supplementary Note 9 So far, we showed that CRANK represents a flexible and general community prioritization plat- form whose model and metrics capture conceptually distinct network structural features. The met- rics non-redundantly quantify different features of network community structure (Supplementary Note 8.3). We also showed that each CRANK metric is necessary and contributes positively to the performance of CRANK (Supplementary Note 8.3). Unlike alternative network metrics, such as conductance, CRANK metrics capture both the magnitude and the robustness of network structural features (Supplementary Note 8.4). However, it is not possible to theoretically guarantee that any finite set of metrics will be sufficient for prioritizing communities in all real-world networks. We address this challenge by showing how to integrate any number of additional user-defined metrics into CRANK model with- out requiring further technical changes to the model. This way, CRANK can build on any existing body of network metrics and can consider domain-specific community/cluster metrics. Supplementary Note 9.1 Sensitivity of CRANK to adding low-signal community metrics We performed additional analyses investigating how inclusion of potentially noisy metrics affects CRANK performance. We created synthetic networks with planted community structure using a stochastic block model. For a given synthetic network we applied a community detection method9 to detect com- munities and then used CRANK to prioritize them. We measured prioritization performance using Spearmans rank correlation between CRANK ranking and the gold standard ranking of communi- ties, as described in the manuscript. We repeated the experiment many times, each time adding a S33 different number of noisy metrics to CRANK. Each added metric was a noisy version of the gold standard ranking of communities containing a different amount of useful signal. We report results in Supplementary Figure 3. We find that CRANK's performance degrades gracefully when low-signal metrics or even adversarial metrics (i.e., metrics that correlate nega- tively with the gold standard community ranking) are added to the set of metrics aggregated by CRANK (Supplementary Figure 3). For example, adding 6 additional noisy metrics to CRANK, each correlating 0.10 with the gold standard community ranking, improves CRANK performance by 11%. We also find that CRANK's performance improves substantially when only a relatively few metrics are added to the set of metrics aggregated by CRANK, if the added metrics are positively correlated with the gold standard ranking. For example, adding 3 additional metrics to CRANK, each correlating 0.50 with the gold standard community ranking, improves CRANK's performance by 67% (Spearman's rank correlation ⇢> 0.90, Supplementary Figure 3). These analyses show that CRANK can handle a large number of metrics and that its aggre- gation method is robust to adding low-signal metrics. Integration of domain-specific information into CRANK Supplementary Note 10 Next, we turn our attention to studying how CRANK can incorporate domain-specific (supervised) information in community prioritization. For domains at the frontier of science supervised data is often scarce and thus unsupervised approaches, like CRANK, are extremely important. In do- mains where domain-specific or other meta and supervised data is available, our method can easily consider such information, potentially leading to improved community prioritization. In this note, we demonstrate that CRANK has a unique ability to operate in unsupervised as well as supervised environments, and thus can identify high-quality communities when domain- specific information is available and even when it is not. Supplementary Note 10.1 Integration of domain-specific information into CRANK When domain-specific or other meta and label information is available it can prove to be useful to improve prioritization performance. In the context of biological networks, domain-specific infor- mation is often given in the form of pathways or gene sets that are over-represented among genes belonging to a cluster/community66–73. CRANK can easily use such domain-specific or other meta and label information to supervise community prioritization. When external information about communities is available, CRANK can make advantage of it to boost prioritization performance. CRANK can leverage available meta information at two different stags of analysis as follows. S34 Supplementary Figure 3: Connections between the number of additional community prioriti- zation metrics in CRANK, the signal rate of each added metric, and CRANK s performance. CRANK is based on aggregation of four metrics, i.e., Likelihood, Density, Boundary, and Alle- giance, that each characterizes a different aspect of community structure. CRANK can include additional metrics to the set of aggregated metrics. We create a synthetic network with planted community structure using a stochastic block model with 100 planted modules/communities. We apply a community detection method9 to detect communities and then use CRANK to prioritize them. CRANK produces a ranked list of communities. The gold standard rank of each community is determined by how accurately it corresponds to its planted counterpart. We measure prioritiza- tion performance using Spearmans rank correlation between CRANK ranking and the gold standard ranking of communities. We obtain ⇢ = 0.54 based on CRANK metrics (in green). We repeat the experiment many times, each time based on a different number of metrics added to CRANK (y-axis in the heat map), where each added metric is a noisy version of the gold standard community rank- ing with a specific amount of signal (x-axis in the heat map). The heat map shows that adding only a relatively few metrics to the set of metrics aggregated by CRANK can lead to an almost perfect prioritization (⇢> 0.90) if the added metrics are positively correlated with the gold standard rank- ing. For example, adding 3 noisy metrics to CRANK, each correlating 0.50 with the gold standard community ranking, improves CRANK s performance by 67% (⇢ = 0.90, highlighted cell in the heat map). We observe that CRANK's performance degrades gracefully when low-signal metrics or even adversarial metrics (i.e., metrics that correlate negatively with the gold standard commu- nity ranking) are added to CRANK. For example, adding 6 additional noisy metrics to CRANK, each correlating 0.10 with the gold standard community ranking, improves CRANK s performance by 11% (⇢ = 0.60, highlighted cell in the heat map). S35 Spearman's ρ Domain-specific information at network community prioritization stage. Given side infor- mation about a small number of high-quality communities, CRANK can use these high-quality communities to guide the prioritization. We only slightly modify the original algorithm where we use supervised information for CRANK to determine importance weights for each prioritization metric and each bag (Eq. (26) in CRANK algorithm). Importance weights are thus determined in a supervised manner based on the given high-quality communities, such that larger weights are assigned to metrics and bags that contain a larger number of communities with high-quality labels. Domain-specific information at network community detection stage. A complementary ap- proach to integrating meta-information at community prioritization stage is to integrate it at com- munity detection stage. Recent community detection methods17, 19, 74 can incorporate metadata into a community detection method itself, which helps guide the method to detect more useful com- munities. These methods combine network and meta-information about nodes, such as the age of individuals in a social network or mutation effects of genes in a gene network, to improve the quality of detected communities. CRANK can be used in conjunction with those methods. Supplementary Note 10.2 Effective use of domain-specific information by CRANK We have conducted additional analyses on synthetic and real-world networks showing how CRANK can integrate domain-specific information into its prioritization model to boost performance. Synthetic networks with planted community structure. In experiments on synthetic networks with planted community structure, we observe that CRANK can use label information about high- quality communities when calculating importance weights for prioritization metrics. We observe that label information improves CRANK's performance by up to 14–117%, depending on the amount of provided information used for supervision (Supplementary Figure 4). Network of medical drugs. In experiments on the medical drug network, we evaluate CRANK's ability to incorporate information about medical drugs into prioritization of drug communities (Supplementary Figure 5). We find that including drug-specific information significantly improves CRANK's performance, even when the amount of drug-specific information used for supervision is small. Supervised CRANK produces up to 55% better community rankings than can be produced by unsupervised version of CRANK (⇢ = 0.48 vs. ⇢ = 0.31, left panel; ⇢ = 0.47 vs. ⇢ = 0.38, middle panel; ⇢ = 0.61 vs. ⇢ = 0.53, right panel in Supplementary Figure 5). These results show that CRANK can identify high-quality communities when meta or other label information is available and even when it is not. Thus, CRANK can operate in supervised S36 Supplementary Figure 4: Integrating meta information into CRANK at network community prioritization stage. CRANK can easily incorporate supervised information or external knowl- edge as prior or even as supervised labels. On synthetic networks with planted community struc- ture we test how useful supervised information can be for CRANK. We generate a benchmark net- work on N = 6000 nodes using a stochastic block model with 200 planted modules/communities. (The same stochastic block network model is used in experiments reported in Figure 2 in the manuscript.) Each planted community has 30 nodes. Planted communities use different values for within-community edge probability, one hundred use p = 0.6 and one hundred use p = 0.2. Between-community edge probability is p = 0.02. Given a benchmark network, we apply a com- munity detection method to detect communities9 and then use CRANK to prioritize them. CRANK produces a ranked list of communities that we evaluate against a gold standard community ranking using Spearman's rank correlation, as described in the manuscript. Each bar indicates performance of CRANK in an experiment with a different amount of supervised information. Unsupervised ex- periment is indicated in green (⇢ = 0.35). In every other experiment (indicated in increasing shades of blue), CRANK is given supervised information about a set of K high-quality communities and it can use this meta-information for supervised community prioritization. High-quality communities are communities with the highest fraction of nodes correctly classified into their corresponding planted communities. CRANK uses these communities to determine importance weights for each prioritization metric and each bag (Eq. (26) in CRANK algorithm) in a supervised manner, such that larger weights are assigned to metrics and bags that contain a larger number of high-quality communities. Integration of meta-information in CRANK improves its performance by 14-117%, depending on the amount of additional information specified by the size of set K. and unsupervised environments and effectively prioritize communities. These analyses increase our confidence that CRANK will be of broad practical utility in both domains with abundant and scarce domain-specific knowledge. S37 Supervised CRank Spearman's ρ Supplementary Figure 5: Integration of supervised information about medical drug into CRANK. We use the network of medical drugs (Figure 3 in the manuscript) to study how use- ful supervised information about drugs can be for CRANK. Recall that we have three types of external meta-information for each drug community: (1) chemical structure similarity of the drugs ("Chemistry"), (2) associations between drugs derived from text data ("Text"), and (3) drug-drug interactions between the drugs ("Epistasis"). Given the medical drug network, we apply a com- munity detection method to detect communities9 and then use CRANK to prioritize them. CRANK produces a ranked list of communities that we evaluate against a gold standard community rank- ing using Spearman's rank correlation, as described in the manuscript. However, in contrast to experiments reported in the manuscript (Figure 3 in the manuscript), we here use the supervised version of CRANK to prioritize communities. Each bar indicates performance of CRANK in an experiment with a different type of supervised information. Unsupervised experiments are indi- cated in green (⇢ = 0.31 for Chemistry, ⇢ = 0.38 for Text, and ⇢ = 0.53 for Epistasis, as in Figure 3 in the manuscript). In every other experiment (indicated in grey), CRank is given a set of K = 10 high-quality communities determined using an external chemical database (i.e., drug-drug interactions from the Drugbank36 database). CRANK uses high-quality communities to determine importance weights for each prioritization metric and each bag (Eq. (26) in CRANK algorithm) in a supervised manner, such that larger weights are assigned to metrics and bags that contain a larger number of high-quality communities. Inclusion of drug-specific information significantly improves CRANK's performance, although the amount of supervised information is small. Al- though in each experiment CRANK has access to only 10 high-quality communities, supervised CRANK produces up to 55% better community rankings than can be produced by unsupervised version of CRANK (⇢ = 0.48 vs. ⇢ = 0.31, left panel; ⇢ = 0.47 vs. ⇢ = 0.38, middle panel; ⇢ = 0.61 vs. ⇢ = 0.53, right panel). Supplementary Note 11 Further case studies In this note we describe case studies on medical, social, and information networks, beyond those presented in the main text. S38 Spearman's ρ Supplementary Note 11.1 Amazon product co-purchasing network The CRANK approach also provides new insights into high-quality communities beyond commu- nity rankings in biomedical networks. Results on a large network of frequently co-purchased prod- ucts at the online retailer further underpin the need for automatic community prioritization. We detect communities in the Amazon product network and rank them using CRANK (Supplementary Figure 6). We find that communities ranked high by CRANK mostly contain products that belong to the same product category (Supplementary Figure 6a). For example, the rank 2 community (2nd highest community in the ranking) contains books belonging to a children's literary franchise "The Boxcar Children" about orphaned children who create a home in an abandoned boxcar. Another high-ranked (rank 3) community is about progressive country, a subgenre of country music. In contrast, communities ranked lower by CRANK carry much broader semantic meaning and their products become increasingly more heterogeneous (Supplementary Figure 6a). Supplementary Note 11.2 Human symptoms disease network We consider a symptom-based human disease network44, where a link between two diseases indi- cates that they have significantly similar clinical symptoms. Promising disease communities in this network are communities with similar molecular, genetic, and chemical properties because such communities hold promise for development of new therapeutic strategies75–77. We apply CRANK to the disease network and examine whether it ranks higher communities that are considered more promising. The disease network was constructed based on more than seven million PubMed biblio- graphic records44. From these records, the symptom-disease relationships were extracted and the symptom similarities for all disease pairs were quantified resulting in the network with 133,106 connections with positive similarity between 1,596 diseases44. The network is visualized in Sup- plementary Figure 7a. The disease network covers a spectrum of disease categories, from broad categories such as cancer to specific conditions such as hyperhomocysteinemia. After detecting disease communities using a community detection method9, we prioritize the communities using CRANK. We then evaluate the degree of correspondence between the CRANK ranking of disease communities and the gold standard ranking. We consider three external medi- cal databases37 with molecular, genetic, and chemical information about diseases (Supplementary Note 6.2). This way, we obtain three possible gold standard rankings. The gold standard rankings are: (1) the ordering of communities by the overlap in disease-associated molecular pathways, (2) the ordering of communities by the similarity of genes associated with diseases in each commu- S39 Supplementary Figure 6: Prioritizing network communities in the Amazon product co- purchasing network and the community prioritization metrics. (a) The network has more than 300,000 nodes and nearly one million edges. Communities are detected using a statistical community detection method9 (more than 10,000 communities are detected) and prioritized using CRANK. Product categories are provided by Amazon and products (nodes) are colored by their category. Manual inspection reveals top ranked communities correspond to the coherent groups of highly related products, such as antique jewelry (rank 1), children's books (rank 2), and country music (rank 3), whereas lower ranked communities contain diverse sets of products from differ- ent categories. For example, the rank 200 community contains song albums by bands within the broader rock musical style, such as music by English new wave rock bands and English pop bands, but also pop albums, such as "They Called Him Tintin." The rank 500 community is even less coherent. It contains Broadway musicals, including "House of Flowers" and "Bells Are Ring- ing," as well as several albums with wedding music, such as "Great Wedding Songs" and "A Song For My Son On His Wedding Day." The rank 1000 community consists predominantly of classic silent films from a wide range of genres, including drama, action, romance, and comedies. (b) The importance of prioritization metrics in CRANK varies across different networks and across communities within each network. CRANK aggregates the values of different metrics such that the weight of a metric varies with community. In the Amazon network, allegiance and boundary metrics are most important for the high-ranked communities, indicating that nodes in the high- ranked communities preferentially attach to other nodes belonging to the same community, and edges connecting each community with the rest of the network are weak. In contrast, density and likelihood metrics contribute less to the prioritization, which means that likelihood and density of a community are less indicative of its quality in the Amazon network. S40 a Rank 1 community Rank 2 community Rank 3 community b Amazon network Antiques & collectibles, jewelry Children's books, mystery & detective, The Boxcar Children Outlaw & progressive country Rank 200 community Rank 500 community Rank 1000 community DBLP network Disease network Alternative rock, new-wave & post-punk Dance & DJ, dance pop Pop rock, adult contemporary Traditional vocal pop Wedding music Broadway vocalists, musicals Silent films, drama, love & romance Classic comedies, silent films, 1920-1929 Medical drug network Human PPI network nity, and (3) the ordering of communities by the structure similarity of chemicals associated with diseases within each community. We evaluate CRANK performance by measuring how well its ranking corresponds to avail- able disease-chemical, disease-gene, and disease-pathway gold standard rankings. We quantify the results using Spearman's rank correlation ⇢ between the CRANK ranking and the gold stan- dard ranking. The results in Supplementary Figure 7b show that CRANK successfully ordered the communities based on how well they match data in the external medical databases. We observed that CRANK ranking agreed well with the gold standard ranking based on molecular pathways (⇢ = 0.45, p-value = 1.7 ⇥ 107), genetic associations (⇢ = 0.47, p-value = 2.7 ⇥ 108), and chemical associations (⇢ = 0.51, p-value = 2.0 ⇥ 109). We contrast the ranking provided by CRANK with the ordering of disease communities by Modularity51. Modularity-based ranking (Supplementary Figure 7c) achieved Spearman's rank correlation of ⇢ = 0.01 on molecular pathway data, ⇢ = 0.16 on genetic association data, and ⇢ = 0.12 when evaluated against external database with chemical associations. When comparing CRANK with Modularity we see that CRANK ranking is 3- to near 50-fold better than the ranking by Modularity as quantified by Spearman's rank correlation. The result that CRANK's high-ranked communities coincide with groups of diseases with similar genetics is interesting for understanding etiology of diseases, which can help with drug repurposing77. An alternative to prioritizing communities based on network structure alone might be to prioritize communities using data in an external medical database. The main obstacle to using ex- ternal data for community prioritization is that comprehensive and unbiased external data are rarely available in real world. Our analysis of the human disease network involved known diseases for which molecular, genetic or chemical information is available in the medical databases. However, the network of all medical diagnoses contains over one hundred million diagnoses78 assigned to patients in hospitals, the vast majority of which have yet unknown molecular, genetic or chemical origins. CRANK offers itself as an interesting approach for prioritizing diseases communities in such cases, because CRANK uses only information provided by the network structure. Supplementary Note 11.3 Further details on prioritizing drug communities Beyond results described in the main text, we here report prioritization performance of conduc- tance and test how conductance compares to CRANK on the network of medical drugs. Recall that the network of medical drugs connects two drugs if they share at least one target protein. Supplementary Figure 8 shows that CRANK ranking of drug communities outperforms ranking by S41 a b c Supplementary Figure 7: Prioritizing network communities found in the human symptoms disease network. (a) Human symptoms disease network44 links diseases that have significantly similar clinical manifestation. Highlighted are top five disease communities as determined by CRANK. Nodes of the highlighted communities are sized by their likelihood score (Eq. (5)). (b- c) We evaluate community prioritization against three external medical databases that were not used during community detection or prioritization: disease-pathway associations37 ("Pathways"), disease-gene associations37 ("Gene"), and disease-chemical associations37 ("Chemistry"). Bars in barplots represent disease communities; bar height denotes similarity of diseases in a community with regard to an external medical database. In perfect prioritization, the heights of the bars would be decreasing from left to right. (b) CRANK ranking exhibits 3- to near 50-fold better correspon- dence (quantified by Spearman's rank correlation coefficient ⇢ = 0.45, 0.47, 0.51) with the three external medical databases than (c) ranking of communities by Modularity (⇢ = 0.01, 0.16, 0.12). S42 Disease communities ranked by CRank Myositis Muscle weakness Glaucoma Retinal vein occlusion Neovascularization Glomerulonephritis Multiple myeloma Atrial heart septal defect Atrial fibrillation Obstructive lung diseases Brugada syndrome Megaloblastic anemia Optic nerve disease Brain ischemia Limb-girdle muscular dystrophies Optic atrophy Pathways Genes Chemistry ρ=0.45 p-value=1.7 x 10-7 ρ=0.47 p-value=2.7 x 10-8 ρ=0.51 p-value=2.0 x 10-9 ρ=0.16 p-value=8.9 x 10-2 ρ=0.12 p-value=1.8 x 10-1 Pathways Genes Chemistry Disease communities ranked by Modularity ρ=0.01 p-value=7.7 x 10-1 Supplementary Figure 8: Performance of conductance in the network of medical drugs. The network of medical drugs connects two drugs if they share at least one target protein. Commu- nities were detected by a community detection method9, and then prioritized by CRANK or an alternative method, such as conductance. We evaluate community prioritization against three ex- ternal chemical databases (Supplementary Note 6) that were not used during community detection or prioritization. For each community we measure: (1) drug-drug interactions between the drugs ("Epistasis"), (2) chemical structure similarity of the drugs ("Chemistry"), and (3) associations between drugs derived from text data ("Text"). We expect that a true high-priority community will have more drug-drug interactions, higher similarity of chemical structure, and stronger textual as- sociations between the drugs it contains. Bars represent communities; bar height denotes similarity of drugs in a community with regard to the gold standard based on external chemical databases. In a perfect prioritization, bars would be ordered such that the heights would decrease from left to right. CRANK ranking of drug communities outperforms ranking by conductance across all three chemical databases (as measured by Spearman's rank correlation ⇢ with the gold standard rank- ing). CRANK ranking achieves ⇢ = 0.38, 0.31, 0.53 (see main text), while conductance obtains ⇢ = 0.34, 0.23, 0.14. conductance on all three types of ground-truth information about chemicals. Supplementary Note 11.4 Further details on prioritizing gene communities We apply CRANK to five molecular biology networks describing physical, genetic, and regulatory interactions between genes and proteins (Supplementary Note 6.1). Community detection in such networks is useful because the detected communities tend to correlate with cellular functions, protein complexes and disease pathways41, 79, 80, and thus they provide a large pool of candidates out of which relevant communities need to be identified for further biological experimentation. CRANK takes each network and communities detected in that network9, and generates a rank-ordered list of communities. Since CRANK ranks the communities purely based on robust- S43 Drug communities ranked by Conductance ρ=0.34 p-value=1.9 x 10-3 ρ=0.23 p-value=4.3 x 10-2 ρ=0.14 p-value=2.2 x 10-1 Epistasis Chemistry Text ness and strength of network connectivity, we use the external metadata information about molec- ular functions, cellular components, and biological processes to assess the quality of community ranking. To this end, we apply statistical enrichment analysis, an established tool in computational biology, to quantify the functional enrichment of each community in molecular functions, com- ponents, and processes as captured in the Gene Ontology database47 (Supplementary Note 7.4). Given a community, the enrichment analysis determines which, if any, of the Gene Ontology terms annotating the genes of the community are statistically over-represented. Supplementary Table 8: Prioritization performance in molecular networks. The fraction of communities that rank among the top 5% and are statistically enriched in molecular functions, biological processes, and cellular components in the Gene Ontology47 (Supplementary Note 7.4). Higher values are better because they indicate that a higher fraction of top-ranked communities achieve significant correspondence with external knowledge in the Gene Ontology. Communities were detected using a statistical community detection method9 and prioritized using one of four different approaches. Method Human Net Human IntAct Yeast GI Human BioGRID Human STRING Random Modularity Conductance CRANK 0.104 0.632 0.658 0.811 0.216 0.587 0.644 0.707 0.227 0.598 0.688 0.747 0.128 0.597 0.523 0.689 0.125 0.624 0.518 0.691 We measure if the highest ranked communities in each network are more enriched in the GO terms than what would be expected by chance. Supplementary Table 8 shows how many commu- nities that rank among the top 5% of all communities in each network are functionally enriched. CRANK ranking contains on average 5 times more communities significantly enriched for cellu- lar functions, components, and processes than random prioritization, and 13% more significantly enriched communities than modularity or conductance-based ranking. For example, a community detection method9 detected 1,500 communities in the human protein-protein interaction (PPI) network. CRANK prioritized the communities by producing a rank-ordered list of all detected communities in the network. Supplementary Table 9 shows ten highest ranked communities by CRANK. The highest ranked community is composed of 20 genes, including PORCN, AQP5, FZD6, WNT1, WNT2, WNT3, and other members of the Wnt signaling protein family81. Genes in that community are enriched in the Wnt signaling pathway processes (p-value = 6.4⇥ 1023), neuron differentiation (p-value = 1.6⇥ 1015), cellular response to retinoic S44 acid (p-value = 2.9⇥1014), and in developmental processes (p-value = 9.2⇥1010), among others. These results highlight the potential of CRANK to aid in the identification of relevant com- munities from a large pool of communities detected in molecular networks. Supplementary Table 9: Highest ranked gene communities in the human PPI network. A human PPI network was compiled using interaction data from the STRING database43. A statis- tical community detection method9 was used to detect communities in the network, followed by CRANK to prioritize the communities. Listed are ten highest ranked communities. Functional enrichment of each community was determined by performing gene set enrichment analysis (Sup- plementary Note 7.4) based on the Gene Ontology term-associated gene sets47. CRANK Community Rank 1 WNT2B, PORCN, AQP5, FZD6, WNT3, WNT10A, WNT1, WNT6, WNT7A, WNT4, FZD8, WNT2, WNT5B, WNT16, WNT5A, ENSP00000345785, WNT3A, WNT10B, WNT11, WNT7B Rank 2 NMUR2, NMUR1, NMU, ENSP00000409127, HCRTR1, NPFFR2, NTSR1, ENSP00000358511, CD200, HCRT, HCRTR2 Statistically over-represented Gene Ontology terms Wnt signaling pathway (p=6.37E-23), Neuron differentiation (p=1.60E-15), Cellular response to retinoic acid (p=2.91E-14), Response to retinoic acid (p=7.73E-13), Canonical Wnt signaling pathway (p=1.84E-12), Cellular response to acid chemical (p=5.43E-11), Single-organism developmental process (p=4.05E-10), Developmental process (p=9.21E-10), Response to acid chemical (p=1.41E-09), Cell surface receptor signaling pathway (p=4.36E-09), Cell differentiation (p=4.54E-09), Anatomical structure morphogenesis (p=9.65E-09), Cellular developmental process (p=3.04E-08), Anatomical structure development (p=4.61E-08), Cellular response to lipid (p=7.58E-08), Cellular response to organic substance (p=1.13E-06), Cell proliferation (p=1.80E-06), Regulation of canonical Wnt signaling pathway (p=2.26E-06), Cellular response to transforming growth factor beta stimulus (p=7.70E-06), Cellular response to stimulus (p=8.87E-06), Response to transforming growth factor beta (p=1.25E-05), Cellular response to chemical stimulus (p=1.34E-05), Mammary gland epithelium development (p=1.46E-05), Regulation of Wnt signaling pathway (p=1.65E-05), Response to lipid (p=1.79E-05), Signal transduction (p=3.82E-05), Response to organic substance (p=1.37E-04), Cellular response to oxygen-containing compound (p=1.73E-04), Chondrocyte differentiation (p=2.03E-04), Epithelium development (p=7.54E-04), Lens fiber cell development (p=8.16E-04), Positive regulation of dermatome development (p=8.16E-04), Regulation of dermatome development (p=8.16E-04), Response to chemical (p=1.58E-03), Stem cell proliferation (p=2.86E-03), Lens development in camera-type eye (p=3.26E-03), Palate development (p=3.89E-03), Response to stimulus (p=4.94E-03), Positive regulation of canonical Wnt signaling pathway (p=5.17E-03), Response to oxygen-containing compound (p=5.73E-03), Animal organ development (p=7.57E-03), Hematopoietic stem cell proliferation (p=8.12E-03), Cellular response to growth factor stimulus (p=2.27E-02), Tissue development (p=2.75E-02), Positive regulation of Wnt signaling pathway (p=3.51E-02), Positive regulation of signal transduction (p=3.66E-02), Neural precursor cell proliferation (p=4.51E-02), Negative regulation of canonical Wnt signaling pathway (p=4.84E-02), Receptor agonist activity (p=1.02E-04), Receptor activator activity (p=9.51E-04), Receptor regulator activity (p=2.05E-03) Neuropeptide receptor activity (p=8.48E-03), Neuromedin U receptor activity (p=4.51E-02) S45 Rank 3 GHRHR, GHRH, GHRL, CCL19, LEP, CCR9, CCL21, ACE2, GHSR, MLNR, CCL25, CXCL13, ENSP00000266003 Rank 4 HLA-DPB1, TRH, ROBO2, CPE, CA12, TRHR, POLD4, RDH11, SLIT1, SLIT3, SLIT2 Rank 5 ENSP00000380280, ENSP00000264498, STAT3, FGF17, ENSP00000260795, KL, FGF19, FGF18, FGF9, FGF8, FGF7, FGF6, FGF5, FGF4, FGF3, FGFR4, FGF1 Rank 6 KCNH1, ENSP00000222812, KCNG1, KCNG2, KCNG3, KCNG4, KCNV1, KCNS3, KCNB1, KCNV2, ENSP00000254976 Feeding behavior (p=4.73E-05), Adult feeding behavior (p=7.44E-04), Response to hormone (p=2.81E-03), G-protein coupled receptor signaling pathway (p=3.61E-03), Positive regulation of multicellular organism growth (p=3.71E-03), Regulation of response to food (p=3.71E-03), Positive regulation of developmental growth (p=5.48E-03), Regulation of appetite (p=6.48E-03), Positive regulation of response to external stimulus (p=1.15E-02), Positive regulation of cell adhesion (p=4.53E-02), Behavior (p=4.84E-02), Regulation of developmental growth (p=4.84E-02), Ccr chemokine receptor binding (p=1.32E-05), G-protein coupled receptor binding (p=1.56E-04), Ccr10 chemokine receptor binding (p=1.86E-04), Chemokine activity (p=5.08E-04), Chemokine receptor binding (p=1.13E-03), Cytokine activity (p=8.66E-03), Cytokine receptor binding (p=1.48E-02), Receptor binding (p=2.36E-02) Apoptotic process involved in luteolysis (p=1.85E-04), Axon guidance (p=3.70E-04), Neuron projection guidance (p=6.71E-04), Apoptotic process involved in development (p=1.85E-03), Neuron projection extension involved in neuron projection guidance (p=6.45E-03), Axon extension involved in axon guidance (p=6.45E-03), Axon extension (p=1.03E-02), Negative chemotaxis (p=1.03E-02), Neuron projection extension (p=1.54E-02), Developmental cell growth (p=3.02E-02), Ovulation cycle process (p=4.02E-02) Fibroblast growth factor receptor signaling pathway (p=1.21E-19), Transmembrane receptor protein tyrosine kinase signaling pathway (p=1.84E-13), Enzyme linked receptor protein signaling pathway (p=1.49E-11), Positive regulation of cell proliferation (p=2.63E-07), Cell surface receptor signaling pathway (p=5.05E-07), Regulation of cell proliferation (p=2.87E-05), Signal transduction (p=6.69E-04), Regulation of endothelial cell chemotaxis to fibroblast growth factor (p=1.23E-03), Regulation of cell chemotaxis to fibroblast growth factor (p=1.23E-03), Positive regulation of biological process (p=1.10E-02), Regulation of steroid biosynthetic process (p=3.65E-02), Regulation of endothelial cell chemotaxis (p=3.65E-02), Fibroblast growth factor receptor binding (p=1.03E-08), Growth factor receptor binding (p=1.05E-05), Type 1 fibroblast growth factor receptor binding (p=3.08E-04), Type 2 fibroblast growth factor receptor binding (p=3.08E-04) Cellular potassium ion transport (p=1.05E-05), Potassium ion transmembrane transport (p=1.05E-05), Potassium ion transport (p=1.52E-05), Monovalent inorganic cation transport (p=3.99E-04), Inorganic cation transmembrane transport (p=1.66E-03), Cation transmembrane transport (p=1.66E-03), Inorganic ion transmembrane transport (p=3.15E-03), Ion transmembrane transport (p=4.23E-03), Transmembrane transport (p=1.12E-02), Metal ion transport (p=1.17E-02), Cation transport (p=2.61E-02), Delayed rectifier potassium channel activity (p=2.72E-08), Voltage-gated potassium channel activity (p=1.66E-06), Potassium channel activity (p=1.05E-05), Voltage-gated cation channel activity (p=2.14E-05), Potassium ion transmembrane transporter activity (p=2.52E-05), Voltage-gated channel activity (p=6.09E-05), Voltage-gated ion channel activity (p=6.09E-05), Monovalent inorganic cation transmembrane transporter activity (p=5.21E-04), Cation channel activity (p=1.08E-03), Gated channel activity (p=1.55E-03), Metal ion transmembrane transporter activity (p=3.55E-03), Ion channel activity (p=5.27E-03), Inorganic cation transmembrane transporter activity (p=5.57E-03), Substrate-specific channel activity (p=7.23E-03), Channel activity (p=8.82E-03), Passive transmembrane transporter activity (p=8.82E-03), Cation transmembrane transporter activity (p=1.23E-02) S46 Monovalent inorganic cation transport (p=6.90E-07), Inorganic cation transmembrane transport (p=5.24E-06), Cation transmembrane transport (p=5.24E-06), Inorganic ion transmembrane transport (p=1.30E-05), Ion transmembrane transport (p=1.97E-05), Transmembrane transport (p=7.80E-05), Metal ion transport (p=8.32E-05), Cation transport (p=2.58E-04), Regulation of sodium ion transport (p=3.18E-03), Sodium ion transmembrane transport (p=3.18E-03), Ion transport (p=4.97E-03), Sodium ion transport (p=5.62E-03), Establishment of localization (p=3.12E-02), Cation channel complex (p=2.59E-06), Sodium channel complex (p=8.17E-06), Ion channel complex (p=2.03E-05), Node of ranvier (p=3.80E-05), Transmembrane transporter complex (p=6.77E-05), Transporter complex (p=7.54E-05), Cell-cell contact zone (p=1.27E-03), Axon part (p=2.58E-03), Plasma membrane part (p=3.02E-03), T-tubule (p=2.01E-02), Membrane protein complex (p=2.62E-02), Voltage-gated channel activity (p=6.24E-06), Voltage-gated ion channel activity (p=6.24E-06), Monovalent inorganic cation transmembrane transporter activity (p=8.38E-05), Cation channel activity (p=2.01E-04), Gated channel activity (p=3.11E-04), Metal ion transmembrane transporter activity (p=8.43E-04), Ion channel activity (p=1.35E-03), Inorganic cation transmembrane transporter activity (p=1.44E-03), Substrate-specific channel activity (p=1.97E-03), Channel activity (p=2.50E-03), Passive transmembrane transporter activity (p=2.50E-03), Cation transmembrane transporter activity (p=3.71E-03), Voltage-gated sodium channel activity (p=2.01E-02), Voltage-gated ion channel activity involved in regulation of postsynaptic membrane potential (p=2.01E-02), Ion transmembrane transporter activity (p=2.74E-02), Delayed rectifier potassium channel activity (p=2.87E-02), Sodium channel activity (p=3.94E-02), Substrate-specific transmembrane transporter activity (p=4.89E-02) Negative regulation of adaptive immune response based on somatic recombination of immune receptors built from immunoglobulin superfamily domains (p=2.26E-04), Negative regulation of adaptive immune response (p=2.26E-04), Cytokine-mediated signaling pathway (p=2.36E-04), Type I interferon signaling pathway (p=5.76E-04), Negative regulation of leukocyte mediated immunity (p=1.27E-03), Negative regulation of T cell mediated immunity (p=5.73E-03), Regulation of T cell differentiation (p=1.84E-02), Regulation of lymphocyte differentiation (p=3.02E-02), Negative regulation of immune response (p=4.69E-02), Negative regulation of immune effector process (p=4.69E-02), Negative regulation of lymphocyte differentiation (p=4.77E-02), Negative regulation of T cell differentiation (p=4.77E-02) Complement activation (p=2.01E-03), Protein activation cascade (p=1.20E-02), Complement binding (p=2.01E-03) Glyceraldehyde-3-phosphate metabolic process (p=1.39E-03) Rank 7 ENSP00000347979, SPTBN4, KCNH1, KCNC1, KCNG3, ENSP00000345751, ANK3, TIAM1, SCN2A, CNTN1, SCN1B, FADD, ENSP00000376966, SCN5A, KCNV2 Rank 8 Rank 9 Rank 10 AP2M1, FBXW11, STAT2, CRKL, ENSP00000329418, IFNA2, IFNA1, IFNB1, IFNAR2, ENSP00000337825, IFNAR1, PTPRC, ZAP70, JAK1, TYK2, IFNA8, IRF9, JAK3 ENSP00000372815, CR1, C3AR1, ENSP00000396688, CST3, MASP2, C5AR2, C4B, KDM6B, C3, HCK, APOA2 HSPB1P1, G6PD, TALDO1, MRE11, SLC25A1, HUWE1, MPI, ENSP00000344818, TKT, RPE, DTYMK, KYAT1, KYAT3, NPPA S47 Supplementary references 1. Wu, F. & Huberman, B. A. Finding communities in linear time: a physics approach. The European Physical Journal B-Condensed Matter and Complex Systems (2004). 2. Karrer, B., Levina, E. & Newman, M. E. Robustness of community structure in networks. Physical Review E 77, 046119 (2008). 3. Bianconi, G., Pin, P. & Marsili, M. Assessing the relevance of node features for network structure. Proceedings of the National Academy of Sciences 106, 11433–11438 (2009). 4. Seifi, M. et al. Stable community cores in complex networks. In Complex Networks, 87–98 (Springer, 2013). 5. Chakraborty, T., Srinivasan, S., Ganguly, N., Mukherjee, A. & Bhowmick, S. On the perma- nence of vertices in network communities. In SIGKDD (2014). 6. Zhang, P. & Moore, C. Scalable detection of statistically significant communities and hierar- chies, using message passing for modularity. Proceedings of the National Academy of Sciences 111, 18144–18149 (2014). 7. Karrer, B. & Newman, M. E. Stochastic blockmodels and community structure in networks. Physical Review E 83, 016107 (2011). 8. Yang, J. & Leskovec, J. Overlapping community detection at scale: a nonnegative matrix factorization approach. In WSDM (2013). 9. Yang, J., McAuley, J. & Leskovec, J. Detecting cohesive and 2-mode communities indirected and undirected networks. In WSDM (2014). 10. Airoldi, E. M., Blei, D. M., Fienberg, S. E. & Xing, E. P. Mixed membership stochastic blockmodels. Journal of Machine Learning Research (2008). 11. Ball, B., Karrer, B. & Newman, M. Efficient and principled method for detecting communities in networks. Physical Review E 84, 036103 (2011). 12. Ho, Q., Parikh, A. P. & Xing, E. P. A multiscale community blockmodel for network explo- ration. Journal of the American Statistical Association 107, 916–934 (2012). 13. Mcauley, J. J. & Leskovec, J. Learning to discover social circles in ego networks. In NIPS (2012). 14. DuBois, C. & Smyth, P. Modeling relational events via latent classes. In KDD, 803–812 (2010). 15. Morup, M., Schmidt, M. N. & Hansen, L. K. Infinite multiple membership relational modeling for complex networks. In IEEE MLSP (2011). S48 16. Gopalan, P. K. & Blei, D. M. Efficient discovery of overlapping communities in massive networks. Proceedings of the National Academy of Sciences 110, 14534–14539 (2013). 17. Yang, J., McAuley, J. & Leskovec, J. Community detection in networks with node attributes. In ICDM (2013). 18. Bothorel, C., Cruz, J. D., Magnani, M. & Micenkova, B. Clustering attributed graphs: models, measures and methods. Network Science 3, 408–444 (2015). 19. Newman, M. & Clauset, A. Structure and inference in annotated networks. Nature Communi- cations 7, 11863 (2016). 20. Fu, W., Song, L. & Xing, E. P. Dynamic mixed membership blockmodel for evolving net- works. In ICML, 329–336 (ACM, 2009). 21. Anandkumar, A., Ge, R., Hsu, D. & Kakade, S. M. A tensor approach to learning mixed mem- bership community models. Journal of Machine Learning Research 15, 2239–2312 (2014). 22. Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S. & Dean, J. Distributed representations of words and phrases and their compositionality. In NIPS, 3111–3119 (2013). 23. Levy, O. & Goldberg, Y. Neural word embedding as implicit matrix factorization. In NIPS, 2177–2185 (2014). 24. Huang, W., Wu, Z., Chen, L., Mitra, P. & Giles, C. L. A neural probabilistic model for context based citation recommendation. In AAAI, 2404–2410 (2015). 25. Fortunato, S. Community detection in graphs. Physics Reports 486, 75–174 (2010). 26. Kass, R. E. & Raftery, A. E. Bayes factors. Journal of the American Statistical Association 90, 773–795 (1995). 27. Casella, G. & Moreno, E. Assessing robustness of intrinsic tests of independence in two-way contingency tables. Journal of the American Statistical Association 104, 1261–1271 (2012). 28. Liang, F., Paulo, R., Molina, G., Clyde, M. A. & Berger, J. O. Mixtures of g priors for Bayesian variable selection. Journal of the American Statistical Association (2012). 29. Berger, J. O. & Pericchi, L. R. The intrinsic bayes factor for model selection and prediction. Journal of the American Statistical Association 91, 109–122 (1996). 30. Gelman, A., Carlin, J. B., Stern, H. S. & Rubin, D. B. Bayesian data analysis, vol. 2 (Chapman & Hall/CRC Boca Raton, FL, USA, 2014). 31. Bernardo, J. M. & Smith, A. F. Bayesian theory (John Wiley, 2001). 32. Heck, D. W., Wagenmakers, E.-J. & Morey, R. D. Testing order constraints: Qualitative dif- ferences between bayes factors and normalized maximum likelihood. Statistics & Probability Letters 105, 157–162 (2015). S49 33. Hardle, W. & Steiger, W. Optimal median smoothing. Applied Statistics 258–264 (1995). 34. Gopalan, P. et al. Scalable inference of overlapping communities. In NIPS (2012). 35. Kuhn, M. et al. STITCH 4: integration of protein–chemical interactions with user data. Nu- cleic Acids Research gkt1207 (2013). 36. Law, V. et al. DrugBank 4.0: shedding new light on drug metabolism. Nucleic Acids Research 42, D1091–D1097 (2014). 37. Davis, A. P. et al. The comparative toxicogenomics database's 10th year anniversary: update 2015. Nucleic Acids Research gku935 (2014). 38. Leskovec, J. & Krevl, A. SNAP Datasets: Stanford large network dataset collection. http: //snap.stanford.edu/data (2014). 39. Lee, I. et al. Prioritizing candidate disease genes by network-based boosting of genome-wide association data. Genome Research 21, 1109–1121 (2011). 40. Orchard, S. et al. The MIntAct project-IntAct as a common curation platform for 11 molecular interaction databases. Nucleic Acids Research gkt1115 (2013). 41. Costanzo, M. et al. The genetic landscape of a cell. Science 327, 425–431 (2010). 42. Chatr-Aryamontri, A. et al. The BioGRID interaction database: 2015 update. Nucleic Acids Research 43, D470–D478 (2015). 43. Franceschini, A. et al. STRING v9.1: protein-protein interaction networks, with increased coverage and integration. Nucleic Acids Research 41, D808–D815 (2013). 44. Zhou, X., Menche, J., Barab´asi, A.-L. & Sharma, A. Human symptoms–disease network. Nature Communications 5 (2014). 45. Fabregat, A. et al. The Reactome pathway knowledgebase. Nucleic Acids Research 44, D481– D487 (2016). 46. Yang, J. & Leskovec, J. Defining and evaluating network communities based on ground-truth. Knowledge and Information Systems 42, 181–213 (2015). 47. Ashburner, M. et al. Gene Ontology: tool for the unification of biology. Nature Genetics 25, 25–29 (2000). 48. Leskovec, J. & Sosic, R. SNAP: A general purpose network analysis and graph mining library in C++. http://snap.stanford.edu/snap (2014). 49. Chang, J. lda: Collapsed Gibbs sampling methods for topic models. http://cran. r-project.org/web/packages/lda (2011). S50 50. Schaeffer, S. E. Graph clustering. Computer Science Review 1, 27–64 (2007). 51. Newman, M. E. Modularity and community structure in networks. Proceedings of the National Academy of Sciences 103, 8577–8582 (2006). 52. Coppersmith, D., Fleischer, L. & Rudra, A. Ordering by weighted number of wins gives a good ranking for weighted tournaments. In SODA, 776–782 (2006). 53. Dwork, C., Kumar, R., Naor, M. & Sivakumar, D. Rank aggregation methods for the web. In WWW (2001). 54. Ailon, N., Charikar, M. & Newman, A. Aggregating inconsistent information: ranking and clustering. Journal of the ACM 55, 23 (2008). 55. Khatri, P., Sirota, M. & Butte, A. J. Ten years of pathway analysis: current approaches and outstanding challenges. PLoS Computation Biology 8, e1002375 (2012). 56. Rhee, S. Y., Wood, V., Dolinski, K. & Draghici, S. Use and misuse of the gene ontology annotations. Nature Reviews Genetics 9, 509–515 (2008). 57. Menche, J. et al. Integrating personalized gene expression profiles into predictive disease- associated gene pools. NPJ Systems Biology and Applications 3, 1 (2017). 58. Mi, H., Poudel, S., Muruganujan, A., Casagrande, J. T. & Thomas, P. D. PANTHER version 10: expanded protein families and functions, and analysis tools. Nucleic Acids Research 44, D336–D342 (2016). 59. Gfeller, D., Chappelier, J.-C. & De Los Rios, P. Finding instabilities in the community struc- ture of complex networks. Physical Review E 72, 056135 (2005). 60. Reichardt, J. & Bornholdt, S. Statistical mechanics of community detection. Physical Review E (2006). 61. Reichardt, J. & Bornholdt, S. Partitioning and modularity of graphs with arbitrary degree distribution. Physical Review E (2007). 62. Hu, Y. et al. Measuring the significance of community structure in complex networks. Physical Review E 82, 066106 (2010). 63. Fagin, R., Kumar, R. & Sivakumar, D. Efficient similarity search and classification via rank aggregation. In SIGMOD, 301–312 (ACM, 2003). 64. Bartholdi III, J., Tovey, C. A. & Trick, M. A. Voting schemes for which it can be difficult to tell who won the election. Social Choice and Welfare 6, 157–165 (1989). 65. Schalekamp, F. & van Zuylen, A. Rank aggregation: Together we're strong. In ALENEX, 38–51 (SIAM, 2009). S51 66. Subramanian, A. et al. Gene set enrichment analysis: a knowledge-based approach for inter- preting genome-wide expression profiles. Proceedings of the National Academy of Sciences 102, 15545–15550 (2005). 67. Wang, J. et al. Noa: a novel network ontology analysis method. Nucleic Acids Research 39, e87–e87 (2011). 68. Draghici, S. et al. A systems biology approach for pathway level analysis. Genome Research 17, 1537–1545 (2007). 69. Glaab, E., Baudot, A., Krasnogor, N., Schneider, R. & Valencia, A. Enrichnet: network-based gene set enrichment analysis. Bioinformatics 28, i451–i457 (2012). 70. Alexeyenko, A. et al. Network enrichment analysis: extension of gene-set enrichment analysis to gene networks. BMC Bioinformatics 13, 226 (2012). 71. Zuberi, K. et al. GeneMANIA prediction server 2013 update. Nucleic Acids Research 41, W115–W122 (2013). 72. Wang, K., Li, M. & Hakonarson, H. Analysing biological pathways in genome-wide associa- tion studies. Nature Reviews Genetics 11, 843 (2010). 73. Hofree, M. et al. Network-based stratification of tumor mutations. Nature Methods 10, 1108– 1115 (2013). 74. Peel, L., Larremore, D. B. & Clauset, A. The ground truth about metadata and community detection in networks. Science Advances 3, e1602548 (2017). 75. Moreau, Y. & Tranchevent, L.-C. Computational tools for prioritizing candidate genes: boost- ing disease gene discovery. Nature Reviews Genetics 13, 523–536 (2012). 76. Greene, C. S. et al. Understanding multicellular function and disease with human tissue- specific networks. Nature Genetics 47, 569–576 (2015). 77. Hu, J. X., Thomas, C. E. & Brunak, S. Network biology concepts in complex disease comor- bidities. Nature Reviews Genetics (2016). 78. Jensen, A. B. et al. Temporal disease trajectories condensed from population-wide registry data covering 6.2 million patients. Nature Communications 5 (2014). 79. Barab´asi, A.-L., Gulbahce, N. & Loscalzo, J. Network medicine: a network-based approach to human disease. Nature Reviews Genetics 12, 56–68 (2011). 80. Tas¸an, M. et al. Selecting causal genes from genome-wide association studies via functionally coherent subnetworks. Nature Methods 12, 154–159 (2015). 81. Kessenbrock, K. et al. Diverse regulation of mammary epithelial growth and branching mor- phogenesis through noncanonical Wnt signaling. Proceedings of the National Academy of Sciences 114, 3121–3126 (2017). S52
1303.6138
1
1303
2013-03-25T14:28:46
About the survey of propagandistic messages in contemporary social media
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
This paper presents the research results that have identified a set of characteristic parameters of propagandistic messages. Later these parameters can be used in the algorithm creating special user-oriented propagandistic messages to improve distribution and assimilation of information by users.
cs.SI
cs
ABOUT THE SURVEY OF PROPAGANDISTIC MESSAGES IN CONTEMPORARY SOCIAL MEDIA Yuri Monakhov1, Natalia Kost ina1, Maria Medvednikova1, Makarov Oleg1, Irina Semenova1 1Department of Informatics and Information security, Vladimir State University, Vladimir 600000, Russia This paper presents the research results that have ident ified a set of characterist ic parameters of propagandist ic messages. Later these parameters can be used in the algorithm creat ing specia l user-oriented propagandist ic messages to improve distribut ion and assimilat ion o f informat ion by users. INTRODUCTION Current ly social networks are very popular, rapidly developing and becoming an integral part of the Internet users’ lives. The purpose of this research is to define the parameters of such promotiona l messages that influence the perception o f informat ion. is research The object of networking services on the Internet. the is The subject under research process of promoting social networking and promotional communicat ions options. socia l FORMAL PARAMETERS OF PROPAGANDISTIC MESSAGES During the research a number o f propagandist ic messages have been studied to identify the properties and parameters of those messages. Psycho logical experiments have been carried out, revealing the degree of significance of various parameters. Messages for analysis were taken from the social networking service VKontakte, as the most advanced and popular in Russia. As a result of the study the fo llowing options were designed. 1) The vo lume of messages. Measured by the number of symbo ls. 2) Message the format. Calculated as confidence to a specific format – text, video, image, sound. 3) The author. Determined by the degree o f confidence in the author. 4) Relevance. Interval between the publicat ions of o fficial propaganda and messages related to a topic. 5) Targeting. Expresses the overlap o f propagandist ic message with the informat ion of a user profile. 6) Transparency. Calculated as a percentage of common words in the message. 7) Identity. Percentage of words matches propagandist ic messages with words from the user’s messages. 8) Emotional co lor. Percentage of emotive words in the message (excluding stop- words). 9) “Nausea”. The indicator of keywords repetit ion in the message. Somet imes it is called synonymous by density. 10) “Water”. Percentage of insignificant words and stop-words in the message. The psycho logical test to determine the impact of message formats on the perception of informat ion was conducted. A message was represented in the form o f video, audio, text and photo. Have been measured such parameters as the assimilat ion o f the message content and emotional impact. The experiment results showed that audio format is assimilated better than any other format. Assessment of parameters was held by specific so ftware. Were used such programs as Textus Pro, Advego, ZnakoSchitalka, Mira Tools. The results of measurements in the programs were analyzed. Some patterns and matches the parameters in different programs were revealed. In addit ion, there were proposed two the the description of to approaches )   dTr ij disseminat ion propagandist ic of The first approach assumes that the user can send propaganda both in private messages and on the “wall” of another user. It is possible to perform 2n act ions, where n is less than the number of user 's friends. An important factor is whether the user will send messages that have been posted to his “wall”. To assess this factor, a survey was conducted. 70% of respondents gave the negat ive answer. The second approach assumes that the user places a propagandist ic message to the news line. In that case, he would not take any action to disseminate informat ion. But then the message can be displayed in the news not all the friends of the site with probability 1  ijTrP ( ijTr , the number of percent where γ - selected by the user. Further study o f the factors influencing the efficiency o f distribut ion, has resulted in appearance of two categories o f factors: technical and behavioral. The technical factors include: 1) Variability o f the message (different descript ions to the link in the message). 2) Recipient status (online / offline). 3) The age o f the target audience (young people fo llow the new links more often.) The behavioral factors include: 1) Friendly relat ions with a source - a message sent by a friend is more likely to be noticed than a message sent by a stranger. Interest in the group - sending that uses targeting (the target audience of interest, university and so on) is more effect ive. 3) Filling the profile and attractiveness of a source and a group – filled profile o f a source and complete informat ion of a group inspires more confidence to the recipient. 2) messages: classical and non-classical. 4) Newsmaker - relevance of the message in a lucrat ive destination for the time interval increases the efficiency o f distribut ion. 5) Age and sex o f a source – for example, the messages, sent by the girls, aged 18 to 24, are more popular. 6) Act ivity in the group – the group should not be "dead": the more actual the informat ion, the more effective delivery. 7) Geographical location of a source – some users have more confidence in groups and sources, located in the own country/region/city. To quantify all o f the parameters there were held the series of experiments with mass mailing messages users of the socia l the networking service. After changing parameters the results of review, the perception and response to messages have been changed as well. CONCLUSION The result o f this work can be considered as the development of a number of parameters that influence the effect iveness of advert ising and propaganda services. This in networking social informat ion may be used to increase resistance to propaganda, or, vice versa, to increase the digest ibility o f such messages. REFERENCES [1] Robert R. Bush and Frederick Mosteller A Stochast ic Model with Applicat ions to Learning// Ann. Math. Statist.,Vol. 24, N 4 (1953), P. 559-585/ Harvard University [2] Analyt ical model o f mis informat ion of a social network node/ Yuri Monakhov, Maria Medvednikova, Konstantin Abramov, Natalia Kostina, Roman Malyshev, Makarov Oleg, Irina Semenova.– Project arXiv by the Cornell University Library.– URL: http://arxiv.org/abs/1212.0336
1705.10453
1
1705
2017-05-30T04:28:28
Twitter Hashtag Recommendation using Matrix Factorization
[ "cs.SI", "cs.IR" ]
Twitter, one of the biggest and most popular microblogging Websites, has evolved into a powerful communication platform which allows millions of active users to generate huge volume of microposts and queries on a daily basis. To accommodate effective categorization and easy search, users are allowed to make use of hashtags, keywords or phrases prefixed by hash character, to categorize and summarize their posts. However, valid hashtags are not restricted and thus are created in a free and heterogeneous style, increasing difficulty of the task of tweet categorization. In this paper, we propose a low-rank weighted matrix factorization based method to recommend hashtags to the users solely based on their hashtag usage history and independent from their tweets' contents. We confirm using two-sample t-test that users are more likely to adopt new hashtags similar to the ones they have previously adopted. In particular, we formulate the problem of hashtag recommendation into an optimization problem and incorporate hashtag correlation weight matrix into it to account for the similarity between different hashtags. We finally leverage widely used matrix factorization from recommender systems to solve the optimization problem by capturing the latent factors of users and hashtags. Empirical experiments demonstrate that our method is capable to properly recommend hashtags.
cs.SI
cs
Twitter Hashtag Recommendation using Matrix Factorization Department of EECS, University of Central Florida, Orlando, FL, USA Hamidreza Alvari [email protected] 7 1 0 2 y a M 0 3 ] I S . s c [ 1 v 3 5 4 0 1 . 5 0 7 1 : v i X r a ABSTRACT Twitter, one of the biggest and most popular microblogging Websites, has evolved into a powerful communication plat- form which allows millions of active users to generate huge volume of microposts and queries on a daily basis. To ac- commodate effective categorization and easy search, users are allowed to make use of hashtags, keywords or phrases prefixed by hash character, to categorize and summarize their posts. However, valid hashtags are not restricted and thus are created in a free and heterogeneous style, increas- ing difficulty of the task of tweet categorization. In this paper, we propose a low-rank weighted matrix factorization based method to recommend hashtags to the users solely based on their hashtag usage history and independent from their tweets' contents. We confirm using two-sample t-test that users are more likely to adopt new hashtags similar to the ones they have previously adopted. In particular, we formulate the problem of hashtag recommendation into an optimization problem and incorporate hashtag correlation weight matrix into it to account for the similarity between different hashtags. We finally leverage widely used matrix factorization from recommender systems to solve the opti- mization problem by capturing the latent factors of users and hashtags. Empirical experiments demonstrate that our method is capable to properly recommend hashtags. Categories and Subject Descriptors H.4 [Information Systems Applications]: Miscellaneous; D.2.8 [Software Engineering]: Metrics-complexity mea- sures, performance measures General Terms Theory Keywords Hashtag recommendation, Hahstag Correlation, Matrix Fac- torization, Twitter Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 200X ACM X-XXXXX-XX-X/XX/XX ...$5.00. 1. INTRODUCTION Twitter1 is one of the prevalent and well-known microblog- ging Websites with millions of active users interacting with each other and posting tweets, a message up to 140 char- acters, per day on either computers or mobile devices. It is popular for massive spreading of tweets and the nature of freedom. Daily bursts of news, gossips, rumors, discus- sions and many others are all exchanged and shared by users all over the world, no matter where they come from, civi- lized or uneducated, or even what religion they hold. Con- sequently, users on Twitter are easily overwhelmed by the tremendous volume of data. The proliferation of such an un- structured user-generated data as opposed to the traditional structured data, has enabled researchers to study and ana- lyze human behavior and develop complex systems such as hashtag recommendation systems that has recently drawn few researchers attention. On Twitter, users are freely allowed to assign valid hash- tags to their tweets, i.e. strings prepended with the hash "#" character, to categorize their posts and represent a coarse- grained topic of the content. Hashtags are indeed a community- driven convention for adding additional context to tweets. This mechanism helps tweet search and quickly propaga- tion of the topic among millions of users by allowing them to join the discussion. Although facilitating the task, the heterogeneity and arbitrariness of the hashtags, due to the fact that users do not face any restrictions while creating them, can immediately make mess and hence make subse- quent searches for tweets difficult. To tackle the problem, few approaches has been proposed in the literature [14, 18, 19, 26, 28], most of them rely on either tweet similarity, i.e. content similarity or focus on adopting Latent Drichlet Allocation (LDA) [9] and Latent Semantic Indexing (LSI) [12] to capture the abstracted top- ics of tweets. The problem with these approaches is that not all the time, the contents of tweets are available due to the fact that many users do not usually have public timelines. Even if all users' timelines were public, these methods suf- fer from computation overloads and lack of strong natural language processing techniques. As opposed to the existing methods, in this paper, we rather take another simple yet effective approach and propose a new hashtag recommenda- tion method which works only based on the users' interests and their hashtag usage history without incorporating the network structure and using tweet/user similarity or LDA. In more details, we treat the problem of hashtag rec- ommendation as an optimization problem and solve it via 1https://twitter.com widely employed matrix factorization borrowed from rec- ommendation systems. Moreover, we envision that users are more likely to adopt similar hashtags while posting on Twitter and to verify that, we use two-sample t-test. Our contributions are thus summarized as follows: • We perform two-sample t-test to verify that users keep adopting related and similar hashtags and hence pos- sess consistent hashtag usage history. • We address the hashtag recommendation problem with an optimization problem and propose a weighted ma- trix factorization based method hW M F to recommend hashtags to the users. To ease the process of optimiza- tion, we use alternating least square scheme for updat- ing the corresponding matrices as finding the optimal values for them is tedious. • We integrate the concept of correlation between the re- lated hashtags into the matrix factorization equation. We quantify the correlation between hashtags based on the times they have been used together and incor- porate these values into the optimization problem to weigh the contribution of training samples over test samples. • We collect and build a dataset of tweets which con- tains at least five hashtags very close to a predefined list of 25 trending hashtags (hereafter called seeds list) selected from different categorizes. We evaluate the model on this dataset and demonstrate its ability to recommend hashtags that best aligns with the users' hashtag usage history. The remainder of the paper is organized as follows. In Section 2, we first define the problem of interest and then detail our proposed matrix factorization method to solve the problem. We explain the experimental settings and discuss the results in Section 3. Then, we discuss the related work in Section 4 and conclude the paper in Section 5. 2. PROPOSED FRAMEWORK In this section, prior to describing the proposed method, we first provide the formal definition of the problem and the notations used throughout the paper. Then we detail the proposed model hW M F for Twitter hashtag recommenda- tion and explain the time complexity of the method. We finally describe two sample t-test to verify our initial as- sumption about users' hashtag usage. 2.1 Problem Statement Given a set of N users and a set of M hashtags adopted by them, we aim to recommend the most related hashtags to the users based on their interests and the hashtag us- age history. Suppose we have a very sparse and low-rank user-hashtag matrix X = [xij] ∈ RN×M . We denote by xij, 1 ≤ i ≤ N, 1 ≤ j ≤ M the ith row and jth column of X, which represents if user i has adopted hashtag j, if xij = 1, but has nothing to say otherwise. The zeros in the matrix demonstrate unknown or missing values; a user might have adopted a hashtag in the past but we could not figure it out since our data collection method does not al- ways return all data. The reason that X is sparse is because in Twitter, users do not usually adopt hashtags while tweet- ing and despite the availability of this feature, only 8% of + the tweets contain hash "#" character [18] Also, suppose we have a hashtag-hashtag matrix Y = [yij] ∈ RM×M with yij, 1 ≤ i ≤ M, 1 ≤ j ≤ M equals to the number of times hashtags i and j are used together. + We treat the problem of hashtag recommendation as a col- laborative filtering based one and formulate it into an opti- mization problem and employ low-rank matrix factorization to solve it as this method has been widely and successfully employed in various applications such as collective filtering [17] and document clustering [29]. In its basic form and in the context of recommendar systems, matrix factorization, one of the realizations of latent factor models, captures both items and users by vectors of factors inferred from the rat- ings. Here, instead we characterize users and hashtags by inferring vectors of factors from user's hashtag usage history. 2.2 Matrix factorization model Based on matrix factorization scheme, we seek two low- and V ∈ RM×d rank and non-negative matrices U ∈ RN×d with dimensionality of the latent space d (cid:28) M, N via solving the following optimization problem: + + F (cid:80) F + γ1U2 F + γ2V2 (cid:113)(cid:80) minU,VW (cid:12) (X − UVT )2 (1) where (cid:12) is Hadamard product (element-wise product) where (X(cid:12) Y)ij = Xij × Yij for any two matrices X and Y with the same size, .F is the Frobenius norm of a matrix, , 1 ≤ i ≤ AF = N, 1 ≤ j ≤ M is an indicator matrix (i.e. weight matrix) to control the learning process. Also, γ1 > 0 and γ2 > 0 are non-negative regularization parameters and U2 F and V2 F are two smoothness regularization terms to avoid overfitting. The row vectors ui., 1 ≤ i ≤ N and vj., 1 ≤ j ≤ M denote the low-dimensional representations of users and hashtags respectively. ij and W = [wij] ∈ RN×M + j A2 i We integrate W into the optimization equation to avoid impacts of unknown elements of X, i.e. increase the contri- bution of the elements with known values in the optimiza- tion process over the elements with the missing information. Therefore, for those hashtags that we have information for, i.e. whether a user has adopted them before, we use wij = 1 and for those with missing information we use the average of their correlation with other hashtags with information. In other words, the indicator matrix is formally defined as: wij = j ,k corr (hj ,hk ) A xij = 1 , xij = 0, xik = 1, yjk ≥ 1 (2) where A = {j ∀j, xij = 1} and corr(hj, hk), i.e. correla- tion between hashtags hj and hk, is calculated by: (cid:40) (cid:80) 1, corr(hk, hj) = (3) yjk(cid:80) t(cid:54)=k yjt Optimization. The coupling between U and V in the optimization problem, makes it difficult to find the optimal solutions for both matrices. Therefore, in this work, we adopt the alternating least squares method[13] to solve the optimization problem, where the objective function is itera- tively optimized with respect to one of the variables U and V while fixing the other one until convergence. Optimizing the equation 1 with respect to U and V corresponds to the computation of their derivatives via the following equations. Given the following objective function: L = W (cid:12) (X − UVT )2 the update equations for U and V are computed according F + γ1U2 F + γ2V2 (4) F to the following equations: U = U − λ V = V − λ ∂L ∂U ∂L ∂V (5) (6) where λ > 0 is the learning step and the partial derivatives of L with respect to U and V are then obtained using: = −2(W (cid:12) X)V + 2(W (cid:12) (UVT ))V + γ1U (7) ∂L ∂U = −2(W (cid:12) X)T U + 2(W (cid:12) (UVT ))T U + γ2V (8) ∂L ∂V Upon the convergence, we approximate X by multiplying the low-rank matrices U and V: (cid:101)X = UVT (9) Algorithm. The detailed algorithm for the proposed ma- trix factorization framework is shown in Algorithm 1. Af- ter randomly initializing matrices U and V and construct- ing the indicator matrix W in lines 3-5, in lines 7-10, we alternatingly update U and V based on the equations 5 to 8, until we reach convergence. Practically, convergence is achieved whenever predefined maximum number of iter- ations has been reached or there is little change in the ob- jective function value. Finally, (cid:101)X = UVT is the low-rank representation of user-hashtag matrix X and also is non- negative as U and V are both non-negative matrices. Algorithm 1 The proposed framework hWMF 1: Input: User-hashtag matrix X, hashtag-hashtag matrix 2: Output: Modeled matrix (cid:101)X Y, d, γ1, γ2, λ 3: Initialize U randomly 4: Initialize V randomly 5: Construct the indicator matrix W according to eq. 2 6: while Not convergent do ∂U = −2(W (cid:12) X)V + 2(W (cid:12) (UVT ))V + γ1U 7: Update U ← U − λ ∂L 8: ∂V = −2(W (cid:12) X)T U + 2(W (cid:12) (UVT ))T U + γ2V 9: Update V ← V − λ ∂L 10: 11: end while ∂U ∂V 12: Set (cid:101)X = UVT ∂L ∂L 2.3 Time Complexity We discuss the time complexity of the proposed method, hWMF, here. Obviously, the complexity burden of hWMF depends mostly on the computation of the derivatives in Equations 7 and 8. In each iteration in our algorithm 1, the time complexities of the computation of the derivatives in lines 7 and 9 are calculated as follows: first note that W(cid:12)X, UVT and (W(cid:12)(UVT )) need to be calculated once for both equations. The time complexity of W (cid:12) X is O(Nx) where Nx is the number of non-zero elements of the sparse matrix X. Also, the time complexity of UVT is O(N dM ). For (W(cid:12) X)V, we need O(Nxd). For the second term in Eq. 7, i.e. (W (cid:12) (UVT ))V, we need O(N M + N M d). Thus in ∂U takes O(Nxd + N M d). each iteration, the calculation of ∂L With the similar computations, the calculation of ∂L ∂V has the time complexity of O(Nxd + N M d) in each iteration. In the next section, we provide statistical evidence that users are indeed more willing to adopt hashtags that have correlations with each other and consequently maintain con- sistent hashtag usage history. This confirms the correct- ness of our intuition on both incorporating the indicator matrix W into the optimization equation and solving the equation via matrix factorization model as collaborative- filtering based models captures well the relations between items (here, hashtags). 2.4 t-test We perform two-sample t-test and verify the existence of hashtag usage consistency. In particular, we seek to answer the question: Do users in Twitter possess consistent hashtag usage history? We construct two vectors hcu and hcr with the equal num- ber of elements where each element in hcu is obtained by calculating the correlation between hashtags hi and hj used by user u using Eq. 3 and similarly each element in hcr is the calculated correlation score between hashtags hi used by user u and hj used by a random user r. We perform a t-test on vectors hcu and hcr. The null hypothesis here is that the correlation of hashtags used by a given user does not differ from those of different users, i.e. these two vectors are the same, H0 : hcu = hcr, while the other hypothesis is that the hashtags used by the same user are more correlated than those used by different users, H1 : hcu > hcr. Therefore we have the following two-sample t-test: H0 : hcu = hcr, H1 : hcu > hcr (10) The t-test result suggests a strong evidence with the sig- nificance level α = 0.001 to reject the null hypothesis and as a result, confirms that users tend to use a consistent set of hashtags while posting tweets on Twitter. Therefore the answer to the above question is positive. This aligns well with our findings and equations in our matrix factorization model in the previous section. 3. EXPERIMENTS We first collect and build our dataset by making use of the Twitter streaming API2 which provides 1% random tweets from the total volume of tweets at a particular moment. We then conduct experiments to compare the performance of our proposed method with the baselines. In this section, we begin by introducing our dataset and the evaluation metric and then we design experiments and discuss the results. 3.1 Dataset In general, the evaluation of hashtag recommendation ap- proach is challenging due to difficulty of collecting the appro- priate and standard dataset, while also human annotation is almost impossible and unreliable because of the tedious 2https://dev.twitter.com/streaming/overview Table 1: Description of the dataset # of users # of tweets Max # of paired hashtags adopted by users Min # of paired hashtags adopted by users Max # of times given paired hashtag used Min # of times given paired hashtag used # of seeds # of hashtags 2,976 6,503 108 5 313 0 25 6,814 workload for evaluating data. Therefore we need a more systematic way of generating the dataset. We rather collect the data in the following way: we first picked a set of 25 trending hashtags of different categories as our initial seeds list including: News, Obama, Iran, Yemen, Gaza, Islam, Terrorism, Shooting, BlackLivesMatters, Youtube, Apple, Google, Microsoft, iPad, Android, Internet, FIFA, JohnNash, LadyGaga, Movie, Weekend, MemorialDay, Love, Hate, Care. We then expanded this list to the 6,814 related hashtags by collecting a set of tweets containing at least five related hashtags to the hashtags in the seeds list (see Table 2 for some examples). This way, we obtain a coarse-grained dataset of very close related hashtags which ease the task of evaluation of the proposed method. The description of the resulting dataset with %0.99 spareness is shown in Table 1. The power-law [11] like distributions of the paired hash- tags used by users and seen together are depicted in Fig- ures 1 and 2 respectively. For the sake of clarity, we remove from Fig. 2, pairs of hashtags which have never appeared together. As we observe from Fig. 1, very few users have used more than 20 paired hashtags while the peak in this plot shows that most of the users have only used less than 20 paired hashtags. This is somehow demonstrated in Fig. 2 as well; roughly 5,424 paired hashtags are used together only once while we observe the decrease in the number of adopted paired hashtags as we move further in the plot. These figures together show the severe sparsity in our dataset; not all the hashtags have paired together at all; most paired hashtags are adopted together rarely. We further plot the distribution of hashtag correlation scores in Fig. 3 (based on the Eq. 2). Since the number of uncorrelated hashtags are much higher than those with correlation, once again, for clarity we remove uncorrelated hashtags. This figure demonstrates that many hashtag cor- relation scores fall in (0,0.1] which shows most of the hash- tags do not have strong correlation with each other, sug- gesting a power-law like distribution of hashtag correlation scores in our dataset. 3.2 Evaluation Metric Similar to the most recommendation systems, we are un- able to use popular metrics such as precision as they require to know the values of all entries in the ground truth matrix to correctly evaluate the returned values against them. Re- member we had zero elements in the matrix representation of our dataset which do not necessarily show users did not adopt the hashtags, i.e. they demonstrate unknown or miss- ing values; a user might have adopted a hashtag in the past but we could not figure it out as our data collection method does not always return all data from Twitter. Instead, we use widely used metric for evaluating collaborative filtering Figure 1: Distribution of paired hashtags used by users Figure 2: Distribution of paired hashtags used to- gether results, root mean square error (RMSE), which is defined as: (cid:115)(cid:80)n i,j((cid:101)xij − xij)2 n RM SE = (11) where n is the number of test instances used for the eval- uation and (cid:101)xij and xij are corresponding test set elements of (cid:101)X and X selected for the evaluation respectively. 3.3 Discussion As discussed before, only few works have addressed the problem of hashtag recommendation and none of them ap- pear to be comparable to our method since they all recom- mend hashtags based on the tweets contents while we do that based on the hashtag usage history. Consequently, we build two baselines and compare the results as follows, MF: this is a variant of our matrix factorization model Table 2: Examples of seed hashtags and their related hashtags Related hashtags Seed #Obama Democrats, Whitehouse, tlot, tcot, Congress #Iran #iPad #Google IranTalks, IranDeal, Nuclear, Iraq, Syria Android, iOS, iPhone, freeaps, Apple io15, Chrome, YouTube, Googleplay, Wearable Table 3: RMSE Comparison for our method with different dimensions of latent space and when per- centage of test set is fixed to %30 5 10 15 20 25 0.1697 0.1378 0.1645 0.1709 0.1865 tent space d is set to 10. To demonstrate the effect of d on the results in Table 3, we fix the percentage of test set to %30 and vary d as {5, 10, 15, 20, 25}. The observation suggests that d = 10 is the best dimension among others. • The performance comparison for different methods in terms of RMSE is shown in Table 4. We observe the best results for all percentages of test set are achieved by our proposed method. The next best method is M F which is a variant of the proposed framework with a different indicator matrix. One observation is that defining the indicator matrix based on the corre- lation between hashtags perform better than the one solely defined similar to the matrix X. Furthermore, the reason our method recommend hashtags more ac- curately than kNN - Correlation is because we incorpo- rate the correlation between hashtags into widely used matrix factorizastion while kNN - Correlation recom- mends hashtags merely based on the correlation of the hashtags. • Table 5 shows two potential practical examples of our method for two anonymized Twitter users. As we ob- serve, both of them have been offered one hashtag (to be concise, we do not show other recommended hash- tags) and they actually adopt them in their future tweets. Obviously, these predicted hashtags are just those from the ground truth set that we use as test in- stances, i.e. those that we know users have previously used. This means we have not applied our method in the real world yet. 4. RELATED WORK As opposed to the large body of works that has been de- voted to the study of various social networks based appli- cations [2, 6, 4, 16, 3, 15, 7, 8, 5] and in particular recom- mendation systems in social networks [24, 10, 1, 27, 21, 20], very few works have addressed the problem of hashtag rec- ommendation for easy categorization and retrieval of tweets. The previous works on hashtag recommendation mostly rely on the similarity between tweets and none of them have exploited the correlation between the topics of the hashtags nor the users' history of hashtags usage. In particular, they focused on two main directions: majority of them recom- mend hashtags based on content similarity having storage problems, fewer adopt LDA, which fails in short texts and is Figure 3: Distribution of hashtag correlation scores. with the indicator matrix W defined as follows: (cid:40) wij = 1, xij = 1 0, xij = 0 (12) which is basically the same as the user-hashtag matrix X. k-Nearest Neighbors with correlation (kNN - Cor- relation): given the whole set of potential hashtags for each user, this method recommends k most correlated hashtags with those each user has used before. In details, we rank hashtags according to the Eq. 3 in descending order and recommend top k hashtags to the user. Random: as the name suggests, this method recom- mends hashtags on a random basis to the users. For our proposed method, we try various parameters and report the best performance, while other methods do not have parameters. In particular, we set both regularization parameters γ1 and γ2 to 0.2 and set the learning step λ to 0.001. Also, we apply different dimensions of latent space d and observe the best performance is achieved when d = 10. For brevity, we only demonstrate this in Table 3, when percentage of test set is fixed to %30. With the parameters chosen as above, our experimental setting is as follows: Suppose we have (cid:96) = {(ui, hj) xij = 1} is the set of pairs of users and hashtags that we know they have adopted. We choose %x of (cid:96) as new relations 0 between users and hashtags to predict. We remove these relations by setting xij = 0,∀(ui, hj) ∈ 0 and then apply the hashtag recommendation approaches on the new representation of X. We vary x as {10, 20, 30, 40, 50}. We make the following observations: • As stated before, for brevity, we only report the best performance of our method when the dimension of la- Table 4: Performance Comparison for different approaches in terms of RMSE with d = 10 and different testbed sizes %10 %20 %30 %40 %50 hWMF MF kNN-Correlation Random 0.0913 0.1756 0.2827 0.6821 0.1156 0.1904 0.3996 0.6901 0.1378 0.2023 0.4018 0.7045 0.1512 0.2278 0.4377 0.7121 0.1693 0.2502 0.6229 0.7187 Table 5: Example hashtag usage history and suggested hashtags User Hashtags adopted in past Suggested hashtags Tweets posted with suggested hashtags 1 Obama, News, Democrates HillaryClinton 2 Weekend, Party, Club MemorialDay unsupervised and hence requires efforts to associate tweets with hashtags, and use abstracted topics of tweets. Another problem with these approaches is the contents of tweets are not always available since many users do not usually make their timelines publicly available due to the privacy con- cerns. Moreover, these methods suffer from computation overloads and lack of strong natural language processing techniques which are required to analyze the contents of tweets. [19] employs WordNet similarity information and Euclidean distance to suggest hashtags from similar tweets. Given a tweet from a user, [28], first discover similar tweets in their dataset based on the TF-IDF[25] representation of tweets. Then they recommend hashtags by three different approaches, relying on ranking the hashtags based on the overall popularity of tweets, the popularity within the most similar tweets, and third one, the most similar tweets, re- ported to perform the best among the others. As opposed to their method which is solely based on the tweets similar- ities, [23] considers terms in tweets and their relevance to candidate hashtags. In more details, they propose a ranking scheme, a variant of TF-IDF that takes into account the rele- vance of hashtags and data sparsity. Similar to their method, [14], proposes an approach focusing on detection of hidden topics for the tweets and recommending the use of those gen- eral topics as hashtags based on LDA model. In details, an unsupervised and content based hashtag recommendation based on LDA is proposed in this study. They first design and develop a binary language classifier for tweets based on the Naive Bayes and Expectation-Maximization and then apply LDA in the context of tweet hashtag recommendation in a fully unsupervised manner. Different from the other studies, [26] proposes a super- vised topic modeling based approach for recommendation of hashtags by treating hashtags as labels of topics and lever- aging topic model to discover relationship between words, hashtags and topics of tweets. with the assumption that each tweet is about one local topic and there is a global background topic for the corpus. They finally recommend k most probable hashtags based on the probability that a new tweet would contain a hashtag. [22], uses probability dis- tributions for hashtag recommendation. In particular, they uses Bayes rule to compute the maximum a posteriori prob- ability of each hashtag class given the words of the tweet. #HillaryClinton how explain ALL BUSH FAULT? How still #rap 1993-2001 #BillClinton 100% INNO- CENT? Military Hero Joey Jones Is Honored with The Real Deal Award https://... #MemorialDay In an different attempt, [18] proposes a method that rec- ommends hashtags based on similar users and tweets by cal- culating the preference weight of a user towards a certain hashtag based on the TF-IDF and then selecting the top users with high cosine similarities with other users. Also, they use the same approach for calculating the top similar tweets. Since many tweets do not contain hashtags, the rec- ommended hashtags may be from similar tweets instead of similar users. They claim that their method is able to rec- ommend more personalized hashtags compared to the other methods and their method suits both user preferences and the tweet content. In contrast, this study seeks to recommend hashtags by incorporating hashtag usage history of each user into the hashtag recommendation problem and address the problem with an optimization problem while using matrix factoriza- tion model to solve it. In particular, we do not rely on the network structure or similarity between tweets/users; instead we exploit the correlation between hashtags by fo- cusing on the probability of their adoption together. 5. CONCLUSION AND FUTURE WORK In this study, we presented an approach to recommend hashtags to the users solely based on their interests and hashtags usage history, which in contrast to the approaches in the literature, does not require the contents of tweets as they are not always available since many users do not usu- ally make their timelines publicly available due to the pri- vacy concerns. In addition to that, all other methods suffer from severe computation burden and lack of strong natu- ral language processing techniques to analyze the contents of tweets. We formulated the problem into an optimization problem and integrated correlation between different hash- tags into the equation and used widely used matrix factor- ization technique to solve the problem via alternating least squares scheme. Experiments demonstrate that our method outperforms other baselines in recommending more accurate hashtags to the users. In future, we plan to replicate the study by investigating the correlation between hashtags based on first discovering their topics from the content of their corresponding tweets through using topic modeling techniques such as LDA, and then computing their topic similarity based on the existing popular similarity measures. That way, we can integrate more accurate correlation values between hashtags into our matrix factorization model. We are investigating other interesting research directions such as time series analysis of the adoption of hashtags by different users and extend the model to work well in pres- ence of time slots in order to design seasonal hashtag recom- mendation systems as well as incorporating demographics of users specially gender of the users to recommend personal- ized hashtags to them. 6. REFERENCES [1] G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. Knowledge and Data Engineering, IEEE Transactions on, 17(6):734–749, June 2005. [2] H. Alvari, A. Hajibagheri, G. Sukthankar, and K. Lakkaraju. Identifying community structures in dynamic networks. Social Network Analysis and Mining (SNAM), 2016. [3] H. Alvari, S. Hashemi, and A. Hamzeh. Detecting overlapping communities in social networks by game theory and structural equivalence concept. In International Conference on Artificial Intelligence and Computational Intelligence, pages 620–630. Springer Berlin Heidelberg, 2011. [4] H. Alvari, S. Hashemi, and A. Hamzeh. Discovering overlapping communities in social networks: A novel game-theoretic approach. AI Communications, 26(2):161–177, 2013. [5] G. Beigi, X. Hu, R. Maciejewski, and H. Liu. An overview of sentiment analysis in social media and its applications in disaster relief. In Sentiment Analysis and Ontology Engineering: An Environment of Computational Intelligence, volume 639, pages 313–340. Springer International Publishing, 2016. [6] G. Beigi, M. Jalili, H. Alvari, and G. Sukthankar. Leveraging community detection for accurate trust prediction. 2014. [7] G. Beigi, J. Tang, and H. Liu. Signed link analysis in social media networks. In International AAAI Conference on Web and Social Media (ICWSM), 2016. [8] G. Beigi, J. Tang, S. Wang, and H. Liu. Exploiting emotional information for trust/distrust prediction. In SIAM International Conference on Data Mining (SDM), 2016. [9] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. J. Mach. Learn. Res., 3:993–1022, Mar. 2003. [10] J. Bobadilla, F. Ortega, A. Hernando, and A. Guti´eRrez. Recommender systems survey. Know.-Based Syst., 46:109–132, July 2013. [11] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Rev., 51(4):661–703, Nov. 2009. [12] S. Deerwester, S. T. Dumais, G. W. Furnas, T. K. Landauer, and R. Harshman. Indexing by latent semantic analysis. Journal of the American society for information science, 41(6):391–407, 1990. [13] C. H. Q. Ding, T. Li, and M. I. Jordan. Nonnegative matrix factorization for combinatorial optimization: Spectral clustering, graph matching, and clique finding. In ICDM, pages 183–192. IEEE Computer Society, 2008. [14] F. Godin, V. Slavkovikj, W. D. Neve, B. Schrauwen, and R. V. de Walle. Using topic models for twitter hashtag recommendation. In WWW (Companion Volume), pages 593–596. International World Wide Web Conferences Steering Committee / ACM, 2013. [15] A. Hajibagheri, H. Alvari, A. Hamzeh, and S. Hashemi. Community detection in social networks using information diffusion. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pages 702–703. IEEE Computer Society, 2012. [16] A. Hajibagheri, H. Alvari, A. Hamzeh, and S. Hashemi. Social networks community detection using the shapley value. In Artificial Intelligence and Signal Processing (AISP), 2012 16th CSI International Symposium on, pages 222–227. IEEE, 2012. [17] Y. Koren. Factorization meets the neighborhood: a multifaceted collaborative filtering model. In Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 426–434. ACM, 2008. [18] S. M. Kywe, T.-A. Hoang, E.-P. Lim, and F. Zhu. On recommending hashtags in twitter networks. In SocInfo, volume 7710 of Lecture Notes in Computer Science, pages 337–350. Springer, 2012. [19] T. Li, Y. Wu, and Y. Zhang. Twitter hash tag prediction algorithm. In ICOMP'11-The 2011 International Conference on Internet Computing, 2011. [20] P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. In R. Meersman and Z. Tari, editors, On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE, volume 3290 of Lecture Notes in Computer Science, pages 492–508. Springer Berlin Heidelberg, 2004. [21] P. Massa and P. Avesani. Trust-aware recommender systems. In Proceedings of the 2007 ACM Conference on Recommender Systems, RecSys '07, pages 17–24, New York, NY, USA, 2007. ACM. [22] A. Mazzia and J. Juett. Suggesting hashtags on twitter. In EECS 545 Project, Winter Term, 2011. URL http://www- personal.umich.edu/ amazzia/pubs/545-final.pdf. [23] E. Otsuka, S. A. Wallace, and D. Chiu. Design and evaluation of a twitter hashtag recommendation system. In IDEAS, pages 330–333. ACM, 2014. [24] A. Rajaraman and J. D. Ullman. Mining of massive datasets. Cambridge University Press, Cambridge, 2012. [25] G. Salton and M. J. McGill. Introduction to modern information retrieval. 1986. [26] J. She and L. Chen. Tomoha: Topic model-based hashtag recommendation on twitter. In WWW (Companion Volume), pages 371–372. ACM, 2014. [27] X. Su and T. M. Khoshgoftaar. A survey of collaborative filtering techniques. Adv. in Artif. Intell., 2009:4:2–4:2, Jan. 2009. [28] E. Zangerle, W. Gassler, and G. Specht. Recommending #-tags in twitter. In Proceedings of the Workshop on Semantic Adaptive Social Web (SASWeb 2011). CEUR Workshop Proceedings, volume 730, pages 67–78, 2011. [29] S. Zhu, K. Yu, Y. Chi, and Y. Gong. Combining content and link for classification using matrix factorization. In SIGIR '07: Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pages 487–494, New York, NY, USA, 2007. ACM.
1801.07004
1
1801
2018-01-22T09:16:35
Public Sentiment and Demand for Used Cars after A Large-Scale Disaster: Social Media Sentiment Analysis with Facebook Pages
[ "cs.SI" ]
There have been various studies analyzing public sentiment after a large-scale disaster. However, few studies have focused on the relationship between public sentiment on social media and its results on people's activities in the real world. In this paper, we conduct a long-term sentiment analysis after the Great East Japan Earthquake and Tsunami of 2011 using Facebook Pages with the aim of investigating the correlation between public sentiment and people's actual needs in areas damaged by water disasters. In addition, we try to analyze whether different types of disaster-related communication created different kinds of relationships on people's activities in the physical world. Our analysis reveals that sentiment of geo-info-related communication, which might be affected by sentiment inside a damaged area, had a positive correlation with the prices of used cars in the damaged area. On the other hand, the sentiment of disaster-interest-based-communication, which might be affected more by people who were interested in the disaster, but were outside the damaged area, had a negative correlation with the prices of used cars. The result could be interpreted to mean that when people begin to recover, used-car prices rise because they become more positive in their sentiment. This study suggests that, for long-term disaster-recovery analysis, we need to consider the different characteristics of online communication posted by locals directly affected by the disaster and non-locals not directly affected by the disaster.
cs.SI
cs
Public Sentiment and Demand for Used Cars after A Large-Scale Disaster: Social Media Sentiment Analysis with Facebook Pages Graduate School of Interdisciplinary Information Studies, Graduate School of Interdisciplinary Information Studies, Yuya Shibuya The University of Tokyo, Japan, [email protected] Hideyuki Tanaka The University of Tokyo, Japan, [email protected] ABSTRACT There have been various studies analyzing public sentiment after a large-scale disaster. However, few studies have focused on the relationship between public sentiment on social media and its results on people's activities in the real world. In this paper, we conduct a long-term sentiment analysis after the Great East Japan Earthquake and Tsunami of 2011 using Facebook Pages with the aim of investigating the correlation between public sentiment and people's actual needs in areas damaged by water disasters. In addition, we try to analyze whether different types of disaster- related communication created different kinds of relationships on people's activities in the physical world. Our analysis reveals that sentiment of geo-info-related communication, which might be affected by sentiment inside a damaged area, had a positive correlation with the prices of used cars in the damaged area. On the other hand, the sentiment of disaster-interest-based- communication, which might be affected more by people who were interested in the disaster, but were outside the damaged area, had a negative correlation with the prices of used cars. The result could be interpreted to mean that when people begin to recover, used-car prices rise because they become more positive in their sentiment. This study suggests that, for long-term disaster-recovery analysis, we need to consider the different characteristics of online communication posted by locals directly affected by the disaster and non-locals not directly affected by the disaster. CCS CONCEPTS Information systems → Data mining KEYWORDS Sentiment Analysis; Social Media; Facebook Pages; Used car 1 INTRODUCTION Social data mining in the context of disasters has been widely addressed because of the increasing popularity of social media. However, most studies focus on short-term restoration from disasters and fewer studies analyze social data mining for long-term recovery [25]. In addition, there is a need to study more about the relationships between social media communication and people's actual activities in the real world. With this in mind, this paper Social Web in Emergency and Disaster Management 2018. analyzes long-term public sentiment after a large-scale disaster and investigates the relationships between public sentiment and people's needs in the disaster-stricken area. More specifically, we compare sentiment in Facebook Page posts and comments related to sentiments about disaster-stricken areas and people as well as used- car price data in the damaged areas of the Great East Japan Earthquake and Tsunami of 2011. The reason we focused on used- car price is that when a water-related large-scale disaster occurs, used cars tend to be increasingly in demand in the damaged areas as shown in subsection 2.1. Our previous study reveals that, after the Great East Japan Earthquake and Tsunami, people in the damaged area needed to buy less expensive cars that required less paperwork for purchase when they began to actively rebuild their daily lives and community, such as when they would go to work, check on their family's safety, and work on recovery efforts [1]. The rest of this paper is constructed as follows. Section 2 provides a literature review and our research questions. In Section 3, we explain the two types of data for our analysis. In Section 4, a sentiment analysis method and its results are described. In Section 5, the model for investigating the relationships between social media sentiment and used-car market data is explained. The result of our analysis is provided in Section 6. Based on this result, we discuss the main findings of our study in Section 7. Lastly, we conclude our study in Section 8. 2 RELATED WORK In this section, we briefly overview related works from two viewpoints: Used-car analysis and social media data analysis focusing on sentiment analysis during disasters. 2.1 Used-car demand after the disaster When a large-scale water-related disaster (e.g., hurricane, typhoon, tsunami) hits a community, used-car demand tends to increase in the community. For example, after Hurricane Harvey and Irma in 2017, the media reported increased demand for used cars around the flooded areas [3, 5, 14]. Likewise, after the Great East Japan Earthquake and Tsunami, newspapers reported a rise in the demand for used cars in the disaster-stricken area to replace water-damaged vehicles and to aid in the rebuilding of the community [20]. [26] statistically shows that there was an increased demand for used cars, particularly for Light Motor Vehicles1 in the disaster-stricken area compared to less demand in non-damaged areas. Also, [1] suggests that communication on Facebook related to the Great East Japan Earthquake and Tsunami, such as topics of people's activities for recovery and emotional support may have correlated to used-car demand in water-damaged areas. This paper attempts to deepen the understanding of the relationships between online communication and damaged people's needs by applying the Hedonic regression model, which is widely used to assess used-car prices in related studies [1, 10, 22, 26]. The Hedonic Regression Model is a simple economic model that estimates the demand value of a product as reflected in a bundle of embodied characteristics and obtains estimates of the contributory value of each characteristic [22]. By controlling used-car characteristics, the Hedonic model allows us to assess the correlation between used-car prices, which reflect used- car demand [26], and sentiment expressed on Facebook Pages. 2.2 Social Media Data Analysis and Sentiment Analysis for Disaster Management Leveraging social media data before, during and after disasters for disaster management has become popular recently. In particular, social media contents shared by local citizens in a disaster-stricken area can provide unique and critical information for emergency responders, event planners, damaged people, journalists, and digital volunteers [27]. Existing studies have recognized different communication patterns between local and non-locals during disasters [13]. [28] found that twitter users in general were more likely to re-tweet the accounts of people local to emergency events. Moreover, [2] investigated an imaginary representation of a disaster via images shared on Twitter, and found that locals focus more on the business details of the response and the damage in their cities while a non-local population focused more on the images of people suffering. Another research direction in the context of disasters, which this study also considers, is sentiment analysis. Public mood and emotion after a large-scale disaster have been analyzed broadly [8, 9, 11, 15, 21, 29]. For example, [18] analyzes the tweets during Hurricane Sandy and describes how people's sentiment changed based on their distance from the hurricane. However, analyzing how cyber-world sentiment correlates with physical world data is still in its infancy compared to other fields. In marketing research, correlations between social media sentiment and sales [24], consumer choice [16], and stock prices [23] have been quantitatively analyzed. In public health, the correlations between a pandemic and social media data have been studied with the aim of detecting epidemic outbreaks as soon as possible [4, 6, 7]. There is a need to study more about what cyber-world data during disasters means in a real-world situation. In disaster management research, to the authors' best knowledge, most studies have focused on a relatively short period (e.g., [9, 11, 19]), and no study has revealed the relationships between sentiment expression in the cyber world and people's activities in the real world for long-term recovery. However, the authors assume that monitoring and assessing a 1 A Japanese category of light motor vehicles whose engine volumes are 660cc or less.
 community's long-term recovery status by leveraging social media data will aid effective and efficient implementation of recovery efforts because traditional socio-economic recovery indicators (e.g., changes in population, consumption and gross domestic production) are not published in a real-time way. Social media data has the possibility of filling the gap in recovery situational awareness by its timeliness. Therefore, this study investigates public sentiment on social media for recovery phases from a socio-economic perspective, with different groups in mind because local and non- local people tend to express and share information differently. 2.3 Research Question Based on the related works described above we have developed the following research questions; RQ1: How does public sentiment of disaster-related communication on Facebook relate to the demand for used cars in the damaged area? RQ2: Do different types of disaster-related communication have different types of relationships to the demand for used cars in the damaged area? 3 DATA To examine the two research questions in 2.3 above, we collected two types of datasets; Facebook Page data and Japanese used-car market data from the damaged area. 3.1 Facebook Page dataset 3.1.1 Facebook Pages Data. Facebook Pages are places to connect people with the same interests, and they are widely used by businesses, organizations, and individuals. Operators of Facebook Pages can share themed content, information, and activities with users, who can also react, comment, and share these posts with their friends. Before collecting Facebook Pages' content data, we first selected Facebook Pages located in Japan2. As of February 2017, there were 109,046 Facebook Pages in Japan. From these pages, we crawled every post and comment between March 11th and September 11th in 2011 through Facebook Graph API. Through acquiring this data, we found that 16,540 out of 109,046 pages published posts during the period. In total, 873,005 posts and comments were gathered. Some of these posts and comments also have attachment files, such as notes, photos, videos, and links to other websites. In this study, we analyzed every text data including attachment descriptions. 3.1.2 Disaster-related posts. To examine whether different types of disaster-related communication have different types of effects on the demand for used cars, we created the following four datasets. Dataset1) Geo-information based dataset. First, we selected posts, comments, and descriptions which contained any of the tsunami-stricken areas' names, including cities, towns, villages, and 2 The initial list of the Facebook Pages was provided by Professor Shyhtsun Felix Wu, the University of California, Davis. small district's names (totally 2,092 areas' names)3. In this method, we found 67,330 posts and comments. Dataset2) Disaster-interests-based dataset. Second, we tested word appearance proportions between 2010 (before the disaster) and 2011 (after the disaster). In doing so, we further collected Facebook Pages in Japan between March 11th and September 11th in 2010 and found 220,871 posts and comments. By conducting a chi-square test of nouns, adjectives, and verbs whose letter lengths are more than one (in Japanese), we identified 3,385 words whose appearance ratios were significantly larger than those in 2010 (p < .05). Because we found several non-disaster-related words among the 3,385 words, for the purpose of this study, the authors manually picked 623 words from the 3,385 words if a word related to the Great East Japan Earthquake and Tsunami and automobile demand. In total, 264,441 posts and comments were found. Dataset3) In addition, we created an intersection of Dataset1 and Dataset2 as Dataset3 (56,017 posts/comments). Dataset4) contains data which consists of only interest-based disaster-related posts and comments (subtracting Dataset3 from Dataset2). Figure 1 shows the number of posts and comments in each dataset and the relationships between them. Figure 1: Four types of disaster-related Facebook Page datasets and number of posts and comments of each dataset 3.2 Used-car market data The second data we used for the analysis was Japanese used-car market data. We used used-car data sourced from advertisements which were posted on one of the most dominant used-car magazines in Japan, 'Goo.' 'Goo' is published half-monthly. We used the data posted by dealers in the water-damaged areas (Miyagi and Iwate prefectures), between the second half of April in 2011 and the first half of October in 2011. After the disaster, 'Goo' suspended publication of the issue for the first half of April in the damaged area. In total, we analyzed data from 12 issues covering half of the year after the disaster. For the analysis, we selected four types of Light Motor Vehicle used cars because the demand for Light Motor Vehicles notably increased in the damaged area after the disaster [26]. Table 1 describes real prices and the numbers of these body types4. 3 This study used areas' name based on 2015 Population Census (https://www.e- stat.go.jp/). If a city, town, or village is listed in the 'Area of inundated area' published by Japan (http://www.gsi.go.jp/kikaku/kikaku60004.html) and located in Miyagi and Iwate prefectures, we regard the area as tsunami-stricken. Information Geospatial Authority the of Table 1: Real prices and numbers in the damaged area between the second half of April and the first half of October in 2011 Real Price (yen) Min Max Number of cars Mean S.D. Body type Light Motor Vehicle RV (LR) Light Motor Vehicle Cab Van (LC) Light Motor Vehicle Truck (LT) Light Motor Vehicle Others (LO) 16,333 49,281 2,975,359 626,484 314,974 1,314 59,609 1,469,681 538,981 258,629 1,280 71,942 1,565,262 482,745 246,275 3,567 39,014 1,745,118 520,550 280,973 4. Facebook Page Sentiment Analysis To analyze the sentiment of each Facebook Page's posts and comments, we have also used Japanese sentiment porality dictionaries designed to use for sentiment analysis, which are openly provided by Inui-Okazaki Laboratory, Tohoku University [12, 17]. The dictionaries contain about 5,000 verbs, adjectives, and adjectival verbs, and about 8,500 nouns. Every word in the dictionaries is tagged as positive, negative, or neutral. For the sake of this study, we removed ten disaster-related words from the dictionaries; namely, 'disaster-stricken,' 'disaster,' 'Tsunami,' 'evacuation,' 'earthquake,' 'catastrophe,' 'flooded,' 'disaster-stricken area,' and 'big disaster.' With the dictionaries, we enumerated the numbers of positive, negative, and neutral words in each post and comment. Then, the sentiment score of the i th post or comment is calculated as Si; 𝑁"#$%"&"'( – 𝑁"+(,-&"'( 𝑁"#$%"&"'(+𝑁"+(,-&"'(+𝑁"+(/&0-1 𝑤ℎ𝑒𝑟𝑒 𝑁"#$%"&"'(,𝑁"+(,-&"'( and 𝑁"+(/&0-1 denote the number of positive, negative and neutral words of the i th comment or post5. If the i th post or comment had any attachment description and the attachment description was different from the i th text, the attachment description's score was added to Si. To analyze these scores with used-car prices, the means of sentiment score in every half month was calculated. Figure 2 shows the chronological change of the sentiment scores means for Dataset1, Dataset2, Dataset3, and Dataset4, respectively. The trends of Dataset 1 and 3 and those of Dataset 2 and 4 are different and sometimes go in opposite directions as the figure shows. 4 Real prices of the used cars were calculated based on the monthly 'automobile' deflator of the fiscal 2015 Consumer Price index (CPI). 5 When polar words appear with denial words in one phrase (e.g., I was not happy, where 'happy' is a positive word and 'not' is a denial.), the word (e.g., happy) is counted as an opposite polar word (e.g., happy as negative). For the analysis, we set a one-month time lag between Facebook Pages' data and used-car data because Facebook data is real-time information, but used-car data is paper-based and takes about one month to be published after data was collected from town used-car shops. For example, Facebook Page data of the second half of April 2011 corresponds to the used-car data of the second half of May 2011 in this study. Our target time range was from the second half of April to the second half of September in 2011. X5j = Other fuels dummy (LPG, CNG or FC = 1, others = 0) Age: X6j = Age (in years) Kilometers driven: X7j = 100,000km dummy (over 100k km driven = 1, others = 0) We apply equation (1) to four types of datasets respectively. The statistical summary and correlation tables of our model are shown in the Appendix. Table 2. The result of our models X1 S ** ** X4 X5 X6 1 t e s a t a D X2 X3 C L 2 t e s a t a D C L O L std err 0.0 std err 0.0 O L R L .636 T L R L .636 T L X7 D_72 D_82 D_91 Inter Adjr2 cept 0.0 * 0.0 * -0.129 ** -0.296 ** -0.019 -0.002 -0.048 * 1.651 * .666 coef 0.0 -0.043 ** 0.0 * 0.0 * 0.0 0.0 0.002 0.019 0.024 0.022 0.023 0.663 0.014 0.0 0.0 std err 0.0 .700 coef 0.0 ** 0.048 ** 0.0 0.0 0.0 0.102 -0.082 ** -0.357 ** -0.033 -0.020 -0.048 0.801 0.018 0.0 0.0 std err 0.0 0.0 0.144 0.002 0.018 0.032 0.031 0.028 0.857 0.092 ** 0.318 * 0.267 -0.071 0.309 ** -0.10 ** -0.321 ** -0.006 0.013 -0.015 0.942 ** .660 coef 0.0 0.005 0.157 0.182 0.182 0.087 0.001 0.007 0.010 0.009 0.009 0.255 std err 0.0 coef 0.0 ** 0.229 ** 0.0 0.0 0.0 0.0 -0.078 ** -0.343 ** -0.007 -0.017 -0.016 -0.095 0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.035 0.035 0.033 1.009 std err 0.0 0.0 0.0 -0.129 ** -0.295 ** 0.011 -0.010 -0.016 -1.964 .665 coef 0.0 ** -0.042 ** 0.0 0.0 0.0 0.0 0.002 0.019 0.021 0.022 0.024 1.347 0.014 0.0 0.0 0.0 ** 0.139 -0.082 ** -0.359 ** -0.008 -0.003 0.011 -6.240 ** .703 coef 0.0 ** 0.043 * 0.0 ** 0.0 ** 0.018 0.0 0.0 0.0 0.144 0.002 0.018 0.029 0.030 0.030 1.689 .660 coef 0.0 ** 0.092 ** 0.325 * 0.266 -0.078 0.310 ** -0.10 ** -0.321 ** 0.011 0.009 0.005 -1.465 ** 0.005 0.158 0.182 0.182 0.087 0.001 0.007 0.009 0.009 0.009 0.557 std err 0.0 0.0 0.0 -0.078 ** -0.343 ** -0.012 -0.023 -0.032 1.761 coef 0.0 ** 0.228 ** 0.0 0.0 0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.031 0.035 0.036 2.10 std err 0.0 0.0 ** 0.0 ** -0.129 ** -0.296 ** -0.037 -0.010 -0.057 * 1.595 * .666 coef 0.0 ** -0.042 ** 0.0 * 0.0 * 0.0 0.0 0.002 0.019 0.027 0.022 0.024 0.621 0.014 0.0 0.0 .700 coef 0.0 ** 0.048 ** 0.0 0.0 0.0 0.104 -0.082 ** -0.357 ** -0.022 -0.027 -0.041 0.079 0.018 0.0 0.0 0.0 0.145 0.002 0.018 0.036 0.030 0.030 0.787 .684 ** .660 coef 0.0 ** 0.092 ** 0.320 * 0.268 -0.073 0.310 ** -0.10 ** -0.321 ** -0.010 0.008 -0.017 0.005 0.158 0.182 0.182 0.087 0.001 0.007 0.011 0.008 0.009 0.245 std err 0.0 0.0 0.0 -0.078 ** -0.343 ** -0.016 -0.015 -0.022 0.265 coef 0.0 ** 0.230 ** 0.0 0.0 0.038 0.0 0.0 0.0 0.0 0.002 0.027 0.040 0.034 0.035 0.926 std err 0.0 0.0 -0.003 -0.014 -2.896 ** 0.0 ** 0.0 ** -0.129 ** -0.294 ** .666 coef 0.0 ** -0.043 ** 0.0 ** 0.0 ** 0.0 0.0 0.002 0.019 0.021 0.022 0.023 1.093 0.014 0.0 0.0 0.0 -0.009 -5.007 ** .703 coef 0.0 ** 0.043 * 0.0 ** 0.0 0.0 ** 0.136 -0.082 ** -0.359 ** -0.030 0.0 0.144 0.002 0.018 0.029 0.030 0.028 1.369 0.018 0.0 0.0 .660 coef 0.0 ** 0.092 ** 0.324 * 0.261 -0.082 0.310 ** -0.10 ** -0.321 ** 0.004 0.013 0.004 -1.743 ** 0.005 0.157 0.182 0.182 0.087 0.001 0.007 0.009 0.009 0.009 0.447 0.0 0.0 -0.078 ** -0.343 ** -0.006 -0.023 -0.026 1.316 0.038 0.0 0.0 0.0 0.002 0.027 0.031 0.035 0.033 1.641 Note1: Note: D_72, D_82, D_91 represent dummies of the first half of July, the second half of August, and the first half of September, respectively. This applies to the tables below. Note2: P value *: < .05, **: < .01 std err 0.0 coef 0.0 ** 0.228 ** 0.0 0.0 std err 0.0 R L .636 T L R L .660 T L std err 0.0 std err 0.0 std err 0.0 std err 0.0 0.0 O L C L C L O L 4 t e s a t a D 3 t e s a t a D 6. RESULT By applying equation (1) to four types of datasets, this study observes how public sentiment toward the disaster correlates with used-car price, and whether different types of communication about the disaster have a different correlation with the used-car prices. Table 2 shows the result of our analysis. The estimated coefficients of S are bolded if they have a statistically significant effect (p < .05). there were significant positive correlations of S with the price of LR and LO. Similarly, in Dataset3 (Geo-info and disaster-related interests), there was a significant positive effect of S on the price of LR and LO. On the other hand, in Dataset2 (Only Disaster-related interests), there were significant negative correlations of S for the price of LR and LC. In addition, for Dataset4 (Disaster-related interests), there were significant negative correlations of S for LR, LC, and LO. For Dataset1 (Geo-info), 7 Related research uses engine volume as another control variable, but the current study does not because all target light motor vehicles' engine volumes are the same (660cc). Note: 1 and 2 in the x-axis label represent the first half or second half of the month. Because the disaster happened on the 11th of March 2011, the first half of March in 2011 is divided into two: the first half before the disaster (March 1st to March 10th), and the first half after the disaster (March 11th to 31st ). Figure 2: Sentiment Score mean of Dataset1-4 5. MODEL To assess how S correlates with used-car prices, we developed our model, based on the Hedonic Model used in our previous work [10]: 𝑙𝑛𝑃==𝛽@+𝛽A𝑋=+𝛽C𝑆=+𝛽E𝐷=+𝜀= (1) Where lnPj is the natural logarithm of the real price of the j th product, Xj is a vector of observable characteristics of the used cars. Sj is Facebook Pages' sentiment scores. Dj is a dummy vector of periods. We chose three periods in order to control chronological effect on prices6. εj is the error term. By focusing on Sj, we can assess the correlation between the sentiment scores on disaster-related posts and comments on Facebook Pages and the price of used cars in the damaged area by controlling the observable characteristics of the used cars and the chronological effect based on the hedonic approach. For the control variables Xj, this paper uses the following7: Transmission: X1j = Transmission dummy (Automatic = 1, others = 0) Fuel: X2j = Diesel dummy (Diesel = 1, others =0) X3j = Gas Hybrid dummy (Gas Hybrid = 1, others = 0) X4j = EV dummy (EV = 1, others = 0) 6 The first half of July, the second half of August, and the first half of September are chosen as control periods. We assessed all the periods as a dummy variables based on equation (1) by using all-type-pooling data. Those of the three periods are statistically significantly positive. 7. DISCUSSION In this section, we discuss the results presented in the previous section. First our analysis reveals that there was a statistically significant positive correlation between Facebook sentiment scores and the price of LR and LC in geo-info based datasets – Dataset1 and Dataset3. Therefore, when geo-info-based disaster-related communication was more positive, there might have been excess demand for LR and LO in the damaged area. On the other hand, our analysis also shows that there were significant negative correlations between Facebook sentiment scores and the prices of several used- car types in disaster-related interests-based datasets – Dataset2 and Dataset4. These negative correlations between sentiment scores and used-car prices might be affected by the different trends of sentiment scores between geo-info-based and disaster-interested-based communication. There are two interpretations of this result. One interpretation is that when people's sentiments in the damaged area became positive, they started to purchase used cars. The other interpretation is that when people are just beginning to recover as indicated in rising car prices, they become more positive in their sentiment. The latter supports the idea that people do not remain helpless victims of disaster response, and instead participate in recovery in ways that are helpful. For further discussion, we focus on a comparison of Dataset3 and Dataset4 because both are equally related to disaster-interests (Figure 1). Facebook Pages users whose post or comment categorized in Dataset3 might be familiar with damaged areas because they know the names of damaged-areas while those of Dataset4 might not be familiar with these areas. Moreover, the trends of sentiment scores are different. In particular, those of Dataset3 and Dataset4 after the first half of April are negatively correlated (coefficient = -0.28). This difference might imply that the sentiment of those who are familiar with damaged areas such as local residents might change in the opposite direction to the sentiment of those who are not familiar with them such as non-local residents. This means, for instance, that even when people's activities in the damaged area aimed at restoring their daily-lives were intense and their sentiment positively improved, people outside the damaged area might express their anxiety or concern due to reading comments about people's continuous struggles for recovery in the damaged area. These results are consistent with other research that indicates that local citizens more likely share images related to response, recovery and the damage, while the non-local population focused more on the images of people suffering [2]. In long-term recovery, local residents might have had more positive sentiments regarding disaster than those on the outside. This is because they need to be strong to return back to normal routines while onlookers from the outside might continue to express sentiments of worry as part of their collective gaze on others' suffering [2]. Our results imply that, for long-term recovery analysis, we need to distinguish the sentiment differences between those who familiar with the damaged areas and those who are not familiar with the areas even if both are interested in the disaster recovery. 8. CONCLUSION The purpose of this study was to analyze the following two questions; (1) how the public sentiment of disaster-related communication on Facebook related to the demand for used cars in the damaged area, and (2) whether different types of disaster-related communication related differently to the demand for used cars. For the first question, our analysis reveals that there were correlations between social media sentiment and the price of used cars in the damaged area. For the latter question, this study shows that a correlation between disaster-related communication and used- car demand might depend on whether the people communicating are local or non-local. When those who are familiar with the disaster areas, such as local residents, communicate about the disaster, their sentiment on Facebook Pages might have positively correlated with the price of used cars. One interpretation of this result is that when people are beginning to recover as indicated in rising car prices, they become more positive in their sentiment. On the other hand, the sentiment of those who are not familiar with the disaster areas, i.e. non-local people might negatively correlate to the used-car demand. This results suggest that we need to distinguish sentiment between those who are familiar with the damaged area and those who are not familiar even if both are equally interested in the disaster itself and disaster relief. Our study was able to contribute academically to disaster management with the following two points. First, this study showed the potential usefulness of social media data for assessing long-term disaster recovery status in disaster-stricken areas. Secondly, we were able to shed light on a new point of discussion; namely, whether for long-term recovery different types of disaster-related communication on social media have different types of effects in the real world. On the other hand, we only investigate one disaster. There is a need to investigate other water-related large-scale disasters, such as hurricanes. In addition, future studies should investigate whether sentiment, in general, helps determine other types of public demands other than those of used cars. APPENDIX Table A1 Statistical summary of the models Data set1 Data set4 S Data set3 S Data set2 S LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 S mean 12.99 0.72 0.00 0.00 0.00 0.00 7.61 0.14 0.10 0.10 0.09 0.19 0.19 0.20 0.19 std 0.65 0.45 0.00 0.00 0.00 0.00 3.81 0.34 0.30 0.29 0.29 0.01 0.01 0.01 0.01 min 10.57 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17 max 14.37 1.00 0.00 0.00 0.00 0.00 20.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20 mean 13.07 0.29 0.00 0.00 0.00 0.00 7.37 0.31 0.09 0.08 0.10 0.19 0.19 0.20 0.19 std 0.53 0.45 0.00 0.00 0.00 0.06 4.25 0.46 0.28 0.27 0.30 0.01 0.01 0.01 0.01 min 11.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17 max 14.20 1.00 0.00 0.00 0.00 1.00 21.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20 mean 13.21 0.58 0.00 0.00 0.00 0.00 7.40 0.16 0.09 0.10 0.10 0.19 0.19 0.20 0.19 std 0.54 0.49 0.02 0.01 0.01 0.03 3.73 0.37 0.29 0.30 0.30 0.01 0.00 0.01 0.01 min 10.81 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17 max 14.91 1.00 1.00 1.00 1.00 1.00 21.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20 mean 12.95 0.06 0.00 0.00 0.00 0.00 10.00 0.14 0.10 0.08 0.10 0.19 0.19 0.20 0.19 std 0.54 0.24 0.00 0.00 0.00 0.00 5.27 0.35 0.30 0.27 0.30 0.01 0.01 0.01 0.01 min 11.18 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.17 0.17 0.18 0.17 max 14.26 1.00 0.00 0.00 0.00 0.00 22.00 1.00 1.00 1.00 1.00 0.21 0.20 0.23 0.20 LA N= 3,567 LC N= 1,314 LR N= 16,333 LT N= 1,280 Table A2 Correlation table of the model for Each Dataset LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 S 1 t e s a t a D 3 t e s a t a D Dataset2 .137 .217 .053 -.024 .216 1 -.080 .003 -.497 -.261 1 -.024 -.002 -.005 1 .137 .216 -.080 .127 1 -.007 -.002 -.002 -.001 .0 .003 -.017 -.005 -.002 .217 -.085 -.497 -.166 .004 .210 -.019 -.005 -.261 -.067 LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 S .022 .009 .002 .031 -.003 -.022 .004 .012 -.003 -.009 -.001 .0 -.012 -.053 -.002 -.009 .013 -.103 .130 -.106 1 .413 .252 - .127 -.007 .0 .053 -.002 -.017 -.166 -.067 -.002 .210 -.003 1 -.001 -.002 -.085 -.019 -.004 .004 -.005 -.003 .004 -.004 .002 .297 -.003 1 1 -.006 .297 1 .005 .002 -.004 -.020 -.006 -.102 .004 -.003 -.001 -.012 -.002 -.103 .40 .016 .009 -.008 -.010 -.003 -.011 -.002 .016 .008 -.003 .005 .002 -.004 -.020 -.006 -.102 1 -.106 -.289 .0 -.002 -.003 -.004 -.003 -.004 -.003 -.006 .008 -.003 .002 -.003 .0 1 .002 .004 .011 -.004 .003 Dataset4 1 1 .217 .003 -.024 .137 1 -.080 .053 .216 -.080 -.497 -.261 .127 .053 -.024 -.002 -.005 1 .137 .216 .127 1 -.007 -.002 -.002 -.001 .0 -.017 -.005 -.002 .003 -.085 -.497 -.166 .004 -.019 -.005 -.261 -.067 S LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 .025 .009 .002 .035 -.003 -.017 .004 .016 -.003 -.007 -.001 .0 -.012 -.054 -.002 -.006 -.103 -.181 .205 -.106 .253 -.007 .0 -.002 -.017 -.166 -.067 -.002 -.003 -.001 -.002 -.085 -.019 -.004 -.005 -.003 -.004 .004 -.003 .297 1 -.006 -.002 -.003 -.004 -.003 -.004 -.003 -.006 .008 .002 .016 .008 -.003 .005 .002 -.004 -.020 -.006 -.102 .0 .016 .009 -.002 -.008 -.007 -.007 -.003 .002 -.004 -.020 -.006 -.102 -.003 -.001 -.012 -.002 -.103 .561 .004 .002 1 .297 .0 1 .002 .004 -.106 -.190 -.003 -.003 .217 .210 .005 .004 1 .30 .210 1 1 LnP X1 X2 X3 X4 X5 X6 X7 D_72 D_82 D_91 - S .0 -.005 .0 ACKNOWLEDGEMENTS We thank the reviewers of this paper for their constructive feedback including insightful suggestion of an interpretation of our results. Any errors are the responsibility of the authors. This study was partially supported by the research grant 'Proto Award,' which the first author received. We would like to show our gratitude to Proto Corporation who provided used-car market data and financial support. This study is also partially supported by the Graduate Program for Social ICT Global Creative Leaders. The authors also would like to thank Professor Shyhtsun Felix Wu from the University of California, Davis, for providing us with the initial data of the Japanese Facebook Pages' profiles. This study received ethical approval (No.17-2) from the Graduate School of Interdisciplinary Information Studies, The University of Tokyo. REFERENCES [1] Shibuya Y. and Tanaka H. 2017. A Demand Side Analysis of the Car Market after The Great East Japan Earthquake and Tsunami of 2011: A content analysis of Facebook Pages. In Proceedings of the 16th International Conference of the Japanese Economic Policy Association, (Nov. 2017). Naha, Japan. [2] Bica, M. et al. 2017. Visual Representations of Disaster. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17. (Feb. 2017), Portland, OR, 1262–1276. DOI:https://doi.org/10.1145/2998181.2998212. [3] Breuninger, K. 2017. Hurricane Harvey could cause a price surge for used cars. CNBC. [4] Charles-Smith, L.E. et al. 2015. Using social media for actionable disease surveillance and outbreak management: A systematic literature review. PLoS ONE. 10(10), 1–20. DOI:https://doi.org/10.1371/journal.pone.0139701. [5] Chee, B. 2017. Hurricanes cause used car prices to increase. Daily News. [6] Chew, C. and Eysenbah, G. 2006. Pandemics in the Age of Twitter: Content Analysis of Tweets during the 2009 H1N1 Outbreak. Annals of the Academy of Medicine Singapore. 35(5), 361–367. DOI:https://doi.org/10.1371/journal.pone.0014118. [7] Chunara, R. et al. 2012. Social and news media enable estimation of epidemiological patterns early in the 2010 Haitian cholera outbreak. American Journal of Tropical Medicine and Hygiene. 86(1), 39–45. DOI:https://doi.org/10.4269/ajtmh.2012.11-0597. [8] Gruebner, O. et al. 2017. A novel surveillance approach for disaster mental health. PLoS One. 12(7), 1–15. DOI:https://doi.org/http://dx.doi.org/10.1371/journal.pone.0181233. [9] Guan, X.Y. and Chen, C. 2014. Using social media data to understand and assess disasters. Natural Hazards. 74, 2 (2014), 837–850. DOI:https://doi.org/10.1007/s11069-014-1217-1. [10] Haan, M.A. and de Boer, H.W. 2010. Has the Internet Eliminated Regional Price Differences? Evidence from the Used Car Market. De Economist. 158, 4 (2010), 373–386. DOI:https://doi.org/10.1007/s10645-010-9151-4. [11] Kelly, S. and Ahmad, K. 2014. Determining levels of urgency and anxiety during a natural disaster: Noise, affect, and news in social media. In DIMPLE: DIsaster Management and Principled Large-Scale information Extraction Workshop Programme. 70. [12] Kobayashi, N. et al. 2005. Collecting Evaluative Expressions for Opinion Extraction. Journal of Natural Language Processing. 12, 3 (2005), 203–22. DOI:https://doi.org/10.5715/jnlp.12.3_203. [13] Kogan, M. et al. 2015. Think Local, Retweet Global. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW '15, 981–993. DOI:https://doi.org/10.1145/2675133.2675218. [14] Lang, S. 2017. Expect Used-Car Prices to Skyrocket in the Southeast Post- Hurricane. Car and Driver. [15] Li, X.H. et al. 2017. Reasoning human emotional responses from large-scale social and public media. Applied Mathematics and Computation. 310, 182–193. DOI:https://doi.org/10.1016/j.amc.2017.03.031. [16] Liu, Y. and Lopez, R.A. 2016. The impact of social media conversations on consumer brand choices. Marketing Letters. 27(1), 1–13. DOI:https://doi.org/10.1007/s11002-014-9321-2. [17] Masahiko, H. et al. 2008. Learning sentiment of nouns from selectional preferences of verbs and adjectives. In Proceedings of the 14th Annual Meeting of the Association for Natural Language Processing, (Mar. 2008), Tokyo, 584– 587. [18] Neppalli, V.K. et al. 2017. Sentiment analysis during Hurricane Sandy in emergency response. International Journal of Disaster Risk Reduction. 21 (2017), 213–222. DOI:https://doi.org/10.1016/j.ijdrr.2016.12.011. [19] Nguyen, D.A. et al. 2014. On critical event observability using social networks: A disaster monitoring perspective. In Proceedings IEEE Military Communications Conference MILCOM. (Oct. 2014), Baltimore, MD, 1633– 1638. DOI:https://doi.org/10.1109/MILCOM.2014.268. [20] Nikkei Sangyo Shinbun. 2011. Register of used cars increased in the disaster- striken area. Nikkei Sangyo Shinbun. [21] Onorati, T. and Diaz, P. 2015. Semantic Visualization of Twitter Usage in Emergency and Crisis Situations. Information Systems for Crisis Response and Management in Mediterranean Countries, Iscram-Med. N.B. BenSaoud et al., eds. 3–14. Springer, Cham. [22] Prieto, M. et al. 2015. Using a hedonic price model to test prospect theory assertions: The asymmetrical and nonlinear effect of reliability on used car prices. Journal of Retailing and Consumer Services. 22(2015), 206–212. DOI:https://doi.org/10.1016/j.jretconser.2014.08.013. [23] Rao, T. et al. 2012. Twitter Sentiment Analysis: How to Hedge Your Bets In The Stock Markets. State of the Art Applications of Social Network Analysis, 227- 247, Springer International Publishing. [24] Rui, H. et al. 2013. Whose and what chatter matters ? The effect of tweets on movie sales. Decision Support Systems. 55(4), 863–870. DOI:https://doi.org/10.1016/j.dss.2012.12.022. [25] Shibuya, Y. 2017. Mining Social Media for Disaster Management : In Proceedings of IEEE International Conference on Big Data (Dec. 2017), Boston, MA, 3029–3036. [26] Shibuya, Y. and Tanaka, H. 2017. How Does a Large-scale Disaster Impact on the Used-car Market. In Proceedings of the 74th Conference of Japan Economic Policy Association (May. 2017), Tokyo. [27] Starbird, K. et al. 2012. Learning from the crowd: Collaborative filtering techniques for identifying on-the-gGround Twitterers during mass disruptions. In Proceedings of 9th International Conference on Information Systems for Crisis Response and Management, ISCRAM. (Apr. 2012), Vancouver, Canada, ID 148, 1–10. [28] Starbird, K. and Palen, L. 2010. Pass it on?: Retweeting in mass emergency. In Proceedings of the 7th International ISCRAM Conference, (Dec. 2010), Seattle, Wahington, 1–10. DOI:https://doi.org/10.1111/j.1556-4029.2009.01231.x. [29] Woo, H. et al. 2015. Public Trauma after the Sewol Ferry Disaster: The Role of Social Media in Understanding the Public Mood. International Journal of Environmental Research and Public Health. 12(9), 10974–10983. DOI:https://doi.org/10.3390/ijerph120910974.
1605.06167
1
1605
2016-05-19T22:24:26
Combining Density and Overlap (CoDO): A New Method for Assessing the Significance of Overlap Among Subgraphs
[ "cs.SI", "physics.soc-ph" ]
Algorithms for detecting clusters (including overlapping clusters) in graphs have received significant attention in the research community. A closely related important aspect of the problem -- quantification of statistical significance of overlap of clusters, remains relatively unexplored. This paper presents the first theoretical and practical results on quantifying statistically significant interactions between clusters in networks. Such problems commonly arise in diverse applications, ranging from social network analysis to systems biology. The paper addresses the problem of quantifying the statistical significance of the observed overlap of the two clusters in an Erd\H{o}s-R\'enyi graph model. The analytical framework presented in the paper assigns a $p$-value to overlapping subgraphs by combining information about both the sizes of the subgraphs and their edge densities in comparison to the corresponding values for their overlapping component. This $p$-value is demonstrated to have excellent discrimination properties in real applications and is shown to be robust across broad parameter ranges. Our results are comprehensively validated on synthetic, social, and biological networks. We show that our framework: (i) derives insight from both the density and the size of overlap among communities (circles/pathways), (ii) consistently outperforms state-of-the-art methods over all tested datasets, and (iii) when compared to other measures, has much broader application scope. In the context of social networks, we identify highly interdependent (social) circles and show that our predictions are highly co-enriched with known user features. In networks of biomolecular interactions, we show that our method identifies novel cross-talk between pathways, sheds light on their mechanisms of interaction, and provides new opportunities for investigations of biomolecular interactions.
cs.SI
cs
Combining Density and Overlap (CoDO): A New Method for Assessing the Significance of Overlap Among Subgraphs Coordinated Science Lab, UIUC Dept. of Computer Science, Purdue University Shahin Mohammadi † West Lafayette, IN 47907 [email protected] Abram Magner∗† Champaign, IL 61820 [email protected] Ananth Grama Dept. of Computer Science, Purdue University West Lafayette, IN 47907 [email protected] Abstract Algorithms for detecting clusters (including overlapping clusters) in graphs have received significant attention in the research community. A closely related impor- tant aspect of the problem – quantification of statistical significance of overlap of clusters, remains relatively unexplored. This paper presents the first theoretical and practical results on quantifying statistically significant interactions between clusters in networks. Such problems commonly arise in diverse applications, ranging from social network analysis to systems biology. The paper addresses the problem of quantifying the statistical significance of the observed overlap of the two clusters in an Erdos-Rényi graph model. The analytical framework presented in the paper assigns a p-value to overlapping subgraphs by combining information about both the sizes of the subgraphs and their edge densities in comparison to the correspond- ing values for their overlapping component. This p-value is demonstrated to have excellent discrimination properties in real applications and is shown to be robust across broad parameter ranges. Our results are comprehensively validated on synthetic, social, and biological networks. We show that our framework: (i) derives insight from both the density and the size of overlap among communities (circles/pathways), (ii) consistently outperforms state-of-the-art methods over all tested datasets, and (iii) when com- pared to other measures, has much broader application scope. In the context of social networks, we identify highly interdependent (social) circles, and show that our predictions are highly co-enriched with known user features. In networks of biomolecular interactions, we show that our method identifies novel cross-talk between pathways, sheds light on their mechanisms of interaction, and provides new opportinities for investigations of biomolecular interactions. 1 Introduction Quantification of statistical significance of an observed artifact in data is a critical aspect of data analytics applications, particularly at scale. The statistical significance of an artifact is often quantified ∗Corresponding authors: [email protected] †Authors contributed equally. in terms of its p-value – the probability that a random event caused the observed artifact. Clearly, the lower this probability, the higher the statistical significance. Statistical significance, in terms of its p-value is defined with respect to a prior, which models the background (random) distribution. Selecting a prior that is distant from the data renders all observations significant (i.e., they have very low p values). Conversely, selecting a prior that is identical to the data renders all observations insignificant (i.e., their p values approach 1). A suitable combination of a statistical prior along with an appropriate p value formulation provides discrimination of significant artifacts from those that are not. p-values of observed artifacts may be estimated using analytic or sampling techniques. Sampling techniques for artifacts in graphs often require large numbers of samples for convergence. Analytic techniques, on the other hand, pose significant challenges for derivation of tight bounds, particularly for complex graph models. Analytic techniques have been successfully demonstrated in the context of characterizing the significance of dense subgraphs [1], distributions of subgraph diameters, and frequencies of network motifs such as triangles. Sampling based techniques have been demonstrated in conjunction with non-parametric graph priors to characterize the alignment of networks [2]. In this paper, we focus on the important and challenging problem of characterizing the statistical significance, in terms of its p-value, of the observed overlap between two dense subgraphs. This problem arises in a number of applications – for instance: (i) in understanding when an overlap between two communities in a social network suggests a social tie; (ii) in assessing whether overlap among two groups of like-minded movie viewers suggests a shared interest; and (iii) in determining whether crosstalk between two sets of interacting biomolecules corresponds to a functional property. The problem of analytically characterizing a suitable p-value for the overlap of two subgraphs, even for simple graph models such as Erdos-Rényi, is a hard one. One can use simpler abstractions to characterize observed overlap using Hypergeometric Tails (HGT) or by characterizing the significance of the overlapping subgraph independently (i.e., ignoring the existence of the two sub-graphs). However, these simpler abstractions lack the discriminating power necessary for most applications. The Hypergeometric Tail does not consider network structure, therefore its applicability is limited. Characterizing the significance of the overlapping subgraph does not consider cluster sizes, relying, instead on high density within the overlapping subgraph. Our method, on the other hand, allows for cases in which densities of each component subgraph and their overlap are not significant by themselves with respect to the ambient graph, but the edges inside the two subgraphs are unusually concentrated inside the overlap. This aspect of our method gives it excellent robustness across wide parameter ranges, as well as diverse applications. We present a detailed theoretical foundation for quantifying the p-value of the overlap of two subgraphs in an Erdos-Rényi graph. Our formulation considers the sizes of the two sub-graphs, their densities, as well as the size and density of the overlap set. In doing so, it provides excellent discrimination across the parameter space. We comprehensively validate the suitability of our selected prior and our framework for quantifying statistical significance of overlaps on synthetic as well as real networks. Using an Erdos-Rényi random graph with implanted clusters of different size, density, and overlap, we experimentally evaluate the behavior of our framework with respect to different parameters. Having established the baseline behavior, we apply our method to the ego networks for Facebook, Google+, and Twitter networks [3]. We identify social circles with significant overlap and show that these circles are highly enriched in common features. Finally, using a well curated network of interacting human proteins and a given set of functional pathways, we identify statistically significant crosstalk between these pathways. We show that the crosstalk identified correlates very well with known biological insights, while also providing a number of novel observations for future investigation. We also demonstrate that our measure significantly outperforms other characterizations of statistical significance. 2 Background and Related Work Evaluating the significance of overlap among a pair of given subgraphs is a challenging problem that can be addressed from different viewpoints, depending on how significance is quantified. The most common method for assessing overlap is to ignore the underlying interactions and focus on the size of the overlap (number of vertices), compared to the sizes of subgraph pairs. In this approach, one often uses Fisher's exact test, also known as the hypergeometric test [4]. This method is described in more detail in Section 3.1. Another way to define significance of overlap is in terms of density. Here, 2 an overlap is defined to be significant if there are "many" edges in the overlap set, compared to a null model. In this class of methods the size of overlap set is assumed to be fixed and density of overlap is assessed, conditioned on the fixed size. The key aspect of this measure is the the density of overlap. There has been extensive research focused on the algorithmic task of identifying dense components in graphs (see, e.g., [5] for a survey). Regarding the study of dense subgraphs in random graphs, the papers by Arratia in 1990 and Koyutürk et al. in 2007 [1, 6] are perhaps the most relevant. Both study the typical sizes of subgraphs of a given density in Erdos-Rényi graphs, motivated by the study of protein interaction networks. The former also gives a result on overlaps between dense subgraphs, but only in the context of dense graphs, unlike social or biological networks that are sparse and the number of edges and nodes are typically of the same order. The distributions of the maximum sizes of cliques and independent sets in random graphs have also been studied, essentially completely [7]. The typical behavior of the overlaps between independent sets in the case of sparse random graphs (equivalently, cliques in extremely dense random graphs) has recently been studied [8]. However, the range of parameters for which the results are derived differs significantly from ours, rendering these results less relevant to our applications of interest. While these contributions are fundamental to our understanding of statistics regarding the distribution of dense components in a graph, none of them directly address the problem of assessing the overlap among subgraphs. Here, we combine the two approaches based on sizes of the overlapping subgraphs and the density of the overlap compared to the constituent subgraphs to analytically derive a p-value for the overlap that considers both its size and density. From an applications point of view, this problem has important implications in social networks, systems biology, financial transactions, and network security. In systems biology, as pathways associated with specific biological functions are fully resolved, there is increasing need to assess the extent of overlap/ cross-talk among these pathways. Pathway interactions have been shown to play a key role in development and progression of cancers [9, 10]. Different groups have focused on identifying the cross-talk map among pathways [11, 12]. However, to the best of our knowledge, none of these methods directly use the overlap subgraph to infer pathway interactions. Another important application of our method in life sciences is in geneset enrichment analysis. While the hypergeometric test remains the most widely used method for identifying functional enrichment of a set of differentially expressed genes, most recent methods do not focus only on the geneset overlap but also try to incorporate network context to evaluate functional importance of genesets [13, 14]. However, a majority of these methods rely on computing empirical p-values instead of providing a closed-form solution. Our method is the first method that quantifies statistical significance within a network context, and in doing so, provides significantly higher discriminating power than prior methods, while using significantly fewer computing resources. 3 Statistical significance of subgraph overlaps Given a pair of overlapping dense subgraphs in a graph, our goal is to derive a measure of the extent to which we should be surprised by their overlap. The appropriate framework for this is that of statistical significance. In the most general setting, we have a random variable X on a probability space and an observed value X for X, and we want a measure of the surprise in observing X. To the observed value X, we associate a p-value, which is given by the probability that X takes a value as extreme or more extreme than X (the notion of extremity depends on the range of the random variable). If the p-value is less than some fixed threshold, the observed value is said to be statistically significant with respect to the distribution of X (the prior); that is, the observation X is unlikely to have occurred by chance. For a given random variable (which need not even take values in a partially ordered set), there may be many non-equivalent notions of p-value that take into account various pieces of observable information about X. In general, a notion of statistical significance is preferable to another if it has more discriminating power, in the sense that the p-value decays smoothly as observations become more extreme (this allows for statistically significant observations to be detected and to be ranked by relative significance). In what follows, we will describe three formulations of statistical significance for subgraph overlaps. The first two, which are already present in literature, take into account only partial information: the first takes into account only the sizes of the subgraphs and their intersection; the second takes into 3 account only the size and density of the intersection of the overlapping subgraphs. The third, which we call CoDO and which is the main topic of this paper, combines subgraph sizes and densities of individual subgraphs along with their their overlaps, to yield a test with significantly greater discriminating power. The basic setup in all three tests is as follows: we have a graph G∼G(n, p) (where G(n, p) denotes the Erdos-Rényi distribution on graphs of size n, with edge probability p) and subgraphs A and B with X = A \ B, Y = B \ A, and Z = A∩B. We also have the following definitions and notation relating to density: For any subgraph S ⊆ G, we denote by E(S) the set of edges in S, and e(S) = E(S). For a pair of subgraphs S1, S2, we denote the set of edges between nodes in S1 and nodes in S2 by E(S1, S2), and e(S1, S2) = E(S1, S2). We denote by δ(S) the density of S: (cid:0)S (cid:1) . e(S) Similarly, for S1, S2, δ(S) = 2 δ(S1, S2) = e(S1, S2) S1S2 . We now describe several p-value formulations. 3.1 Hypergeometric Tail (HGT) The hypergeometric tail p-value takes into account only the size of the overlap Z of A and B. It is defined by considering the following probabilistic experiment (note that this hypothetical experiment is introduced for the purpose of defining a particular probability distribution as the outcome of some random process; it is not meant to be implemented by a user of our methods): we fix a subset B ⊆ V (G) of size B = B, and we draw, uniformly at random from V (G), a subset A of nodes of size A = A. The size A∩ B of the overlap is then hypergeometrically distributed, so the hypergeometric p-value is given by the probability that the overlap in this experiment has size at least that of the observed overlap Z. That is, Pr[ A∩ B ≥ Z] = 1 − F (Z − 1, n, B, A), where F (x, y, z, w), for arbitrary x ∈ N∪{0}, denotes the probability that a hypergeometrically distributed random variable with population size y, number of successes z, and number of trials w, takes a value at least x. 3.2 Erdos-Rényi Density Model (ERD) A second approach to scoring of p-values of overlaps takes into account only the size and density of the overlap set Z . It is defined as the probability that there exists in G a subgraph of density δ(Z ) and size at least Z. This is given by Pr[∃H ⊆ G,H ≥ Z : δ(H ) = δ(Z )]. Upper bounds on this probability have been worked out by, e.g., Arratia in 1990 and Koyutürk et al. in 2007 [1, 6]. The main tool for this is the first moment method [15]: the event that there exists a subgraph with a given property is precisely equal to the event that the number of subgraphs with the given property is at least 1. The first moment method consists of an application of Markov's inequality to conclude that Pr[#{H : H ≥ Z, δ(H ) = δ(Z )} ≥ 1] ≤ E[#{H : H ≥ Z, δ(H ) = δ(Z )}] The expected value is then easily calculated using linearity of expectation. For a fixed value of δ(Z), the threshold value of Z below which the expected value tends to ∞ as n → ∞ and above which it tends to 0 turns out to be 2 log(n) κ(δ(Z),p), where κ(a, b) is given by κ(a, b) = a log(a/b) + (1 − a) log((1 − a)/(1 − b)), (1) the relative entropy between Bernoulli random variables with parameter a and b, respectively. The first moment method shows that overlaps with density δ(Z) and size at least (1 + )Z, for any 4 fixed positive , are unlikely to occur randomly. The second moment method, which takes into account the dependence between events defined on overlapping subgraphs, can be used to give a matching probabilistic lower bound, which shows that, with high probability (i.e., with probability asymptotically tending to 1), the maximum size of any δ(Z)- dense subgraph is asymptotically equivalent to 2 log(n) κ(δ(Z),p). Because of the very sharp transition, as Z increases, from insignificant to significant, this formulation has the undesirable property that it has little discriminating power. In particular, the first moment upper bound implies that Pr[#{H : H ≥ Z, δ(H ) = δ(Z )} ≥ 1] ≤ e−Θ(Z2). That is, the p-value decays superexponentially as Z increases. 3.3 Combining Density/Overlap (CoDO) The measures of statistical significance presented above are not well suited to real-world applications, where the densities and sizes of the the dense components may vary significantly, and where we desire smoother transitions. Motivated by these shortcomings, we propose an alternate formulation that combines information about the size and density of the overlapping set, defined by the following probabilistic experiment: • Consider a set V of vertices, with size n, and a distinguished subset B of size B. Choose uniformly at random from V a subset A of size A. • In the set A∪ B, choose uniformly at random e(A∪B ) edges to insert. Then, we define the combined density/overlap p-value to be the probability that the resulting overlap A∩ B has size at least that of the observed overlap Z and that the density of the overlapping set δ(A∩ B ) is at least the observed overlap density δ(Z ). That is, it is given by pCoDO = Pr[A∩ B ≥ Z∩δ(A ∩ B ) ≥ δ(Z )] By conditioning on the size of the overlap, we can get an explicit formula for this p-value in terms of hypergeometric tails: (cid:104) A∩ B = j (cid:105) · Pr (cid:104) Pr δ( A∩ B) ≥ δ(Z )(cid:12)(cid:12) A∩ B = j (cid:105) (2) min{ A, B}(cid:88) j=Z pCoDO = The first factor in the terms of the sum is easily seen to be a hypergeometric probability mass: A∩ B∼Hypergeometric(n,B,A), which is the number of successes when one draws without replacement A samples from a collection of n items, B of which are successes. Analogously, the second factor is a hypergeometric probability tail, since (cid:18)(cid:18)A + B − j (cid:19) (cid:18)j (cid:19) 2 , 2 (cid:19) , e(A∪B) . e( A∩ B)∼Hypergeometric Thus, the sum is explicitly computable, and tail bounds can be applied if approximations are desired. Note that the expression (2) involves the observed sizes and densities of the constituent subgraphs, as well as the overlaps, through the distributions of A∩ B and δ( A∩ B). 3.3.1 Characteristics of the CoDO p-Value We investigate in more detail some interesting properties of the CoDO p-value defined above. An elementary observation is that, whenever the density of overlap subgraph δ(Z) is low enough, the conditional probabilities in the pCoDO formula degenerate to 1, and it becomes equivalent to the hypergeometric tail p-value. Similarly, when the overlap size Z is small, all probabilities degenerate to 1. 5 Next, we look at the behavior of pCoDO when we fix δ(Z) = ρZ ∈ (0, 1) and vary the observed overlap size Z. We consider z = We have the following lemma: Lemma 1 (Monotone decrease as Z increases). For ρZ fixed as above, for z1 < z2, we have Z M ∈ (0, 1), where we define M = min{A,B}. pCoDO(z1, ρZ) ≥ pCoDO(z2, ρZ). Proof. We have pCoDO(z1, ρZ) − pCoDO(z2, ρZ) = Pr[ A∩ B = j] Pr δ( A∩ B) ≥ ρZ j=z1M M(cid:88) − M(cid:88) z2M−1(cid:88) j=z2M = (cid:104) (cid:104) (cid:104) (cid:105) (cid:12)(cid:12) A∩ B = j (cid:105) (cid:12)(cid:12) A∩ B = j (cid:105) (cid:12)(cid:12) A∩ B = j Pr[ A∩ B = j] Pr Pr[ A∩ B = j] Pr δ( A∩ B) ≥ ρZ δ( A∩ B) ≥ ρZ Since all of the terms of the final sum are at least 0, this completes the proof. j=z1M It then becomes interesting to investigate the point at which pCoDO transitions from insignificant to significant as a function of z. To do this we, define the threshold point θ(ρZ) by θ(ρZ) = z∗ = inf{z ∈ (0, 1) : pCoDO(z, ρZ) ≤ 1/2}. computable. However, the fact that E(cid:104) Note that, whenever it exists, the threshold point is unique, because of the monotonicity property just proven. In principle, the asymptotic value of the threshold point, as a function of ρZ, is explicitly is an increasing function of j whenever j is large enough makes this somewhat subtle. The following upper bound can be established: Theorem 1. With ρZ ∈ (0, 1) fixed and e( A∩ B)(cid:12)(cid:12) A∩ B = j(cid:105) M = min{A,B} (cid:29) √ n, we have, for any fixed δ > 0, θ(ρZ) ≤ E[ A∩ B] M (1 + δ). To prove this, we will need the following lemma giving large deviation bounds for the hypergeometric distribution [16]. It is a consequence of the Hoeffding inequality [17]. Lemma 2 (Hypergeometric large deviations). Let X∼Hypergeometric(N, K, n) (the parameters denote the population size, number of successes, and number of trials, respectively). Let p = K/N. Then we have the following tail bound: Pr[X ≥ (1 + δ)E[X]] ≤ exp(−nκ((1 + δ)p, p)), where δ is any number greater than 0, and κ(a, b) is given by (1). of Theorem 1. Let z = (1 + δ) M . We have the following upper bound on pCoDO(z, ρZ). E[ A∩ B] pCoDO(z, ρZ) ≤ M(cid:88) (cid:110) j=zM p∗ = max Pr j where we define Pr[ A∩ B = j]p∗ = Pr[ A∩ B ≥ zM ]p∗, (3) (cid:104) δ( A∩ B) ≥ ρZ (cid:12)(cid:12) A∩ B = j (cid:105)(cid:111) , where the maximum is taken over all terms j in the sum (this is allowed because all of the probabilities are non-negative). 6 Next, we apply Lemma 2 to further upper bound (3) by pCoDO(z, ρZ) ≤ Pr[ A∩ B ≥ (1 + δ)E[ A∩ B]]p∗ ≤ exp(−Aκ((1 + δ)B/n,B/n))p∗. We now examine the role of the relative entropy factor in the exponent. As B/n n→∞−−−−→ 0, its first term asymptotically dominates: κ((1 + δ)B/n,B/n) = (1 + δ)B/n log(1 + δ) + o(1). √ Using the fact that B ≥ M (cid:29) ( n), we then have that the entire exponent tends to −∞. That is, provided that n is large enough, pCoDO(z, ρZ) is arbitrarily small and, in particular, is less than 1/2. Note that, in the proof of this theorem, we did not use any information about the conditional probability in the pCoDO formula. This is another incarnation of the phenomenon that the conditional expectation of the number of edges in A∩ B increases with j. Thus, broadening the applicability of this bound requires a more careful study of how the conditional probabilities behave as j increases. The behavior of pCoDO(z, ρZ) for fixed and varying ρZ is also of interest. We have an analogue of Lemma 1: Lemma 3 (Monotone decrease as ρZ increases). For fixed z ∈ (0, 1), we have, for ρ1 < ρ2, pCoDO(z, ρ1) ≥ pCoDO(z, ρ2). Proof. We have pCoDO(z, ρ1) − pCoDO(z, ρ2) Pr[ A∩ B = j] ·(cid:104) M(cid:88) = (cid:104) δ( A∩ B) ≥ ρ1 (cid:12)(cid:12) A∩ B = j (cid:105) − Pr (cid:104) δ( A∩ B) ≥ ρ2 (cid:12)(cid:12) A∩ B = j (cid:105)(cid:105) Pr j=zM By monotonicity of the CDF of a random variable, the difference of conditional probabilities is non-negative, so that the entire sum is positive. This completes the proof. As an analogue of the definitions for fixed ρZ and varying z, we can define a threshold point φ(z). We can also give analogous bounds for the location of the threshold point. The details of the derivation are entirely similar to those for fixed z and varying ρZ. 4 Experimental Validation We provide a detailed experimental evaluation of CoDO, in comparison with other measures, in the contest of synthetic datasets, datasets derived from social networks, and datasets from biomolecular interactions. We use synthetic datasets to characterize the dependence of our results of choices of parameters. We use the other datasets to demonstrate the robustness and application scope of our framework, even in cases where the networks do not follow an Erdos-Renyi model. 4.1 Assessing Overlap in Synthetic Graphs To evaluate the performance of each measure (and associated method) on a controlled dataset, we create a synthetic test case that models the behavior of functional modules at a smaller scale. We sample an ER graph GR from G(n, p) with n = 80 and p = 3 n. We embed two modules with the same high density (ρA = ρA = 10p) of size 50 and 40 vertices in GR with varying levels of overlaps and density. For the overlap, the expected value of hypergeometric distribution for this setting is n = 25, where nA and nB are the number of vertices in modules A and B, respectively. We nAnA chose overlap sizes of 20 and 30 vertices, which are below and above the expected value of number of overlapping vertices, respectively, to represent low and high overlaps. For simulating the density of overlap region, we tested a sparse overlap by setting ρZ = 2p = ρA 5 and a dense overlap by setting ρZ = 10p = 2ρA. For each of these four settings, we computed HGT, ERD, and CoDO p-values, the results of which are illustrated in Figure 1. Each subfigure represents the adjacency matrix of the constructed test case, with modules A and B color-coded as blue and green, respectively. The 7 (a) Insignificant Overlap/Insignificant Density (b) Insignificant Overlap/Significant Density (c) Significant Overlap/Insignificant Density (d) Significant Overlap/Significant Density Figure 1: Synthetic graphs with varying levels of density/overlap. Illustrated here is the adjacency matrix of generated graphs. Black, green, and blue dots (edges) belong to the background, the first, and the second implanted subgraphs, respectively, whereas red dots represent edges in the overlap. overlap set of the two modules is separately marked in red. The first notable observation in our experiments is that ERD has a sharp transition from p-value of 1 to 0 as we vary ρZ from ρ to 2ρ. On the other hand, CoDO exhibits a smooth transition as we increase ρZ . When neither the overlap, nor its density are significant, as in Figure 1(a), the p-values from all methods are close to 1 (as expected). When the overlap size is significant but density of overlap is not (Figure 1(c)), HGT and CoDO yield identical significant results, while ERD does not identify the overlap as significant (p-value approaching 1). On the other hand, when size of overlap is not significant but its density is significant, as in Figure 1(b), HGT p-value is close to one, whereas both ERD and CoDO identify the overlap as significant, the difference being that ERD p-value abruptly changes from 1 to 3.29 × 10−70, but CoDO smoothly transitions from 8.77 × 10−1 to 4.45 × 10−3 demonstrating much better discriminating power. Finally, when both the size of the overlap and its density are significant, CoDO p-value is more significant than in both cases in Figures 1(b) and Figure 1(c), and it is more significant that HGT p-value alone. 4.2 Significance of Overlap Among Social Circles Users in social networks are connected not only to their close friends, but also family members, schoolmates, and colleagues, among others. Organizing friends into communities, or social circles, is one of the common approaches to organizing, predicting, and recommending contacts. A user's circles are typically overlapping, and a user can belong to one, many, or none of the circles. Given a set of overlapping circles, we are interested in assessing whether there is a significant interdependency among the circles, or that the observed overlap is simply due to the existence of bridge nodes or party alters. To evaluate our method, we use three sets of social networks derived from Facebook, Google+, and Twitter[3]. Each of these networks is centered around a focal user, or ego, along with all other users it directly connects to. This collection of neighbor nodes is also known as the set of alters. The induced subgraph of friendships among alter nodes, is known as an ego net. The Facebook dataset is fully 8 01020304050607080900102030405060708090HGT = 8.77e−01, ERD = 1.00e+00, CODO = 8.77e−0101020304050607080900102030405060708090HGT = 8.77e−01, ERD = 3.29e−70, CODO = 4.45e−0301020304050607080900102030405060708090HGT = 8.33e−04, ERD = 1.00e+00, CODO = 8.33e−0401020304050607080900102030405060708090HGT = 8.33e−04, ERD = 2.44e−183, CODO = 1.05e−10 Table 1: Statistics of ego nets Dataset Facebook Google+ Twitter # Nets Avg # Users Avg # Circles # Over. Circles # Signif. Overlaps 10 124 834 416.7 1,945.7 137.6 19.3 3.5 4.2 415 1,170 14,610 92 437 5,055 observed, in the sense that each user was asked to manually identify all coherent groups among their friends. We refer to these coherent groups of friends as circles. In contrast to the Facebook dataset, circles in Google+ and Twitter are restricted to publicly visible and explicitly designated circles for each ego net. To establish a ground truth for interdependency among pairs of circles, we use common features of users to assign a p-value to their feature overlap. For a given ego net G = (V, E) together with a K-dimensional feature vector for each node, we compute the total number of feature pairs between (cid:1). Moreover, we can compute the total number of features common to any pair of alters as π = K(cid:0)V any two alters as: 2 ξ = 1f (i, j) (4) where V is the set of alter vertices, F is the set of features, and 1f (i, j) is an indicator function that is one, if alter i and alter j share feature f, and zero, otherwise. Given an overlap set of O, we can similarly define πO = K(cid:0)O (cid:1) and: 2 (cid:88) (cid:88) i,j∈V i<j f∈F (cid:88) (cid:88) i,j∈O i<j f∈F ξO = 1f (i, j) (5) (6) Using this notion, we can define the significance of feature overlap among two circles as: min(ξ,πO)(cid:88) x=ξO (cid:0)ξ x (cid:1) (cid:1)(cid:0) π−ξ (cid:0) π (cid:1) πO−x πO p − val(O) = which is simply the tail of the Hypergeometric distribution, measuring the probability of observing ξO or more common features in a random set of size O (with πO feature pairs), if we were sampling at random without replacement from all possible feature pairs. For each dataset, we compute the significance of all circle pairs for every ego net and correct for multiple hypothesis testing using Bonferroni method. Finally, we define a pair of circles as significantly correlated if p-value of their overlap is smaller than or equal to the threshold 0.05. Table 1 summarizes the statistics of these networks. Here, we remove all ego nets with less than two circles or those without at least one common feature between alters. Among the three datasets, Facebook had the lowest percentage of significant overlaps (< 25%) compared to the other two datasets (35% and 37%). This may be attributed to method used for identifying circles in the Facebook dataset. Next, to evaluate HGT, ERD, and CoDO methods, we assess all pairs of overlapping circles and sort them based on their significance. For pairs with similar p-value, we randomly order them. Using the gold-standard set of significantly correlated circles, computed using feature vector overlaps, we compute the receiver operating characteristic (ROC) for each dataset individually. These are presented in Figure 2. Each method is annotated with its area under the curve (AUC) to simplify comparison. In all three datasets, CoDO outperforms the other two methods. It is worth noting that CoDO is designed to capture signals from both network density and the overlap size. To illustrate this point, we emphasize the behavior of CoDO over the Facebook dataset as an example. For small FPR values, density has higher signal than overlap (observed as the superior performance of ERD compared to HGT). In this regime, CoDO captures this signal and outperforms of ERD. When ERD signal plateaus (0.1 < F P R), CoDO leverages network structure to outperform (HGT). 9 (a) Facebook (b) Google+ Figure 2: Overlapping circles in social networks predict common features (c) Twitter 4.3 Crosstalk Among Biological Pathways Biological pathways are higher order constructs that perform key cellular functions. These pathways are known to work in concert and their cross-talk regulates the systems level behavior of cells. To evaluate the interaction between different pathways and their shared mechanisms, we seek to construct a pathway-pathway interaction map that represents the extent of overlap among different pathways. We construct a comprehensive human interactome from a recently published dataset by Han et al.[18], resulting in a network of 164,826 interactions among 8,872 proteins. We downloaded the set of KEGG pathways from MSigDB[19] and filtered pathways that have less than 10 corresponding vertices in the human interactome. The final dataset consists of 186 pathways with an average of ∼ 66 vertices per pathway. To evaluate the computed p-values, we use co-transcriptional activity of pathway pairs as a proxy for their functional relatedness. We downloaded the and processed tissue-specific RNASeq dataset from the Genotype-Tissue Expression (GTEx) project [20], which contains 2,916 samples from 30 different tissues/ cell types. We summarize tissue-specific expression of each pathway by averaging the expression of all its member genes in each tissue. Then, we define co-transcriptional activity of pathways by computing the Pearson's correlation of these tissue-specific pathway expression signatures. To evaluate different methods, we first compute the nonparametric Spearman's correlation between the co-transcriptional activity scores and computed p-values in each method. This yields 0.28, 0.16, and 0.41 correlation scores for HGT, ERD, and CoDO methods, respectively, which shows that CoDO significantly outperforms the other two methods with respect to the co-transcriptional activity of significant pathway pairs. Next, to put the computed p-values by CoDO in context, we construct a pathway-pathway overlap network by thresholding pairwise overlaps at a stringent cutoff (p-value ≤ 10−30) and use all pairs with significant p-values as edges in the network. This results in a network of 129 nodes (representing pathways) and 877 interactions (inferred as the significance of the pathway overlaps) among them. This network is shown in Figure 3. We use Cytoscape [21] to visualize the graph and MCODE [22] to cluster the network. Each cluster is color-coded independently, and four major clusters are manually annotated with the dominant function in each group. We observe that the set of top-ranked pathway pairs cluster together to form coherent groups with highly coherent functions. These significant overlaps reveal interesting functional connections, which can be used to understand pathology and identify novel drug targets. 10 00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.779)ERD (AUC = 0.834)CoDO (AUC = 0.870)00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.761)ERD (AUC = 0.655)CoDO (AUC = 0.763)00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.91False Positive Rate (1 − Specificity)True Positive Rate (Sensitivity) HGT (AUC = 0.820)ERD (AUC = 0.772)CoDO (AUC = 0.878) Figure 3: Pathway-pathway overlap graph 5 Conclusions Assessing the statistical significance of observed overlaps between clusters in networks is an important substrate of many graph analytics problems. In this paper, we present detailed analysis and derivation of a p-value based measure of significance of cluster overlap. Unlike previous measures, our measure accounts for cluster sizes, densities, and density of overlap – all critical parameters of the problem. We show that our measure provides excellent discrimination, smooth transition, and robustness to wide parameter ranges. Using both synthetic and real datasets, we validate excellent performance of our analytical formulation. Our work opens a number of avenues for continued explorations. These include formulations for alternate graph models, algorithms aimed at explicitly maximizing statistical significance of overlaps, and application validation in other contexts. 11 Immune ResponseDNA Replication and RepairDrug MetabolismCancer Signaling Pathways References [1] M. Koyutürk, W. Szpankowski, and A. Grama, "Assessing significance of connectivity and conservation in protein interaction networks," Journal of Computational Biology, vol. 14, no. 6, pp. 747–764, 2007. [2] S. Mohammadi et al., "Scope and limitations of yeast as a model organism for studying human [3] [4] tissue-specific pathways," BMC Systems Biology, vol. 9, no. 1, p. 96, Dec. 2015. J. Mcauley and J. Leskovec, "Discovering social circles in ego networks," ACM Trans. Knowl. Discov. Data, vol. 8, no. 1, 4:1–4:28, Feb. 2014. J. McDonald, Handbook of Biological Statistics. Baltimore, MD, USA: Sparky House Publish- ing, 2014. [5] V. E. Lee et al., "A survey of algorithms for dense subgraph discovery," English, in Managing and Mining Graph Data, C. C. Aggarwal and H. Wang, Eds., vol. 40, ser. Advances in Database Systems, Springer US, 2010, pp. 303–336. [6] R. Arratia and E. S. Lander, "The distribution of clusters in random graphs," Advances in Applied Mathematics, vol. 11, pp. 36–48, 1990. [7] B. Bollobás, Random Graphs, 2nd. Cambridge Studies in Advanced Mathematics, 2001. [8] D. Gamarnik and M. Sudan, "Limits of local algorithms over sparse random graphs," Proceed- ings of the 5th Conference on Innovations in Theoretical Computer Science, pp. 369 –376, 2014. [9] Y. Sun et al., "Crosstalk analysis of pathways in breast cancer using a network model based on overlapping differentially expressed genes," Experimental and Therapeutic Medicine, May 2015. [10] Y. Wang et al., "Pathway crosstalk analysis of high-metastasis lung cancer cells.," Tumori, [11] S. Mohammadi, G. Kollias, and A. Grama, "Role of synthetic genetic interactions in under- standing functional interactions among pathways.," in Pacific Symposium on Biocomputing (PSB) 2012, Jan. 2012, pp. 43–54. [12] A. N. Tegge, N. Sharp, and T. M. Murali, "Xtalk: a path-based approach for identifying crosstalk between signaling pathways," Bioinformatics, btv549, Sep. 2015. [13] C. Mitrea et al., "Methods and approaches in the topology-based analysis of biological path- ways," Frontiers in Physiology, vol. 4, 2013. [14] X. Dong et al., "LEGO: a novel method for gene set over-representation analysis by incorpo- rating network-based gene weights," Scientific Reports, vol. 6, p. 18 871, Jan. 2016. [15] N. Alon and J. H. Spencer, The probabilistic method. Wiley. [16] V. Chvátal, "The tail of the hypergeometric distribution," Discrete Mathematics, vol. 25, pp. 285–287, 1979. [17] A. Dembo and O. Zeitouni, Large Deviations Techniques and Applications, 2nd. Springer- Verlag, 2010. J. Han et al., "ESEA: Discovering the Dysregulated Pathways based on Edge Set Enrichment Analysis.," Scientific reports, vol. 5, p. 13 044, 2015. [18] [19] A. Subramanian et al., "Gene set enrichment analysis: A knowledge-based approach for interpreting genome-wide expression profiles," Proceedings of the National Academy of Sciences, vol. 102, no. 43, pp. 15 545–15 550, Oct. 2005. [20] K. G. Ardlie et al., "The Genotype-Tissue Expression (GTEx) pilot analysis: Multitissue gene regulation in humans," Science, vol. 348, no. 6235, pp. 648–660, May 2015. [21] P. Shannon et al., "Cytoscape: A software Environment for integrated models of biomolecular interaction networks," Genome Research, vol. 13, no. 11, pp. 2498–2504, 2003. [22] G. Bader and C. Hogue, "An automated method for finding molecular complexes in large protein interaction networks," BMC bioinformatics, vol. 27, pp. 1–27, 2003. 12
1505.05657
1
1505
2015-05-21T09:43:09
Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach
[ "cs.SI" ]
The ever-growing number of people using Twitter makes it a valuable source of timely information. However, detecting events in Twitter is a difficult task, because tweets that report interesting events are overwhelmed by a large volume of tweets on unrelated topics. Existing methods focus on the textual content of tweets and ignore the social aspect of Twitter. In this paper we propose MABED (i.e. mention-anomaly-based event detection), a novel statistical method that relies solely on tweets and leverages the creation frequency of dynamic links (i.e. mentions) that users insert in tweets to detect significant events and estimate the magnitude of their impact over the crowd. MABED also differs from the literature in that it dynamically estimates the period of time during which each event is discussed, rather than assuming a predefined fixed duration for all events. The experiments we conducted on both English and French Twitter data show that the mention-anomaly-based approach leads to more accurate event detection and improved robustness in presence of noisy Twitter content. Qualitatively speaking, we find that MABED helps with the interpretation of detected events by providing clear textual descriptions and precise temporal descriptions. We also show how MABED can help understanding users' interest. Furthermore, we describe three visualizations designed to favor an efficient exploration of the detected events.
cs.SI
cs
Social Network Analysis and Mining DOI 10.1007/s13278-015-0258-0 The final publication is available at www.springerlink.com Event detection, tracking and visualization in Twitter A mention-anomaly-based approach Adrien Guille · C´ecile Favre 5 1 0 2 y a M 1 2 ] I S . s c [ 1 v 7 5 6 5 0 . 5 0 5 1 : v i X r a Received: December 14, 2014 / Revised: April 3, 2015 / Accepted: May 13, 2015 Abstract The ever-growing number of people using Twitter makes it a valuable source of timely informa- tion. However, detecting events in Twitter is a diffi- cult task, because tweets that report interesting events are overwhelmed by a large volume of tweets on unre- lated topics. Existing methods focus on the textual con- tent of tweets and ignore the social aspect of Twitter. In this paper we propose MABED (mention-anomaly- based Event Detection), a novel statistical method that relies solely on tweets and leverages the creation fre- quency of dynamic links (i.e. mentions) that users in- sert in tweets to detect significant events and estimate the magnitude of their impact over the crowd. MABED also differs from the literature in that it dynamically es- timates the period of time during which each event is discussed, rather than assuming a predefined fixed du- ration for all events. The experiments we conducted on both English and French Twitter data show that the mention-anomaly-based approach leads to more accu- rate event detection and improved robustness in pres- ence of noisy Twitter content. Qualitatively speaking, we find that MABED helps with the interpretation of detected events by providing clear textual descriptions and precise temporal descriptions. We also show how MABED can help understanding users’ interest. Fur- thermore, we describe three visualizations designed to favor an efficient exploration of the detected events. Keywords Event detection · Twitter · Visualization A. Guille ERIC Lab, University of Lyon 2 5 avenue Pierre Mends France 69676 Bron, France E-mail: [email protected] C. Favre [email protected] 1 Introduction Twitter is a social networking and micro-blogging ser- vice that allows users to publish short messages limited to 140 characters, i.e. tweets. Users share, discuss and forward various kinds of information – ranging from personal daily events to important and global event re- lated information – in real-time. The ever-growing num- ber of users around the world tweeting makes Twit- ter a valuable source of timely information. On the other hand, it gives rise to an information overload phe- nomenon and it becomes increasingly difficult to iden- tify relevant information related to significant events. An event is commonly defined as a thing that hap- pens at one specific time (Becker et al, 2011; Aggarwal and Subbian, 2012), and it is significant if it may be discussed by traditional media (McMinn et al, 2013). These facts raise the following question: How can we use Twitter for automated significant event detection and tracking? The answer to this question would help analyze which events, or types of events, most interest the crowd. This is critical to applications for journal- istic analysis, playback of events, etc. Yet the list of “trends” determined by Twitter isn’t so helpful since it only lists isolated keywords and provides no infor- mation about the level of attention it receives from the crowd nor temporal indications. Twitter delivers a continuous stream of tweets, thus allowing the study of how topics grow and fade over time (Yang and Leskovec, 2011). In particular, event detection methods focus on detecting “bursty” patterns – which are intuitively assumed to signal events (Klein- berg, 2002) – using various approaches ranging from term-weighting-based approaches (Shamma et al, 2011; Benhardus and Kalita, 2013) to topic-modeling-based approaches (Lau et al, 2012; Yuheng et al, 2012), includ- 2 Adrien Guille, C´ecile Favre ing clustering-based approaches (Weng and Lee, 2011; Li et al, 2012; Parikh and Karlapalem, 2013). Despite the wealth of research in the area, the vast majority of prior work focuses on the textual content of tweets and mostly neglects the social aspect of Twitter. How- ever, users often insert extra-textual content in their tweets. Of particular interest is the “mentioning prac- tice”, which consists of citing other users’ screennames in tweets (using the syntax “@username”). Mentions are in fact dynamic links created either intentionally to engage the discussion with specific users or automat- ically when replying to someone or re-tweeting. This type of link is dynamic because it is related to a partic- ular time period, i.e. the tweet lifespan, and a particular topic, i.e. the one being discussed. Proposal We tackle the issue of event detection and tracking in Twitter by devising a new statistical method, named MABED (mention-anomaly-based Event Detec- tion). It relies solely on statistical measures computed from tweets and produces a list of events, each event be- ing described by (i) a main word and a set of weighted related words, (ii) a period of time and (iii) the magni- tude of its impact over the crowd. In contrast with ex- isting methods, MABED doesn’t only focus on the tex- tual content of tweets but also leverages the frequency at which users interact through mentions, with the aim to detect more accurately the most impactful events. It also differs from the literature in that it dynamically estimates the period of time during which each event is discussed, rather than assuming a predefined fixed duration for all events, in order to provide clearer event descriptions. What is more, we develop three interac- tive visualizations to ensure an efficient exploration of the detected events: (i) a timeline that allows exploring events through time, (ii) a chart that plots the magni- tude of impact of events through time and (iii) a graph that allows identifying semantically related events. The implementation of MABED is available for re-use and future research. It is also included in SONDY (Guille et al, 2013), an open-source social media data mining software that implements several state-of-the-art algo- rithms for event detection. Results We perform quantitative and qualitative stud- ies of the proposed method on both English and French Twitter corpora containing respectively about 1.5 and 2 millions tweets. We show that MABED is able to ex- tract an accurate and meaningful retrospective view of the events discussed in each corpus, with short compu- tation times. To study precision and recall, we ask hu- man annotators to judge whether the detected events are meaningful and significant events. We demonstrate the relevance of the mention-anomaly-based approach, by showing that MABED outperforms a variant that ignores the presence of mentions in tweets. We also show that MABED advances the state-of-the-art by comparing its performance against those of two recent methods from the literature. The analysis of these re- sults suggests that considering the frequency at which users interact through mentions leads to more accurate event detection and improved robustness in presence of noisy Twitter content. Lastly, we analyze the types of events detected by MABED with regard to the commu- nities detected in the network structure (i.e. the follow- ing relationships) that interconnects the authors of the tweets. The results of this analysis shed light on the interplay between the social and topical structures in Twitter and show that MABED can help understand- ing users’ interests. The rest of this paper is organized as follows. In the next section we discuss related work, before describ- ing in detail the proposed method in Section 3. Then an experimental study showing the method’s effective- ness and efficiency is presented in Section 4. Next, we present three visualizations for exploring the detected events. Finally, we conclude and discuss future work in Section 6. 2 Related Work Methods for detecting events in Twitter rely on a rich body of work dealing with event, topic and burst de- tection from textual streams. In a seminal work, Klein- berg (2002) studies time gaps between messages in or- der to detect bursts of email messages. Assuming that all messages are about the same topic, he proposes to model bursts with hidden Markov chains. AlSumait et al (2008) propose OLDA (On-line Latent Dirichlet Allocation), a dynamic topic model based on LDA (Blei et al, 2003). It builds evolutionary matrices translat- ing the evolution of topics detected in a textual stream through time, from which events can be identified. Fung et al (2005) propose to detect and then cluster bursty words by looking at where the frequency of each word in a given time window is positioned in the overall dis- tribution of the number of documents containing that word. Tweet streams differ from traditional textual docu- ment streams, in terms of publishing rate, content, etc. Therefore, developing event detection methods adapted to Twitter has been studied in several papers in recent years. Next, we give a brief survey of the proposed ap- proaches. Event detection, tracking and visualization in Twitter 3 2.1 Event Detection and Tracking from Tweets Term-weighting-based approaches The Peakiness Score (Shamma et al, 2011) is a normalized word fre- quency metric, similar to the tf · idf metric, for iden- tifying words that are particular to a fixed length time window and not salient in others. However, individual words may not always be sufficient to describe complex events because of the possible ambiguity and the lack of context. To cope with this, Benhardus and Kalita (2013) propose a different normalized frequency metric, Trending Score, for identifying event-related n-grams. For a given n-gram and time window, it consists in computing the normalized frequency, tfnorm, of that n- gram with regard to the frequency of the other n-grams in this window. The Trending Score of a n-gram in a particular time window is then obtained by normalizing the value of tfnorm in this time window with regard to the values calculated in the others. Topic-modeling-based approaches Lau et al (2012) propose an online variation of LDA. The idea is to in- crementally update the topic model in each time win- dow using the previously generated model to guide the learning of the new model. At every model update, the word distribution in topics evolves. Assuming that an event causes a sudden change in the word distribution of a topic, authors propose to detect events by monitor- ing the degree of evolution of topics using the Jensen- Shannon divergence measure. Yuheng et al (2012) note that topic modeling methods behave badly when ap- plied to short documents such as tweets. To remedy this, they propose ET-LDA (joint Event and Tweets LDA). It expands tweets with the help of a search en- gine and then aligns them with re-transcriptions of events provided by traditional media, which heavily influences the results. Globally, topic-modeling-based methods suf- fer from a lack of scalability, which renders their ap- plication to tweet streams difficult. However, works by Aiello et al (2013) reveal that dynamic topic models don’t effectively handle social streams in which many events are reported in parallel. Clustering-based approaches EDCoW (Weng and Lee, 2011) breaks down the frequency of single words into wavelets and leverages Fourier and Shannon theo- ries to compute the change of wavelet entropy to iden- tify bursts. Trivial words are filtered away based on their corresponding signal’s auto correlation, and the similarity between each pair of non-trivial words is mea- sured using cross correlation. Eventually, events are de- fined as bags of words with high cross correlation during a predefined fixed time window, detected with modular- ity-based graph clustering. However, as pointed out by Li et al (2012) and Parikh and Karlapalem (2013), mea- suring cross correlation is computationally expensive. Furthermore, measuring similarity utilizing only cross correlation can result in clustering together several un- related events that happened in the same time span. TwEvent (Li et al, 2012) detects event from tweets by analyzing n-grams. It filters away trivial n-grams based on statistical information derived from Wikipedia and the Microsoft Web N-Gram service. The similarity be- tween each pair of non-trivial n-grams is then measured based on frequency and content similarity, in order to avoid merging distinct events that happen concurrently. Then, similar n-grams in fixed-length time windows are clustered together using a k-nearest neighbor strategy. Eventually, the detected events are filtered using, again, statistical information derived from Wikipedia. As a result, the events detected with TwEvent are heavily influenced by Microsoft Web N-Gram and Wikipedia, which could potentially distort the perception of events by Twitter users and also give less importance to re- cent events that are not yet reported on Wikipedia. It is also worth mentioning ET (Parikh and Karlapalem, 2013), a recent method similar to TwEvent, except that it doesn’t make use of external sources of information and focuses on bigrams. The similarity between pairs of bigrams is measured based on normalized frequency and content similarity, and the clustering is performed using a hierarchical agglomerative strategy. 2.2 Event Visualization in Twitter Eddi (Bernstein et al, 2010) is among the first tools de- veloped for visualizing events from tweets. It displays a single word cloud that describes all the detected events, as well as a single stacked area chart that plots the evo- lution of the relative volume of tweets for each event. Mathioudakis and Koudas (2010) propose TwitterMon- itor, a system that allows for a finer understanding of the detected events in comparison with Eddi. It displays a list of events, each event being described by a set of words and a chart that plots the evolution of the vol- ume of related tweets. KeySEE (Lee et al, 2013) is a tool that offers similar functionalities with more sophis- ticated visualizations, such as word clouds to describe events instead of sets of words. Marcus et al (2011) de- scribe TwitInfo, a tool whose interface revolves around a timeline of events. The user can click an event to see the tweets published during the related time interval, or to see the most cited URLs in these tweets. Let us also mention work by Kraft et al (2013), in which a heatmap describes the distribution of events across time. 4 Table 1 Table of notations. Notation Definition N N i N i t N@t N i @t Total number of tweets in the corpus Number of tweets in the ith time-slice Number of tweets in the ith time-slice that contain the word t Number of tweets in the corpus that contain the word t and at least one mention Number of tweets that contain the word t and at least one mention in the ith time-slice 3 Proposed Method In this section, we first formulate the problem we intend to solve. Then we give an overview of the solution we propose, MABED, before describing it formally. 3.1 Problem Formulation Input We are dealing with a tweet corpus C. We dis- cretize the time-axis by partitioning the tweets into n time-slices of equal length. Let V be the vocabulary of the words used in all the tweets and V@ be the vocab- ulary of the words used in the tweets that contain at least one mention. Table 1 gives the definitions of the notations used in the rest of this paper. Output The objective is to produce a list L, such that L = k, containing the events with the k highest mag- nitude of impact over the crowd’s tweeting behavior. We define an event as a bursty topic, with the magni- tude of its impact characterized by a score. Definitions 1 and 2 below respectively define the concepts of bursty topic and event. Definition 1 (Bursty Topic) Given a time interval I, a topic T is considered bursty if it has attracted an uncommonly high level of attention (in terms of creation frequency of mentions) during this interval in comparison to the rest of the period of observation. The topic T is defined by a main term t and a set S of weighted words describing it. Weights vary between 0 and 1. A weight close to 1 means that the word is cen- tral to the topic during the bursty interval whereas a weight closer to 0 means it is less specific. Definition 2 (Event) An event e is characterized by a bursty topic BT = [T, I] and a value Mag > 0 indi- cating the magnitude of the impact of the event over the crowd. 3.2 Overview of the Proposed Method The method has a two-phase flow. It relies on three components: (i) the detection of events based on men- Adrien Guille, C´ecile Favre tion-anomaly, (ii) the selection of words that best de- scribe each event and (iii) the generation of the list of the k most impactful events. The overall flow, illus- trated on Figure 1, is briefly described hereafter. Fig. 1 Overall flow of the proposed method, MABED. 1. The mention creation frequency related to each word t ∈ V@ is analyzed with the first component. The re- sult is a list of partially defined events, in that they are missing the set S of related words. This list is ordered according to the impact of the events. 2. The list is iterated through starting from the most impactful event. For each event, the second compo- nent selects the set S of words that best describe it. The selection relies on measures based on the co-occurrence and the temporal dynamics of words tweeted during I. Each event processed by this com- ponent is then passed to the third component, which @,wordabE(word)I = [a;b]wwordword1..................abword:co-occurence matrixa ... b......NwordNword1wMag,IDetecting events based on mention anomalySelecting words describing eventsIredundancy graphevent graphNIITweet streamword2Events ordered according to the magnitude of their impact over the crowdWater: moon (0.9), NASA (0.9), found...from 09-11-13 10amto 09-11-15 7:30amGenerating the list of the k most impactful events and managing duplicated eventsword1 word2Mag(I)Veterans:served (0.8), country (0.7)...from 09-11-10 4pmto 09-11-12 8amTiger, Woods: accident (0.9), car (0.9)...from 09-11-27 6pmto 09-11-29 5amiiiINPUTPHASE 1PHASE 2OUTPUTIII Event detection, tracking and visualization in Twitter 5 is responsible for storing event descriptions and man- aging duplicated events. Eventually, when k distinct events have been processed, the third component merges duplicated events and returns the list L con- taining the top k events. 3.3 Detection of Events Based on Mention Anomaly The objective of this component is to precisely identify when events happened and to estimate the magnitude of their impact over the crowd. It relies on the identifica- tion of bursts based on the computation of the anomaly in the frequency of mention creation for each individual word in V@. Existing methods usually assume a fixed duration for all events that corresponds to the length of a time-slice. It’s not the case with MABED. In the following, we describe how to compute the anomaly of a word for a given time-slice, then we describe how to measure the magnitude of impact of a word given a contiguous sequence of time-slices. Eventually, we show how to identify the intervals that maximize the magni- tude of impact for each word in V@. Be- Computation of the anomaly at a point fore formulating the anomaly measure, we define the expected number of mention creation associated to a word t for each time-slice i ∈ [1; n]. We assume that the number of tweets that contain the word t and at least one mention in the ith time-slice, N i @t, follows a generative probabilistic model. Thus we can compute the probability P (N i @t. For a large enough corpus, it seems reasonable to model this kind of probability with a binomial distribution (Fung et al, 2005). Therefore we can write: @t) of observing N i P (N i @t) = @t (1 − p@t)N i−N i pN i @t @t (cid:18) N i (cid:19) N i @t where p@t is the expected probability of a tweet con- taining t and at least one mention in any time-slice. Be- cause N i is large we further assume that P (N i @t) can be approximated by a normal distribution (Li et al, 2012), that is to say: P (N i @t) ∼ N (N ip@t, N ip@t(1 − p@t)) It follows that the expected frequency of tweets con- taining the word t and at least one mention in the ith time-slice is: E[ti] = N ip@t where p@t = N@t/N Eventually, we define the anomaly of the mention cre- ation frequency related to the word t at the ith time- slice this way: anomaly(t, i) = N i @t − E[ti] Fig. 2 Identification of the time interval that maximizes the magnitude of impact for a given word. With this formulation, the anomaly is positive only if the observed mention creation frequency is strictly greater than the expectation. Event-related words that are specific to a given period of time are likely to have high anomaly values during this interval. In contrast, recurrent (i.e. trivial) words that aren’t event-specific are likely to show little discrepancy from expectation. What is more, as opposed to more sophisticated ap- proaches like modeling frequencies with Gaussian mix- ture models, this formulation can easily scale to the number of distinct words used in tweets. Computation of the magnitude of impact The magnitude of impact, Mag, of an event associated with the time interval I = [a; b] and the main word t is given by the formula below. It corresponds to the algebraic area of the anomaly function on [a; b]. (cid:90) b b(cid:88) Mag(t, I) = anomaly(t, i) di = anomaly(t, i) a i=a The algebraic area is obtained by integrating the dis- crete anomaly function, which in this case boils down to a sum. Identification of events For each word t ∈ V@, we identify the interval I that maximizes the magnitude of impact, that is to say : I = argmax Mag(t, I) I Because the magnitude of impact of an event described by the main word t and the time interval I is the sum of the anomaly measured for this word over I, this opti- mization problem is similar to a “Maximum Contiguous Subsequence Sum” (MCSS ) problem. The MCSS prob- lem is well known and finds application in many fields (Fan et al, 2003; Lappas et al, 2009). In other words, for a given word t we want to identify the interval I = [a; b], such that: Mag(t, I) = max{ b(cid:88) i=a anomaly(t, i)1 (cid:54) a (cid:54) b (cid:54) n} (cid:179)(cid:141)(cid:113)(cid:93)(cid:103)(cid:71)(cid:60)(cid:68)(cid:17)(cid:165)(cid:113)(cid:93)(cid:103)(cid:71)(cid:166)(cid:25)(cid:3)(cid:222)(cid:3)(cid:167)(cid:60)(cid:142)(cid:68)(cid:168)(cid:69)(cid:80)(cid:103)(cid:93)(cid:90)(cid:73)(cid:36)(cid:47)(cid:60)(cid:68)(cid:88)(cid:60)(cid:71)(cid:80)(cid:60)(cid:78)(cid:81)(cid:3)(cid:143)(cid:90)(cid:60)(cid:106)(cid:103)(cid:81)(cid:69)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:69)(cid:93)(cid:93)(cid:69)(cid:69)(cid:107)(cid:103)(cid:73)(cid:91)(cid:69)(cid:73)(cid:104)(cid:60)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:144)(cid:144)(cid:144)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:3)(cid:68)(cid:17)(cid:17)(cid:17)(cid:17)(cid:17)(cid:17)(cid:34)(cid:88)(cid:60)(cid:71)(cid:80)(cid:60)(cid:78)(cid:81)(cid:34)(cid:78)(cid:81)(cid:91)(cid:60)(cid:91)(cid:69)(cid:75)(cid:113)(cid:34)(cid:71)(cid:73)(cid:104)(cid:88)(cid:106)(cid:93)(cid:100)(cid:78)(cid:81)(cid:91)(cid:60)(cid:91)(cid:69)(cid:75)(cid:81)(cid:81)(cid:81)(cid:33)(cid:60)(cid:79)(cid:165)(cid:25)(cid:166)(cid:79)(cid:93)(cid:93)(cid:79)(cid:89)(cid:73)(cid:89)(cid:60)(cid:91)(cid:79)(cid:107)(cid:60)(cid:79)(cid:73)(cid:23)(cid:93)(cid:100)(cid:103)(cid:93)(cid:79)(cid:103)(cid:60)(cid:90)(cid:159)(cid:90)(cid:81)(cid:91)(cid:79)(cid:106)(cid:113)(cid:73)(cid:73)(cid:106)(cid:81)(cid:73)(cid:60)(cid:100)(cid:100)(cid:195)(cid:144)(cid:194)(cid:80)(cid:93)(cid:93)(cid:71)(cid:78)(cid:93)(cid:103)(cid:106)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:90)(cid:93)(cid:91)(cid:71)(cid:60)(cid:115)(cid:69)(cid:115)(cid:68)(cid:73)(cid:103)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:103)(cid:73)(cid:71)(cid:93)(cid:91)(cid:71)(cid:60)(cid:91)(cid:69)(cid:73)(cid:104)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:75)(cid:112)(cid:74)(cid:91)(cid:73)(cid:90)(cid:73)(cid:91)(cid:106)(cid:104)(cid:60)(cid:112)(cid:60)(cid:91)(cid:106)(cid:3)(cid:78)(cid:107)(cid:104)(cid:81)(cid:93)(cid:91)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:81)(cid:91)(cid:87)(cid:107)(cid:103)(cid:73)(cid:71)(cid:106)(cid:81)(cid:79)(cid:73)(cid:103)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:60)(cid:69)(cid:69)(cid:81)(cid:71)(cid:73)(cid:91)(cid:106)(cid:113)(cid:93)(cid:93)(cid:71)(cid:104)(cid:69)(cid:103)(cid:60)(cid:104)(cid:80)(cid:69)(cid:60)(cid:103)(cid:23)(cid:103)(cid:60)(cid:100)(cid:80)(cid:73)(cid:3)(cid:71)(cid:73)(cid:104)(cid:3)(cid:75)(cid:112)(cid:74)(cid:91)(cid:73)(cid:90)(cid:73)(cid:91)(cid:106)(cid:104)(cid:60)(cid:100)(cid:103)(cid:74)(cid:104)(cid:3)(cid:78)(cid:107)(cid:104)(cid:81)(cid:93)(cid:91)(cid:81)(cid:91)(cid:87)(cid:107)(cid:103)(cid:73)(cid:71)(cid:219)(cid:159)(cid:219)(cid:104)(cid:93)(cid:107)(cid:103)(cid:69)(cid:73)(cid:33)(cid:60)(cid:79)(cid:193)(cid:3)(cid:141)(cid:3)(cid:25)(cid:193)(cid:33)(cid:60)(cid:79)(cid:3)(cid:141)(cid:3)(cid:25) 6 Adrien Guille, C´ecile Favre This formulation permits the anomaly to be negative at some points in the interval, as shown in Figure 2, only if it permits extending the interval while increasing the total magnitude. This is a desirable property, as it avoids fragmenting events that last several days because of the lower activity on Twitter during the night for instance, which can lead to low or negative anomaly. Another desirable property of this formulation is that a given word can’t be considered as the main word of more than one event. This increases the readability of events for the following reason. The bigger the number of events that can be described by a given word, the less specific to each event this word is. Therefore, this word should rather be considered as a related word than the main word. We solve this MCSS type of problem using the linear-time algorithm described by Bentley (1984). Eventually, each event detected following this process is described by: (i) a main word t (ii) a period of time I and (iii) the magnitude of its impact over the tweeting behavior of the users, Mag(t, I). 3.4 Selection of Words Describing Events Observing that clustering-based methods can in some cases lead to noisy event descriptions (Valkanas and Gunopulos, 2013), we adopt a different approach which we describe hereafter, with the aim to provide more semantically meaningful descriptions. In order to limit information overload, we choose to bound the number of words used to describe an event. This bound is a fixed parameter noted p. We justify this choice because of the shortness of tweets. Indeed, because tweets contain very few words, it doesn’t seem reasonable for an event to be associated with too many words (Weng and Lee, 2011). Identification of the candidate words The set of candidate words for describing an event is the set of the words with the p highest co-occurrence counts with the main word t during the period of time I. The most rel- evant words are selected amongst the candidates based on the similarity between their temporal dynamics and the dynamics of the main word during I. For that, we compute a weight wq for each candidate word t(cid:48) q. We propose to estimate this weight from the time-series for N i with the correlation coefficient proposed by Erdem et al (2012). This coefficient, primarily designed to analyze stock prices, has two desirable properties for our application: (i) it is parameter-free and (ii) there is no stationarity assumption for the validity of this coef- ficient, contrary to common coefficients, e.g. Pearson’s coefficient. This coefficient takes into account the lag difference of data points in order to better capture the t and N i t(cid:48) q direction of the co-variation of the two time-series over time. For the sake of conciseness, we directly give the formula for the approximation of the coefficient, given words t, t(cid:48) q and the period of time I = [a; b]: b(cid:88) ρOt,t(cid:48) q = where At,t(cid:48) = (N i At,t(cid:48) q i=a+1 (b − a − 1)AtAt(cid:48) t − N i−1 q t )(N i t(cid:48) t − N i−1 t q )2 i=a+1(N i b − a − 1 i=a+1(N i t(cid:48) − N i−1 t(cid:48) q q b − a − 1 q (cid:80)b (cid:80)b A2 t = A2 t(cid:48) q = − N i−1 t(cid:48) q ), and )2 t and N i t(cid:48) This practically corresponds to the first order auto-cor- relation of the time-series for N i . The proof that ρO satisfies ρO (cid:54) 1 using the Cauchy-Schwartz inequality is given by Erdem et al (2012). Eventually, we define the weight of the term t(cid:48) q as an affine function of ρO to conform with our definition of bursty topic, i.e. 0 (cid:54) wq (cid:54) 1: q wq = + 1 ρOt,t(cid:48) q 2 Because the temporal dynamics of very frequent words are less impacted by a particular event, this formulation – much like tf·idf – diminishes the weight of words that occur very frequently in the stream and increases the weight of words that occur less frequently, i.e. more specific words. Selection of the most relevant words The final set of words retained to describe an event is the set S, such q ∈ S, wq (cid:62) θ. The parameters p and θ allow that ∀t(cid:48) the users of MABED to adjust the level of information and detail they require. 3.5 Generating the List of the Top k Events Each time an event has been processed by the second component, it is passed to the third component. It is re- sponsible for storing the description of the events while managing duplicated events. For that, it uses two graph structures: the event graph and the redundancy graph. The first is a directed, weighted, labeled graph that stores the descriptions of the detected events. The rep- resentation of an event e in this graph is as follows. One node represents the main word t and is labeled with the interval I and the score Mag. Each related word t(cid:48) q is represented by a node and has an arc toward the main word, which weight is wq. The second structure is a Event detection, tracking and visualization in Twitter 7 Storing the description of e0 in the event graph. Checking connectivity between events e0 and e1. Adding a link between A and D in the redundancy graph. Fig. 3 Detecting duplication between events e0 and e1. Detecting duplicated events The event e1 is con- sidered to be a duplicate of the event e0 already stored in the event graph if (i) the main words t1 and t0 would be mutually connected and (ii) if the overlap coefficient between the periods of time I1 and I0 exceeds a fixed I1∩I0 threshold. The overlap coefficient is defined as min(I1,I0) and the threshold is noted σ, σ ∈]0; 1]. In this case, the description of e1 is stored aside and a relation is added between t1 and t0 in the redundancy graph. An exam- ple is shown in Figure 3, where e0 = {A, {B, C, D, E}, I0, Mag0}, and e1 = {D, {C, E, F}, I1, Mag1}. Merging duplicated events Identifying which du- plicated events should be merged together is equivalent to identifying the connected components in the redun- dancy graph. This is done in linear time, w.r.t to the numbers vertices and edges of the graph, using the al- gorithm described by Hopcroft and Tarjan (1973). In each connected component, there is exactly one node that corresponds to an event stored in the event graph. Its magnitude of impact and the related time interval remain the same, but its textual description is updated according to the following principle. The main word be- comes the aggregation of the main words of all dupli- cated events. The words describing the updated event are the p words among all the words describing the duplicated events with the p highest weights. Figure 4 shows the description of the event resulting from the merging of the events e0 and e1, based on the event and redundancy graphs shown in Figure 3. 3.6 Overall algorithm To conclude this section, Algorithm 1 sums-up the over- all flow of MABED. Fig. 4 Merging event e0 with duplicated event e1. simple undirected graph that is used to represent the relations between the eventual duplicated events, rep- resented by their main words. Let e1 be the event that the component is process- ing. First, it checks whether it is a duplicate of an event that is already stored in the event graph or not. If it isn’t the case, the event is added to the graph and the count of distinct events is incremented by one. Oth- erwise, assuming e1 is a duplicate of the event e0, a relation is added between t0 and t1 in the redundancy graph. When the count of distinct events reaches k, the duplicated events are merged and the list of the top k most impactful events is returned. We describe how du- plicated events are identified and how they are merged hereafter. 4 Experiments In this section we present the main results of the exten- sive experimental study we conducted on both English and French Twitter data to evaluate MABED. In the quantitative evaluation, we demonstrate the relevance of the mention-anomaly-based approach and we quan- tify the performance of MABED by comparing it to state-of-the-art methods. To evaluate precision and re- call, we ask human annotators to judge whether the detected events are meaningful and significant. In the qualitative evaluation, we show that the descriptions of the events detected by MABED are semantically and temporally more meaningful than the descriptions pro- vided by existing methods, which favors an easy under- standing of the results. Lastly, we analyse the detected (cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:4)(cid:15)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:22)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:33)(cid:60)(cid:79)(cid:192)(cid:141)(cid:3)(cid:25)(cid:192)(cid:12)(cid:4)(cid:15)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191)(cid:12)(cid:4)(cid:15)(cid:22)(cid:13)(cid:17)(cid:33)(cid:60)(cid:79)(cid:191)(cid:141)(cid:3)(cid:25)(cid:191) 8 Adrien Guille, C´ecile Favre Algorithm 1: Overall algorithm for MABED. Data: A corpus C of N tweets partitioned into n time-slices of equal length and the corresponding vocabularies, V and V@ Parameters: k > 0, p > 0, θ ∈ [0; 1] and σ ∈]0; 1] Result: The ordered list L of the k most impactful detected events /* First phase */ Initialize the stack P which stores the detected events during the first phase; for each word t ∈ V@ do Mag(t, I) = max{(cid:80)b Identify the interval I = [a; b] such that : Add the event e = [t, ∅, I, Mag(t, I)] in P ; i=a anomalie(t, i); end Sort the event stack P by descending magnitude of impact; /* Second phase Initialize the event graph GE and the redundancy graph GR; Set count to 0; while count < k and P > 0 do */ Pop the event e on top of the stack P ; Select the words that describe e, with parameters p and θ; if e is redundant with the event e(cid:48) which is already in GE, for a given σ then Add a link between the mains word of events e and e(cid:48) in GR; Store the description of e aside; else Insert the description e in graph GE; Increment count; end end Identify which events should be merged based on GR then update GE; Transform graph GE into list L; Sort L ; return L; event with regard to user communities and find that MABED can help understanding their interests. 4.1 Experimental Setup Corpora Since the Twitter corpora used in prior work aren’t available we base our experiments on two differ- ent corpora. The first corpus – noted Cen – contains 1,437,126 tweets written in English, collected with a user-centric strategy. They correspond to all the tweets published in November 2009 by 52,494 U.S.-based users (Yang and Leskovec, 2011). This corpus contains a lot of noise and chatter. According to the study conducted by PearAnalytics (2009), the proportion of non-event- related tweets could be as high as 50%. The second corpus – noted Cf r – contains 2,086,136 tweets written in French, collected with a keyword-based strategy. We have collected these tweets in March 2012, during the Table 2 Corpus Statistics. @: proportion of tweets that con- tain mentions, RT : proportion of retweets. Corpus Cen Cf r Tweets 1,437,126 2,086,136 Authors 52,494 150,209 @ 0.54 0.68 RT 0.17 0.43 campaign for the 2012 French presidential elections, us- ing the Twitter streaming API with a query consisting of the names of the main candidates running for presi- dent. This corpus is focused on French politics. Trivial words are removed from both corpora based on English and French standard stop-word lists. All timestamps are in UTC. Table 2 gives further details about each corpus. Baselines for comparison We consider two recent methods from the literature: ET (clustering-based) and TS (term-weighting-based). ET is based on the hier- archical clustering of bigrams using content and ap- pearance patterns similarity (Parikh and Karlapalem, 2013). TS is a normalized frequency metric for identify- ing n-grams that are related to events (Benhardus and Kalita, 2013). We apply it to both bigrams (TS2 ) and trigrams (TS3 ). We also consider a variant of MABED, noted α-MABED, that ignores the presence of men- tions in tweets. This means that the first component detects events and estimates their magnitude of impact based on the values of N i @t. The reason- ing for excluding a comparison against topic-modeling- based methods is that in preliminary experiments we found that they performed poorly and their computa- tion times were prohibitive. Parameter setting For MABED and α-MABED, we partition both corpora using 30 minute time-slices, which allows for a good temporal precision while keep- ing the number of tweets in each time-slice large enough. The maximum number of words describing each event, p, and the weight threshold for selecting relevant words, θ, are parameters that allow the user to define the re- quired level of detail. Given that the average number of words per sentence on Twitter is 10.7 according to the study conducted by Oxford (2009), we fix p to 10. For the purpose of the evaluation, we set θ = 0.7 so judges are only presented with words that are closely related to each event. There is a parameter that can affect the performance of MABED: σ. In the following, we report results for σ = 0.5 (we discuss the impact of σ in Section 4.1). t instead of N i For ET and TS, because they assume a fixed dura- tion for all events – which corresponds to the length of one time-slice – we partition both corpora using 1-day time-slices like in prior work. ET has two parameters, for which we use optimal values provided by the au- thors. Event detection, tracking and visualization in Twitter 9 Evaluation metrics The corpora don’t come with ground truth, therefore we have asked two human anno- tators to judge whether the detected events are mean- ingful and significant. The annotators are French grad- uate students who aren’t involved in this project. Their task consisted in reading the descriptions of the events detected by each method, and independently assign a rate to each description. This rate can be either 1, if the annotator decides that the description is meaning- ful and related to a significant event (i.e. an event that may be covered in traditional media), or 0 in any other cases. They also had to identify descriptions similar to ones which had previously been rated, in order to keep track of duplicates. Considering that annotating events is a time consuming task for the annotators, we limit the evaluation to the 40 most impactful events detected by each method (i.e. k = 40) in each corpus. We measure precision as the ratio of the number of detected events that both annotators have rated 1, which we refer to as k(cid:48), to the total number of detected events, k: P = k(cid:48) k Based on the number of duplicated events, k(cid:48)(cid:48), we define recall as the fraction of distinct significant events among all the detected events (Li et al, 2012): R = k(cid:48) − k(cid:48)(cid:48) k We also measure the DERate (Li et al, 2012), which denotes the percentage of events that are duplicates among all the significant events detected, that is to say DERate = k(cid:48)(cid:48)/k(cid:48). 4.2 Quantitative Evaluation Hereafter, we discuss the performance of the five consid- ered methods, based on the rates assigned by the anno- tators. The inter-annotator agreement, measured with Cohen’s Kappa (Landis and Koch, 1977), is κ (cid:39) 0.76, showing a strong agreement. Table 3 (page 10) reports the precision, the F-measure defined as the harmonic mean of precision and recall (i.e. 2 · P ·R P +R ), the DERate and the running-time of each method for both corpora. Comparison against baselines We notice that MABED achieves the best performance on the two corpora, with a precision of 0.775 and F-measure of 0.682 on Cen, and a precision and a F-measure of 0.825 on Cf r. Although ET yields a better DERate on Cen, it still achieves lower precision and recall than MABED on both corpora. Fur- thermore, we measure an average relative gain of 17.2% over α-MABED in the F-measure, which suggests that considering the mentioning behavior of users leads to MABED MABED (8 threads) 1 0.5 e m i t n u r d e z i l a m r o N 0.4 0.55 0.7 0.85 1 Subsample size Fig. 5 Runtime comparison versus subsample size. e t a R E D / e r u s a e m - F / n o i s i c e r P 0.8 0.6 0.4 0.2 Precision F-measure DERate 0.2 0.4 0.6 0.8 1 Fig. 6 Precision, F-measure and DERate of MABED on Cen for different values of σ. Value of σ more accurate detection of significant events in Twit- ter. Interestingly, we notice that MABED outperforms all baselines in the F-measure with a bigger margin on Cen, which contains a lot more noise than Cf r – with up to 50% non-event-related tweets according to the study conducted by PearAnalytics (2009). This suggests that considering the mentioning behavior of users also leads to more robust detection of events from noisy Twitter content. The DERate reveals that none of the signifi- cant events detected in Cf r by MABED were duplicated, whereas 6 of the significant events detected in Cen are duplicates. Furthermore, we find that the set of events detected by the four baseline methods is a sub-set of the events detected by MABED. Further analysis of the results produced by α-MABED, TS2 and TS3 reveals that most of non-significant events they detected are related to spam. The fact that most of these irrelevant events aren’t detected by MABED suggest that consid- ering the presence of mentions in tweets helps filtering away spam. Concerning ET, the average event descrip- tion is 17.25 bigrams long (i.e. more than 30 words). As a consequence, the descriptions contain some unrelated words. Specifically, irrelevant events are mostly sets of unrelated words that don’t make any sense. This is due in part to the fact that clustering-based approaches are prone to aggressively grouping terms together, as Valka- nas and Gunopulos (2013) stated in a previous study. 10 Adrien Guille, C´ecile Favre Table 3 Performance of the five methods on the two corpora. Corpus: Cen Corpus: Cf r Method MABED α-MABED ET TS2 TS3 Precision F-measure DERate Running-time Precision F-measure DERate Running-time 0.775 0.625 0.575 0.600 0.375 0.682 0.571 0.575 0.514 0.281 0.167 0.160 0 0.250 0.4 96s 126s 3480s 80s 82s 0.825 0.725 0.700 0.725 0.700 0.825 0.712 0.674 0.671 0.616 0 0.025 0.071 0.138 0.214 88s 113s 4620s 69s 74s Efficiency It appears that MABED and TS have running-times of the same order, whereas ET is or- ders of magnitude slower, which is due to the clustering step that requires computing temporal and semantical similarity between all bigrams. We also observe that MABED runs faster than α-MABED. The main reason for this is that V@ (cid:54) V , which speeds up the first phase. It should be noted that the running-times given in Table 3 don’t include the time required for prepar- ing vocabularies and pre-computing term frequencies, which is more important for methods that rely on bi- grams or trigrams. We evaluate the scalability of (i) MABED and (ii) a parallelized version of MABED (8 threads), by measuring their running-times on random subsamples of both corpora, for subsample sizes varying from 40% to 100%. Figure 5 shows the average normal- ized running--time versus subsample size. This means that the runtimes measured on a corpus are normalized by the longest runtime on this corpus and are then aver- aged for MABED and MABED (8 threads). We notice that runtimes grow linearly in size of the subsample. Furthermore, we note that MABED (8 threads) is on average 67% faster than MABED. Impact of σ on MABED While the list of events is constructed by MABED, the overlap threshold σ con- trols the sensitivity to duplicated events. Figure 6 plots the precision, F-measure and DERate of MABED on Cen for values of σ ranging from 0.2 to 1. We observe that the value of σ mainly impacts the DERate. More specifically, the DERate increases along the increase of σ as fewer duplicated events are merged. For σ = 1, the precision increases to 0.825 because of the high percent- age of duplicated significant events. Globally, it appears that the highest F-measure is attained for values of σ ranging from 0.2 to 0.5. However, even using σ = 1, MABED achieves a F-measure of 0.582, which is higher than all baselines on Cen. 4.3 Qualitative Evaluation Next, we qualitatively analyze the results of MABED and show how they provide relevant information about the detected events. Table 4 (page 11) lists the top 25 events with highest magnitude of impact over the crowd max y l a m o n A “hood” “fort” “shooting” 0 Nov. 5 e6 (13:30) Nov. 6 Nov. 7 Time (CST) Fig. 7 Measured anomaly for the words “hood”, “fort” and “shooting” between Nov. 5 and Nov. 7 midnight (CST). s t n e v e f o e g a t n e c r e P 0.4 0.2 0 CenCf r <12 [12;24] ]24;36] ]36;48] ]48;60] >60 Event duration (in hours) Fig. 8 Distribution of the duration of the events detected with MABED. in Cen. From this table, we make several observations along three axes: readability, temporal precision and redundancy. Readability We argue that highlighting main words allows for an easy reading of the description, more es- pecially as main words often correspond to named en- tities, e.g. Fort Hood (e6), Chrome (e7), Tiger Woods (e8), Obama (e13). This favors a quicker understanding of events by putting into light the key places, products or actors at the heart of the events, in contrast with ex- isting methods that identify bags of words or n-grams. What is more, MABED ranks the words that describe each event and limits their number, which again favors the interpretation of events. Temporal precision MABED dynamically estimates the period of time during which each event is discussed on Twitter. This improves the temporal precision as Event detection, tracking and visualization in Twitter 11 Table 4 Top 25 events with highest magnitude of impact over the crowd, detected by MABED in Cen. Main words are in bold and time intervals are given in UTC (Coordinated Universal Time). e# Time interval Topic 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 from 25 09:30 to 28 06:30 from 25 09:30 to 27 09:00 from 10 16:00 to 12 08:00 from 26 13:00 to 28 10:30 from 07 13:30 to 09 04:30 from 05 19:30 to 08 09:00 from 19 04:30 to 21 02:30 from 27 18:00 to 29 05:00 from 28 22:30 to 30 23:30 thanksgiving, turkey: hope (0.72), happy (0.71) Twitter users celebrated Thanksgiving thankful: happy (0.77), thanksgiving (0.71) Related to event #1 veterans: served (0.80), country (0.78), military (0.73), happy (0.72) Twitter users celebrated the Veterans Day that honors people who have served in the U.S. army black: friday (0.95), amazon (0.75) Twitter users were talking about the deals offered by Amazon the day before the “Black Friday” hcr, bill, health, house, vote: reform (0.92), passed (0.91), passes (0.88) The House of Representatives passed the health care reform bill on November 7 hood, fort: ft (0.92), shooting (0.83), news (0.78), army (0.75), forthood (0.73) The Fort Hood shooting was a mass murder that took place in a U.S. military post on November 5 chrome: os (0.95), google (0.87), desktop (0.71) On November 19, Google released Chrome OS’s source code for desktop PC tiger, woods: accident (0.91), car (0.88), crash (0.88), injured (0.80), seriously (0.80) Tiger Woods was injured in a car accident on November 27, 2009 tweetie, 2.1, app: retweets (0.93), store (0.90), native (0.89), geotagging (0.88) The iPhone app named Tweetie (v2.1), hit the app store with additions like retweets and geotagging from 29 17:00 monday, cyber: deals (0.84), pro (0.75) to 30 23:30 from 10 01:00 to 12 03:00 from 04 17:00 to 06 05:30 from 15 09:00 to 17 23:30 from 25 10:00 to 26 10:00 from 19 21:30 to 21 16:00 from 07 11:30 to 09 05:00 from 11 03:30 to 13 08:30 Twitter users were talking about the deals offered by online shops for the “Cyber Monday” linkedin: synced (0.86), updates (0.84), status (0.83), twitter (0.71) Starting from November 10, LinkedIn status updates can be synced with Twitter yankees, series: win (0.84), won (0.84), fans (0.78), phillies (0.73), york (0.72) The Yankees baseball team defeated the Phillies to win their 27th World Series on November 4 obama: chinese (0.75), barack (0.72), twitter (0.72), china (0.70) Barack Obama admitted that he’d never used Twitter but Chinese should be able to holiday: shopping (0.72) Twitter users started talking about the “Black Friday”, a shopping day and holiday in some states oprah, end: talk (0.81), show (0.79), 2011 (0.73), winfrey (0.71) On November 19, Oprah Winfrey announced her talk show will end in September 2011 healthcare, reform: house (0.91), bill (0.88), passes (0.83), vote (0.83), passed (0.82) Related to event #5 facebook: app (0.74), twitter (0.73) No clear corresponding event from 18 14:00 whats: happening (0.76), twitter (0.73) to 21 03:00 from 20 10:00 to 22 00:00 from 26 08:00 to 26 15:30 Twitter started asking ”What’s happening?” instead of ”What are you doing?” from November 18 cern: lhc (0.86), beam (0.79) On November 20, proton beams were successfully circulated in the ring of the LHC (CERN) icom: lisbon (0.99), roundtable (0.98), national (0.88) The I-COM roundtable about market issues in Portugal took place on November 26 from 03 23:00 maine: voters (0.76), marriage (0.71) to 05 10:00 from 07 13:00 to 10 16:30 from 18 14:00 to 20 09:00 On November 4, Maine voters repealed a state law granting same-sex couples the right to marry droid: verizon (0.75), iphone (0.72), video (0.70) On November 7, Verizon stores released the new DROID phone, promoted as an iPhone alternative read: blog (0.76), article (0.74) No clear corresponding event from 02 05:00 wave: guide (0.81), google (0.73) to 03 19:00 from 18 10:30 to 20 09:00 The complete Google Wave guide was released on November 9 talk, show: oprah (0.89), 2011 (0.85), end (0.77) Related to event # 15 compared to existing methods, that typically report events on a daily basis. We illustrate how this improves the quality of the results with the following example. The 6th event corresponds to Twitter users reporting the Fort Hood shooting that, according to Wikipedia1, happened on November 5, 2009 between 13:34 and 13:44 CST (i.e. 19:34 and 19:44 UTC). The burst of activity engendered by this event is first detected by MABED in the time-slice covering the 19:30-20:00 UTC period. MABED gives the following description: 1Source: shooting http://en.wikipedia.org/wiki/Fort_Hood_ 12 Adrien Guille, C´ecile Favre (i) 11-05 19:30 to 11-08 9:00 ; (ii) hood, fort; (iii) ft (0.92), shooting (0.83), news (0.78), army (0.75), fort- hood (0.73). We can clearly understand that (i) something happened around 7:30pm UTC, (ii) at the Hood Fort and that (iii) it is a shooting. In contrast, α-MABED fails at detecting this event on November 5 but reports it on November 7 when the media coverage was the highest. Redundancy Some events have several main words, e.g. events e1, e5, e6, e8. This is due to merges oper- ated by the third component of MABED to avoid du- plicated events. Redundancy is further limited because of the dynamic estimation of each event duration. We may continue using event e6 to illustrate that. Figure 7 plots the evolution of the anomaly measured for the words “hood”, “fort” and “shooting” between Novem- ber 5 and November 7. We see that the measured ano- maly is closer to 0 during the night (local time), giv- ing a “dual-peak” shape to the curves. Nevertheless, MABED reports a unique event which is discussed for several days, instead of reporting distinct consecutive 1- day events. The importance of dynamically estimating the duration of events is further illustrated by Figure 8, which shows the distributions of event duration for both corpora. It reveals that some events are discussed during less than 12 hours whereas some are discussed for more than 60 hours. We note that event durations in Cf r are normally distributed and that these politics- related events tend to be discussed for a longer duration than the events detected in Cen. This is consistent with the empirical study presented by Romero et al (2011), which states that controversial and more particularly political topics are more persistent than other topics on Twitter. 4.4 Analysis of Detected Events In this section we analyze events detected by MABED in Cen, with regard to the communities detected in the structure of the network that interconnects the authors of the tweets in that corpus. Our goal is to show that MABED can help understanding users’, or user com- munities’ interests. Network structure The 52,494 authors of the tweets in Cen are interconnected by 5,793,961 following rela- tionships (Kwak et al, 2010). This forms a directed, con- nected network, which diameter is 8, with an average path length of 2.55 and a clustering coefficient of 0.246. We measure a small-world-ness metric (Humphries et al, 2006) of s = 47.2, which means – according to the defi- nition given by Humphries et al (2006), i.e. s > 1 – this network is a small-world network. Detecting communities in the network In order to find communities in this network, we apply the Lou- vain method proposed by Blondel et al (2008), which has been notably used to detect communities in online social networks in several studies (Haynes and Perisic, 2010; Kim et al, 2013). It is a heuristic-based, greedy method for optimizing modularity (Newman, 2006). It detects two communities: c0, comprised of 25,625 users, and c1, comprised of 26,869 users. By Cen(c0) and Cen(c1), we denote, respectively, the corpus of 479,899 tweets published by the users belonging to c0 and the corpus of 932,699 tweets published by users belonging to c1. Characterizing communities’ interests We ex- tract the list L0 (respectively L1) of the k most impact- ful events from the corpus Cen(c0) (respectively Cen(c1)). Here we choose to fix k = 10, so only events that en- gendered a significant amount of reactions in the related community are considered. In order to compare the two communities’ interests, we first manually label each de- tected event with one the following categories (McMinn et al, 2013): – Armed Conflicts and Attacks; – Sports; – Disasters and Accidents; – Art Culture and Entertainment; – Business and Economy; – Law Politics and Scandals; – Science and Technology; – Miscellaneous. Then, we measure the weight of each category in each event list and compute the category weight dis- tribution for each community. The weight of a given category is obtained by the following formula: (cid:88) e∈E Weightcategory = 1 − ((rank(e) − 1) × 0.1) where E is the set of events labelled with this category. Thus, the contribution of an event to the weight of the related category linearly diminishes with its rank in the list, e.g. an event ranked 1st contributes for a weight of 1, whereas an event ranked 10th contributes for a weight of 0.1. For comparison purpose, we do the same for events detected in Cen and Cen(random). The Cen(random) corpus contains 725,806 tweets that corresponds to the subset of tweets published by 26,000 randomly chosen authors (i.e. about the number of users in communities c0 or c1) in Cen. Figure 9(a) shows the weight distri- bution for communities c0 and c1. We note that, vi- sually, the two distributions seem quite different. For instance, we notice that the “Miscellaneous” category has the highest weight for c1 whereas none of the events Event detection, tracking and visualization in Twitter 13 Cen(c0) Cen(c1) users adopt and their social ties – and suggest that the social network structure can influence event detection. From a different perspective, these results show that event detection can help understanding user communi- ties’ interests. t h g i e W t h g i e W 2 1 0 2 1 0 (a) Events detected in Cen(c0) and Cen(c1). CenCen(random) y g o l o n h c e T d n a e c n e i c S y m o n o c E d n a s s e n i s u B s l a d n a c S d n a s c i t i l o P w a L s t r o p S s t n e d i c c A d n a s r e t s a s i D s u o e n a l l e c s i M s k c a t t A d n a s t c i fl n o C d e m r A t n e m n i a t r e t n E d n a e r u t l u C t r A (b) Events detected in Cen and Cen(random). Event category Fig. 9 Category weight distribution for events detected with MABED in Cen(c0), Cen(c1), Cen and Cen(random). detected in Cen(c0) belongs to that category. On the op- posite, the “Science and Technology” category has the highest weight for c0 whereas it has the second lowest weight for c1. We measure a negative linear correlation of -0.36 between the two distributions using Pearson’s coefficient, which reinforce this assessment. Figure 9(b) shows the distribution of event category weight for Cen and Cen(random). In this case, we measure a linear cor- relation of 0.93, which means that the two distributions are very similar. These results indicate that the com- munities detected in the network structure are also rele- vant in terms of users’ interests. These results also shed light on the interplay between the social structure, i.e. who follows whom, and the topical structure, i.e. who’s interested in what, in Twitter. More specifically, they complement the findings from Romero et al (2013) – who have found a relationship between the hashtags 5 Implementation and Visualizations We provide a parallel implementation23 of MABED. It is also included in SONDY (Guille et al, 2013), an open-source social media data mining software that im- plements several state-of-the-art methods for event de- tection in social media. To ensure an efficient explo- ration of the events detected by MABED, we also de- velop three visualizations, which we describe below. Time-oriented visualization It is based on an in- teractive timeline that allows the user to explore the detected events through time. As an example, Figure 10 shows the time-oriented visualization generated from the events detected in Cen. As one can see, the timeline is divided into two parts. The lower part is a ribbon labelled with events in chronological order (fig. 10.1). Selecting a label (i.e. the main term of an event) in the lower part updates the upper part of the visualization with details about the related event. More specifically, the upper part displays the temporal and textual de- scriptions extracted with MABED (fig. 10.2.a), an im- age (fig. 10.2.b) and a hypertext (fig. 10.2.c). In the current implementation, these correspond to the top image and the description of the top page returned by the Bing search engine, using the description extracted by MABED as a query. This visualization provides a chronological overview of the events detected in a tweet corpus. In addition, the hypertexts offer quick access to resources that can help learning more about these events. For instance, the hypertext associated to the event selected on the time- line depicted in Figure 10, reveals that, on November 19, 2009, Google released Chrome OS’s source code and demonstrated an early version of this operating system for desktop computers. Impact-oriented visualization It is an interac- tive chart that allows analyzing the magnitude of im- pact of the detected events. More precisely, it plots the mention-anomaly function related to each event. Fig- ure 11 depicts this visualization for the top 20 events detected in Cen. The interactive legend (fig.11.1) can be used to display (fig.11.2) only the functions which are of interest by clicking on them. Single clicking on a legend item removes the corresponding function from 2Binaries: http://mediamining.univ-lyon2.fr/mabed 3Sources: https://github.com/AdrienGuille/MABED 14 Adrien Guille, C´ecile Favre Fig. 10 The time-oriented visualization. The lower part is a ribbon (1) labeled with events in chronological order. The upper part displays details about the event selected in the lower part: the description extracted with MABED (2.a), an image (2.b) and a hypertext (2.c). Fig. 11 The impact-oriented visualization is a chart (1) that plots the magnitude of impact of the detected events (2). Each event is associated to a different color. Event detection, tracking and visualization in Twitter 15 the chart while double clicking on a item makes it the only visible one in the chart. This visualization helps analyzing the temporal pat- terns that describe how Twitter users reacted to the detected events. For instance, we observe that different events trigger different patterns: some events engender a single significant peak of reactions (e.g. fig.11.a), some events generate successive peaks of decreasing strength (e.g. fig.11.b), while other events engender successive increasing peaks of attention (e.g. fig.11.c). Topic-oriented visualization It is based on the event graph constructed by MABED during the sec- ond phase. Figure 12 shows the event graph constructed from Cf r. Main terms are represented with grey nodes (fig. 12.1), whose diameter is proportional to the mag- nitude of impact of the corresponding event. Related words are represented by blue nodes (fig. 12.3), which are connected to main terms by edges (fig. 12.2) whose thickness is proportional to the related weight. For the sake of readability, nodes’ labels are hidden by default, but the user can click a grey node in order to reveal the main term and related words describing the event. This visualization helps identifying similar events by topic. It also helps discovering words which are com- mon to several events. This could be useful in cases when one wants to quickly identify events involving, e.g. a specific actor or place. For instance, we spot two nodes (fig.12.a, b) which describe many events. They correspond to the two main candidates for the 2012 presidential elections. Interestingly, even though they appear in many different events, they appear together in only one single event. 5.1 Case study: Monitoring the French Political Conversation on Twitter Setup MABED has been used from December 2013 until November 2014 to continuously analyze the French political conversation on Twitter. For this purpose, it has been coupled with a system fetching tweets in real- time about the President of the French Republic, Fran- cois Hollande, via the Twitter streaming API. During this period, the highest crawling rate we have reached was about 150,000 tweets in 24 hours. Every 10 minutes, the visualizations were refreshed with the five most im- pactful events detected from the tweets received in the last 24 hours (partioned into 144 time-slices of 10 min- utes each). Results It has helped us to understand the political conversation on Twitter, and it has revealed interesting clues about how public opinion evolves on Twitter. The visualizations, most notably the impact-oriented visu- alizations in this case, have also shed light on specific patterns. As an example, Figure 13 shows two impact- oriented visualizations. They were automatically gen- erated from the five most impactful events detected in two successive 24-hour periods: (i) December 13th, 2013 and (ii) December 14th, 2013. We notice that the two distinct sets of detected events are distributed dif- ferently throughout each day. On December 13th, we observe that Twitter users focus their attention on var- ious successive events throughout the day. On the other hand, on the 14th we observe an opposite pattern since all the events are discussed simultaneously during the second half of the day. Further analysis, indicates that all five events detected on December 13th are closely related. In contrast, the events detected on the 14th are loosely related. One possible explanation for the pattern we observe on December 13th is that related events can “compete” or “collaborate”. The mention- anomaly measured for competing events should thus be negatively correlated, while the mention-anomaly mea- sured for cooperating events should be positively cor- related. For instance, we observe that events e3 and e4 take place simultaneously and are likely to collaborate. Eventually, both of them end when events e2 and e1 (likely to be competing with e3 and e4) start. 6 Conclusion In this paper, we developed MABED, a mention-ano- maly-based method for event detection in Twitter. In contrast with prior work, MABED takes the social as- pect of tweets into account by leveraging the creation frequency of mentions that users insert in tweets to engage discussion. Our approach also differ from prior work in that it dynamically estimates the period of time during which each event is discussed on Twitter. The experiments we conducted have shown that MABED has a linear runtime in the corpus size. They have also demonstrated the relevance of our approach. Quantita- tively speaking, MABED yielded better performance in all our tests than α-MABED – a variant that ignores mentions – and also outperformed two recent meth- ods from the literature. Qualitatively speaking, we have shown that the highlighting of main words improves the readability of the descriptions of events. We have also shown that the temporal information provided by MABED is very helpful. On the one hand, it clearly in- dicates when real-world events happened. On the other hand, dynamically identifying the period of time during which each event is discussed limits the fragmentation of events. By analyzing the detected events with regard to the user communities detected in the social network structure, we have shed light on the interplay between social and topical structure in Twitter. In particular, we 16 Adrien Guille, C´ecile Favre Fig. 12 The topic-oriented visualization is an interactive drawing of the event graph. Grey nodes (1) correspond to main terms while blue nodes (3) correspond to related words. Edges (2) connect words that describe the same event. Fig. 13 On the left: the impact-oriented visualization generated based on the five most impactful events detected from tweets collected on December 13th, 2013. On the right: the impact-oriented visualization generated based on the five most impactful events detected from tweets collected on December 14th, 2013. Each event is associated to a different color. have found that MABED can help understanding user communities’ interests. Moreover, we presented three visualizations designed to help with the exploration of the detected events. Finally, we described how we lever- aged MABED and the visualizations we developed in order to continuously monitor and analyze the French political conversation on Twitter from December 2013 until November 2014. As part of future work, we plan to investigate the effectiveness of utilizing more features to model the dis- cussions between users (e.g. number of distinct users, users’ geolocations). Another interesting direction for future work is to incorporate sentiment analysis in the event detection process to further enrich event descrip- tions. Acknowledgements The authors would like to thank Mi- chael Gauthier for helpful suggestions. This work was sup- ported in part by the French National Research Agency and the ImagiWeb project (ANR-2012-CORD-002-01). References Aggarwal CC, Subbian K (2012) Event detection in so- cial streams. In: SDM, pp 624–635 Aiello LM, Petkos G, Martin C, Corney D, Papadopou- los S, Skraba R, Goker A, Kompatsiaris Y, Jaimes A (2013) Sensing trending topics in twitter. IEEE Trans Multimedia 15(6):1–15 AlSumait L, Barbar´a D, Domeniconi C (2008) On-line lda: Adaptive topic models for mining text streams with applications to topic detection and tracking. In: ICDM, pp 3–12 Becker H, Iter D, Naaman M, Gravano L (2011) Be- yond trending topics: Real-world event identification Event detection, tracking and visualization in Twitter 17 on twitter. In: ICWSM, pp 438–441 Benhardus J, Kalita J (2013) Streaming trend detection in twitter. IJWBC 9(1):122–139 Bentley J (1984) Programming pearls: algorithm design techniques. CACM 27(9):865–873 Bernstein MS, Suh B, Hong L, Chen J, Kairam S, Chi EH (2010) Eddi: Interactive topic-based browsing of social status streams. In: UIST ’10, pp 303–312 Blei D, Ng A, Jordan M (2003) Latent dirichlet alloca- tion. JMLR 3:993–1022 Blondel V, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large net- works. Journal of Statistical Mechanics: Theory and Experiment P10008:1–12 Erdem O, Ceyhan E, Varli Y (2012) A new correlation coefficient for bivariate time-series data. In: MAF, pp 58–73 Fan TH, Lee S, Lu HI, Tsou TS, Wang TC, Yao A (2003) An optimal algorithm for maximum-sum seg- ment and its application in bioinformatics. In: CIAA, pp 251–257 Fung GPC, Yu JX, Yu PS, Lu H (2005) Parameter free bursty events detection in text streams. In: VLDB, pp 181–192 Guille A, Favre C, Hacid H, Zighed D (2013) Sondy: An open source platform for social dynamics mining and analysis. In: SIGMOD, pp 1005–1008 Lappas T, Arai B, Platakis M, Kotsakos D, Gunopulos D (2009) On burstiness-aware search for document sequences. In: KDD, pp 477–486 Lau JH, Collier N, Baldwin T (2012) On-line trend analysis with topic models: #twitter trends detection topic model online. In: COLING, pp 1519–1534 Lee P, Lakshmanan LV, Milios E (2013) Keysee: Sup- porting keyword search on evolving events in social streams. In: KDD ’13, pp 1478–1481 Li C, Sun A, Datta A (2012) Twevent: Segment-based event detection from tweets. In: CIKM, pp 155–164 Marcus A, Bernstein MS, Badar O, Karger DR, Mad- den S, Miller RC (2011) Twitinfo: aggregating and visualizing microblogs for event exploration. In: CHI ’11, pp 227–236 Mathioudakis M, Koudas N (2010) Twittermonitor: trend detection over the twitter stream. In: SIG- MOD, pp 1155–1158 McMinn AJ, Moshfeghi Y, Jose JM (2013) Building a large-scale corpus for evaluating event detection on twitter. In: CIKM, pp 409–418 Newman MEJ (2006) Modularity and community structure in networks. Proceedings of the National Academy of Sciences of the USA 103(23):8577–8582 Oxford UP (2009) OUP dictionary team monitors twit- terer and tweets. http://blog.oup.com/2009/06/ oxford-twitter/ Haynes J, Perisic I (2010) Mapping search relevance to Parikh R, Karlapalem K (2013) Et: events from tweets. social networks. In: SNA-KDD, pp 11–20 In: WWW (companion volume), pp 613–620 Hopcroft J, Tarjan R (1973) Algorithm 447: efficient al- gorithms for graph manipulation. CACM 16(6):372– 378 Humphries M, Gurney K, Prescott T (2006) The brain- stem reticular formation is a small-world, not scale- free, network. In: Biological Sciences, vol 273, p 503511 Kim YH, Seo S, Ha YH, Lim S, Yoon Y (2013) Two applications of clustering techniques to twitter: Com- munity detection and issue extraction. Discrete Dy- namics in Nature and Society 2013:1–9 Kleinberg J (2002) Bursty and hierarchical structure in streams. In: KDD, pp 91–101 Kraft T, Wang D, Delawder J, Dou W, Li Y, Rib- arsky W (2013) Less after-the-fact: Investigative vi- sual analysis of events from streaming twitter. In: LDAV, pp 95–103 Kwak H, Lee C, Park H, Moon S (2010) What is Twit- ter, a social network or a news media? In: WWW, pp 591–600 Landis JR, Koch GG (1977) The measurement of ob- server agreement for categorical data. Biometrics pp 159–174 PearAnalytics (2009) Twitter study. Tech. rep., http: //www.pearanalytics.com/wp-content/uploads/ 2012/12/Twitter-Study-August-2009.pdf Romero D, Chenhao T, Ugander J (2013) On the interplay between social and topical structure. In: ICWSM, pp 516–525 Romero DM, Meeder B, Kleinberg J (2011) Differences in the mechanics of information diffusion across top- ics: idioms, political hashtags, and complex contagion on twitter. In: WWW, pp 695–704 Shamma DA, Kennedy L, Churchill EF (2011) Peaks and persistence: modeling the shape of microblog conversations. In: CSCW, pp 355–358 Valkanas G, Gunopulos D (2013) How the live web feels about events. In: CIKM, pp 639–648 Weng J, Lee BS (2011) Event detection in twitter. In: ICWSM, pp 401–408 Yang J, Leskovec J (2011) Patterns of temporal varia- tion in online media. In: WSDM, pp 177–186 Yuheng H, Ajita J, Dor´ee DS, Fei W (2012) What were the tweets about? topical associations between public events and twitter feeds. In: ICWSM, pp 154–161
1811.01852
1
1811
2018-11-05T17:17:18
Differences between Health Related News Articles from Reliable and Unreliable Media
[ "cs.SI", "cs.CY" ]
In this study, we examine a collection of health-related news articles published by reliable and unreliable media outlets. Our analysis shows that there are structural, topical, and semantic differences in the way reliable and unreliable media outlets conduct health journalism. We argue that the findings from this study will be useful for combating health disinformation problem.
cs.SI
cs
Differences between Health Related News Articles from Reliable and Unreliable Media Sameer Dhoju, Md Main Uddin Rony, Naeemul Hassan Department of Computer Science and Engineering, The University of Mississippi ABSTRACT In this study, we examine a collection of health-related news articles published by reliable and unreliable media outlets. Our analysis shows that there are structural, topical, and semantic differences in the way reliable and unreliable media outlets conduct health journalism. We argue that the findings from this study will be useful for combating health disinformation problem. ACM Reference Format: Sameer Dhoju, Md Main Uddin Rony, Naeemul Hassan. 2019. Differences between Health Related News Articles from Reliable and Unreliable Media. In Proceedings of Computation+Journalism Symposium (C+J'19). ACM, New York, NY, USA, Article 4, 5 pages. https://doi.org/10.475/1234 1 INTRODUCTION Of the 20 most-shared articles on Facebook in 2016 with the word "cancer" in the headline, more than half the reports were discredited by doctors and health authorities [6]. The spread of health-related hoaxes is not new. However, the advent of Internet, social network- ing sites (SNS), and click-through-rate (CTR)-based pay policies have made it possible to create hoaxes/"fake news", published in a larger scale and reach to a broader audience with a higher speed than ever [14]. Misleading or erroneous health news can be dan- gerous as it can lead to a critical situation. [12] reported a measles outbreak in Europe due to lower immunization rate which experts believed was the result of anti-vaccination campaigns caused by a false news about MMR vaccine. Moreover, misinformation can spoil the credibility of the health-care providers and create a lack of trust in taking medicine, food, and vaccines. Recently, researchers have started to address the fake news problem in general [19, 27]. However, health disinformation is a relatively unexplored area. Ac- cording to a report from Pew Research Center [7], 72% of adult internet users search online for information about a range of health issues. So, it is important to ensure that the health information which is available online is accurate and of good quality. There are some authoritative and reliable entities such as National In- stitutes of Health (NIH) 1 or Health On the Net 2 which provide high-quality health information. Also, there are some fact-checking 1https://www.nih.gov/ 2https://www.hon.ch/en/ Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. C+J'19, February 2019, Miami, Florida USA © 2019 Association for Computing Machinery. ACM ISBN 123-4567-24-567/08/06...$15.00 https://doi.org/10.475/1234 sites such as Snopes.com 3 and Quackwatch.org 4 that regularly de- bunk health and medical related misinformation. Nonetheless, these sites are incapable of busting the deluge of health disinformation continuously produced by unreliable health information outlets (e.g., RealFarmacy.com, Health Nut News). Moreover, the bots in so- cial networks significantly promote unsubstantiated health-related claims [8]. Researchers have tried developing automated health hoax detection techniques but had limited success due to several reasons such as small training data size and lack of consciousness of users [10, 11, 18, 30]. The objective of this paper is to identify discriminating features that can potentially separate a reliable health news from an unreli- able health news by leveraging a large-scale dataset. We examine how reliable media and unreliable media outlets conduct health journalism. First, we prepare a large dataset of health-related news articles which were produced and published by a set of reliable media outlets and unreliable media outlets. Then, using a system- atic content analysis, we identify the features which separate a reliable outlet sourced health article from an unreliable sourced one. These features incorporate the structural, topical, and seman- tic differences in health articles from these outlets. For instance, our structural analysis finds that the unreliable media outlets use clickbaity headlines in their health-related news significantly more than what reliable outlets do. Our semantic analysis shows that on average a health news from reliable media contains more reference quotes than an average unreliable sourced health news. We argue that these features can be critical in understanding health misinfor- mation and designing systems to combat such disinformation. In the future, our goal is to develop a machine learning model using these features to distinguish unreliable media sourced health news from reliable articles. 2 RELATED WORK There has been extensive work on how scientific medical research outcomes should be disseminated to general people by following health journalism protocols [3, 4, 16, 26, 28]. For instance, [20] sug- gests that it is necessary to integrate journalism studies, strategic communication concepts, and health professional knowledge to successfully disseminate professional findings. Some researchers particularly focused on the spread of health misinformation in social media. For example, [10] analyzes Zika 5 related misinformation in Twitter. In particular, it shows that tracking health misinformation in social media is not trivial, and requires some expert supervision. It used crowdsource to annotate a collection of Tweets and used the annotated data to build a rumor classification model. One limitation of this work is that the used dataset is too small (6 rumors) to make 3https://www.snopes.com/ 4http://www.quackwatch.org/ 5https://en.wikipedia.org/wiki/Zikavirus C+J'19, February 2019, Miami, Florida USA S. Dhoju et al. a general conclusion. Moreover, it didn't consider the features in the actual news articles unlike us. [11] examines the individuals on social media that are posting questionable health-related infor- mation, and in particular promoting cancer treatments which have been shown to be ineffective. It develops a feature based supervised classification model to automatically identify users who are com- paratively more susceptible to health misinformation. There are other works which focus on automatically identifying health misin- formation. For example, [17] developed a classifier to detect misin- formative posts in health forums. One limitation of this work is that the training data is only labeled by two individuals. Researchers have also worked on building tools that can help a user to easily consume health information. [18] developed the "VAC Medi+board", an interactive visualization platform integrating Twitter data and news coverage from a reliable source called MediSys6. It covers public debate related to vaccines and helps users to easily browse health information on a certain vaccine-related topic. Our study significantly differs from these already existing researches. Instead of depending on a small sample of health hoaxes like some of the existing works, we take a different approach and focus on the source outlets. This gives us the benefit of investigating with a larger dataset. We investigate the journalistic practice of reliable and unreliable health outlets, an area which has not been studied according to our knowledge. 3 DATA PREPARATION For investigating how reliable media outlets and unreliable outlets portray health information, we need a reasonably sized collection of health-related news articles from these two sides. Unfortunately, there is not an available dataset which is of adequate size. For this reason, we prepare a dataset of about 30, 000 health-related news articles disseminated by reliable or unreliable outlets within the years 2015 − 2018. Below, we describe the preparation process in detail. 3.1 Media Outlet Selection The first challenge is to identify reliable and unreliable outlets. The matter of reliability is subjective. We decided to consider the outlets which have been cross-checked as reliable or unreliable by credible sources. 3.1.1 Reliable Media. We identified 29 reliable media outlets from three sources -- i) 11 of them are certified by the Health On the Net [22], a non-profit organization that promotes transparent and reliable health information online. It is officially related with the World Health Organization (WHO) [31]. ii) 8 from U.S. govern- ment's health-related centers and institutions (e.g., CDC, NIH, NCBI), and iii) 10 from the most circulated broadcast [25] main- stream media outlets (e.g., CNN, NBC). Note, the mainstream out- lets generally have a separate section for health information (e.g., https://www.cnn.com/health). As our goal is to collect health- related news, we restricted ourselves to their health portals only. 3.1.2 Unreliable Media. Dr. Melissa Zimdars, a communication and media expert, prepared a list of false, misleading, clickbaity, and satirical media outlets [33, 34]. Similar lists are also maintained by 6http://medisys.newsbrief .eu Reliable Unreliable everydayhealth, WebMD, statnews, AmericanHeart, BBCLifestyleHealth, CBSHealth, FoxNewsHealth, WellNYT, latimesscience, tampabaytimeshealth, philly.comhealth, AmericanHeart, AmericanCancerSociety, HHS, CNNHealth, cancer.gov, FDA, mplus.gov, NHLBI, kidshealthparents, ahrq.gov, healthadvocateinc, HealthCentral, eMedicineHealth, C4YWH, BabyCenter, MayoClinic, MedicineNet, healthline liveahealth, healthexpertgroup, healthysolo, organichealthcorner, justhealthylifestyle1, REALfarmacyCOM, thetruthaboutcancer, BookforHealthyLife, viralstories.bm, justhealthyway, thereadersfile, pinoyhomeremedies, onlygenuinehealth, greatremediesgreathealth, HealthRanger, thefoodbabe, AgeofAutism, HealthNutNews, consciouslifenews, HealthImpactNews Table 1: List of Facebook page ids of the reliable and unreli- able outlets. Some of them are unavailable now. Wikipedia [32] and informationisbeautiful.net [13]. We identified 6 media outlets which primarily spread health-related misinforma- tion and are present in these lists. Another source for identifying unreliable outlets is Snopes.com, a popular hoax-debunking website that fact-checks news of different domains including health. We followed the health or medical hoaxes debunked by Snopes.com and identified 14 media outlets which sourced those hoaxes. In total, we identified 20 unreliable outlets. Table 1 lists the Facebook page ids of all the reliable and unreliable outlets that have been used in this study. 3.2 Data Collection The next challenge is to gather news articles published by the selected outlets. We identified the official Facebook pages of each of the 49 media outlets and collected all the link-posts 7 shared by the outlets within January 1, 2015 and April 2, 2018 8 using Facebook Graph API. For each post, we gathered the corresponding news article link, the status message, and the posting date. 3.2.1 News Article Scraping. We used a Python package named Newspaper3k 9 to gather the news article related data. Given a news article link, this package provides the headline, body, author name (if present), and publish date of the article. It also provides the visual elements (image, video) used in an article. In total, we collected data for 29, 047 articles from reliable outlets and 15, 017 from unreliable outlets. Filtering non-Health News Articles. Even though we restricted 3.2.2 ourselves to health-related outlets, we observed that the outlets also published or shared non-health (e.g., sports, entertainment, weather) news. We removed these non-health articles from our dataset and only kept health, food & drink, or fitness & beauty related articles. Specifically, for each news article, we used the document categorization service provided by Google Cloud Natural Language API 10 to determine its topic. If an article doesn't belong to one of the three above mentioned topics, it is filtered out. This step reduced the dataset size to 27, 589; 18, 436 from reliable outlets and 9, 153 from unreliable outlets. We used this health-related dataset only in all the experiments of this paper. Figure 1 shows the health-related news percentage distribution for reliable outlets and unreliable outlets using box-plots. For each of the 29 reliable outlets, we measure the percentage of health news and then use these 29 percentage values 7Facebook allows posting status, pictures, videos, events, links, etc. We collected the link type posts only. 8After that, Facebook limited access to pages as a result of the Cambridge Analytica incident. 9https://newspaper.readthedocs.io/en/latest/ 10https://cloud.google.com/natural-language/ Differences between Health Related News Articles from Reliable and Unreliable Media C+J'19, February 2019, Miami, Florida USA to draw the box-plot for the reliable outlets; likewise for unreliable. We observe that the reliable outlets (median 72%) publish news on health topics comparatively less than unreliable outlets (median 85%). Figure 2: Distribution of clickbait patterns We further investigate the linguistic patterns used in the clickbait headlines. In particular, we analyze the presence of some common patterns which are generally employed in clickbait according to [1, 23]. The patterns are- • Presence of demonstrative adjectives (e.g., this, these, that) • Presence of numbers (e.g., 10, ten) • Presence of modal words (e.g., must, should, could, can) • Presence of question or WH words (e.g., what, who, how) • Presence of superlative words (e.g., best, worst, never) Figure 2 shows the distribution of these patterns among the clickbait headlines of reliable and unreliable outlets. Note, one headline may contain more than one pattern. For example, this headline "Are these the worst 9 diseases in the world?" contains four of the above patterns. This is the reason why summation of the percentages isn't equal to one. We see that unreliable outlets use demonstrative adjective and numbers significantly more compared to the reliable outlets. Figure 3: Distribution of (Shared Date - Published Date) gaps in days 4.1.2 Time-span Between Publishing and Sharing. We investigate the time difference between an article's published date and share date (in Facebook). Figure 3 shows density plots of Facebook Share Date -- Article Publish Date for reliable and unreliable outlets. We observe that both outlet categories share their articles on Facebook within a short period after publishing. However, unreliable outlets seem to have considerable time gap compared to reliable outlets. It could be because of re-sharing an article after a long period. To verify that, we checked how often an article is re-shared on Facebook. We find that on average a reliable article is shared 1.057 times whereas an unreliable article is shared 1.222 times. Figure 1: Comparison between reliable and unreliable out- lets with respect to presence of health-related news contents 4 ANALYSIS Using this dataset, we conduct content analysis to examine struc- tural, topical, and semantic differences in health news from reliable and unreliable outlets. 4.1 Structural Difference 4.1.1 Headline. The headline is a key element of a news article. According to a study done by American Press Institute and the Associated Press [15], only 4 out of 10 Americans read beyond the headline. So, it is important to understand how reliable and unreliable outlets construct the headlines of their health-related news. According to to [1], a long headline results in significantly higher click-through-rate (CTR) than a short headline does. We observe that the average headline length of an article from reliable outlets and an article from unreliable outlets is 8.56 words and 12.13 words, respectively. So, on average, an unreliable outlet's headline has a higher chance of receiving more clicks or attention than a reliable outlet's headline. To further investigate this, we examine the clickbaityness of the headlines. The term clickbait refers to a form of web content (headline, image, thumbnail, etc.) that employs writing formulas, linguistic techniques, and suspense creating visual elements to trick readers into clicking links, but does not deliver on its promises [9]. Chen et al. [2] reported that clickbait usage is a common pattern in false news articles. We investigate to what extent the reliable and unreliable outlets use clickbait headlines in their health articles. For each article headline, we test whether it is a clickbait or not using two supervised clickbait detection models -- a sub-word embedding based deep learning model [24] and a feature engineering based Multinomial Naive Bayes model [21]. Agreement between these models was measured as 0.44 using Cohen's κ. We mark a headline as a clickbait if both models labeled it as clickbait. We observe, 27.29% (5,031 out of 18,436) of the headlines from reliable outlets are click bait. In unreliable outlets, the percentage is significantly higher, 40.03% (3,664 out of 9,153). So, it is evident that the unreliable outlets use more click baits than reliable outlets in their health journalism. C+J'19, February 2019, Miami, Florida USA S. Dhoju et al. (a) Image (b) Quotation (c) Link Figure 4: Distribution of average number of image/quotation/link per article from reliable and unreliable outlets. (a) RT1 (b) RT2 (c) RT3 and cancer risk, an unsubstantiated claim, generally propagated by unreliable media 11, 12. Figure 5e and 5f suggest the discussions about weight loss, skin, and hair care products (e.g., essential oil, lemon). Topics in Figure 5b and 5c discuss mostly flu, virus, skin infection, exercise, diabetes and so on. (d) UT1 (e) UT2 (f) UT3 Figure 5: Topic modeling (k = 3) of articles from reliable out- lets (top, denoted as RT) and from unreliable outlets (bot- tom, denoted as UT). 4.1.3 Use of visual media. We examined how often the outlets use images in the articles. Our analysis finds that on average an article from reliable outlets uses 13.83 images and an article from unreliable outlets uses 14.22 images. Figure 4a shows density plots of the average number of images per article for both outlet categories. We observe that a good portion of unreliable outlet sourced articles uses a high number of images (more than 20). 4.2 Topical Difference All the articles which we examined are health-related. However, the health domain is considerably broad and it covers many topics. We hypothesize that there are differences between the health topics which are discussed in reliable outlets and in unreliable outlets. To test that, we conduct an unsupervised and a supervised analysis. 4.2.1 Topic Modeling. We use Latent Dirichlet Allocation(LDA) al- gorithm to model the topics in the news articles. The number of topics, k, was set as 3. Figure 5 shows three topics for each of the outlet categories. Each topic is modeled by the top-10 important words in that topic. The font size of words is proportional to the importance. Figure 5a and 5d indicate that "cancer" is a common topic in reliable and unreliable outlets. Although, the words study, said, percent, research, and their font sizes in Figure 5a indicate that the topic "cancer" is associated with research studies, facts, and references in reliable outlets. On the contrary, unreliable outlets have the words vaccine, autism, and risk in Figure 5d which suggests the discussion regarding how vaccines put people under autism (a) Reliable (b) Unreliable Figure 6: Top-10 topics in reliable and unreliable outlets. 4.2.2 Topic Categorization. In addition to topic modeling, we cate- gorically analyze the articles' topics using Google Cloud Natural Language API 13. Figure 6 shows the top-10 topics in the reliable and unreliable outlets. In the case of reliable, the distribution is significantly dominated by health condition. On the other hand, in the case of unreliable outlets, percentages of nutrition and food are noticeable. Only 4 of the 10 categories are common in two outlet groups. Unreliable topics have weight loss, hair care, face & body care. This finding supports our claim from topic modeling analysis. 4.3 Semantic Difference We analyze what efforts the outlets make to make a logical and meaningful health news. Specifically, we consider to what extent the outlets use quotations and hyperlinks. Use of quotation and hyperlinks in a news article is associated with credibility [5, 29]. Presence of quotation and hyperlinks indicates that an article is 11https://www.webmd.com/brain/autism/do-vaccines-cause-autism 12https://www.skepticalraptor.com/skepticalraptorblog.php/polio-vaccine-causes- cancer-myth/ 13https://cloud.google.com/natural-language/ Differences between Health Related News Articles from Reliable and Unreliable Media C+J'19, February 2019, Miami, Florida USA logically constructed and supported with credible factual informa- tion. 4.3.1 Quotation. We use the Stanford QuoteAnnotator 14 to iden- tify the quotations from a news article. Figure 4b shows density plots of the number of quotations per article for reliable and unreli- able outlets. We observe that unreliable outlets use less number of quotations compared to reliable outlets. We find that the average number of quotations per article is 1 and 3 in unreliable and reliable outlets, respectively. This suggests that the reliable outlet sources articles are more credible and unreliable outlets are less credible. 4.3.2 Hyperlink. We examine the use of the hyperlink in the ar- ticles. On average, a reliable outlet sourced article contains 8.4 hyperlinks and an unreliable outlet sourced article contains 6.8 hy- perlinks. Figure 4c shows density plots of the number of links per article for reliable and unreliable outlets. The peaks indicate that most of the articles from reliable outlets have close to 8 (median) hyperlinks. On the other hand, most of the unreliable outlet articles have less than 2 hyperlinks. This analysis again suggests that the reliable sourced articles are more credible than unreliable outlet articles. 5 CONCLUSION AND FUTURE WORK In this paper, we closely looked at structural, topical, and semantic differences between articles from reliable and unreliable outlets. Our findings reconfirm some of the existing claims such as unreli- able outlets use clickbaity headlines to catch the attention of users. In addition, this study finds new patterns that can potentially help separate health disinformation. For example, we find that less quo- tation and hyperlinks are more associated with unreliable outlets. However, there are some limitations to this study. For instance, we didn't consider the videos, cited experts, comments of the users, and other information. In the future, we want to overcome these limitations and leverage the findings of this study to combat health disinformation. REFERENCES [1] Chris Breaux. (accessed September 28, 2018). "You'll Never Guess How Chartbeat's Data Scientists Came Up With the Single Greatest Head- line". http://blog.chartbeat.com/2015/11/20/youll-never-guess-how-chartbeats- data-scientists-came-up-with-the-single-greatest-headline/ [2] Yimin Chen, Niall J Conroy, and Victoria L Rubin. 2015. Misleading online content: Recognizing clickbait as false news. In Proceedings of the 2015 ACM on Workshop on Multimodal Deception Detection. ACM, 15 -- 19. [3] Nicole K Dalmer. 2017. Questioning reliability assessments of health information on social media. Journal of the Medical Library Association: JMLA 105, 1 (2017), 61. [4] Irja Marije de Jong, Frank Kupper, Marlous Arentshorst, and Jacqueline Broerse. 2016. Responsible reporting: neuroimaging news in the age of responsible re- search and innovation. Science and engineering ethics 22, 4 (2016), 1107 -- 1130. about linking in online news. Journalism Practice 6, 5-6 (2012), 692 -- 701. [6] Katie Forster. (accessed October 30, 2018). Revealed: How dangerous fake health news conquered Facebook. https://www.independent.co.uk/life-style/health- and-families/health-news/fake-news-health-facebook-cruel-damaging-social- media-mike-adams-natural-health-ranger-conspiracy-a7498201.html [7] Susannah Fox. (accessed October 30, 2018). The social life of health infor- mation. http://www.pewresearch.org/fact-tank/2014/01/15/the-social-life-of- health-information/ [5] Juliette De Maeyer. 2012. The journalistic hyperlink: Prescriptive discourses [8] Gaby Galvin. (accessed October 30, 2018). How Bots Could Hack Your Health. https://www.usnews.com/news/healthiest-communities/articles/2018- 07-24/how-social-media-bots-could-compromise-public-health 14https://stanfordnlp.github.io/CoreNLP/quote.html & Sources. 2016. Unreliable/Fake [13] informationisbeautiful.net. [9] Bryan Gardiner. (accessed September 28, 2018). "You'll Be Outraged at How Easy It Was to Get You to Click on This Headline". https://www.wired.com/2015/12/ psychology-of-clickbait/ [10] Amira Ghenai and Yelena Mejova. 2017. Catching Zika Fever: Application of Crowdsourcing and Machine Learning for Tracking Health Misinformation on Twitter. In Healthcare Informatics (ICHI), 2017 IEEE International Conference on. IEEE, 518 -- 518. [11] Amira Ghenai and Yelena Mejova. 2018. Fake Cures: User-centric Modeling of Health Misinformation in Social Media. In 2018 ACM Conference on Computer- Supported Cooperative Work and Social Computing (CSCW). ACM. [12] Muiris Houston. (accessed October 31, 2018). Measles back with a vengeance due to fake health news. https://www.irishtimes.com/opinion/measles-back-with-a- vengeance-due-to-fake-health-news-1.3401960 News Sites https://docs.google.com/spreadsheets/d/ 1xDDmbr54qzzG8wUrRdxQlC1dixJSIYqQUaXVZBqsJs. (2016). [14] Mathew Ingram. (accessed October 30, 2018). The internet didn't invent viral content or clickbait journalism âĂŤ there's just more of it now, and it happens faster. https://gigaom.com/2014/04/01/the-internet-didnt-invent-viral-content- or-clickbait-journalism-theres-just-more-of-it-now-and-it-happens-faster/ [15] American Press Institute and the Associated Press-NORC Center for Public Affairs Research. (accessed September 28, 2018). The Personal News Cycle: How Americans choose to get their news. https://www.americanpressinstitute.org/ publications/reports/survey-research/how-americans-get-news/ [16] Marjorie Kagawa-Singer and Shaheen Kassim-Lakha. 2003. A strategy to reduce cross-cultural miscommunication and increase the likelihood of improving health outcomes. Academic Medicine 78, 6 (2003), 577 -- 587. [17] Alexander Kinsora, Kate Barron, Qiaozhu Mei, and VG Vinod Vydiswaran. 2017. Creating a Labeled Dataset for Medical Misinformation in Health Forums. In Healthcare Informatics (ICHI), 2017 IEEE International Conference on. IEEE, 456 -- 461. [18] Patty Kostkova, Vino Mano, Heidi J Larson, and William S Schulz. 2016. Vac medi+ board: Analysing vaccine rumours in news and social media. In Proceedings of the 6th International Conference on Digital Health Conference. ACM, 163 -- 164. [19] David MJ Lazer, Matthew A Baum, Yochai Benkler, Adam J Berinsky, Kelly M Greenhill, Filippo Menczer, Miriam J Metzger, Brendan Nyhan, Gordon Penny- cook, David Rothschild, et al. 2018. The science of fake news. Science 359, 6380 (2018), 1094 -- 1096. [20] Felisbela Lopes, Teresa Ruão, Zara Pinto Coelho, and Sandra Marinho. 2009. Journalists and health care professionals: what can we do about it?. In 2009 Annual Conference of the International Association for Media and Communication Research (IAMCR),"Human Rights and Communication". 1 -- 15. [21] Saurabh Mathur. (accessed September 24, 2018). Clickbait Detector. https:// github.com/saurabhmathur96/clickbait-detector [22] HEALTH ON THE NET. (accessed September 24, 2018). . https://www.hon.ch/en/ [23] Matthew Opatrny. (accessed September 28, 2018). "9 Headline Tips to Help You Connect with Your Target Audience". https://www.outbrain.com/blog/9-headline- tips-to-help-marketers-and-publishers-connect-with-their-target-audiences/ [24] Md Main Uddin Rony, Naeemul Hassan, and Mohammad Yousuf. 2017. Diving Deep into Clickbaits: Who Use Them to What Extents in Which Topics with What Effects?. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. ACM, 232 -- 239. [25] Michael Schneider. (accessed September 24, 2018). Most-Watched Television Networks: Ranking 2016's Winners and Losers. https://www.indiewire.com/2016/ 12/cnn-fox-news-msnbc-nbc-ratings-2016-winners-losers-1201762864/ [26] Gary Schwitzer. 2008. How do US journalists cover treatments, tests, products, and procedures? An evaluation of 500 stories. PLoS medicine 5, 5 (2008), e95. [27] Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake news detection on social media: A data mining perspective. ACM SIGKDD Explorations Newsletter 19, 1 (2017), 22 -- 36. [28] Miriam Shuchman and Michael S Wilkes. 1997. Medical scientists and health news reporting: a case of miscommunication. Annals of Internal Medicine 126, 12 (1997), 976 -- 982. [29] S Shyam Sundar. 1998. Effect of source attribution on perception of online news [31] World Health Organization (WHO). (accessed September 24, 2018). stories. Journalism & Mass Communication Quarterly 75, 1 (1998), 55 -- 68. [30] Emily K Vraga and Leticia Bode. 2017. Using Expert Sources to Correct Health Misinformation in Social Media. Science Communication 39, 5 (2017), 621 -- 645. . http: //www.who.int/ [32] Wikipedia. (accessed September 24, 2018). List of fake news websites. https: //bit.ly/2moBDvA [33] Wikipedia. (accessed September 24, 2018). Wikipedia:Zimdars' fake news list. https://bit.ly/2ziHafj [34] Melissa Zimdars. 2016. My 'fake news list' went viral. But made-up stories are only part of the problem. https://www.washingtonpost.com/posteverything/ wp/2016/11/18/my-fake-news-list-went-viral-but-made-up-stories-are-only- part-of-the-problem. (2016).
1704.03441
1
1704
2017-04-11T17:39:28
Node-centric community detection in multilayer networks with layer-coverage diversification bias
[ "cs.SI", "physics.soc-ph" ]
The problem of node-centric, or local, community detection in information networks refers to the identification of a community for a given input node, having limited information about the network topology. Existing methods for solving this problem, however, are not conceived to work on complex networks. In this paper, we propose a novel framework for local community detection based on the multilayer network model. Our approach relies on the maximization of the ratio between the community internal connection density and the external connection density, according to multilayer similarity-based community relations. We also define a biasing scheme that allows the discovery of local communities characterized by different degrees of layer-coverage diversification. Experimental evaluation conducted on real-world multilayer networks has shown the significance of our approach.
cs.SI
cs
NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS WITH LAYER-COVERAGE DIVERSIFICATION BIAS ROBERTO INTERDONATO Dept. of Computer, Modeling, Electronics, and Systems Engineering, University of Calabria, Italy ANDREA TAGARELLI Dept. of Computer, Modeling, Electronics, and Systems Engineering, University of Calabria, Italy DINO IENCO IRSTEA - UMR TETIS, France ARNAUD SALLABERRY LIRMM - Universit´e Paul Val´ery, France PASCAL PONCELET LIRMM - Universit´e de Montpellier, France 7 1 0 2 r p A 1 1 ] I S . s c [ 1 v 1 4 4 3 0 . 4 0 7 1 : v i X r a E-mail addresses: [email protected], [email protected], [email protected], [email protected], [email protected]. 1 2 Abstract. The problem of node-centric, or local, community detec- tion in information networks refers to the identification of a community for a given input node, having limited information about the network topology. Existing methods for solving this problem, however, are not conceived to work on complex networks. In this paper, we propose a novel framework for local community detection based on the multilayer network model. Our approach relies on the maximization of the ratio between the community internal connection density and the external connection density, according to multilayer similarity-based community relations. We also define a biasing scheme that allows the discovery of local communities characterized by different degrees of layer-coverage diversification. Experimental evaluation conducted on real-world multi- layer networks has shown the significance of our approach. 1. Introduction The classic problem of community detection in a network graph corre- sponds to an optimization problem which is global as it requires knowledge on the whole network structure. The problem is known to be computa- tionally difficult to solve, while its approximate solutions have to cope with both accuracy and efficiency issues that become more severe as the net- work increases in size. Large-scale, web-based environments have indeed traditionally represented a natural scenario for the development and test- ing of effective community detection approaches. In the last few years, the problem has attracted increasing attention in research contexts related to complex networks [12, 2, 13, 9, 7, 11, 8, 14], whose modeling and analysis is widely recognized as a useful tool to better understand the characteris- tics and dynamics of multiple, interconnected types of node relations and interactions [1, 6]. Nevertheless, especially in social computing, one important aspect to con- sider is that we might often want to identify the personalized network of social contacts of interest to a single user only. To this aim, we would like to determine the expanded neighborhood of that user which forms a densely connected, relatively small subgraph. This is known as local community detection problem [5, 4], whose general objective is, given limited informa- tion about the network, to identify a community structure which is centered on one or few seed users. Existing studies on this problem have focused, however, on social networks that are built on a single user relation type or context [4, 15]. As a consequence, they are not able to profitably ex- ploit the fact that most individuals nowadays have multiple accounts across different social networks, or that relations of different types (i.e., online as well as offline relations) can be available for the same population of a social network [6]. In this work, we propose a novel framework based on the multilayer net- work model for the problem of local community detection, which overcomes the aforementioned limitations in the literature, i.e., community detection NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS 3 on a multilayer network but from a global perspective, and local commu- nity detection but limited to monoplex networks. We have recently brought the local community detection problem into the context of multilayer net- works [10], by providing a preliminary formulation based on an unsupervised approach. A key aspect of our proposal is the definition of similarity-based community relations that exploit both internal and external connectivity of the nodes in the community being constructed for a given seed, while ac- counting for different layer-specific topological information. Here we push forward our research by introducing a parametric control in the similarity- based community relations for the layer-coverage diversification in the local community being discovered. Our experimental evaluation conducted on three real-world multilayer networks has shown the significance of our ap- proach. 2. Multilayer Local Community Detection 2.1. The ML-LCD method. We refer to the multilayer network model described in [9]. We are given a set of layers L and a set of entities (e.g., users) V. We denote with GL = (VL, EL,V,L) the multilayer graph such that VL is a set of pairs v ∈ V, L ∈ L, and EL ⊆ VL × VL is the set of undirected edges. Each entity of V appears in at least one layer, but not necessarily in all layers. Moreover, in the following we will consider the specific case for which nodes connected through different layers the same entity in V, i.e., GL is a multiplex graph. Local community detection approaches generally implement some strat- egy that at each step considers a node from one of three sets, namely: the community under construction (initialized with the seed node), the "shell" of nodes that are neighbors of nodes in the community but do not belong to the community, and the unexplored portion of the network. A key aspect is hence how to select the best node in the shell to add to the community to be identified. Most algorithms, which are designed to deal with monoplex graphs, try to maximize a function in terms of the internal edges, i.e., edges that involve nodes in the community, and to minimize a function in terms of the external edges, i.e., edges to nodes outside the community. By account- ing for both types of edges, nodes that are candidates to be added to the community being constructed are penalized in proportion to the amount of links to nodes external to the community [5]. Moreover, as first analyzed in [4], considering the internal-to-external connection density ratio (rather than the absolute amount of internal and external links to the community) allows for alleviating the issue of inserting many weakly-linked nodes (i.e., outliers) into the local community being discovered. In this work we follow the above general approach and extend it to identify local communities over a multilayer network. Given GL = (VL, EL,V,L) and a seed node v0, we denote with C ⊆ V the node set corresponding to the local community being discovered around 4 NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS node v0; moreover, when the context is clear, we might also use C to re- fer to the local community subgraph. We denote with S = {v ∈ V \ C ∃((u, Li), (v, Lj)) ∈ EL ∧ u ∈ C} the shell set of nodes outside C, and with B = {u ∈ C ∃((u, Li), (v, Lj)) ∈ EL ∧ v ∈ S} the boundary set of nodes in C. Our proposed method, named MultiLayer Local Community Detection (ML-LCD), takes as input the multilayer graph GL and a seed node v0, and computes the local community C associated to v0 by performing an iterative search that seeks to maximize the value of similarity-based local community function for C (LC(C)), which is obtained as the ratio of an internal community relation LCint(C) to an external community relation LCext(C). We shall formally define these later in Section 2.2. Algorithm ML-LCD works as follows. Initially, the boundary set B and the community C are initialized with the starting seed, while the shell set S is initialized with the neighborhood set of v0 considering all the layers in L. Afterwards, the algorithm computes the initial value of LC(C) and starts expanding the node set in C: it evaluates all the nodes v belonging to the current shell set S, then selects the vertex v∗ that maximizes the value of LC(C). The algorithm checks if (i) v∗ actually increases the quality of C (i.e., LC(C ∪ {v∗}) > LC(C)) and (ii) v∗ helps to strength the internal connectivity of the community (i.e., LCint(C ∪ {v∗}) > LCint(C)). If both conditions are satisfied, node v∗ is added to C and the shell set is updated accordingly, otherwise node v∗ is removed from S as it cannot lead to an increase in the value of LC(C). In any case, the boundary set B and LC(C) are updated. The algorithm terminates when no further improvement in LC(C) is possible. 2.2. Similarity-based local community function. To account for the multiplicity of layers, we define the multilayer local community function LC(·) based on a notion of similarity between nodes. In this regard, two major issues are how to choose the analytical form of the similarity function, and how to deal with the different, layer-specific connections that any two nodes might have in the multilayer graph. We address the first issue in an unsupervised fashion, by resorting to any similarity measure that can express the topological affinity of two nodes in a graph. Concerning the second issue, one straightforward solution is to determine the similarity between any two nodes focusing on each layer at a time. The above points are formally captured by the following definitions. We denote with EC the set of edges between nodes that belong to C and with EC i the subset of EC corresponding to edges in a given layer Li. Analogously, EB refers to the set of edges between nodes in B and nodes in S, and EB to its subset corresponding to i Li. Given a community C, we define the similarity-based local community function LC(C) as the ratio between the internal community relation and NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS 5 external community relation, respectively defined as: (1) (2) LCint(C) = LCext(C) = 1 C 1 B (cid:88) (cid:88) v∈C (cid:88) (cid:88) Li∈L (cid:88) (cid:88) (u,v)∈EC i ∧ u∈C simi(u, v) simi(u, v) v∈B Li∈L (u,v)∈EB i ∧ u∈S In the above equations, function simi(u, v) computes the similarity be- tween any two nodes u, v contextually to layer Li. In this work, we define it Ni(u)∩Ni(v) in terms of Jaccard coefficient, i.e., simi(u, v) = Ni(u)∪Ni(v) , where Ni(u) denotes the set of neighbors of node u in layer Li. 2.3. Layer-coverage diversification bias. When discovering a multilayer local community centered on a seed node, the iterative search process in ML- LCD that seeks to maximize the similarity-based local community measure, explores the different layers of the network. This implies that the various layers might contribute very differently from each other in terms of edges constituting the local community structure. In many cases, it can be desir- able to control the degree of heterogeneity of relations (i.e., layers) inside the local community being discovered. In this regard, we identify two main approaches: • Diversification-oriented approach. This approach relies on the assumption that a local community is better defined by increasing as much as possible the number of edges belonging to different lay- ers. More specifically, we might want to obtain a local community characterized by high diversification in terms of presence of layers and variability of edges coming from different layers. • Balance-oriented approach. Conversely to the previous case, the aim is to produce a local community that shows a certain balance in the presence of layers, i.e., low variability of edges over the dif- ferent layers. This approach relies on the assumption that a local community might be well suited to real cases when it is uniformly distributed among the different edge types taken into account. Following the above observations, here we propose a methodology to in- corporate a parametric control of the layer-coverage diversification in the local community being discovered. To this purpose, we introduce a bias fac- tor β in ML-LCD which impacts on the node similarity measure according to the following logic: (0, 1], 0, [−1, 0), (3) β = diversification-oriented bias no bias balance-oriented bias 6 NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS Positive values of β push the community expansion process towards a diversi- fication-oriented approach, and, conversely, negative β lead to different levels of balance-oriented scheme. Note that the no bias case corresponds to han- dling the node similarity "as is". Note also that, by assuming values in a continuous range, at each iteration ML-LCD is enabled to make a decision by accounting for a wider spectrum of degrees of layer-coverage diversification. Given a node v ∈ B and a node u ∈ S, for any Li ∈ L, we define the β-biased similarity simβ,i(u, v) as follows: (4) (5) 2simi(u, v) simβ,i(u, v) = , 1 + e−bf bf = β[f (C ∪ {u}) − f (C)] where bf is a diversification factor and f (C) is a function that measures the current diversification between the different layers in the community C; in the following, we assume it is defined as the standard deviation of the number of edges for each layer in the community. The difference f (C ∪ {u}) − f (C) is positive when the insertion of node u into the community increases the coverage over a subset of layers, thus diversifying the presence of layers in the local community. Consequently, when β is positive, the diversification effect is desired, i.e., there is a boost in the value of simβ,i (and vice versa for negative values of β). Note that β introduces a bias on the similarity between two nodes only when evaluating the inclusion of a shell node into a community C, i.e., when calculating LCext(C). 3. Experimental Evaluation We used three multilayer network datasets, namely Airlines (417 nodes corresponding to airport locations, 3588 edges, 37 layers corresponding to airline companies) [3], AUCS (61 employees as nodes, 620 edges, 5 acquain- tance relations as layers) [6], and RealityMining (88 users as nodes, 355 edges, 3 media types employed to communicate as layers) [8]. All network graphs are undirected, and inter-layer links are regarded as coupling edges. Size and structural characteristics of local communities. We first analyzed the size of the local communities extracted by ML-LCD for each node. Table 1 reports on the mean and standard deviation of the size of the local communities by varying of β. As regards the no bias solution (i.e, β = 0.0), largest local communities correspond to Airlines (mean 11.33 ± 14.78), while medium size communities (7.90 ± 2.74) are found for AUCS and relatively small communities (3.37 ± 1.77) for RealityMining. The im- pact of β on the community size is roughly proportional to the number of layers, i.e., high on Airlines, medium on AUCS and low on RealityMin- ing. For Airlines and AUCS, smallest communities are obtained with the solution corresponding to β = −1.0, thus suggesting that the discovery pro- cess becomes more xenophobic (i.e., less inclusive) while shifting towards a balance-oriented scheme. Moreover, on Airlines, the mean size follows a NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS 7 Table 1. Mean and standard deviation size of communities by varying β (with step of 0.1). dataset Airlines AUCS mean sd mean sd Reality- mean Mining sd dataset Airlines AUCS mean sd mean sd Reality- mean Mining sd -0.4 -0.5 -0.6 -0.7 -0.8 -0.9 -0.1 -1.0 -0.3 5.73 5.91 6.20 6.47 6.74 7.06 7.57 8.10 10.33 11.33 4.68 4.97 5.45 5.83 6.39 6.81 7.63 8.62 10.58 12.80 14.78 7.90 6.38 6.59 6.64 6.75 6.84 6.85 6.92 7.13 2.74 1.48 1.51 1.59 1.69 1.85 1.85 1.87 2.15 3.37 3.21 3.24 3.25 3.25 3.32 3.32 3.34 3.34 1.61 1.64 1.66 1.66 1.73 1.73 1.74 1.74 1.77 7.77 2.40 3.37 1.77 7.16 2.18 3.34 1.74 -0.2 9.13 0.0 0.8 0.7 0.6 0.5 0.3 8.82 0.2 9.02 0.4 1.0 0.1 9.80 8.37 8.20 7.93 7.53 7.26 7.06 7.06 12.10 10.61 10.07 9.39 9.15 8.67 7.82 7.46 7.35 7.27 8.89 8.89 8.89 8.87 8.85 8.85 8.85 8.77 3.16 3.27 3.27 3.27 3.26 3.23 3.23 3.23 3.39 3.36 3.36 3.32 3.18 3.17 3.17 3.38 1.78 1.78 1.74 1.74 1.71 1.60 1.59 1.59 8.92 3.33 3.39 1.78 8.92 3.33 3.39 1.78 0.9 roughly normal distribution, with most inclusive solution (i.e., largest size) corresponding to the unbiased one. A near normal distribution (centered on 0.2 ≤ β ≤ 0.4) is also observed for RealityMining, while mean size values linearly increase with β for AUCS. To understand the effect of β on the structure of the local communi- ties, we analyzed the distributions of per-layer mean average path length and mean clustering coefficient of the identified communities (results not shown). One major remark is that on the networks with a small number of layers, the two types of distributions tend to follow an increasing trend for balance-oriented bias (i.e., negative β), which becomes roughly constant for the diversification-oriented bias (i.e., positive β). On Airlines, variabil- ity happens to be much higher for some layers, which in the case of mean average path length ranges between 0.1 and 0.5 (as shown by a rapidly de- creasing trend for negative β, followed by a peak for β = 0.2, then again a decreasing trend). Distribution of layers over communities. We also studied how the bias factor impacts on the distribution of number of layers over communities, as shown in Figure 1. This analysis confirmed that using positive values of β produces local communities that lay on a higher number of layers. This out- come can be easily explained since positive values of β favor the inclusion of nodes into the community which increase layer-coverage diversification, thus enabling the exploration of further layers also in an advanced phase of the discovering process. Conversely, negative values of β are supposed to yield a roughly uniform distribution of the layers which are covered by the com- munity, thus preventing the discovery process from including nodes coming from unexplored layers once the local community is already characterized by a certain subset of layers. As regards the effects of the bias factor on the layer-coverage diversifica- tion, we analyzed the standard deviation of the per-layer number of edges 8 NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS (a) Airlines (b) AUCS (c) RealityMining Figure 1. Distribution of number of layers over communi- ties by varying β. Communities are sorted by decreasing number of layers. (a) Airlines (b) AUCS Figure 2. Average Jaccard similarity between solutions ob- tained by varying β. by varying β (results not shown, due to space limits of this paper). As ex- pected, standard deviation values are roughly proportional to the setting of the bias factor for all datasets. Considering the local communities obtained with negative β, the layers on which they lay are characterized by a similar presence (in terms of number of edges) in the induced community subgraph. Conversely, for the local communities obtained using positive β, the induced community subgraph may be characterized by a small subset of layers, while other layers may be present with a smaller number of relations. Similarity between communities. The smooth effect due to the diversification-oriented bias is confirmed when analyzing the similarity be- tween the discovered local communities. Figure 2 shows the average Jaccard similarity between solutions obtained by varying β (i.e., in terms of nodes included in each local community). Jaccard similarities vary in the range NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS 9 [0.75, 1.0] for AUCS and Airlines, and in the range [0.9, 1.0] for RealityMin- ing (results not shown). For datasets with a lower number of layers (i.e., AUCS and RealityMining), there is a strong separation between the solu- tions obtained for β > 0 and the ones obtained with β < 0. On AUCS, the local communities obtained using a diversification-oriented bias show Jaccard similarities close to 1, while there is more variability among the solutions obtained with the balance-oriented bias. Effects of the bias factor are lower on RealityMining, with generally high Jaccard similarities. On Airlines, the effects of the bias factor are still present but smoother, with gradual similarity variations in the range [0.75, 1.0]. 4. Conclusion We addressed the novel problem of local community detection in mul- tilayer networks, providing a greedy heuristic that iteratively attempts to maximize the internal-to-external connection density ratio by accounting for layer-specific topological information. Our method is also able to control the layer-coverage diversification in the local community being discovered, by means of a bias factor embedded in the similarity-based local community function. Evaluation was conducted on real-world multilayer networks. As future work, we plan to study alternative objective functions for the ML- LCD problem. It would also be interesting to enrich the evaluation part based on data with ground-truth information. We also envisage a number of application problems for which ML-LCD methods can profitably be used, such as friendship prediction, targeted influence propagation, and more in general, mining in incomplete networks. References [1] M. Berlingerio, F. Pinelli, and F. Calabrese. ABACUS: frequent pattern mining- based community discovery in multidimensional networks. Data Min. Knowl. Disc., 27(3):294–320, 2013. [2] V. Carchiolo, A. Longheu, M. Malgeri, and G. Mangioni. Communities unfolding in multislice networks. In Proc. Complex Networks, pp. 187–195, 2010. [3] A. Cardillo, J. Gomez-Gardenes, M. Zanin, M. Romance, D. Papo, F. del Pozo, and S. Boccaletti. Emergence of network features from multiplexity. Scientific Reports, 3:1344, 2013. [4] J. Chen, O. R. Zaıane, and R. Goebel. Local community identification in social net- works. In Proc. IEEE/ACM ASONAM, pp. 237–242, 2009. [5] A. Clauset. Finding local community structure in networks. Phys. Rev. E, 72(2):026132, 2005. [6] M. E. Dickison, M. Magnani, and L. Rossi. Multilayer social networks. Cambridge University Press, 2016. [7] M. De Domenico, A. Lancichinetti, A. Arenas, and M. Rosvall. Identifying modular flows on multilayer networks reveals highly overlapping organization in social systems. Phys. Rev. X, 5(1):011027, 2015. [8] J. Kim and J.-G. Lee. Community detection in multi-layer graphs: A survey. SIG- MOD Record, 44(3):37–48, 2015. 10 NODE-CENTRIC COMMUNITY DETECTION IN MULTILAYER NETWORKS [9] M. Kivela, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, and M. A. Porter. Mutilayer networks. Journal of Complex Networks, 2(3):203–271, 2014. [10] R. Interdonato, A. Tagarelli, D. Ienco, A. Sallaberry, and P. Poncelet. Local commu- nity detection in multilayer networks. In Proc. IEEE/ACM ASONAM, pp. 1382–1383, 2016. [11] C. W. Loe and H. J. Jensen. Comparison of communities detection algorithms for multiplex. Physica A, 431:29–45, 2015. [12] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, , and J.-P. Onnela. Sci- ence. Community structure in time-dependent, multiscale, and multiplex networks, 328(5980):876–878, 2010. [13] E. E. Papalexakis, L. Akoglu, and D. Ienco. Do more views of a graph help? Com- munity detection and clustering in multi-graphs. In Proc. Fusion, pp. 899–905, 2013. [14] T. P. Peixoto. Inferring the mesoscale structure of layered, edge-valued, and time- varying networks. Phys. Rev. E, 92(4):042807, 2015. [15] A. Zakrzewska and D. A. Bader. A dynamic algorithm for local community detection in graphs. In Proc. IEEE/ACM ASONAM, pp. 559–564, 2015.
1710.01724
1
1710
2017-10-04T17:59:08
An efficient alternative to Ollivier-Ricci curvature based on the Jaccard metric
[ "cs.SI", "physics.soc-ph" ]
We study Ollivier-Ricci curvature, a discrete version of Ricci curvature, which has gained popularity over the past several years and has found applications in diverse fields. However, the Ollivier-Ricci curvature requires an optimal mass transport problem to be solved, which can be computationally expensive for large networks. In view of this, we propose two alternative measures of curvature to Ollivier-Ricci which are motivated by the Jaccard coefficient and are demonstrably less computationally intensive, a cheaper Jaccard (JC) and a more expensive generalized Jaccard (gJC) curvature metric. We show theoretically that the gJC closely matches the Ollivier-Ricci curvature for Erdos-Renyi graphs in the asymptotic regime of large networks. Furthermore, we study the goodness of approximation between the proposed curvature metrics and Ollivier-Ricci curvature for several network models and real networks. Our results suggest that in comparison to an alternative curvature metric for graphs, the Forman-Ricci curvature, the gJC exhibits a reasonably good fit to the Ollivier-Ricci curvature for a wide range of networks, while the JC is shown to be a good proxy only for certain scenarios.
cs.SI
cs
An efficient alternative to Ollivier-Ricci curvature based on the Jaccard metric ∗ Siddharth Pal†1, Feng Yu‡2, Terrence J. Moore§3, Ram Ramanathan¶ (cid:107)4, Amotz Bar-Noy∗∗2 and Ananthram Swami††3 1Raytheon BBN Technologies, Cambridge, MA 02138, USA. 2Graduate Center of the City University of New York, New York, NY 10016, USA. 3U.S. Army Research Lab, Adelphi, MD 20783, USA. 4GoTenna Inc, Brooklyn, NY 11201, USA. October 5, 2017 Abstract We study Ollivier-Ricci curvature, a discrete version of Ricci curvature, which has gained popularity over the past several years and has found applications in diverse fields. However, the Ollivier-Ricci cur- vature requires an optimal mass transport problem to be solved, which can be computationally expensive for large networks. In view of this, we propose two alternative measures of curvature to Ollivier-Ricci which are motivated by the Jaccard coefficient and are demonstrably less computationally intensive, a cheaper Jaccard (JC) and a more expensive generalized Jaccard (gJC) curvature metric. We show theoretically that the gJC closely matches the Ollivier-Ricci curvature for Erdös-Rényi graphs in the asymptotic regime of large networks. Furthermore, we study the goodness of approximation between the proposed curvature metrics and Ollivier-Ricci curvature for several network models and real networks. Our results suggest that in comparison to an alternative curvature metric for graphs, the Forman-Ricci curvature, the gJC exhibits a reasonably good fit to the Ollivier-Ricci curvature for a wide range of networks, while the JC is shown to be a good proxy only for certain scenarios. Introduction 1 The various notions of curvature in differential geometry measure, in different ways, the curves or bends of tensors on the surface of a manifold [1, 2, 3]. Several of these definitions of curvature have recently been interpreted on graphs and applied to networks. Some examples include Gaussian curvature [4], Gromov curvature [5], and Ricci curvature [6, 7]. Of these, the Ollivier-Ricci curvature seems to be the most promising new metric for networks. It has been shown to be able to measure robustness in gene expression, reliably distinguishing between cancerous and non-cancerous cells [8]. Ricci curvature has been shown to indicate ∗Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-09-2-0053 (the ARL Network Science CTA). The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. This document does not contain technology or technical data controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations. †[email protected][email protected] §[email protected][email protected] (cid:107)Work done while the author was with Raytheon BBN Technologies ∗∗[email protected] ††[email protected] 1 fragility in stock markets [9]. Ollivier-Ricci curvature has also been applied to explaining congestion wireless network capacity [10]. Ollivier-Ricci curvature is defined between a pair of vertices in a network based on the optimal mass transport, determined by the Wasserstein distance, between their associated mass distributions. When restricted to the transport between adjacent vertices, Ollivier-Ricci curvature can be viewed as a edge centrality metric, akin to betweenness or random-walk measures on edges. Positive curvature implies the neighbors of the two nodes are close (perhaps overlapping or shared). Zero (or near-zero) curvature implies the nodes are locally embeddable in a flat surface (as in a grid or regular lattice). Negative curvature implies that the neighbors of the two nodes are further apart. Unfortunately, Ollivier-Ricci curvature can have high-computational complexity in dense, high-degree networks as solving the Wasserstein distance can, in the worst case, scale with the quartic of the degree (see Sec. 4) or, in practice, scale with the product of the two nodes' degrees [11]. This motivates the desire for a less computationally-intensive approximation. Jost and Liu [12] demonstrated the significance of overlapping neighborhoods in the Ollivier-Ricci curvature of edges in the formulation of a bound involving the clustering coefficient [13]. Hence, it seems reasonable to build a metric approximating Ollivier-Ricci from the sets of common and separate neighbors of the nodes in an edge. We derive a new curvature metric approximating the Ollivier-Ricci graph curvature metric using the Jaccard index, which has previously found utility in networks, e.g., as a measure of similarity between nodes [14]. The Jaccard index naturally captures the overlapping neighborhood feature found in positively curved edges in a simplistic manner. The notion of set-comparison as a curvature metric leads to a more general linear approximation function of Ollivier-Ricci formulated from classes of sets of each node's neighbors that effectively solves a mass exchange problem. The complexity of this new metric is significantly less than that for Ollivier-Ricci. For random graphs, we find that our new metric shares many asymptotic properties of the Ollivier-Ricci curvature [15]. Moreover, comparisons of the Jaccard-inspired curvature with Ollivier- Ricci seem more favorable than the alternative Forman-Ricci curvature metric [6, 16, 17] that is extremely computationally efficient, on network models and real networks. 2 Curvature Metrics We first introduce two discretized version of the Ricci curvature – the Ollivier-Ricci curvature as discussed in [7, 12, 18], and the Forman-Ricci curvature as discussed in [6, 16]. Then, we introduce a new graph curvature metric which is intuitively similar to Ollivier-Ricci curvature, without requiring as much computational complexity. 2.1 Ollivier-Ricci curvature Consider an undirected graph G = (V, E) on n nodes, i.e., V = n, with no self loops. We define the metric d such that for distinct vertices i,j, d(i, j) is the length of the shortest path connecting i and j. Ollivier-Ricci curvature can be defined on the graph G, with a probability measure mi attached to each vertex i ∈ V . For two nodes i and j, we define a mass transport plan νi,j : V × V → [0, 1] such that for every x, y in V νi,j((cid:96), y) = mj(y). (1) (cid:88) k∈V νi,j(x, k) = mi(x) and (cid:88) (cid:96)∈V The above condition enforces that mass attributed to any neighbor of i, mi(·), is completely transferred to neighbors of j in such a manner that all the neighbors of j get exactly the required mass mj(·). Let the space of all valid mass transport plans between nodes i and j be denoted by Π(i, j). For an edge (i, j) ∈ E, the Ollivier-Ricci (OR) curvature metric is defined as follows (2) where W (mi, mj) is the Wasserstein distance or optimal mass transport cost between the two probability measures mi and mj, expressed as follows κ(i, j) = 1 − W (mi, mj), W (mi, mj) = inf νi,j∈Π(i,j) νi,j(x, y)d(x, y). (3) (cid:88) (cid:88) x∈V y∈V 2 For each vertex i, the probability measure mi is set as mi(j) = 1 di , if i ∼ j = 0 otherwise, (4) where i ∼ j implies an edge between i and j. The probability measure mi shown above assigns weight to all neighbors of i uniformly as in [8, 12]. A more generic setting is where a mass 0 ≤ α ≤ 1 is assigned to node i, and the rest of the mass 1 − α is distributed uniformly among the neighbors of i [11, 18]. We can bound the Ollivier-Ricci curvatures defined in (2). First, note that for an edge (i, j), the minimum distance between a neighbor of i and j is 0 when they are common, and the maximum distance is 3 hops. This implies the following bound on the Wasserstein distance 0 < W (mi, mj) < 3, which in turn implies −2 < κ < 1. 2.2 Forman-Ricci curvature Forman discretized the classical Ricci curvature for a broad class of geometric objects, the CW complexes [6], which is called the Forman-Ricci or simply Forman curvature. While the original definition of Forman curvature for CW complexes is not relevant to this paper, we present Forman curvature for undirected networks as introduced in [16]. This was proposed as a candidate for a discrete Ricci curvature to gain new insights on the organization of complex networks. The Forman curvature for an edge e = (i, j) is given as follows  wi we − (cid:88) e(cid:96)∈ei\e + wj we − (cid:88) e(cid:96)∈ej\e wi√ wewe(cid:96) wj√ wewe(cid:96)  F (e) = w(e) (5) where we is a weight associated with the edge e, wi and wj are weights associated with vertices i and j, and ei \ e and ej \ e denote the set of edges incident on vertices i and j excluding the edge e. For an unweighted graph, two weighting schemes were proposed [16, 17, 19]. One was to set all the node and edge weights as 1, and the other was to weight the edges by 1, and the nodes by their degree. We implemented both the weighting schemes, and did not find a significant difference in terms of their correlations with the Ollivier-Ricci curvature. The results shown in Section 5 follow the former weighting scheme, where the original expression of Forman curvature (5) reduces to F (e) = 4 − di − dj. (6) Other, more involved, weighting schemes have also been proposed [20, 21], but are not considered in this work. 2.3 Jaccard Curvatures Calculating Ollivier-Ricci curvature can be costly because it involves solving an optimal mass transport problem, or equivalently a linear program [11], for each edge. Especially for large graphs, with high values of maximum degree, calculating OR curvature for all the edges can be prohibitively costly (see Section 4). To address this issue, we introduce an approximation to the OR curvature, which would not require solving the optimal mass transport problem. Towards this end, we revisit the intuition of OR curvature – An edge has positive curvature if the neighborhoods of the two concerned nodes are closer to each other compared to the nodes themselves, zero curvature if the neighborhoods are at the same distance, and negative curvature if the neighborhoods are farther apart. A simple heuristic would be to measure the fraction of common nodes between the neighborhoods of the two concerned nodes. This is related to Jaccard's coefficient [14] which was introduced in network analysis as a similarity measure between nodes. First, we define some notation: For an edge (i, j), the set of common neighbors of the nodes i and j is given by C(i, j) = Ni ∩ Nj, 3 where Nk is the neighbor set of node k. We let C(i, j) = C(i, j). We also define the set of separate neighbors between i and j as follows S(i, j) = (Ni ∪ Nj) \ C(i, j), with S(i, j) = S(i, j). We define the union of the neighbor sets of i and j as N (i, j), i.e., N (i, j) = C(i, j) ∪ S(i, j), with N (i, j) = N (i, j). to their union, i.e., Jaccard's coefficient is defined as the ratio between the intersection of neighborhoods of the two nodes J(i, j) = C(i, j) N (i, j) . (7) It is evident that the metric J(i, j) will be closer to 1 if there are more common nodes, and closer to 0 otherwise. However, the range of this metric will be between 0 and 1, as opposed to OR curvature which takes the range (−2, 1). We want the Jaccard curvature metric for an edge (i, j), JC(i, j), to approach a value of 1 when the fraction of common nodes to total nodes is close to 1, and −2 when that fraction is equal to 0. In other words, we have the following requirements, and When C(i, j) N (i, j) ≈ 1, then JC(i, j) ≈ 1 when C(i, j) N (i, j) = 0, then JC(i, j) = −2. Equations (8) and (9) lead to the following expression for the Jaccard curvature, JC(i, j) = 1 − 3S(i, j) N (i, j) = −2 + 3J(i, j). see Figure 1 for an illustrative example. (8) (9) (10) Figure 1: Jaccard curvatures shown for an illustrative example – We consider the edge (1, 2) and calculate its Jaccard (JC), see (10), and generalized Jaccard (gJC) curvatures, see (16) for details. We have one common neighbor, i.e., C(1, 2) = {3}, and the set of separate numbers is {1, 2, 4, 5, 6}. Therefore, C(1, 2) = 1, S(1, 2) = 5 and N (1, 2) = 6, and the Jaccard curvature JC(1, 2) = 1 − 3×5 2. Since, node 4 is the only exclusive neighbor of node 1 directly connected to an exclusive neighbor of node 2, we have S (1) 1 = {4}. 2 = {5}. The remaining exclusive neighbor of node 1, i.e., node 6, is By the same argument, we have S (1) connected to node 3 (an exclusive neighbor of node 2) through a path of 2 hops, and S (2) 1 = {6}. Putting all this together, using (16) we obtain, gJC(1, 2) = 1 − 1+1+2 6 = 0. In comparison, the Ollivier-Riccci curvature OR(1, 2) = 1 4. 6 − 2 · 1 6 = − 3 4 123456 The above expression could be interpreted as subtracting the influence of separate neighbors, with S(i, j) being the total number of separate neighbors and the denominator N (i, j) being the cardinality of the union of the neighbor sets of i and j. Computing Jaccard curvature is very cheap because it only requires the knowledge of the size of neigh- borhoods of the two relevant nodes and the common nodes in those neighborhood sets. From simulations and experiments reported in Section 5, we have observed that the Jaccard curvature is a reasonably good approximation of the Ollivier-Ricci curvature for several instances of generated and real-world networks. However, since the Jaccard curvature partitions the set of neighbors into common and separate vertices, the granularities of OR curvature is lost to a great extent. This is best demonstrated by considering randomly chosen edges in canonical graphs. In a complete graph the OR curvature of each edge will be close to 1, and the Jaccard curvature will be exactly 1. For an edge connecting high degree nodes in a tree, the OR curvature will be close to -2, while the Jaccard curvature will be exactly -2. However on a grid or a line, the OR curvature of the edges will be 0, while the Jaccard curvature will still be -2, because there are no common nodes. Clearly, the Jaccard curvature metric should have a more positive value in a grid compared to that on a tree, if we are to obtain a better approximation of the OR curvature. To address this issue, we now define a generalized version of the Jaccard curvature metric to take into account nodes that are not common, yet closer than 3 hops apart. We introduce some more notation: Define Ni(i, j) as the exclusive neighbors of i with respect to the edge (i, j), i.e., Ni(i, j) = {k ∈ V \ {j} (i, k) ∈ E}. For any two nodes u and v, recall that d(u, v) denotes the shortest path length between the two nodes. Let the set of separate nodes be partitioned into the following sets S (r) i = {k ∈ Ni(i, j) min (cid:96)∈Nj (i,j) d(k, (cid:96)) = r}, i = S (r) with S(r) hops from the closest exclusive neighbor of j. If Nj(i, j) = ∅, then we set S (1) , for r = 1, 2, 3. In other words, S (r) i i is the set of neighbors of i that are at a distance of r i = Ni(i, j). Observe that (cid:16)∪3 (cid:17) ∪(cid:16)∪3 r=1S (r) j (cid:17) ∪ {i ∪ j}. S(i, j) = r=1S (r) i Jaccard (gJC) metric. Since Ollivier-Ricci curvature includes the endpoints of the edge itself, we include i and j in the generalized Therefore, for an edge (i, j) ∈ E, the generalized Jaccard metric is defined as follows S(3) i + S(3) j N (i, j) S(1) i + S(1) N (i, j) S(2) i + S(2) j N (i, j) gJC(α, β, γ, δ, ζ; i, j) = α + β C(i, j) N (i, j) j + 2 (11) + γ + δ + ζ where the parameters α,β, γ, δ and ζ need to be determined. Since, i /∈ S (1) , we arrive at the gJC metric by including the two nodes separately in (11). The parameters are determined by considering the cases of canonical graphs. and j /∈ S (1) j i 2.3.1 Considering canonical graphs In a k-complete graph, we would like the generalized Jaccard metric to have a maximum value close to 1, so as to approximate the OR curvature which approaches 1 as k gets large. Therefore we require, as k → ∞ and C(i, j) N (i, j) → 1, then gJC(i, j) → 1, which leads to (12) Similarly, for edges in a d-dimensional grid, we would like the generalized Jaccard metric to have a value close to 0 as d gets large. This requires that as d → ∞ and α + β = 1. i + S(1) S(1) N (i, j) j + 2 → 1, then gJC(i, j) → 0, 5 which leads to α + γ = 0. (13) This would best approximate the OR curvature which has a value of 0 for d -dimensional grids. For edges in a tree connecting nodes with degree d, we would like the generalized Jaccard metric to have a value close to a minimum value of -2, approximating the OR curvature which itself approaches −2 as d gets large. This requires that as d → ∞ and which leads to i + S(3) S(3) j N (i, j) → 1, then gJC(i, j) → −2 α + ζ = −2. We set, α = 1, β = 0, γ = −1, ζ = −3, which satisfies (12)-(14). We also enforce the following bound γ > δ > ζ. (14) (15) so that the effect of S (2) on the edge curvature falls between that of S (1) and S (3). Setting δ = 2 or γ+ζ obtain 2 , we gJC(i, j) = 1 − S(1) j + 2 i + S(1) N (i, j) − 2 i + S(2) S(2) j N (i, j) − 3 i + S(3) S(3) j N (i, j) . (16) 2.3.2 Connections to mass transport The Ollivier-Ricci curvature is related to the solution of an optimal mass transport problem as discussed in Section 2.1. Here we study if the Jaccard curvature has a similar connection to mass transport. Observe that the generalized Jaccard expression derived in (16) subtracts the influence of a node in S (1) with a weight of 1, influence of a node in S (2) with a weight of 2, and similarly for a node in S (3) with a weight of 3. These weights exactly match the transportation cost of moving mass from a source node to any destination node in the neighborhood of the other node. Next, we observe that the Jaccard curvature is related to the solution of this optimal mass exchange problem. N (i,j) for every k in N (i, j). The mass exchange plan νi,j : V × V → [0, 1] requires that for every x in Ni(i, j) and y in Nj(i, j) We define a mass exchange problem with an initial mass distribution of mk = 1 (cid:88) (cid:96)∈V and (cid:88) k∈V νi,j(x, (cid:96)) = 1 N (i, j) νi,j(k, y) = 1 N (i, j) (17) and νi,j(i, j) = 1 N (i,j). The mass exchange problem introduced here only requires that mass from a particular node x in Ni(i, j) be completely transported to Nj(i, j) and vice-versa, along with the requirement that mass at node i be transported to node j and vice-versa. N (i,j) and νi,j(j, i) = 1 It can be shown that the generalized Jaccard expression in (16) is related to the solution of the optimal mass exchange problem between neighborhoods of the two concerned nodes, where the mass distribution at the source is predetermined and fixed and the destination mass distribution is kept flexible, with the constraint that mass from a neighbor of one node needs to be transported to any neighbor of the other node and vice-versa. 3 Analytical results on random graphs We state the following result on the behavior of gJC curvature in ER graphs and compare with that of the OR curvature [15]. We present the results for a sequence of Erdos-Renyi graphs {G1, G2, . . .}, and let JCn(i, j) and gJCn(i, j) denote the Jaccard and generalized Jaccard curvature of edge (i, j) in the graph Gn. Theorem 3.1 Let {G1, G2, . . .} be a sequence of Erdos-Renyi graphs. As n → ∞ and for all (i, j) ∈ E, we have the following results. 6 a. For pn → p b. For pn → 0, E [JCn(i, j)] → −2 . E [JCn(i, j)] → 5p − 4 2 − p . (18) Theorem 3.2 Let {G1, G2, . . .} be a sequence of Erdos-Renyi graphs. As n → ∞ and for all (i, j) ∈ E, we have the following results. a. For pn → p (19) Note that E [gJCn] > 0 for all p > 0. As p → 1, E [gJCn(i, j)] → 1 and as p → 0, E [gJCn(i, j)] → 0. E [gJCn(i, j)] → p 2 − p . b. For npn → 0 and pn → 0, E [gJCn(i, j)] → 0. n → ∞ and pn → 0, E [gJCn(i, j)] → 0. c. For np2 n → ∞, np2 d. For n2p3 e. For npn → ∞,n2p3 n → 0 and pn → 0, E [gJCn(i, j)] → −1. n → 0 and pn → 0, E [gJCn(i, j)] → −2. Proof of Theorems 3.1 and 3.2. Without loss of generality, we set i = 1 and j = 2 in (16). Note that for the generic edge (1, 2) in graph Nn(1, 2) = [1 [k ∼ 1, k ∼ 2] + 1 [k ∼ 1, k (cid:28) 2] + 1 [k (cid:28) 1, k ∼ 2]] . (cid:88) k∈Vn Gn, and Therefore, where, E [Nn(1, 2)] = (n − 2)p2 n + [2(n − 2)pn(1 − pn) + 2] E [Cn(1, 2)] = (n − 2)p2 n (20) (21) E [Sn(1, 2)] = 2(n − 2)pn(1 − pn) + 2. (22) Observe that the number of common and separate nodes Cn(1, 2),Sn(1, 2) have been indexed by n, to denote that they correspond to the graph Gn. Note that as n → ∞ and if pn → 0, E [Sn(1, 2)] ∼ 2npn and E [Cn(1, 2)] ∼ o(npn). However, if pn → p, then E [Sn(1, 2)] → 2np(1 − p) and E [Cn(1, 2)] → np2. For (i, j) ∈ E, the Jaccard curvature for the regime pn → p follows by simply using (20)-(22). For the other regimes where pn → 0, the fraction of common nodes to the neighborhood size goes to 0, implying that JC(i, j) → −2. This proves Theorem 3.1. The argument for the gJC curvature is a bit more involved. From (16), we have E [gJC(i, j)] = 1 − E j + 2 i + S(1) N (i, j) − 2E i + S(2) j N (i, j) − 3E . (23) (cid:34) S(1) (cid:35) (cid:34) S(2) (cid:35) (cid:35) (cid:34) S(3) i + S(3) j N (i, j) We obtain the result by considering the different scaling regimes separately: The proof of Theorem 3.2 requires Lemmas A.1 through A.4 which are stated and proved in Appendix A. (a) First, consider the regime pn → p. From Lemma A.2 it is clear that all separate nodes are in sets S (1) n,(cid:96) for (cid:96) = i, j. Using this fact and (21), we obtain the result shown in (19). (b) First, we consider the regime npn → 0. Under this regime, degree of nodes goes to 0 a.s. Therefore for edge (i, j), there are no common nodes and the separate nodes are {i, j} whp. Therefore E [gJC(i, j)] → 0. 7 (c) Next, we consider the case np2 n− +1 Lemma A.1. Using Lemma A.4, we note that 2 npn = Θ(1). Multiplying numerator and denominator in E n → ∞ and pn → 0. Fix 0 <  < 1: Suppose np2 by n− +1 (cid:16) i +S(1) N (i,j) (cid:17) j +2 V ar n− +1 2 Nn(1, 2) = n−(+1)V ar(Nn(1, 2) ∼ n−(+1)npn = Θ(n− +1 2 ) (cid:20) S(1) (cid:21) n = Θ(n). Therefore 2 allows us to apply (24) n → ∞ and np2 n → 0 forces the bound 0 <  < 1 Eq. (24) and Lemmas A.2 yields E [gJC(i, j)] → 0. (d) We consider the scaling range where n2p3 the constraint np2 and denominator of the individual terms of (23) by n− +1 n− +1 (e) Now, we consider the scaling range where npn → ∞ and n2p3 The constraint n2p3 individual terms of (23) by n−, we obtain E [gJC(i, j)] → −2 by applying Lemmas A.3 and A.4. n → 0. Fix  > 0: Suppose n2p3 (cid:16) 3 , we obtain E [gJC(i, j)] → −1 by applying Lemmas A.3 and A.4. n → 0 forces the bound 0 <  < 1 n → 0. Fix  > 0 and let npn = Θ(n). 3. Multiplying the numerator and denominator of the n = Θ(n). Also, 3 npn = Θ(1). Multiplying the numerator 2. Therefore, n− +1 3 , and observing that V ar n− +1 3 Nn(1, 2) (cid:17) ∼ Theorems 3.1-3.2 together suggest that gJC is a better approximation of OR curvature than the JC curvature. We see that as the scaling changes and the ER graph becomes more dense, the gJC curvature increases progressively. In fact, the scalings at which the asymptotic behavior changes, match for the OR and gJC curvatures. The behavior of JC, gJC and OR curvatures are tabulated in Table 1 for different regimes in ER graphs. p constant npn → 0 npn → ∞ and n2p3 n → ∞ and np2 n2p3 n → ∞ np2 JC 5p−4 2−p −2 n → 0 −2 n → 0 −2 −2 gJC OR p 2−p 0 −2 −1 0 p 0 −2 −1 0 Table 1: The asymptotic values for the three curvatures under different scalings for the ER graph 4 Computational Complexity Here we analytically study the complexity of computing the Ollivier-Ricci (OR), Forman, Jaccard (JC) and generalized Jaccard (gJC) curvatures of a graph. Intuitively there is a clear hierarchy in the complexity of the above-mentioned curvatures. Consider computing them for a generic edge (i, j): In Forman we are only considering the degree of i and j so the complexity is going to be O(m) for a graph of m edges; while for JC, we are looking for the number of common neighbors between i and j. In gJC we look for the shortest path to get from any exclusive neighbor of i to any exclusive neighbor of j. All of these shortest paths could be to the same neighbor of j. Finally, in OR these shortest paths must represent a perfect fractional matching in the sense that one neighbor of y cannot be the target of too many neighbors of x. This is obviously a harder task. For ease of computation we will first assume that the graph is d-regular and the graph is stored as sorted adjacency lists. In Appendix B, we extend our analysis to address general graphs. 8 4.1 Jaccard curvatures In Section 2.3, we divided i, j's neighbor nodes into separate subsets: S (r) i = {k ∈ Ni(i, j) min l∈Nj (i,j) S (r) j = {k ∈ Nj(i, j) min l∈Ni(i,j) , with S(r) = S (r), then i ∪ S (r) j for r = 0, 1, 2, 3. Let S (r) = S (r) d(k, l) = r}. d(k, l) = r}. N (i, j) = S (0) ∪ S (1) ∪ S (2) ∪ S (3) ∪ {i ∪ j}. In order to compute JC and gJC, we need to count the size of S(0), S(1), S(2), S(3). In the following we will show how to compute these and their associated computational complexities. First, we note that computing the Forman curvature for all edges in the graph will be O(m) or O(nd), if the graph is d-regular. Lemma 4.1 S(0)(i, j) can be computed with cost O(d), and the total cost for the graph is O(nd2). Proof. Let N (i),N (j) be the sorted adjacency list of i, j, by merge sorting these two list; we get a new sorted list as N (i, j) = N (i) ∪ N (j). Then we have C(i, j) = N (i) + N (j) − N (i, j) by inclusion–exclusion principle, therefore S(0) = 2d − N (i, j). The merge-sort cost is O(d). Since there are m = O(nd) edges, the total cost of computing S(0) for all the edges in the graph will be O(md) = O(nd2) Lemma 4.2 S(1)(i, j) can be computed with cost O(d2), and the total cost for the graph is O(nd3). Proof. Assume that we have N (i) = (i1, i2, ...id), N (j) = (j, j1, j2, ...jd) as i, j's sorted adjacency list. Let N (is) be the sorted adjacency list of node is. As in Lemma 4.1, we merge-sort N (is) and N (j). If N (is) ∩ N (j) = ∅, then minl∈Ni(j) d(is, l) > 1, and therefore we must have is /∈ S(1) ∪ S(0); otherwise if N (is) ∩ N (j) (cid:54)= ∅, then is ∈ S(1) ∪ S(0). We apply the same process to the N (j) list. The total cost for computing S(1)(i, j) is 2d × O(d) = O(d2), and total cost for the graph is O(md2) = O(nd3) Lemma 4.3 S(2)(i, j), S(3)(i, j) can be computed with cost of O(d3), the total cost for the graph is O(nd3). Proof. Assume that we have sorted adjacency lists N (i) = (i1, i2, ...id), N (j) = (j, j1, j2, ...jd), N (is), N (jt) defined as above. It is easy to see that for any two nodes x, y if N (x) ∩ N (y) = ∅, then d(x, y) > 2. Therefore for each is, if for all jt ∈ N (j), we have N (is) ∩ N (jt) = ∅, then minl∈N (j) d(is, l) > 2, thus is ∈ S(3); if there exists jt ∈ N (j) such that N (is) ∩ N (jt) (cid:54)= ∅, then minl∈Ni(j) d(is, l) ≤ 2. With the help of S(0)(i, j), S(1)(i, j) we determine if is ∈ S(2)(i, j). Therefore the total cost for confirming is ∈ S(2)(i, j) or is ∈ S(3)(i, j) is O(d2) and total cost for confirming all N (i),N (j) is 2d × O(d2) = O(d3). The naive way of computing S(2), S(3) for the entire graph would be to apply this to each edge, with the resulting cost of O(md3) = O(nd4). However we can save when computing S(2)(i, j), S(3)(i, j) for all the edges in the graph. As a preprocessing step, we apply BFS on each nodes for depth at most 2, Then we know the distance between all pairs of nodes (distance could be 0, 1, 2, > 2). By using this lookup table, we can determine if d(is, jt) > 2 with cost of O(1) instead of O(d) by applying merge-sort to N (is) and N (jt). Therefore the total cost for determining S(2)(i, j), S(3)(i, j) for all the edges could be reduced to O(md2) = O(nd3). The cost for preprocessing of BFS is O(nd2) which is being dominated. So the total cost is O(nd3) + O(nd2) = O(nd3). . 9 Theorem 4.4 The cost for computing JC for the entire graph is O(nd2). Proof. Note that S (0) = C(i, j) and 2S(0) + S(1) + S(2) + S(3) = 2d. We also have S = S (1) ∪ S (2) ∪ S (3). Therefore S(i, j) = 2d − 2S(0). Hence for JC we only need to compute S(0). total cost in computing for the entire graph is m × O(d) = O(nd2). From Lemma 4.1, S(0)(i, j) can be computed with cost of O(d), and JC(i, j) with a cost of O(d). The Theorem 4.5 The cost for computing gJC for the entire graph is O(nd3). Proof. For gJC, we need to calculate all of S(0), S(1), S(2), S(3) . From Lemmas 4.1-4.3, the total cost will be O(nd3). 4.2 Ollivier-Ricci curvature The computation of the Olliver-Ricci curvature of an edge (i, j) is an optimization problem. It is usually solved by an LP solver which is not guaranteed to be in polynomial time. Here we translate the OR curvature problem into a min-cost max flow problem as follows: First we create a complete bipartite graph G = (I ∪ J, E), where I = N (i) and J = N (j), with Ni being the neighbor set of i. Cost of edge (is, jt), cs,t, is set to d(is, jt) in the original graph, and the capacity of each edge set to infinity. Next, we add a source node x and sink node y; source node x connects to all the nodes in I with cost of edge (x, is), cx,s, set to 1 and capacity set to the mass mis distributed on the original graph; the sink node y connects to all the nodes in J with cost of edge (y, jt), cy,t, set to 1 and capacity set to the mass mjt. The goal is to minimize the total cost along the edge with maximum possible flow f, where the cost is defined as C =(cid:80) e∈E ce × f (e). We can solve the min-cost max flow problem using the network simplex algorithm [22]. Theorem 4.6 The cost for computing OR curvatures for the entire graph is O(nd4 log2 d) In Tarjan's paper [22], it was shown that the network simplex algorithm has complexity O(mn log n log C), Proof. where m, n are the number of nodes and edges in the graph respectively, and C is the maximum edge cost. In the present setting, m = d2 + 2d, n = 2d + 2, C = 1/ 1 d = d, so computing OR curvature for an edge will have complexity O(d3 log2 d), with the total complexity for the entire graph being O(nd4 log2 d). Note that the algorithm is for a general graph, but for ease of computation complexity we still use d- regular setting here. Results on the computational complexity for general graphs are provided in Appendix B. Complexity Forman O(nd) JC gJC OR O(nd2) O(nd3) O(n4 log2 n) Table 2: The complexity hierarchy for Forman, JC, gJC and OR curvatures 5 Experimental Results 5.1 Network models We consider different network models to investigate the relationship between Jaccard and Forman curvatures in relation to Ollivier-Ricci curvature. Specifically, we explore network models for which Jaccard curvature 10 or Forman curvature gives a reasonably good approximation to Ollivier-Ricci curvature. This would in- form types of real-world networks for which Jaccard curvatures could be used to approximate Ollivier-Ricci curvature. The network models being considered are described below. Erdös-Rényi (ER) model: The ER model introduced by Erdös and Rényi [23] has long been considered to be a suitable mathematical model for networks because of the simplicity and mathematical tractability in analyzing their properties. ER(n, p) is a network on n nodes that connects every pair of nodes with probability p independent across node pairs. We fix n = 100 and vary p from 0.05 to 0.9, to study the behavior of the Jaccard and Forman curvatures vis-a-vis Ollivier-Ricci curvature. Table 3 shows the average curvatures of different ER graphs as the probability of connection p is varied. We observe that for small p, the average OR curvature is negative, and as p increases the average OR curvature increases as well. This is because as p increases, the density of the graph increases leading to more edges with positive curvature. For p small, the ER graph is more disconnected and tree-like, leading to negative average OR curvature. This behavior is well replicated by the Jaccard curvatures. In particular, the average gJC curvature closely tracks the average OR curvature as p is varied. On the other hand, the average Forman curvature decreases as p is increased for the simple reason that the average degree of nodes increase. We also observe that gJC correlates the best with OR curvature, and this difference is more pronounced for ER graphs with low p value. The advantage of gJC with respect to JC is somewhat lost as p is increased beyond 0.2. Furthermore, the correlation between the Jaccard curvatures and OR curvature improves as p is increased, but deteriorates slightly as p is increased beyond 0.5. Scatter plots shown in Figure 2 provides a visual representation of the correlation between OR and Jaccard curvatures. It is clear visually that the spread in the scatter plot is the least for p = 0.5, which is also supported by the correlation coefficients shown in the table. Graph ER(100,0.05) ER(100,0.1) ER(100,0.2) ER(100,0.3) ER(100,0.4) ER(100,0.5) ER(100,0.6) ER(100,0.7) ER(100,0.8) ER(100,0.9) OR JC gJC F -0.59 -0.20 0.15 0.26 0.35 0.47 0.55 0.67 0.77 0.87 -1.95 -1.83 -0.77 -1.48 -1.3 -1.01 -0.77 -0.39 -0.06 0.38 -0.86 -0.23 0.09 0.17 0.23 0.35 0.41 0.54 0.65 0.8 -7.8 -19.3 -37.4 -57 -74 -97.12 -113 -137 -154.03 -173 (OR,JC) τ rp 0.4 0.28 0.45 0.64 0.76 0.89 0.86 0.97 0.97 0.86 0.83 0.96 0.77 0.93 0.75 0.92 0.91 0.74 0.77 0.91 (OR,gJC) rp 0.77 0.90 0.94 0.97 0.97 0.96 0.93 0.92 0.91 0.91 τ 0.55 0.73 0.80 0.86 0.86 0.83 0.77 0.75 0.73 0.77 (OR,F) rp 0.35 -0.31 -0.46 -0.53 -0.44 -0.54 -0.58 -0.64 -0.7 -0.83 τ 0.25 -0.21 -0.3 -0.38 -0.28 -0.37 -0.4 -0.45 -0.5 -0.68 Table 3: Average curvatures shown for different Erdos Renyi (ER) graphs [ER(n,p) - number of nodes being n, and probability of connection being p]. The Pearson correlation coefficient rp and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated. Barabási-Albert (BA) model: The BA model introduced by Barabási and Albert [24] became popular and widely used because it was the first network model to explain power-law behavior through the preferential attachment or the rich-get-richer phenomena. BA(n, m) is a network growth model, which starts with m nodes and new nodes connect preferentially to m existing nodes with probability proportional to their degree. We study how the curvature metrics behave as n and m are varied. So first we fix n = 100 and consider m = 1, 2, 5, and then we study networks with a larger value of n = 500. In Table 4 we observe that gJC correlates the best with OR curvature for BA(100,1), a dramatic improve- ment over JC which has a single value of −2 for all the edges. Forman curvature correlates better than JC for BA(100,1), suggesting that it captures some properties of OR curvature for sparse tree-like graphs. Because there are no triangles in BA(100,1), JC simply cannot capture any information. On the other hard, gJC performs very well in approximating OR, because all mass transport paths need to pass through the edge being considered, leading to most mass transports requiring 3 hop paths, except the endpoints of the edge itself. Increasing m from 1 to 2 and keeping number of nodes fixed at 100, results in slightly deterioration of the correlation between gJC and OR curvature because now there could be shorter than 3 hop paths that 11 (a) ER(100,0.1) (b) ER(100,0.5) Figure 2: Scatter plots of Ollivier-Ricci and Jaccard curvatures for Erdös-Rényi graphs (c) ER(100,0.9) need to be accounted for. However, increasing m further leads to improvement, similar to what was observed in ER graphs for moderate p values. Increasing number of nodes n to 500 and keeping m fixed, decreases the correlation of Jaccard curvatures slightly, probably because that makes the graph more tree-like with larger hubs. Scatter plots in Figure 3 show that the spread is higher in BA graph compared to ER graphs. Watts-Strogatz (WS) model: The WS model introduced by Watts and Strogatz [13] produces graphs with small-world properties, exhibiting short average path lengths and high clustering coefficent. W S(n, k, p) is a network model on n nodes which first constructs a ring among adjacent nodes such that each node is connected to k closest neighbors. Then every edge is randomly rewired with probability p by keeping one endpoint fixed and choosing the other endpoint uniformly at random. We show curvature results for p = 0.1 and k = 4, and vary n = 100, 200, 500. Furthermore, we show results for n = 500,k = 4 and varying p = 0.1, 0.3, 0.5, 0.7, 0.9, 0.99. Thus, we analyze the results as the number of nodes and the rewiring probability varies. Table 5 shows the average curvatures and correlation results for different WS networks. We observe that keeping the parameters p and k fixed, increasing the number of nodes n does not change the curvatures much. Increasing the probability of rewiring makes the curvature more negative. This behavior is shown by OR, JC, gJC and the Forman curvatures. Ollivier-Ricci and Jaccard curvatures show this behavior because increasing the rewiring probability, increases the number of shortcuts in the network, thus making the average curvature more negative. Increasing the rewiring probability leads to a steady decrease in correlation between the Jaccard and the OR curvature, with Forman curvature showing the opposite behavior. This leads us to believe that the Jaccard curvatures are a better fit for the OR curvature for more positively curved graphs. Nevertheless, for W S(500, 4, 0.99) where the average OR curvature is −0.93, the correlation coefficients between gJC and OR are still pretty high. Figure 4 shows how the spread in the scatter plots increases as 12 Graph BA(100,1) BA(100,2) BA(100,5) BA(500,1) BA(500,2) BA(500,5) OR JC gJC F -0.31 -0.45 -0.16 -0.31 -0.79 -0.58 -2 -1.9 -1.77 -2 -1.98 -1.94 -0.54 -0.85 -0.19 -0.55 -1.32 -0.62 -3.84 -10.26 -25 -16.8 -11.7 -32 (OR,gJC) rp (OR,JC) rp τ N/A N/A 0.92 0.62 0.47 0.73 0.86 N/A N/A 0.93 0.52 0.12 0.52 0.81 -0.05 0.34 0.24 0.54 (OR,F) rp 0.65 0.6 -0.16 0.33 0.64 -0.08 τ 0.5 0.5 -0.07 0.37 0.58 0.03 τ 0.94 0.45 0.66 0.72 0.4 0.6 Table 4: Average curvatures shown for different Barabasi-Albert graphs [BA(n,m) - m being the number of connections formed by a new node]. The Pearson correlation coefficient rp and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated. (a) BA(500,1) (b) BA(500,5) Figure 3: Scatter plots of Ollivier-Ricci and Jaccard curvatures for Barabási-Albert graphs the probability of rewiring is increased from 0.1 to 0.99. Random geometric graph (RGG) model: Random geometric graphs [25] are spatial networks that have found application in the modeling of ad hoc mobile networks [26]. RGG(n, r) is a network model where all nodes are distributed uniformly on a metric space, e.g., a unit square, and connections between nodes are formed only if the pairwise Euclidean distance is less than a certain radius r, with 0 < r < 1. We study the curvature results for fixed n = 500 and varying radius r. From Table 6, we observe that increasing the radius r increases the OR curvature slightly. This is because clustering of the network increases with increasing r, thus leading to an increase in the OR curvature. Both the Jaccard curvatures exhibit this behavior too, although the mean gJC curvature values are much closer to the mean OR curvature values. On the other hand, the Forman curvature becomes more negative as r increases, because of an increase in the average degree of nodes. Furthermore, the correlation coefficients of the Jaccard curvatures increase as r increases. This observation agrees with the previously mentioned hy- pothesis that the Jaccard curvature approximates OR curvature better for positively curved graphs. Figure 5 visually shows how the fit of the Jaccard curvature improves as the radius of connectivity r is increased. 5.2 Real-world networks We consider several real-world networks in this subsection. The Gnutella network has been obtained from the Stanford large network dataset collection [27], while the rest of the networks were obtained from the Koblenz Network Collection [28]. A brief description of the datasets is provided below. Their network properties are displayed in Table 7. 13 Graph OR JC gJC F WS(100,4,0.1) WS(200,4,0.1) WS(500,4,0.02) WS(500,4,0.05) WS(500,4,0.1) WS(500,4,0.2) WS(500,4,0.3) WS(500,4,0.5) WS(500,4,0.7) WS(500,4,0.9) WS(500,4,0.99) -0.04 -0.08 0.17 0.06 -0.05 -0.31 -0.54 -0.77 -0.9 -0.94 -0.93 -1.46 -1.51 -1.33 -1.41 -1.47 -1.65 -1.78 -1.91 -1.98 -1.99 -2 -0.22 -0.28 0.02 -0.11 -0.24 -0.57 -0.88 -1.2 -1.4 -1.45 -1.45 -4.17 -4.2 -4.04 -4.1 -4.2 -4.36 -4.5 -4.7 -4.8 -4.8 -5 (OR,JC) τ rp 0.89 0.89 0.86 0.88 0.93 0.95 0.91 0.9 0.87 0.89 0.79 0.86 0.85 0.73 0.55 0.77 0.3 0.52 0.19 0.35 0.08 0.06 (OR,gJC) rp 0.96 0.96 0.98 0.96 0.96 0.95 0.94 0.89 0.8 0.78 0.78 τ 0.9 0.9 0.95 0.92 0.9 0.87 0.85 0.83 0.76 0.78 0.68 (OR,F) τ rp 0.25 0.33 0.26 0.37 0.29 0.21 0.23 0.29 0.31 0.42 0.3 0.39 0.42 0.34 0.45 0.49 0.61 0.66 0.69 0.76 0.76 0.65 Table 5: Average curvatures shown for different Watts Strogatz graph [WS(n,k,p) - each node connects to k nearest neighbors and p is the probability of rewiring an edge]. The Pearson correlation coefficient rp and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated. (a) WS(500,0.1,4) (b) WS(500,0.99,4) Figure 4: Scatter Plots of Ollivier-Ricci and Jaccard curvatures for Watts Strogatz graphs 5.2.1 Description of networks: Infrastructure Networks: We study the US Power Grid network [13] which contains information about the power grid of the Western states of the United States of America. A node in the network is either a generator, a transformer or a power substation, while edges represent high-voltage power supply lines between nodes. This network was studied in [13] as an example of a real network with the small-world property. Another infrastructure network we consider is the Euroroad network [29], a road network located mostly in Europe. The network is undirected, with nodes representing cities and an edge between two nodes denotes a physical road between them. This network was observed to be neither scale-free nor small-world, and particularly difficult to partition with standard community detection algorithms. Online social and communication networks: We study a social network formed by people that shares confidential information using the Pretty Good Privacy (PGP) encryption algorithm, also called the PGP web of trust [30]. The degree distribution of the network exhibits a power law decay with a particular exponent for small degrees, and a crossover towards another power-law with a higher exponent for large degree values. This suggests that unlike many technological networks, the PGP is not a scale-free network but exhibits bounded degree distribution. Furthermore, the network shows a large clustering coefficient. We also consider the Gnutella network [31], a peer-to-peer architecture, where nodes represent Gnutella 14 Graph OR JC gJC F RGG(500,0.05) RGG(500,0.1) RGG(500,0.15) RGG(500,0.2) 0.22 0.23 0.28 0.32 -1.13 -0.75 -0.64 -0.61 0.05 0.37 0.44 0.46 -4.89 -28 -64.4 -112 (OR,JC) τ rp 0.83 0.86 0.86 0.94 0.96 0.87 0.89 0.97 (OR,gJC) rp 0.88 0.94 0.96 0.97 τ 0.79 0.82 0.86 0.88 (OR,F) rp -0.17 -0.22 0.04 0.16 τ -0.15 -0.12 0.04 0.09 Table 6: Average curvatures shown for different Random Geometric Graphs [RGG(n,r) - each node connects to nodes within a distance of r]. The Pearson correlation coefficient rp and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated. (a) RGG(500,0.1) (b) RGG(500,0.2) Figure 5: Scatter Plots of Ollivier-Ricci and Jaccard curvatures for random geometric graphs hosts and the edges represent connections between them. It is not a pure power-law network and preserves good fault tolerance characteristics, while being less dependent than a pure power-law network on highly connected nodes. The email communication network [32] at the University Rovira i Virgili in Tarragona is also studied. Here, the nodes of the network are users, and each edge represents that at least one mail was exchanged between the concerned nodes. This network was studied as an example of a self-organized complex system [32]. Other miscellaneous networks: We considered a biological network that was an initial version of a systematic mapping of protein-protein interactions in humans [33]. We also considered a collaboration network between Jazz musicians, with each node being a Jazz musician and an edge denoting the two musicians playing together in a band [34]. 5.2.2 Discussion of results Table 8 shows the mean curvature values and correlation coefficients between OR and the other curvature metric for different real-world networks. Firstly, we observe that gJC tracks OR the closest in terms of the mean curvature. Since the range of Forman is not bounded, we see large negative average curvatures for many networks, unlike Jaccard and OR curvatures which are inherently bounded. Furthermore, the gJC curvature correlates strongly with OR compared to JC and Forman curvatures for almost every real network being considered. Even JC seems to outperform Forman curvature in correlating with OR curvature on PGP Network, p2p-Gnutella, Email network, Hamsterster friendship network and Human protein network, while Forman correlates stronger with OR solely on the EuroRoad network. Table 9 shows that the gJC implementation is several orders of magnitude faster than the OR imple- mentation, while the JC implementation itself is faster compared to the gJC implementation. The Forman implementation is the fastest among all the curvature metrics being considered, thus agreeing with the the- oretical analysis in Section 4. However, the results suggest that there is no clear scenario where the Forman 15 Dataset n m dmax davg US power grid EuroRoad PGP network p2p-Gnutella Email network Hamsterster Human protein Jazz musicians 4941 1174 10680 6301 1133 1858 3133 198 6594 1417 24316 20777 5451 12534 6726 2742 19 10 205 97 71 272 129 100 2.67 2.41 4.55 6.59 9.62 13.5 4.29 27.69 Diameter Mean shortest 46 62 24 9 8 14 13 6 path length 20 19 7.65 4.64 3.65 3.4 4.80 2.21 Clustering coefficient Assortativity 0.1 0.03 0.38 0.01 0.17 0.09 0.04 0.52 0.003 0.13 0.24 0.03 0.08 -0.08 -0.13 0.02 Table 7: Network properties of real-world networks being considered. The number of nodes n, number of edges m, maximum degree dmax, average degree davg, and other well-known network properties are reported. is a good proxy for OR curvature, while JC could be a good proxy for OR for positively curved or more clus- tered networks. Although the gJC curvature is computationally costlier than JC and Forman, it correlates strongly with OR curvature for most of the real networks being considered across a wide range of network properties and types. Graph OR JC gJC F US power grid EuroRoad PGP network p2p-Gnutella Email network Hamsterster friendships Human protein Jazz musicians -0.34 -0.33 -0.10 -1.01 -0.41 -0.34 -0.62 0.27 -1.89 -1.97 -1.36 -1.98 -1.72 -1.87 -1.93 -0.92 -0.78 -0.97 -0.14 -1.16 -0.38 -0.19 -0.79 0.32 -3.7 -2 -33.76 -31 -33.37 -86.7 -27 -73.3 (OR,JC) τ rp 0.23 0.4 0.09 0.15 0.73 0.53 0.27 0.23 0.56 0.73 0.23 0.41 0.31 0.1 0.79 0.91 (OR,gJC) rp 0.8 0.69 0.85 0.86 0.81 0.58 0.78 0.92 τ 0.69 0.67 0.74 0.58 0.69 0.42 0.6 0.8 (OR,F) rp 0.48 0.76 0.13 -0.32 0.15 0.13 0.35 0.09 τ 0.41 0.69 0.08 0.08 0.11 0.13 0.34 0.05 Table 8: Average curvatures shown for different real-world networks. The Pearson correlation coefficient rp and Kendall's τ coefficient between the OR and Jaccard curvatures, and the OR and Forman curvature are tabulated. US power grid EuroRoad Hamsterster friendships PGP network p2p-Gnutella Email network Human protein Jazz musicians OR(LP solver) 146.011s 9.515s 1052.614s 219.943s 57.279s 424.898s 78.64s 72.137s gJC 0.67s 0.432s 5.258s 5.66s 1.543s 14.354s 1.312s 1.539s JC 0.368s 0.227s 2.624s 2.146s 0.718s 5.069s 0.951s 0.957s Forman 0.099s 0.023s 0.419s 0.331s 0.071s 0.267s 0.084s 0.092s Table 9: Running times for computing the OR, Jaccard and Forman curvatures for different real networks. 16 6 Conclusion We investigated a new network curvature metric inspired by the Jaccard coefficient, which we call the Jaccard curvature. We generalized the notion of Jaccard curvature and studied two Jaccard curvature metrics, JC and gJC. Theoretically, the gJC metric was shown to better approximate OR curvature for Erdos-Renyi graphs, compared to the JC metric. We conducted experiments with different classes of network models and real networks, and observed that gJC outperforms JC and Forman curvatures in approximating the OR curvature. Nonetheless, the JC curvature is easier to compute than gJC, and correlates moderately well with OR for positively curved or strongly clustered networks, suggesting that it could be used as a cheap proxy to the OR curvature for such special scenarios. The Forman curvature while being the cheapest to compute, shows weak correlation with OR curvature for many real networks. References [1] J. Jost, Riemannian geometry and geometric analysis. New York, NY: Springer, 2002. [2] S. Gallot, J. Lafontaine, and D. Hulin, Riemannian geometry. New York, NY: Springer, 1987. [3] S. I. Goldberg, Curvature and homology. Mineola, NY: Dover, 1998. [4] Y. Higuchi, "Combinatorial curvature for planar graphs," Journal of Graph Theory, vol. 38, no. 4, pp. 220–229, 2001. [5] O. Narayan and I. Saniee, "Large-scale curvature of networks," Physical Review E, vol. 84, no. 6, p. 066108, 2011. [6] R. Forman, "Bochner's method for cell complexes and combinatorial ricci curvature," Discrete and Computational Geometry, vol. 29, no. 3, pp. 323–374, 2003. [7] Y. Ollivier, "Ricci curvature of markov chains on metric spaces," Journal of Functional Analysis, vol. 256, no. 3, pp. 810–864, 2009. [8] R. Sandhu, T. Georgiou, L. Z. Reznik, I. Kolesov, Y. Senbabaoglu, and A. Tannenbaum, "Graph curva- ture for differentiating cancer networks," Scientific reports, vol. 5, 2015. [9] R. S. Sandhu, T. T. Georgiou, and A. R. Tannenbaum, "Ricci curvature: An economic indicator for market fragility and systemic risk," Science advances, vol. 2, no. 5, p. e1501495, 2016. [10] C. Wang, E. Jonckheere, and R. Banirazi, "Wireless network capacity versus ollivier-ricci curvature IEEE, 2014, pp. under heat-diffusion (hd) protocol," in American Control Conference (ACC), 2014. 3536–3541. [11] C.-C. Ni, Y.-Y. Lin, J. Gao, X. D. Gu, and E. Saucan, "Ricci curvature of the internet topology," in IEEE Conference on Computer Communications (INFOCOM). IEEE, 2015, pp. 2758–2766. [12] J. Jost and S. Liu, "Ollivier's ricci curvature, local clustering and curvature-dimension inequalities on graphs," Discrete & Computational Geometry, vol. 51, no. 2, pp. 300–322, 2014. [13] D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, p. 440, 1998. [14] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for social networks," Journal of the Association for Information Science and Technology, vol. 58, no. 7, pp. 1019–1031, 2007. [15] B. B. Bhattacharya and S. Mukherjee, "Exact and asymptotic results on coarse ricci curvature of graphs," Discrete Mathematics, vol. 338, no. 1, pp. 23–42, 2015. [16] R. Sreejith, K. Mohanraj, J. Jost, E. Saucan, and A. Samal, "Forman curvature for complex networks," Journal of Statistical Mechanics: Theory and Experiment, vol. 2016, no. 6, p. 063206, 2016. 17 [17] R. Sreejith, J. Jost, E. Saucan, and A. Samal, "Systematic evaluation of a new combinatorial curvature for complex networks," Chaos, Solitons & Fractals, vol. 101, pp. 50–67, 2017. [18] Y. Lin, L. Lu, and S.-T. Yau, "Ricci curvature of graphs," Tohoku Mathematical Journal, Second Series, vol. 63, no. 4, pp. 605–627, 2011. [19] E. Saucan, A. Samal, M. Weber, and J. Jost, "Discrete curvatures and network analysis," Max Planck Institute for Mathematics in the Sciences, Preprint, 2017. [20] M. Weber, E. Saucan, and J. Jost, "Characterizing complex networks with forman-ricci curvature and associated geometric flows," Journal of Complex Networks, p. cnw030, 2017. [21] M. Weber, J. Jost, and E. Saucan, "Forman-ricci flow for change detection in large dynamic data sets," Axioms, vol. 5, no. 4, p. 26, 2016. [22] R. E. Tarjan, "Dynamic trees as search trees via euler tours, applied to the network simplex algorithm," Mathematical Programming, vol. 78, no. 2, pp. 169–177, 1997. [23] P. Erdös and A. Rényi, "On the evolution of random graphs," Publ. Math. Inst. Hung. Acad. Sci, vol. 5, no. 1, pp. 17–60, 1960. [24] A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509–512, 1999. [25] M. Penrose, Random geometric graphs. Oxford University Press, 2003, no. 5. [26] M. Nekovee, "Worm epidemics in wireless ad hoc networks," New Journal of Physics, vol. 9, no. 6, p. 189, 2007. [27] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap. stanford.edu/data, Jun. 2014. [28] "KONECT: The Koblenz network collection," http://konect.uni-koblenz.de/, 2017. [29] L. Šubelj and M. Bajec, "Robust network community detection using balanced propagation," The Eu- ropean Physical Journal B-Condensed Matter and Complex Systems, vol. 81, no. 3, pp. 353–362, 2011. [30] M. Boguñá, R. Pastor-Satorras, A. Díaz-Guilera, and A. Arenas, "Models of social networks based on social distance attachment," Physical review E, vol. 70, no. 5, p. 056122, 2004. [31] M. Ripeanu and I. Foster, "Mapping the gnutella network: Macroscopic properties of large-scale peer- to-peer systems," in International Workshop on Peer-to-Peer Systems. Springer, 2002, pp. 85–93. [32] R. Guimera, L. Danon, A. Diaz-Guilera, F. Giralt, and A. Arenas, "Self-similar community structure in a network of human interactions," Physical review E, vol. 68, no. 6, p. 065103, 2003. [33] J.-F. Rual, K. Venkatesan, H. Tong, T. Hirozane-Kishikawa et al., "Towards a proteome-scale map of the human protein-protein interaction network," Nature, vol. 437, no. 7062, p. 1173, 2005. [34] P. M. Gleiser and L. Danon, "Community structure in jazz," Advances in complex systems, vol. 6, no. 04, pp. 565–573, 2003. [35] G. Grimmett and D. Stirzaker, Probability and random processes. Oxford university press, 2001. A Proof of Theorem 3.2 A.1 Preliminaries Since (16) consists of ratios of rvs, we find it helpful to state a result which ensures mean convergence of ratio of rvs to the ratio of their means. 18 Dn c2 A.1.1 A probabilistic result on ratios of rvs First we state a basic result which will help us investigate the asymptotic behavior of the gJC curvature. Lemma A.1 Consider the following sequences of rvs {Nn, n = 1, 2, . . .} and {Dn, n = 1, 2, . . .}. If E [Nn] n−→ c1 and E [Dn] n−→ c2, then finite constant c such that (cid:12)(cid:12)(cid:12)E(cid:104) Nn (cid:12)(cid:12)(cid:12) n−→ 0 as n → ∞, provided V ar(Dn) n−→ 0 as n → ∞ and there exists (cid:105) − c1 (cid:12)(cid:12)(cid:12) Nn (cid:12)(cid:12)(cid:12) < c almost surely. (cid:20) Nn (cid:20) Nn (cid:21) (cid:20) Nn Dn The latter term in (25) yields Proof. For n = 1, 2, . . ., 1 [Dn − c2 > ] 1 [Dn − c2 < ] (cid:20) Nn = E + E (25) (cid:21) (cid:21) (cid:21) . Dn Dn E Dn 1 [Dn − c2 < ]c ≤ cP [Dn − c2 > ] E Dn by using Chebyshev's inequality [35]. Using (26) in (25), we obtain ≤ c V ar(Dn) n−→ 0 2 (cid:12)(cid:12)(cid:12)(cid:12)E (cid:20) Nn (cid:21) Dn (cid:12)(cid:12)(cid:12)(cid:12) → 0 − c1 c2 as n → ∞ and  → 0. A.1.2 Mean asymptotics on the sets of Separate nodes We aim to find the asymptotic behavior of gJC(i, j) for an edge (i, j). Next, we state results on the asymptotics of the sets S(1) n,i, S(2) n,i and S(3) n,i for i = 1, 2. Lemma A.2 For edge (i, j) ∈ En, we have E(cid:104) S(1) n,(cid:96) (cid:105) ∼ npn(1 − pn), when pn → p ∼ npn, when np2 ∼ o(npn), when np2 n → ∞ n → 0 for (cid:96) = i, j, which also implies E(cid:104)(cid:16) (cid:17) (cid:16) + S(2) n,i + S(2) n,j S(3) n,i + S(3) n,j (cid:17)(cid:105) ∼ o(npn), when np2 ∼ 2npn, when np2 n → ∞ or pn → p n → 0. Proof. Observe that, n,1 = {k ∈ Nn,1(1, 2) S(1) d(k, (cid:96)) = 1} = {k ∈ Vn k ∼ 1, k (cid:28) 2 and ∃(cid:96) ∈ Nn,2(1, 2) : k ∼ (cid:96)} = 1 [k ∼ 1, k (cid:28) 2] (1 [(cid:96) ∼ 2, (cid:96) (cid:28) k] + 1 [(cid:96) (cid:28) 2]) (cid:88) k∈Vn  . min (cid:96)∈Nn,2(1,2) 1 − (cid:89) (cid:96)∈Vn\k 19 (26) (27) (28) (29) (30) By using the iid property of edges in an Erdos Renyi graph, we obtain from (30), E(cid:104) S(1) n,1 (cid:105) = npn(1 − pn) = npn(1 − pn) 1 − (pn(1 − pn) + (1 − pn))n−1(cid:17) (cid:16) (cid:16) 1 −(cid:0)1 − p2 (cid:16) (cid:105) ∼ npn (cid:1)n−1(cid:17) (cid:17) 1 − e−np2 n n Note that as n → ∞ and pn → 0, E(cid:104) n → ∞, E(cid:104) and if pn → p, E(cid:104) (cid:105) ∼ 2npn, implying that all separate vertices are actually in S (1) Therefore, first part of the lemma, (28) follows. From (22), we note that E [Sn(i, j)] ∼ 2npn. However, when n,2. Thus the np2 second part of the lemma follows as well. (cid:105) ∼ np(1 − p). n,1 ∪ S (1) S(1) n,1 + S(1) S(1) n,1 S(1) n,1 (31) n,2 . Next, we study the properties of S(2). Lemma A.3 For edge (i, j) ∈ E, we have for (cid:96) = (i, j), which also implies E(cid:104)(cid:16) Proof. Observe that n → ∞, np2 n → 0 E(cid:104) S(2) n,(cid:96) (cid:105) ∼ npn, n2p3 (cid:17)(cid:105) ∼ o(npn), n2p3 ∼ o(npn), n2p3 n → 0 ∼ 2npn, n2p3 S(3) n,i + S(3) n,j n → ∞ n → 0, npn → ∞. (32) (33) 1 = {k ∈ Nn,1(1, 2) S(2) min (cid:96)∈Nn,2(1,2) = {k ∈ Nn,1(1, 2) \ (C ∪ S (1) d(k, (cid:96)) = 2} From (29), we note that we only need to consider the scaling where np2 requirement of k /∈ S(1) n,i. Continuing from (34), n,1) ∃(cid:96), m ∈ Vn s.t. (cid:96) ∼ 2, (cid:96) (cid:28) 1, (cid:96) ∼ m, m ∼ k}. (34) n → 0. Therefore, we can drop the (cid:89) (1 [(cid:96) ∼ 2, k ∼ m, m (cid:28) (cid:96)] + 1 [(cid:96) ∼ 2, k (cid:28) m] + 1 [(cid:96) (cid:28) 2])  . 1 [k ∼ 1, k (cid:28) 2] × k∈Vn S(2) n,1 = (cid:88) 1 − (cid:89) (cid:105) E(cid:104) Note that as n → ∞, E(cid:104) S(2) n,1 (cid:96)∈Vn\{1,2,k} m∈Vn\{1,2,k,(cid:96)} (cid:16) = npn(1 − pn) 1 −(cid:0)p2 = npn(1 − pn)(cid:0)1 − p3 (cid:105) ∼ npne−n2p3 n Using the independence of the involved rvs {k ∼ 1},{k (cid:28) 2}, {(cid:96) ∼ 2}, {k ∼ m} and {m (cid:28) (cid:96)}, we obtain n(1 − pn) + pn(1 − pn) + (1 − pn)(cid:1)(n−3)(n−4)(cid:17) (cid:1)(n−3)(n−4) . (35) n,1 ∪ S (2) n → 0, npn → ∞, since E [Sn(1, 2)] ∼ 2npn, we must have all the separate nodes in S (3) n. Therefore, first part of the lemma follows. This implies n,2. For the range n,1 ∪ S (3) n,2. n → 0, all separate vertices are actually in S (2) that in the range n2p3 n2p3 n → ∞, np2 S(2) n,1 20 A.1.3 Variance asymptotics In this section we analyze the variance asymptotics of the set of neighbor nodes. Lemma A.4 For edge (i, j) in E, we have V ar(Nn(i, j)) ∼ 2npn. Proof. Observe that, Set χk = 1 [k (cid:28) 1] 1 [k (cid:28) 2]. It follows that Nn(1, 2) = n − (cid:88) (cid:88) k∈Vn\{1,2} V ar(Nn(1, 2)) = V ar(χk) + k∈Vn\{1,2} 1 [k (cid:28) 1] 1 [k (cid:28) 2] . (cid:88) i(cid:54)=j Cov(χi, χj). By independence of links in an ER graph, Cov(χi, χj) = 0, and V ar(χk) = E [1 [k (cid:28) 1] 1 [k (cid:28) 2]] − (E [1 [k (cid:28) 1]] E [1 [k (cid:28) 2]])2 = (1 − pn)2 − (1 − pn)4 = (1 − pn)2(2pn − p2 n). Therefore, V ar(Nn(1, 2)) ∼ 2npn. (36) (37) (38) (39) (40) B Complexity analysis for General Graph We introduce some notation: Let n, m and ∆ denote the number of nodes, number of edges and the maximum degree in a graph respectively. Let dx denote the degree of node x, and Dx the sum of the degrees of all the neighbors of x. Lemma B.1 Total cost of computing S(0) for all the edges of the graph is 2(cid:80) Proof. As in Lemma 4.1, merge-sort N (i), N (j) will cost di + dj, so the total cost will be(cid:80) It is easy to see that each di appears di time in the summation, therefore the total cost is 2(cid:80) Lemma B.2 Total cost of computing S(1) for all the edges of the graph is 2(cid:80) (i,j)∈E(di + dj). v∈V d2 v v∈V d2 v v∈V dvDv Proof. Following a process similar to that for the proof of Lemma 4.2, the cost of calculating S(1)(i, j) is (dx + dj) + (dy + di) = dx + dy + 2didj = Di + Dj + 2didj (cid:88) The total cost is(cid:80) x∈N (i) (cid:88) y∈N (j) (cid:88) x∈N (i) (i,j)∈E(Di + Dj + 2didj). Notice that (cid:88) y∈N (j) (cid:88) v∈V dvDV (cid:88) (i,j)∈E (Di + Dj) = 21 (cid:88) (i,j)∈E (cid:88) (cid:88) (cid:88) i∈V (cid:88) j∈N (i) (cid:88) i∈V and 2didj = v∈V dvDv i∈V j∈N (i) didj = di( dj) = diDi Therefore the total cost is 2(cid:80) Lemma B.3 Total cost of computing S(2) and S(3) for all the edges of the graph is(cid:80) Proof. The proof is similar to that for Lemma 4.3 The preprocessing of BFS costs(cid:80) determining each S(2)(i, j) or S(3)(i, j) is(cid:88) (i,j)∈E 2didj =(cid:80) So the total cost is(cid:80) Theorem B.4 The complexity of computing JC for a general graph is O(2(cid:80) 1)Dv), and for OR is O((cid:80) v∈V dvDV , overall cost is(cid:80) (i,j)∈E(di + dj + di ∗ dj)(di + dj) log2(di + dj)). Using the lemmas stated above we obtain the following result. v∈V (dv + 1)Dv (cid:88) x∈N (i) y∈N (j) dj + di = 2didj v∈V (dv + 1)Dv v∈V Dv. The cost for v), for gJC is O((cid:80) v∈V d2 v∈V (dv+ 22
1809.05812
2
1809
2018-11-20T17:01:16
Robust Cascade Reconstruction by Steiner Tree Sampling
[ "cs.SI" ]
We consider a network where an infection cascade has taken place and a subset of infected nodes has been partially observed. Our goal is to reconstruct the underlying cascade that is likely to have generated these observations. We reduce this cascade-reconstruction problem to computing the marginal probability that a node is infected given the partial observations, which is a #P-hard problem. To circumvent this issue, we resort to estimating infection probabilities by generating a sample of probable cascades, which span the nodes that have already been observed to be infected, and avoid the nodes that have been observed to be uninfected. The sampling problem corresponds to sampling directed Steiner trees with a given set of terminals, which is a problem of independent interest and has received limited attention in the literature. For the latter problem we propose two novel algorithms with provable guarantees on the sampling distribution of the returned Steiner trees. The resulting method improves over state-of-the-art approaches that often make explicit assumptions about the infection-propagation model, or require additional parameters. Our method provides a more robust approach to the cascadereconstruction problem, which makes weaker assumptions about the infection model, requires fewer additional parameters, and can be used to estimate node infection probabilities. Empirically, we validate the proposed reconstruction algorithm on real-world graphs with both synthetic and real cascades. We show that our method outperforms all other baseline strategies in most cases
cs.SI
cs
Robust Cascade Reconstruction by Steiner Tree Sampling Han Xiao Aalto University Espoo, Finland [email protected] Cigdem Aslay Aalto University Espoo, Finland Aristides Gionis Aalto University Espoo, Finland [email protected] [email protected] 8 1 0 2 v o N 0 2 ] I S . s c [ 2 v 2 1 8 5 0 . 9 0 8 1 : v i X r a Abstract -- We consider a network where an infection has taken place and a subset of infected nodes has been partially observed. Our goal is to reconstruct the underlying cascade that is likely to have generated these observations. We reduce this cascade- reconstruction problem to computing the marginal probability that a node is infected given the partial observations, which is a #P-hard problem. To circumvent this issue, we resort to estimating infection probabilities by generating a sample of probable cascades, which span the nodes that have already been observed to be infected, and avoid the nodes that have been observed to be uninfected. The sampling problem corresponds to sampling directed Steiner trees with a given set of terminals, which is a problem of independent interest and has received limited attention in the literature. For the latter problem we propose two novel algorithms with provable guarantees on the sampling distribution of the returned Steiner trees. that often make explicit assumptions about The resulting method improves over state-of-the-art ap- the proaches infection-propagation model, or require additional parameters. Our method provides a more robust approach to the cascade- reconstruction problem, which makes weaker assumptions about the infection model, requires fewer additional parameters, and can be used to estimate node infection probabilities. We experi- mentally validate the proposed reconstruction algorithm on real- world graphs with both synthetic and real cascades. We show that our method outperforms all other baseline strategies in most cases. Index Terms -- infection cascades, epidemics, cascade recon- struction, Steiner tree sampling I. INTRODUCTION Diffusion processes have been used to model the spread of an item in a network, such as rumors, trends, or infections. The study of diffusion processes has a wide range of applications, from designing strategies for viral marketing to preventing and controlling outbreaks. In this paper we consider the problem of reconstructing a cascade, based on the partially observed outcome of a propagation process in a network. Reconstructing a cascade, which may have resulted from the propagation of an infection or information, has many important applications, and thus, several variants of the problem have been studied in the literature [1, 2, 3, 4]. In this work, we consider the task of probabilistic cascade reconstruction. Given the partially observed infection state of the network, our aim is to reconstruct the infection cascade by inferring the hidden infection state of the nodes with no observation. We map our cascade reconstruction problem to the task of (a) Input (b) Tree sampling (c) Inference Fig. 1. Overview of our approach: (a) given input observed infections; (b) Steiner trees are sampled, each representing a possible cascade explaining the observation; (c) node infection probabilities are estimated from the samples; computing the marginal probability that a node is infected given partial observations. We show that computing these marginal probabilities is #P-hard and resort to approximation by sampling cascades from a target distribution. The sampled cascades are required to span the nodes that have been observed to be infected, and avoid the nodes that have been observed to be uninfected. We map this sampling problem to the problem of sampling directed Steiner trees with a given set of terminals. The latter problem is of independent interest, and to our knowledge it has received limited attention in the literature. Our main technical contribution is two novel algorithms with provable guarantees on the distribution of the sampled Steiner trees. The first algorithm, TRIM, uses Wilson's algo- rithm [5] to sample spanning trees then "trims" the branches that are beyond the terminal nodes, with proper adjustment of the sampling probabilities so that the resulting Steiner tree is sampled from the desired target distribution. The second algorithm, loop-erased random walk (LERW), is an adaptation of Wilson's algorithm [5] adjusted to take into account the input set of terminal nodes and directly return a Steiner tree from the desired target distribution. An illustration of our setting and approach is shown in Figure 1. To simplify visualization, the example is shown on a 2-d grid, however, the idea is general for any network. observed infectedhidden infectedsourcehidden uninfectedP(uninfected)P(infected) Figure 1(a) shows the ground-truth cascade. Among the infected nodes some are observed (blue squares ) while most ). The uninfected nodes (small are unknown (yellow circles white circles ) are also unknown. Figure 1(b) shows four dif- ferent cascades sampled from the grid. The sampled cascades are modeled as Steiner trees spanning a set of terminals -- the observed infected nodes. Using the sampled cascades we estimate the infection probabilities for all the nodes whose infection status is unknown -- shown in Figure 1(c). Our main contribution are as follows: • We define the probabilistic cascade-reconstruction prob- lem (Section III), which makes weaker assumptions com- pared to methods such as NetFill [3], thus offering more robustness. • To solve the cascade-reconstruction problem, we study the problem of sampling Steiner trees with a given set of terminals, and propose two algorithms with provable guarantees on the sampling distribution (Section IV). • We empirically demonstrate that our sampling-based cascade-reconstruction approach outperforms other base- lines in terms of both node and edge recovery (Section V). II. RELATED WORK Cascade reconstruction. Diffusion processes have been stud- ied in the literature extensively under different viewpoints. Nevertheless, the problem of "reverse engineering" an epi- demic so as to reconstruct the most likely cascade, and the most likely infected nodes, or propagation edges, has received relatively little attention. Lappas et al. [6] study the problem of identifying k seed nodes, or effectors, in a partially-activated network, which is assumed to be in steady-state under the independent-cascade model (IC). The problem has also been considered in different settings. For example, recent works by Rozenshtein et al. [1] and Xiao et al. [4] consider different cascade-reconstruction problems in a temporal setting, where interaction timestamps, or infection times, respectively, are assumed to be known. A related line of research focuses on finding the source node (root) of a given cascade, or a number of cascades. Shah and Zaman [7] formalize the notion of rumor-centrality to identify the single source node of an epidemic under the susceptible- infected model (SI), and provide an optimal algorithm for d- regular trees. The more recent study of Farajtabar et al. [8] considers the problem of identifying a single source given multiple partially-observed cascades. In our case, we focus on detecting the unobserved infected nodes. The work closest to ours is the work by Sundareisan et they aim at al. [3]. Similar to our problem formulation, recovering hidden infections under a non-temporal setting where the source nodes are unknown. However, they make two key assumptions. First, their method NetFill is tailored specifically for the SI model. Second, they assume that the fraction of observed infections is known. In contrast, our method does make such assumptions, making it more robust. On the other hand, their method also attempts to recover the infection sources while our method relies on external source- inference methods. However, we empirically show that the integration of our method with simple distance-based source- inference heuristics can still significantly outperform NetFill. Finally, while NetFill makes binary decisions, our method produces infection probability estimates: tackling this problem probabilistically suits more the stochastic nature of a variety of diffusion processes. Sampling trees. Sampling combinatorial structures has long been an active research area. In particular, sampling random spanning trees [5, 9, 10, 11] is an extensively-studied problem. On the other hand, the problem of sampling Steiner trees has not received much attention in the literature. Related work on Steiner trees has mainly considered the optimization aspect, such as minimum Steiner tree problem and its variants[12]. III. PROBLEM DEFINITION Infection cascade model. We consider a reciprocal non- symmetric directed contact graph G = (V, E, p). By reciprocal we mean that (u, v) ∈ E implies (v, u) ∈ E. We assume that under an infection-propagation model, a dynamic process takes place in the network, and for each edge (u, v) ∈ E, puv denotes the probability that u transmits the infection to v. These infection probabilities are non-symmetric, meaning that in the general case puv (cid:54)= pvu. The infection process starts at an initial source node s, i.e., patient-zero, which could potentially be unknown. We denote by T ∗ the resulting cascade and the corresponding set of infected nodes by V [T ∗]. We assume each node can be infected by only one other node and infected nodes do not recover.1 Under these assumptions, the cascade T ∗ forms a tree. Observation model. For each node u ∈ V we use the variable yu ∈ {0, 1} to denote its infection state such that yu = 1 if u ∈ V [T ∗] and 0 otherwise. We assume that we can only partially observe the infection state of the network and define the set of observations O = {(u, yu)} as the set of nodes with known infection states. We use X and U to refer to the nodes that are reported to be infected and uninfected, respectively. Thus, abusing the notation slightly, for all u ∈ V \ O, the value of yu is unknown. We use Pr (yu = 1 O) to denote the probability that a node u ∈ V \ O is infected when we are given the partial observation set O. Probabilistic cascade reconstruction. Given a partially ob- served infection propagation process, our aim is to reconstruct the infection cascade by inferring the hidden infection state of the unreported nodes. Thus, we consider the following problem. Problem 1 (Probabilistic cascade reconstruction). Given a re- ciprocal non-symmetric directed contact graph G = (V, E, p), and a set O = {(u, yu)} of partial observations, reconstruct the infection cascade by inferring the hidden infection state of the unreported nodes. 1These assumptions are aligned with SI and IC models while ruling out Linear Threshold [13] and SIR models. Complexity of Problem 1. We now show that, computing the probability Pr (yu = 1 O) that a node u ∈ V \O is in infected state is a #P-hard problem. First, notice that an infection can propagate only via the infected nodes in a graph. Hence, we can simply handle the observations on uninfected nodes by removing such nodes and their adjacent edges from the graph as these nodes can neither become infected nor transmit infection. Thus, for a given u, to compute Pr (yu = 1 O) in G = (V, E, p), we can simply assign V = V \ U and E = E\{(u, v)∪(v, u)}, for all u ∈ U. We provide our complexity analysis based on this. Lemma 1. Given a probabilistic graph G = (V, E, p), a partially observed infection cascade T ∗ with source s, and the corresponding subset X ⊆ V [T ∗] of partially observed infected nodes, computing Pr (yu = 1 O = X) for any u ∈ V \ X is #P-hard. Proof. We prove this by a reduction from the counting prob- lem of s-t connectedness in a directed graph [14]. Given a directed graph G = (V, E) and two nodes s, t ∈ V , s-t connectedness problem is to count the number of subgraphs of G in which there is a directed path from s to t. We reduce this problem to the problem of computing marginal infection probabilities as follows. Let O = ∅ and let T denote a random infection cascade with infection source s. For any random tree T , let 1[t ∈ V [T ]] denote the indicator random variable that equals 1 if t ∈ V [T ] for a given node t. It is easy to see that Pr (yt = 1 O = ∅) = (cid:88) T∼T [1[(t ∈ V [T ])]] E (cid:88) Pr (T ) 1[t ∈ V [T ]] Pr (g) path g(s, t), T(cid:118)T g(cid:118)G = = where g is a possible world sampled from graph G by keeping each edge (u, v) ∈ E with probability puv and path g(s, t) is an indicator variable that equals 1 if t is reachable via a path from s in g. Therefore, for computing Pr (yt = 1 O = ∅), we solve the s-t connectedness counting problem. It is shown in [14] that s-t connectedness is #P-complete, and thus computing Pr (yt = 1 O = ∅) is #P-hard. Given the #P-hardness of our problem, we resort to Monte- Carlo sampling for estimating Pr (yu = 1 O = X), for all u ∈ V \ X. To do so, we generate a sample of probable cascades that span X by sampling directed Steiner trees from the set of all directed Steiner trees on G with terminals X, with probability proportional to their likeliness to happen. Thus, the operational definition for the cascade-reconstruction problem we consider in this paper is the following. Problem 2 (Random Infection Tree). Given a weighted di- rected contact network G = (V, E, p), a root node r ∈ V , and a set X ⊆ V of terminal nodes, sample a directed Steiner tree TX, rooted at r, with terminal nodes X, and with probability proportional to P r(TX ) ∝ (cid:81) (u,v)∈TX puv. 2We simply define the chain from the transposed graph as we will be using anti-arborescence model of random-walk based tree samplers. IV. RANDOM STEINER-TREE SAMPLING Given a symmetric directed network G = (V, E, p), a set of terminal nodes X ⊆ V , and a root node r ∈ V , our aim is to sample a random tree TX from the graph G containing the terminal nodes X. Our sampling approach is based on a random walk defined on G. Since G = (V, E, p) is not necessarily stochastic we need to define the Markov chain G = (V, E, w), over the graph G, for which we perform the random walk. The random walk for the sampler is performed on the reverse direction of the edges of G. In other words the edge set of the Markov chain G is defined as E = ET , that is, the transpose of the edges of G.2 Let Nin (u) denote the set of in-neighbors of a node u in G, v∈Nin (u) pvu denote the weighted in-degree of u. We also denote by Nout (u) the set of out-neighbors of u in G. Furthermore, we denote by Nin (u) and Nout (u) the sets of in-neighbors and out-neighbors, respectively, in the Markov chain G. To ensure that the Markov chain G is stochastic we set w(u, v) = pvu/p(u) so that the weighted out-degree v∈ Nout (u) w(u, v) is equal to 1 for all the nodes u in G. Our tree sampling method performs a random walk on G according to edge weights w(u, v). Let v∈Nin (u) w(u, v) =(cid:80) (cid:89) w(u) =(cid:80) and let p(u) =(cid:80) w(TX ) = w(u, v) (u,v)∈TX denote the weight of a Steiner tree TX. Assume that we are able to sample a Steiner tree TX, from the Markov chain G, with probability proportional to the weight of the tree w(TX ). Notice that after normalization of the weights, we have puv = w(TX ) p(u). (1) (u,v)∈TX u∈V [TX ]\{r} Thus, to solve Problem 2, we need to be able to sample a Steiner tree TX from G with probability proportional to w(TX ): once this is achieved, we use sampling importance resampling [15] (SIR) to correct for the difference. SIR aims at sampling x from target distribution π(x) via two steps: 1) sam- pling from proposal distribution q(x) and 2) resampling the samples with probability proportional to π(x) q(x) . In our case, we resample each Steiner tree returned by the proposed algorithms with probability proportional to so as to achieve the target distribution, and thus solving Problem 2. We address next the problem of sampling a Steiner tree with probability proportional to its weight. Problem 3 (Random Steiner Tree). Given a Markov chain G = (V, E, w), a root node r ∈ V , and a set of terminal nodes X ⊆ V , sample a Steiner tree TX, rooted at r, with terminal nodes X, and with probability proportional to u∈V [TX ]\{r} p(u) (cid:16)(cid:81) (cid:17) (cid:89) (cid:89) (cid:89) w(TX ) = w(u, v). (u,v)∈TX Algorithm 1: TRIM : Markov chain G = (V, E, w), root r, set of terminals X Input Output: Random Steiner tree TX 1 T ← RandomTreeWithRoot(r) ; 2 TX ← TrimTree(T ) ; The difference between Problems 2 and 3, is that Problem 3 assumes that the input graph is a Markov chain, i.e., the probabilities out of each node sum up to 1. A general input probabilistic graph, can be turned to Markov chain using the weighting scheme transformation outlined above. Notice that since G is reciprocal (non-symmetric) directed, the graph G is strongly connected, hence, the chain is irre- ducible. However, it is not time-reversible due to the non- symmetricity of the transition probabilities. In the next sec- tions, we propose two sampling algorithms that can produce non-uniformly distributed Steiner trees from irreducible but not time-reversible Markov chains. A. TRIM algorithm Our first algorithm, TRIM, receives as input the edge weights of the Markov chain G, a root r ∈ V and a set of terminal nodes X ⊆ V . TRIM first samples a random spanning tree T with root r from the chain G and then trims T into a Steiner tree TX rooted at r, such that all the leafs of TX are terminal nodes. Before we proceed to present the details of the algorithm TRIM, we first discuss how to sample a random spanning tree for a given root r. This is a classic problem studied extensively in the literature [5, 9, 10]. Note that in our case the chain G is not time-reversible. Hence, we cannot use Broder's algo- rithm [10] as it can only operate on time-reversible Markov chains defined on unweighted undirected graphs. Similarly, the algorithm by Mosbah and Saheb [9] is devised for reversible chains defined on weighted but undirected graphs hence is also not suitable for our setting. Thus, to generate a random tree T from a weighted directed graph G, with probability distribution different than the uni- form, we use Wilson's RandomTreeWithRoot algorithm [5], which works on any irreducible chain that is not necessarily time-reversible. Now we give the details of the TRIM algorithm. The pseudocode is provided in Algorithm 1. The algorithm first samples a spanning tree T with root r. Then, the sampled spanning tree T is given as input to the TrimTree procedure, which removes all the subtrees that are below each terminal node x ∈ X, which then become leafs in the tree T . The trimmed tree TX is returned as the output of TRIM. It is clear that all terminal nodes X are contained in TX, and also that the set of leafs of TX is a subset of X. Before we start analyzing the distribution of the sampled Steiner trees TX returned by TRIM, we first introduce some concepts used in our analysis. We use S( G) to denote the set of all directed spanning trees of G rooted at r. Given TX, we use STX ( G) ⊆ S( G) to denote the set of spanning trees of G, with root r, in which TX is contained as a subgraph. For any weighted directed chain G = (V, E, w), with V = {v1,··· , vn}, we define its Laplacian matrix L( G) as follows:  (cid:80) −w(i, j) 0 vi∈ Nin (vj ) w(vi, vj) Lij( G) = if i = j if i (cid:54)= j and (vi, vj) ∈ E otherwise its weight wc(u, vc) = (cid:80) its weight wc(vc, u) = (cid:80) Given G and a Steiner tree TX, we denote the contracted graph of TX on G as Gc[TX ] = (Vc, Ec, wc, (cid:96)c). The contraction of TX on G merges all the nodes of TX into a supernode vc. Thus, the node set of Gc[TX ] is given by Vc = (V \ V [TX ])∪{vc}. The contraction may create parallel edges from a node u ∈ V \V [TX ] to vc if Nout (u)∩V [TX ] > 1, where Nout (u) denotes the out-neighbors of u in G. For each u ∈ V \ V [TX ] such that Nout (u) ∩ V [TX ] > 1, we merge the parallel edges into a single edge (u, vc), set v∈ Nout (u)∩V [TX ] w(u, v), and set its label (cid:96)c(u, vc) = Nout (u) ∩ V [TX ]. Similarly, for each u ∈ V \ V [TX ] such that Nin (u) ∩ V [TX ] > 1, we merge the parallel edges from vc to u into a single edge (vc, u), set v∈ Nin (u)∩V [TX ] w(v, u), and set its label (cid:96)c(vc, u) = Nin (u) ∩ V [TX ]. For the rest of the edges, we use their original weights from G and set their labels to 1, i.e., for each u, v ∈ V \ V [TX ], we set wc(u, v) = w(u, v) and (cid:96)c(u, v) = 1. Let S( Gc[TX ]) denote the spanning trees of Gc[TX ] with root vc. The following lemma depicts the relation between S( Gc[TX ]) and STX ( G). Lemma 2. Given a weighted directed graph G = (V, E, w), a Steiner tree TX of G, and the contracted graph Gc[TX ] of TX on G, define a structure-preserving mapping f : STX ( G) (cid:55)→ S( Gc[TX ]), where for a given tree T ∈ STX ( G), a tree f (T ) is obtained by contracting TX on T . The function f is surjective and any spanning tree Tc in S( Gc[TX ]) is the image (u,v)∈Tc (cid:96)c(u, v) spanning trees in STX ( G). Moreover of(cid:81) (cid:88) w(T ) w(TX ) = w(Tc). T∈f−1(Tc) Proof. To show that f is surjective, we need to show that: (i) each T ∈ STX ( G) maps to a unique spanning tree Tc ∈ S( Gc[TX ]) and (ii) each spanning tree Tc ∈ S( Gc[TX ]) is the image of at least one spanning tree in STX ( G). Regarding (i) it is clear that for each T ∈ STX ( G), f (T ) is a unique spanning tree with root vc in Gc[TX ]. The existence and uniqueness hold by construction. Regarding (ii) given a spanning tree Tc ∈ S( Gc[TX ]), we define an "expansion" process, which is the reverse process of contracting TX on G: we first replace the contracted node vc in Tc with TX. For each (u, vc) ∈ Gc[TX ] such that (cid:96)c(u, vc) = 1, we can directly replace the edge (u, vc) ∈ Gc[TX ] with the corresponding original edge (u, v) ∈ E, (cid:80) where {v} = Nout (u) ∩ V [TX ]. On the other hand, for each (u, vc) ∈ Gc[TX ] such that (cid:96)c(u, vc) > 1, we cannot simply insert the original edges in G that go from u to the nodes of TX since we would then have (cid:96)c(u, vc) paths from node u to root r hence the expansion process would not create a valid tree. Thus, for each (u, vc) in Tc with (cid:96)c(u, vc) > 1, the expansion process should perform (cid:96)c(u, vc) different assignments, where in each assignment, a different (u, v) : v ∈ Nout (u)∩V [TX ] is selected to replace (u, vc). Hence, for a given Tc, the number of feasible assignments that create valid spanning trees are given by(cid:81) (u,v)∈Tc (cid:96)c(u, v). Finally, given the structure-preserving surjection and the way we assign the weights in Gc[TX ], it follows that for any Tc ∈ S( Gc[TX ]), we have (cid:88) w(Tc) = T∈f−1(Tc) w(T ) w(TX ) . Theorem 1. Algorithm 1 (TRIM) returns a random Steiner tree TX rooted at r with probability proportional to w(TX ) · det(Lr( Gc[TX ])) where det(Lr( Gc[TX ])) is the determinant of the Laplacian matrix of Gc[TX ] with row and column r removed. Proof. First, notice that the algorithm RandomTreeWith- Root(r) of Wilson [5], returns a random spanning tree T with probability proportional to w(T ). Then, using Lemma 2 we have: Pr (TX ) = Pr (T ) T∈STX ( G) (cid:88) ∝ (cid:88) (cid:88) (cid:88) = w(TX ) · (cid:88) Tc∈S( Gc[TX ]) T∈STX ( G) w(T ) = T∈f−1(Tc) w(T ) w(Tc) Tc∈S( Gc[TX ]) = w(TX ) · det(Lr( Gc[TX ])) where the last line follows from Tutte's Matrix Tree Theorem for weighted directed graphs [16]. Theorem 1 implies that the TRIM algorithm returns a Steiner tree with probability proportional to its weight among all the Steiner trees that contain the same set of Steiner nodes: let TX and T (cid:48) X be two Steiner trees returned by the TRIM algorithm, such that V [TX ] = V [T (cid:48) X ]. Then, the contracted graph of TX on G and the contracted graph of T (cid:48) X on G will be identical, which means that the sum of the weights of the spanning trees of Gc[TX ] with root vc, i.e., the term Tc∈S( Gc[TX ]) w(Tc), will be the same for both TX and T (cid:48) X. On the other hand, our aim is to sample a Steiner tree with probability proportional to its weight among all the Steiner trees (that could contain different set of Steiner nodes). Thus, to remove the bias introduced by the term (cid:80) (cid:17) (cid:16)(cid:80) Tc∈S( Gc[TX ]) w(Tc), we employ importance resampling [15] and resample each tree returned by the TRIM algorithm with probability proportional to Special case: unweighted graphs. Consider the special case when G is unweighted, i.e., we perform a simple random walk on G = (V, E). Then, it follows from Tutte's Matrix Tree Theorem for directed graphs [16] that S( G) = det(Lr( G)) where the Laplacian of unweighted directed G is given by: Tc∈S( Gc[TX ]) w(Tc) . Lij( G) = if i = j if i (cid:54)= j and (vi, vj) ∈ E otherwise Then, the TRIM algorithm returns a Steiner tree TX rooted at r with probability equal to Pr (TX ) = Pr (T ) −1 0  Nin (vj) (cid:88) T∈STX ( G) STX ( G) (cid:80) S( G) Tc∈S( Gc[TX ]) = = (cid:81) (u,v)∈Tc (cid:96)c(u, v) det(Lr( G)) where the last line follows from Lemma 2. B. Loop-erased random walk algorithm In this section, we propose a more efficient algorithm, based on loop-erased random walk (LERW), which is a more direct adaptation of the RandomTreeWithRoot algorithm [5]. The LERW algorithm can directly sample a Steiner tree TX from the chain G with probability proportional to its weight w(TX ). The pseudocode for algorithm LERW is provided in Algo- rithm 2. LERW maintains a current tree TX, which initially consists of just the root r. As long as there are terminal nodes that are not in the tree, LERW performs a random walk in G starting from such v ∈ X \ V [TX ], erasing loops (i.e., cycles) as they are created, until the walk encounters a node that is in the current tree TX. This cycle-erased trajectory is then added to the current tree. The algorithm terminates once all the terminal nodes are added to the current tree TX. Theorem 2. The LERW algorithm returns a random Steiner tree TX rooted at r with probability proportional to w(TX ). To prove this result, we will use an adaptation of the cycle- popping algorithm, devised by Wilson [5], which was shown to be equivalent to loop-erased random walk when sampling a spanning tree. Given G and root r, following Wilson [5], we associate to each non-root node u an infinite stack Su = [Su,1, Su,2,··· ], whose elements are states of the chain G such that Pr (Su,i = v) = Pr (RandomSuccessor(u) = v) , for all u and i and such that all the items Su,i are jointly independent of one another. We refer to the left-most element : Markov chain G = (V, E, w), root r, terminals X Next[i] ← f alse; Algorithm 2: LERW Input Output: Random Steiner tree TX 1 for i ← 1 . . . n do 2 3 Next[r] ← nil; 4 InTree[r] ← true; 5 for i ∈ X do 6 7 8 9 u ← i; while not InTree[u] do 10 11 12 13 14 u ← i; while not InTree[u] do InTree[u] ← true ; u ← Next[u]; return Next; Next[u] ← RandomSuccessor(u); u ← Next[u]; (cid:46) erase the loop Algorithm 3: CYCLEPOPPING procedure : Markov chain G = (V, E, w), root r, terminals X Input Output: Random Steiner tree TX 1 while Gr has a cycle involing any item in X do 2 pop any such cycle off the stack; 3 TX ← the edges that are traversed on Gr starting from each terminal to the root; 4 return TX; Su as the element that is at the top of stack Su, and by popping the stack Su we mean removing the top element from Su. At any moment, the top elements of the stacks define a directed stack graph Gr such that Gr contains an edge (u, v) only if the top element of Su is v. If there is a directed cycle C in Gr, we pop Su for every u ∈ C, which creates another stack graph with cycle C removed. Wilson showed that when the cycle-popping process termi- nates, the stack graph Gr is a directed spanning tree rooted at r [5]. Our aim instead is to obtain a Steiner tree: this translates to an early termination of the cycle-popping procedure as soon as the cycles do not contain any terminal node, thus, defining a Steiner tree on top of the stacks. The pseudocode of the cycle- popping procedure for sampling a Steiner tree is provided in Algorithm 3. Lemma 3. CYCLEPOPPING terminates with probability 1 and the stack graph Gr upon termination is a Steiner tree. Proof. We first show that Gr is a Steiner tree. Suppose some terminal node u is connected to another connected subgraph G(cid:48) r induced by the top entries of the stacks. Since G(cid:48) r does not touch the current tree, root r does not belong in G(cid:48) r. Thus, it must have G(cid:48) r edges, which implies that it contains a cycle, which is a contradiction since cycle popping terminates when no u ∈ X is involved in a cycle. We now show that CYCLEPOPPING terminates with probability 1. Following Wilson [5], when the cycle-popping procedure is performed until no node in V is involved in a cycle, i.e., without early termination, it returns a spanning tree with probability 1. This directly implies that it must also return a Steiner tree in a finite number of steps since every Steiner tree of G is a subgraph of at least one spanning tree of G. Using similar arguments as by Propp and Wilson [11], we now show that the cycle-popping procedure with early termination is equivalent to loop-erased random walk that operates on an arbitrary ordering of the terminal nodes. First, notice that, instead of generating infinitely long stacks and looking for cycles to pop, LERW uses the principle of de- ferred decisions and generates stack elements when necessary. LERW starts with an arbitrary terminal node u ∈ X, does a walk on the stacks so that the next node is given by the top of the current node's stack. If LERW encounters a loop, then it has found a cycle in the stack graph induced by the stacks that LERW generates. Erasing the loop is equivalent to popping this cycle. When the current tree (initially just the root r) is encountered, the cycle erased trajectory starting from node u is added to the tree. This process is then repeated for the other terminals that are not yet added to the current tree. Given the equivalence between the methods LERW and CYCLEPOPPING, we now provide the proof of Theorem 2 by reasoning with the cycle-popping procedure. Proof. (of Theorem 2) It follows from Lemma 3 that when CYCLEPOPPING terminates, the stack graph Gr induced by the stack entries containing the root node r is a Steiner tree. Now, given a collection of cycles C, let C denote the event that C is the collection of cycles that CYCLEPOPPING pops before it terminates. Similarly, let TX denote the event that a fixed Steiner tree TX is produced by the algorithm. Finally, let C∧ TX denote the event that the algorithm popped the cycles C and terminated with TX. Following Propp and Wilson [11], the order of cycles being popped until termination and the tree returned upon termination are independent, hence, we have Pr (TX) = Pr (C ∧ TX) (cid:88) C = Pr (TX) ∝ w(TX ), (cid:88) C P (C) where the last line follows from the fact that Pr (TX) is the probability that the edges traversed on Gr starting from each terminal to the root is equal to TX, which is given by the stack entries containing root r upon termination. Comparison. Both TRIM and LERW rely on loop-erased random walk and run in time O(τ ), where τ is the mean hitting time [5] However, while TRIM, needs to visit all the nodes at least once, LERW is equipped with an early termination procedure, hence can terminate without having to visit all the TABLE I DATASETS V 410 1 133 1 266 4158 279 631 E 2 765 5 451 6 451 13 428 1 548 131 Assortativity 0.0121 -0.0007 -0.0039 0.1641 0.0015 Name infectious email-univ student grqc Digg nodes, making it more efficient than TRIM in practice. Thus, we use LERW in our experiments. V. EXPERIMENTAL EVALUATION In this section, we conduct an extensive empirical evaluation of the proposed approach and several baselines. A. Experimental setup Datasets. We experiment on real-world graphs with both synthetic and real-world cascades. We use public benchmark graph datasets, in particular, infectious,3 email-univ,4 student,5 grqc,6 and Digg.7 The characteristics of these graphs are shown in Table I. In addition, we perform a case study on a lattice graph. For all the datasets, except Digg, we generate synthetic cascades using the following diffusion models: (i) SI model with the infection probability β set to 0.1; (ii) IC model, where the infection probability on each edge is independently drawn from the uniform distribution [0, 1]. For each graph that is originally undirected, we create directed copies of each undirected edge. For the Digg dataset, we experiment on real-world avail- able cascades, which correspond to stories that propagate in the network. In most of the cases, the activated nodes do not form a connected component, hence, we extract the largest connected component as the cascade. We experiment using the top-10 largest cascades, with an average cascade size of 1868. Reconstruction methods. We test and compare the following reconstruction methods.8 • Tree-sampling: our sampling-based method that returns, for each hidden node, the marginal probability of being in infected state. We use LERW for the sampling of Steiner- trees and set the size of the Steiner-tree sample to 1000.9 For the case when the real infection source is unknown, we use different root selection strategies to be used as a proxy to the real infection source. Obviously, the accuracy of our sampling approach is affected by the choice of root node. 3http://konect.uni-koblenz.de/networks/sociopatterns-infectious 4http://networkrepository.com/ia-email-univ.php 5http://networkrepository.com/ia-fb-messages.php 6http://snap.stanford.edu/data/ca-GrQc.html 7https://www.isi.edu/lerman/downloads/digg2009.html 8Our implementation is available at github/xiaohan2012 9We observed that increasing the sample size beyond 1000 gives little marginal gain in accuracy. We discuss the different root selection strategies employed in the next sub-section. • NetFill: a method designed specifically for the SI model by Sundareisan et al. [3], which assumes a single propagation probability β common to all edges. This method addition- ally assumes that the fraction of observed infections are known. For completeness, we also test NetFill using IC cascades where we set β = 0.5, corresponding to the mean of the infection probabilities drawn from the uniform [0, 1] distribution. • PageRank: a baseline that ranks the nodes based on their Personalized PageRank scores [17], with the personaliza- tion vector initialized to 1/O for the observed nodes and 0 for the unobserved nodes. • Min-Steiner-tree: a baseline that constructs the minimum- weight Steiner tree where the weight of each edge (u, v) is defined as − log puv. Note that, this baseline is inspired by the approach in [6] for constructing a Steiner tree with the minimum negative log-likelihood. Notice that, this baseline can also be considered as the time-agnostic version of the minimum Steiner tree based reconstruction approach proposed in [4]. Root selection. we experiment with the following root- selection methods: • Min-dist selects the "centroid" node with minimum weighted shortest path distance to the terminals, where the weight on each edge (u, v) is defined as − log puv. • PageRank chooses the node with the highest Personalized PageRank score as the root, where the personalization vector is initialized to 1/O for observed nodes and to 0 for unobserved nodes. • True-root is an oracle that simply returns the true infection source s. We consider this case to eliminate the effect of root selection on the final performance We observe that, while PageRank is more scalable than Min- dist, Min-dist gives slightly better performance in practice. Evaluation measure. We evaluate the performance of the algorithms not only for recovering the nodes, but also recov- ering the edges: ideally a good method should discover many hidden infected nodes, along with the edges that the infection propagated. We use average precision (AP) to evaluate the quality of different reconstruction methods. The AP measure sum- marizes a precision-recall curve as the weighted mean of precision achieved at each threshold, with the increase in recall from the previous threshold used as the weight. In particular, (cid:88) AP = (Rn − Rn−1)Pn, n where Pn and Rn is the precision and recall at the n-th threshold, respectively. The AP measure is widely used for evaluating the accuracy of information retrieval (IR) tasks, where giving higher ranking to a small set of relevant docu- ments against non-relevant ones is the primary goal. Notice that our task is very similar to an IR task, since in real- world scenarios, cascades tend to be small with respect to graph size, thus, a good reconstruction method should give high ranking to the actual hidden infected nodes (and the edges). By convention, we exclude all observed nodes from evaluation. For each experiment setting, we report the results of experiments averaged over 100 runs. B. Case study on a lattice graph We perform a case study on simulated SI cascades on a 32×32 lattice graph, where 20% of the nodes are infected, among which 50% are observed. Figure 2 illustrates the be- havior of different reconstruction algorithms by a color-coding of the predictions they produce. In contrast to Tree-sampling that provides, for each hidden node, the probability to be infected, NetFill and Min-Steiner-tree can only produce binary predictions, which is reflected by their binary colored output. Notice that Tree-sampling correctly assigns high probability to the actual hidden infections, which is shown by the assignment of dark red color to the actual infection region. We also observe that NetFill finds considerable amount of true positives and false . Finally, Min-Steiner-tree, by design, produces than the negatives small trees, thus, producing more false negatives other two methods. , but also returns quite a few false positives C. Node-level performance on synthetic cascades Next, we evaluate node-level AP scores in different settings. We experiment with various values of the following three parameters: • cascade generation model: either IC or SI; • observation fraction: the fraction of the number of ob- served infections by the number of true infected nodes; • cascade fraction: the fraction of the number of true in- fected nodes by the total number of nodes in the graph. though PageRank is a simple heuristic, Effect of observation fraction. We fix cascade fraction to 0.1 and vary the observation fraction from 0.1 to 0.9 at step size 0.1. Figure 3 shows node-level AP scores under different graphs and cascade models. We see that Tree-sampling (with both Min-dist and True-root) and PageRank outperform Net- Fill10 and Min-Steiner-tree by a large margin. This result is consistent on all graphs we experiment and cascade models. Notice that, is among the top-performing methods, even outperforming Tree- sampling with True-root on grqc by as much as 0.1. We also see that, the effect of root selection plays an important role for most graphs. For example, on all graphs except grqc, with True-root, Tree-sampling is the best, while with Min-dist, Tree- sampling falls behind PageRank. Finally, as the observation fraction increases, all methods' performance tends to drop. This is expected as more infections are observed, there are fewer hidden infections, which makes the task harder. it Effect of cascade fraction. We fix observation fraction to 0.5 and vary the cascade fraction from 0.1 to 0.5 at step size 0.1. Figure 4 shows node AP scores under different graphs and cascade models. Again, NetFill and Min-Steiner- tree are out-performed by other methods. For Tree-sampling and PageRank, AP scores are very close except on grqc, where PageRank outperforms the others. Also, as cascade fraction increases, all methods tend to give better AP scores. Discussion on grqc graph. On the grqc graph, PageRank performs better than Tree-sampling with True-root while this is not the case in other graphs. We now provide some remarks to explain this difference in performance for the grqc graph. First of all, we observe that grqc has a very high assortativity coefficient [18] (AC) compared to the other graphs (as shown in Table I). In graphs with large assortativity coefficient, high degree nodes tend to connect to each other, which implies that, the infected nodes in simulated cascades tend to form densely connected subgraphs. Notice that the random walker of PageRank tends to give higher scores to the cascade subgraph if it's densely connected, which gives prediction advantage to PageRank. In contrast, if the graph has low AC, the cascade subgraph tends to be sparsely connected, making PageRank less effective. D. Edge-level performance on synthetic cascades Next, we evaluate edge-level AP scores under the same setting as the node-level evaluation. Similarly, we consider two variants of Tree-sampling with True-root or Min-dist, while here we focus on the IC model -- SI model yields similar results. Note that in this case, NetFill and PageRank are not applicable by design because neither produces prediction on the edges. Shown in Figure 5, Tree-sampling, regardless of root selec- tion strategy, outperforms Min-Steiner-tree. Also, we observe that the performance increases both with the observation fraction and the cascade fraction. Meanwhile, the effect of root selection does not play an important role as we observe that the performance with Tree-sampling with Min-dist or True- root are very close. E. Real cascades Figure 6 shows the experiment results on Digg dataset.11 We vary the observation fraction from 0.1 to 0.8 to recover only the hidden nodes since the dataset does not provide the edge-level propagation information. We observe that in Digg dataset, the AP scores of all the methods are much lower than what is obtained for synthetic cascades. We also make the following observation: first, the AP scores of all methods are much lower than synthetic cascades in above sections. The reason can be two-fold: (1) the underlying infection propaga- tion probabilities on the edges are unknown; (2) the size of the cascade is very small (on average only 0.7% of the whole graph is infected), making the prediction task much harder. 10We are not able to run NetFill with observation fraction < 0.5 using the implementation provided by the original authors. 11NetFill was not able to terminate within reasonable amount of time when using the implementation provided by the authors. cascade with observation Tree-sampling NetFill Min-Steiner-tree Fig. 2. Case study on lattice graph. Underlying cascade and observation is shown in left most figure. Output by different methods are shown in the remaining figures. Note that Tree-sampling outputs node infection probability while NetFill and Min-Steiner-tree make binary decision (infected or not). infectious email-univ student grqc Fig. 3. Node-level AP score with respect to the fraction of observation: top row (IC model), bottom row (SI model) We also observe that, Tree-sampling (both with PageRank and True-root) perform the best in such difficult setting, followed by PageRank, and Min-Steiner-tree which performs the worst. Notice that Digg has assortativity coefficient close to zero and the fact Tree-sampling outperforms PageRank supports our remarks provided in Section V-C. VI. CONCLUSION We study the problem of cascade-reconstruction in the probabilistic setting. To estimate node infection probability, we reduce our problem to sampling Steiner trees. We propose two novel algorithms with provable guarantees on the distribution of the sampled Steiner trees. The proposed reconstruction algorithm makes fewer assumptions (e.g., cascade model and observation fraction) compared to previous work. This makes our approach more robust in practice. Experimental results show that the proposed approach outperforms the other base- lines on most cases. algorithms that sample directly from (cid:81) Our work opens interesting directions for future research. First, it is important to re-visit Problem 2 and design sampling (u,v)∈T puv. Second, is interesting to consider the problem of reconstructing it cascades in the presence of temporal information, where we need to sample Steiner trees with node-order constraints. ACKNOWLEDGMENTS This work has been supported by three Academy of Finland projects (286211, 313927, and 317085), and the EC H2020 RIA project "SoBigData" (654024)". Part of the work was done while the second author was at ISI Foundation. REFERENCES [1] P. Rozenshtein, A. Gionis, B. A. Prakash, and J. Vreeken, "Reconstructing an epidemic over time," in KDD. ACM, 2016, pp. 1835 -- 1844. [2] A. Braunstein and A. Ingrosso, "Network recon- struction from infection cascades," arXiv preprint arXiv:1609.00432, 2016. [3] S. Sundareisan, J. Vreeken, and B. A. Prakash, "Hid- den hazards: Finding missing nodes in large graph epi- demics," in SDM. SIAM, 2015, pp. 415 -- 423. P(uninfected)P(infected)0.00.51.0obs. fraction0.00.20.40.60.8AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.20.40.6AP0.00.51.0obs. fraction0.00.20.40.6AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.10.20.30.4AP0.00.51.0obs. fraction0.00.20.40.60.8APmin steiner treenetfillpageranktree sampling (true root)tree sampling (min dist) infectious email-univ student grqc Fig. 4. Node-level AP score with respect to cascade size: top row (IC model), bottom row (SI model) infectious email-univ student grqc Fig. 5. Edge-level AP score on IC model with respect to the observation fraction (top row) and cascade fraction (bottom row) 296 -- 303. [6] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in KDD. ACM, 2010, pp. 1059 -- 1068. [7] D. Shah and T. Zaman, "Rumors in a network: Who's the culprit?" IEEE, vol. 57, no. 8, pp. 5163 -- 5181, 2011. [8] M. Farajtabar, M. G. Rodriguez, M. Zamani, N. Du, H. Zha, and L. Song, "Back to the past: Source iden- tification in diffusion networks from partially observed cascades," in AISTATS, 2015, pp. 232 -- 240. [9] M. Mosbah and N. Saheb, "Non-uniform random span- ning trees on weighted graphs," vol. 218, no. 2. Elsevier, 1999, pp. 263 -- 271. [10] A. Broder, "Generating random spanning trees," in FOCS. IEEE, 1989, pp. 442 -- 447. [11] J. G. Propp and D. B. Wilson, "How to get a perfectly random sample from a generic markov chain and gener- ate a random spanning tree of a directed graph," Journal of Algorithms, vol. 27, no. 2, pp. 170 -- 217, 1998. Fig. 6. Node-level AP score with respect to observation fraction on real cascades from Digg [4] H. Xiao, P. Rozenshtein, N. Tatti, and A. Gionis, "Recon- structing a cascade from temporal observations," SDM, 2018. [5] D. B. Wilson, "Generating random spanning trees more quickly than the cover time," in STOC. ACM, 1996, pp. 0.10.20.30.40.5cascade fraction0.00.51.0AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.51.0AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8AP0.10.20.30.40.5cascade fraction0.00.20.40.60.8APmin steiner treenetfillpageranktree sampling (true root)tree sampling (min dist)0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.10.20.3AP0.00.51.0obs. fraction0.00.20.40.6AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.10.20.3AP0.10.20.30.40.5cascade fraction0.00.20.4APtree sampling (min dist)tree sampling (true root)min steiner tree0.00.20.40.60.8obs. fraction0.000.020.040.060.08APmin steiner treepageranktree sampling (pagerank)tree sampling (true root) [12] M. Hauptmann and M. Karpinski, "A compendium on steiner tree problems," 2015. [13] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of influence through a social network," in KDD. ACM, 2003, pp. 137 -- 146. [14] L. G. Valiant, "The complexity of enumeration and SIAM, 1979, pp. reliability problems," vol. 8, no. 3. 410 -- 421. [15] A. F. Smith and A. E. Gelfand, "Bayesian statistics without tears: a sampling -- resampling perspective," The American Statistician, vol. 46, no. 2, pp. 84 -- 88, 1992. [16] W. T. Tutte, "Graph theory, volume 21 of encyclopedia of mathematics and its applications," 1984. [17] B. Bahmani, A. Chowdhury, and A. Goel, "Fast incre- mental and personalized pagerank," VLDB, vol. 4, no. 3, pp. 173 -- 184, 2010. [18] M. E. Newman, "Assortative mixing in networks," Phys- ical review letters, vol. 89, no. 20, p. 208701, 2002.
1301.6870
1
1301
2013-01-29T09:29:54
Studying User Footprints in Different Online Social Networks
[ "cs.SI" ]
With the growing popularity and usage of online social media services, people now have accounts (some times several) on multiple and diverse services like Facebook, LinkedIn, Twitter and YouTube. Publicly available information can be used to create a digital footprint of any user using these social media services. Generating such digital footprints can be very useful for personalization, profile management, detecting malicious behavior of users. A very important application of analyzing users' online digital footprints is to protect users from potential privacy and security risks arising from the huge publicly available user information. We extracted information about user identities on different social networks through Social Graph API, FriendFeed, and Profilactic; we collated our own dataset to create the digital footprints of the users. We used username, display name, description, location, profile image, and number of connections to generate the digital footprints of the user. We applied context specific techniques (e.g. Jaro Winkler similarity, Wordnet based ontologies) to measure the similarity of the user profiles on different social networks. We specifically focused on Twitter and LinkedIn. In this paper, we present the analysis and results from applying automated classifiers for disambiguating profiles belonging to the same user from different social networks. UserID and Name were found to be the most discriminative features for disambiguating user profiles. Using the most promising set of features and similarity metrics, we achieved accuracy, precision and recall of 98%, 99%, and 96%, respectively.
cs.SI
cs
Studying User Footprints in Different Online Social Networks Anshu Malhotra† Luam Totti(cid:63) Wagner Meira Jr.(cid:63) Ponnurangam Kumaraguru† Virg´ılio Almeida(cid:63) † Indraprastha Institute of Information Technology New Delhi, India {anshu1001,pk}@iiitd.ac.in (cid:63)Departamento de Ci encia da Computac¸ ao Universidade Federal de Minas Gerais Belo Horizonte, Brazil {luamct,meira,virgilio}@dcc.ufmg.br 3 1 0 2 n a J 9 2 ] I S . s c [ 1 v 0 7 8 6 . 1 0 3 1 : v i X r a Abstract—With the growing popularity and usage of online social media services, people now have accounts (some times several) on multiple and diverse services like Facebook, LinkedIn, Twitter and YouTube. Publicly available information can be used to create a digital footprint of any user using these social media services. Generating such digital footprints can be very useful for personalization, profile management, detecting malicious behavior of users. A very important application of analyzing users’ online digital footprints is to protect users from potential privacy and security risks arising from the huge publicly available user information. We extracted information about user identities on different social networks through Social Graph API, FriendFeed, and Profilactic; we collated our own dataset to create the digital footprints of the users. We used username, display name, description, location, profile image, and number of connections to generate the digital footprints of the user. We applied context specific techniques (e.g. Jaro Winkler similarity, Wordnet based ontologies) to measure the similarity of the user profiles on different social networks. We specifically focused on Twitter and LinkedIn. In this paper, we present the analysis and results from applying automated classifiers for disambiguating profiles belonging to the same user from different social networks. UserID and Name were found to be the most discriminative features for disambiguating user profiles. Using the most promising set of features and similarity metrics, we achieved accuracy, precision and recall of 98%, 99%, and 96%, respectively. I . IN TRODUC T ION In this digital age, when we all are living two lives, offline and online, our paper trails and digital trails coexist. Our digital trail captures our interactions and behaviors in the digital environment. In this virtual age, an important com- ponent of our footprints are our online digital footprints [1]. Due to the tremendous growth in online social media, the size of a users’ online digital footprints is also growing. We interact with friends, post updates about our day to day lives, bookmark links, write online blogs and micro blogs, share pictures, watch and upload videos, read news articles, make professional connections, listen to music, tag online resources, share location updates and what not. Our online digital footprints capture our online identity and whatever we do on the web becomes part of our online identity forever. Due to strong relationship between users’ offline and online identity [2], [3], users’ online digital footprints can help in uniquely identifying them. By uniquely identifying users across social networks we can discover and link her mul- tiple online profiles. Linking together users’ multiple online identities has many benefits e.g. profile management [4] like managing setting 1 and building a global social networking profile, 2 help user monitor and control her personal informa- tion leakage [3], user profile portability [5], personalization [4], [6]–[8]. In addition, linking users’ multiple online profiles facilitates analysis across different social networks [6] which helps in detecting and protecting users from various privacy and security threats arising due to vast amount of publicly available user information. Unification of users’ multiple online identities can lead to various privacy and security threats like: identity thefts and profile cloning [3], [9] which can lead to compromised accounts [1]; directed spam and phishing [10]; online profiling by advertisers and attackers [11]; online stalking [1]. An inter- esting attack was demonstrated by PleaseRobMe.com 3 where they used Tweets containing Check-Ins from FourSquare to discover if the user was away from her home. We believe, formulating users’ digital footprints and linking her multiple online identities can help to keep the user informed about such threats and suggest her preventive measures. The users of the social networks can choose the usernames they wish to, which may be totally unrelated to their real iden- tity [12], and also users may choose different (and unrelated) usernames on different services. People with common names tend to have similar usernames [2], [11]. Users may enter inconsistent and misleading information across their profiles [12], unintentionally or often deliberately in order to disguise. Each social network has different purpose and functional- ity. Heterogeneity in the network structure and profile fields between the services becomes a complicating factor in the task of linking online accounts. All these factors make user profile linking across social networks a challenging task in comparison to Named Entity Recognition [13]. In this work, we propose a scalable and automated technique for disambiguating user profiles by extracting his online digital footprints from publicly available profile information. The major contributions of our work are: • We propose the use of automated classifiers to classify the input profiles as belonging to the same user or not. • Our approach works on publicly available data and does not require user authentication or standardization by different social networks. Sophisticated similarity metrics 1 http://blisscontrol.com/ 3 http://pleaserobme.com/ 2 http://www.digfoot.com/ were used to compare different categories of profile fields. • We conduct a large scale analysis of our approach for linking user accounts across Twitter and LinkedIn, the second and the third most popular social networking sites. 4 We also evaluate our systems’ performance in real world. In the next section, we discuss the closely related work. Sec- tion III describes our system for user profile disambiguation. In section IV, we provide details on the dataset construction. Sec- tion V discuss the user profile features and the corresponding similarity metrics used to compare them. Results and analysis from our experimental evaluation is presented in Section VI. Section VII discusses the conclusions and main findings of our work. I I . R ELAT ED WORK Different techniques have been proposed for user disam- biguation across social networks. In this section, we discuss the techniques, their limitations and compare them with our approach. Various graph based techniques have been suggested for unifying accounts belonging to the same user across social networks [3], [6], [7], [14]. Golbeck et al. generated Friend Of A Friend (FOAF) ontology based graphs from FOAF files / data obtained from different social networks [6] and linked multiple user accounts based on the identifiers like Email ID, Instant Messenger ID. The majority of the analysis was done for blogging websites. Rowe et al. applied graph based similarity metrics to compare user graphs generated from the FOAF files corresponding to the user accounts on different social networks; if the graphs qualified a threshold similarity score, they were considered to be belonging to the same user [7]. They applied this approach to identify web references / resources belonging to users [3], [14]. Such FOAF graph based techniques might not be scalable and FOAF based data might not be available publicly for all social networks and all users. Researchers have also used tags created by users (on different social networking sites such as Flickr, Delicious, StumbleUpon) to connect accounts using semantic analysis of the tags [5], [8], [12]. While using tags, accuracy has been around 60 – 80 %. Zafarani et al. mathematically modeled the user identification problem and used web searches based on usernames for correlating accounts [2] with an accuracy of 66%. Another probabilistic model was proposed by Perito et al. [11]. User profile attributes were used to identify accounts belonging to the same user [1], [2], [4], [15]–[18]. Carmagnola et al. proposed a user account identification algorithm which computes a weighted score by comparing different user profile attributes, and if the score is above a threshold, they are deemed to be matched. Vosecky et al. proposed a similar threshold based approach for comparing profile attributes [17]. They used exact, partial and fuzzy string matching to compare attributes of user profiles from Facebook and StudiVZ and achieved 83% accuracy. Kontaxis et al. used profile fields to detect user profile cloning [18]. They used string matching to discover exactly matching profile attributes extracted by HTML parsing. Irani et al. did some preliminary work to 4 http://www.ebizmba.com/articles/social- networking-websites match publicly available profile attributes to assess users’ online social footprints [1]. However, their work was limited to categorical and single value text fields and did not include free text profile fields, location and image. Even they suggested as their future work, the use of sophisticated matching techniques and a flexible similarity score for matching profile fields instead of a binary match or a non match decision. Some of the major limitations of the techniques discussed above are – specificity to certain type of social networks, e.g., blogging website, networks which support tagging; de- pendency on identifiers like email IDs, Instant Messenger IDs which might not be publicly available for most of the net- works; computationally expensive; use of simple text matching algorithms for comparing different types of profile fields. Also, assignment of weights and thresholds is very subjective and it might not be scalable with the growing size and number of social networks. Most importantly, all the above techniques have been tested on a small dataset (the biggest being 5,000 users), wherein the data collection and evaluation was done manually in some approaches. Lastly, with growing privacy awareness, most of the fields (like gender, marital status, date of birth) which have been used in most of the techniques above, might not be publicly available at present or in future. Real world evaluation has not been done for most of the above techniques. In our work, we address these concerns and hence improve the process of user disambiguation across networks. I I I . U S ER PRO FILE D I SAMB IGUAT ION User’s digital footprints within a service is the set of all (personal) information related to her, which was either provided by the user directly or extracted by observing the user’s interaction with the service. In this paper, we investigate how to match a users’ digital footprints across different online services, aggregate online accounts belonging to the user across different services, and hence assemble a unified and hopefully richer online digital footprints of the users. For the purpose of automating this task, we employed simple supervised techniques. Using a dataset of paired accounts known to belong to a same user, we compared correspond- ing features from each social network using feature-specific similarity techniques. Each pair of accounts belonging to a same entity generated a similarity vector in the form < usernamescore , namescore , descriptionscore , locationscore , imagescore , connectionsscore >, where fscore is the similarity score between the field f (e.g. location) of the user profile in both services. This vector was used as a train- ing instance for supervised classifiers. Similar vectors were generated for profile pairs known to belong to different users. We test the use of these vectors with four classifiers: Naıve Bayes, kNN, Decision Tree and SVM. Our system architecture is depicted in the Figure 1. Account Correlation Extractor collates the user profiles known to be belonging to the same user across different social networks. Profile Crawler crawls the public profile information from Twitter and LinkedIn APIs for paired user accounts for these services. A user’s Online Digital Footprints are generated after Feature Extraction and Selection. Various classifiers are trained for account pairs belonging to same users and pairs belonging to different users, which are then used to disambiguate user profiles i.e. classify After this first stage of data collection, we had true positive connections of the profiles belonging to the same user across different social networks. This data for each user U was a 1 , us2 N-tuple record of the form (us1 n ), where si is 2 , . . . , usn the online service in which user U has an account using the identifier ui . We wanted to measure the effectiveness of different features of a user profile in forming unique and distin- guishable digital footprints of a user. For this, we formulated a model to disambiguate a user on a social network given his digital from some other social network. To accomplish these tasks, we required the profile features of the user profiles from different social networks. This comprised the second phase of our data collection. Using the unique user handle, we crawled and collected the publicly available profile fields of the users.8 B. Data Summary To start with, our data consisted of 41,336 user profiles from each of the following services: Twitter, YouTube and Flickr. Each account triple were know to belong to the same user. Additionally, 29,129 pair of accounts were collected from Twitter and LinkedIn. We observed that profile information from YouTube and Flickr had large proportion of missing fields (Figure 2). We used 29,129 accounts from Twitter and LinkedIn for all further analysis in this work. Fig. 1: System Architecture. Account Correlation Extractor and Profile Crawler helped in dataset collection. Features were extracted and the Classification Engine was trained using selected features. User Profile Disambiguator was used for system evaluation. the given input profile pairs to be belonging to the same user or not. IV. DATA S ET In this section, we discuss the dataset we collated for developing automated mechanisms for disambiguating digital footprints of a user. A. Collection The data collection consisted of two phases. The first stage involved collecting the true positive connections, i.e. the profiles from different services known to belong to the same user. We used the following sources in this phase: Social Graph API: 5 This Google API provides access to declared connections between public URLs. A URL can be a website or a user’s profile page. When connections for a given user profile URL are requested, Social Graph returns other profile URLs that are alternative identities of the requested user, allowing us to retrieve accounts of a same user across multiple services. We collected information of around 14 million users, although only 28% of those users had useful declared connections. Social Aggregators: Social network aggregators are ser- vices that pull together the feeds from multiple social networks that the user manually configured. We crawled 883,668 users from FriendFeed 6 and 38,755 users from Profilactic. 7 5 http://code.google.com/apis/socialgraph/docs/ 7 http://www.profilactic.com/ 6 http://friendfeed.com/ Fig. 2: Percentage of missing features in each service. V. ON L IN E D IG I TAL FOOT PR IN T S A user profile on any social networking website can be seen as an N dimensional vector, where each dimension is a profile field, e.g., username, first name, last name, location, descrip- tion / about me, relationship and others [17]. A subset of these features (e.g. username, location) from one social network can be used to disambiguate the same user from millions of other users on another social network. We chose to study the Twitter- LinkedIn connections since they had some comparable profile features like location, ‘about me’ / description and others. In this section we discuss the features and techniques we used for matching the users’ digital footprints across social networks. A. UserID This refers to the unique username / user ID / handle which identifies a user on the social network and in many cases is used by the person to log in to the service. A person may have different usernames across social networks and hence 8 All profiles declared as non-English were ignored (around 13%). 0 10 20 30 40 50 60 70 80NameLocationDescriptionImageMissing (%)TwitterLinkedInYouTubeFlickr cannot be identified with only her username. We employed a sophisticated string matching method, Jaro-Winkler 9 distance (jw) that is designed for comparing short strings and gives a score in the range [0, 1]. Higher the score, higher the similarity of the two strings. B. Display name This refers to the first name and / or the last name which the user has entered in his profile. Instead of exactly matching display names, we again employed the Jaro-Winkler distance for computing the similarity between display names. How- ever, users with the same display name might have similar usernames and hence we need to look at other features which can help identify a user. C. Description This is the short write up / ‘bio’ / ‘about me’ which the user provides about himself. We employed the following three methods to compare description fields from two profiles which were to be matched – tf-idf vector space model: The description fields were first pre-processed by removing the punctuations, stop words to extract the tokens which were lemmatized and converted to lower case. The cosine similarity was then computed between the two token sets, considering each to be a document, therefore resulting in a score in the range [0,1] between the two fields. Jaccard’s Similarity: Applying the same pre-processing described in the previous method, the Jaccard’s similarity10 between the two token sets was taken as the similarity score. WorldNet based Ontologies: Wordnet11 is a common English language lexical database which provides ontologies i.e. groupings of synsets based on hypernym-hyponym (is-a-relation) tree. This ontology organized using hypernym tree can be used to explain the similarity or dissimilarity between synsets. We use the Wu- Palmer similarity metric [19] between tokens of the description fields from the two user profiles to be matched [20]. D. Location The next profile field we chose for comparison was location (loc). For comparing the location field, we extracted the tokens from the location field of both the profiles to be matched by removing the punctuations and converting to lower case. For these tokens, we computed the following metrics – Sub Strings Score (substr): normalized score of number of tokens from one location field present as a sub-string in the other; Jaccard’s Score: Jaccard’s similarity of tokens from two location fields; Jaro-Winkler Score; Geographic Distance (geo): Euclidean Distance between the two locations was found using their latitude and longitudes. Latitude and longitude were found by querying Google Maps GeoCoding API. 12 E. Profile Image A profile image is a thumbnail provided by the user for the purpose of visually representing him. The collected user profiles provide the URL in which the image is made available. The images were downloaded and stored locally. Each image 9 http://en.wikipedia.org/wiki/Jaro-Winkler distance 10 http://infolab.stanford.edu/∼ullman/mmds/ch3.pdf 11 http://wordnet.princeton.edu/ 12 https://developers.google.com/maps was then scaled down to 48 x 48 pixels using cubic spline interpolation and then converted to gray scale by taking the scalar product of the RGB components vector (r, g , b) with the coefficient vector (0.299, 0.587, 0.114). Each image could then be seen as a vector of values from 0 to 255 to which simple functions were applied to quantify their similarity. This feature may be abbreviated as ‘img’ throughout the paper. We used Mean Square Error, Peak Signal-to-Noise Ratio, and Levenshtein (ls) for analyzing the profile image. F. Number of Connections The last feature was derived from the intuition that a user has a similar number of friends (which we generalize as con- nections) across different services. For Twitter, we considered the number of connections of a user u to be the number of users that u follows. For LinkedIn, a user v is a connection of u if v belongs to the private network of user u. The number of connections in different services can assume different ranges, with different meanings. For example, a certain number of connections on LinkedIn can mean that a user is very active and popular, while the same number on Twitter can be much less significant. Taking this into consideration, two different techniques were employed to compare those two values – Normalized (norm): Each connection value c was normalized to the range [0..1] using the smallest and greatest connection values observed in each service. The similarity was then taken as the unsigned difference between the two values. Class: norm is very vulnerable to outliers, e.g. a single big value would compress all the other values into a very small range, possibly suppressing relevant information. To overcome this, each value was assigned a class denoting how big it was. This was done by organizing all connection values into a sorted vector and then dividing it into k equally sized clusters, where k was the chosen number of classes. Once each value was assigned a class index between 1 and k , the similarity was taken as the unsigned different between those two indexes. We adopted k = 5 in this work. V I . EVA LUAT ION EX PER IM EN T S In this section, we describe and evaluate the experiments performed using the dataset and metrics proposed in Sec- tion V. The analysis was done using a dataset of account pairs for 29,129 unique users. A. Feature Analysis With the purpose of effectively measuring the similarity between two fields, different approaches were proposed in this work to assess the usefulness of each feature and similarity metric in the classification process. Table I shows the features’ discriminative capacity according to four different scores: Information Gain (IG), Relief [21], Minimum Description Length (MDL) [22] and Gini coefficient [23]. For the metrics that can only be applied to categorical attributes an entropy based discretization approach was used [24]. Throughout this section, we represent each component of a similarity vector as the feature name subscripted with the similarity metric used, e.g. <useridjw , descjaccard , locgeo >. For each feature the similarity metric with the highest score is highlighted. Additionally, box plots are shown in Figure 3 for some of IG Relief MDL Gini U SER ID NAM E CONN ECT ION S D E SCR I P T ION LOCAT ION IMAG E Class MSE Geo TF-IDF JW JW Norm Ontology Jaccard JW Substr Jaccard PSNR 0.009 0.520 0.323 0.548 0.812 0.000 0.183 0.161 0.286 0.232 0.337 0.350 0.184 0.095 0.227 0.180 0.434 0.521 0.157 0.002 0.113 0.134 0.108 0.039 0.041 0.158 0.006 0.488 0.300 0.379 0.562 0.205 -0.006 0.188 0.274 0.158 0.270 0.233 0.205 0.003 0.146 0.092 0.151 0.217 0.000 0.051 0.051 0.084 0.067 0.098 0.102 0.051 TABLE I: Discriminative capacity of each pair < f eature, metric > according to four different approaches. LS 0.215 0.188 0.227 0.061 the feature to enlighten how their value distributions affect their discriminative capacity. For each feature different boxes are plotted for the values of each class, “Match” and “Non Match.” Outliers were omitted for better clarity. In Table I, we can see a consistency across all four scores in all feature groups. UserID and Name are the most discriminative features, which are clearly supported by the values distributions on Figure 3. Both features show very polarized distributions, with no overlap between the ranges of the different classes. For the Description values, tf-idf has shown to be slightly better than Jaccard, while Ontology presented poor results. The Geo-Location metric has shown to be considerably superior than the other metrics for the Location field. For fast and low cost solutions though, Jaccard and Sub-String can be considered viable alternatives. Both implemented metrics for the Connections showed low values for all scores, which is also supported by the box plots. Manual verification confirmed that the intuition that a same user should have a similar number of friends in different social networks may be flawed. In particular, for Twitter and LinkedIn this is generally not true due to the different nature of the services. The Image feature presented a small but significant informational relevance, being the Levenshtein distance the best metric to be used. B. Matching profiles The similarity methods presented in the previous section were applied to the accounts collected from Twitter and LinkedIn to produce a training set for the classifiers. The positive examples consisted of all the similarity vectors for the account pairs of the Social Graph dataset. An equal number of negative examples were synthesized by randomly pairing accounts that don’t belong to the same user and calculating their similarity vectors. This yielded a total of 58, 258 training instances. After training the classifier, they were tested by giving them as input a Twitter-LinkedIn profile pair to be classified as a “Match” or a “Non Match.” A “Match” means that the two given input profiles belong to the same user, while “Non Match” means they don’t. The results shown in this section were obtained by 10-fold cross-validation on the data. In order to further evaluate the effectiveness of the adopted similarity metrics, we generated results for all the possible combinations of the features and metrics. The feature set with the best accuracy using Naıve Bayes was <namejw , useridjw , locgeo , descjaccard , imgls >. We also observed that the features Name, UserID and Location using Geo-Location were present on all of the top 10 results, confirming that they are relevant features. Table II presents detailed results for the most promising set of features according to previous results. The results for each classifier are very comparable, except for the kNN. Using the most promising set of features and similarity metrics, we achieved accuracy, precision and recall as 98%, 99% and 96% respectively. Recall Precision Accuracy F1 0.980 0.964 0.980 Naıve Bayes 0.996 0.964 0.936 0.994 0.965 Decision Tree 0.971 0.956 0.988 0.972 SVM 0.998 0.887 0.798 0.898 kNN TABLE II: Results for multiple classifiers using the feature set {namejw , useridjw , locgeo , descjaccard , imgls , connnorm }. C. Finding Candidate User Profiles To evaluate how our model for user profile disambiguation would perform in a real scenario, we developed a system for retrieving account / profile candidates from the services’ API, in order to find a possible match for a known account. More specifically, we reserve a part of the true positive data to be a testing set T . A classifier C (vi ) is then trained with the remaining dataset. We modified Naıve Bayes to return the probability that the similarity vector vi was generated by 2 profiles that belong to the same user. Now, for each instance < pt , pl >∈ T we query Twitter’s API using the LinkedIn display name, pl [name]. Let C be all the accounts returned by Twitter. For each ci ∈ C we compute the similarity vector S (ci , pl ) = vi , which is now a instance suitable for our model. For each vi , calculate the probability Pi of ci belonging to the same user of pl , which is basically C (vi ). At last, we sort all the values C (vi ) in decreasing order to form a rank R in which, ideally, pt should be at the top. Figure 4 shows how good our profile ranking mechanism is. The x axis is the position in the rank and the y axis is the percentage of times the right profile was found in a position lower or equal to x. We plotted curves first using UserID and Name, and next using all the profile features in order to verify whether using all features was unnecessary. Although the best features have shown to be really good discriminators, when doing searches in the services APIs using a given name, most of the returned accounts have very similar values in the fields Name and UserID, making the use of more features specially important. This assumption was confirmed by the observed results. Figure 4 shows that in 64% of the cases the right profile was found in the first position of the rank when using all features, while this value was 49% for the set of the best features. This shows that our model could be used to match profiles automatically with a 64% accuracy rate by choosing the best guess. The system could also be used in a semi-supervised manner to narrow down candidates. For example, we can see that in 75% of the times the right profile was in the first 3 positions of the rank. Fig. 3: Box plots for each feature separating the values of the “Match” class and the “Non Match” class. [2] R. Zafarani and H. Liu, “Connecting corresponding identities across communities,” 2009. [Online]. Available: http://aaai.org/ocs/index.php/ ICWSM/09/paper/view/209/538 [3] M. Rowe and F. Ciravegna, “Harnessing the social web: The science of identity disambiguation,” in Web Science Conference, 2010. [4] F. Carmagnola and F. Cena, “User identification for cross-system per- sonalisation,” Inf. Sci., vol. 179, no. 1-2, pp. 16–32, Jan. 2009. [5] M. Szomszor, H. Alani, I. Cantador, K. O’Hara, and N. Shadbolt, “Se- mantic modelling of user interests based on cross-folksonomy analysis,” ser. ISWC ’08, 2008, pp. 632–648. [6] J. Golbeck and M. Rothstein, “Linking social networks on the web with foaf: a semantic web case study,” ser. AAAI’08, 2008, pp. 1138–1143. [7] M. Rowe, “Interlinking distributed social graphs,” in LDOW2009, April,Spring 2009. [8] M. N. Szomszor, I. Cantador, and H. Alani, “Correlating user profiles from multiple folksonomies,” ser. HT ’08, 2008, pp. 33–42. [9] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: automated identity theft attacks on social networks.” [10] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel, “Abusing social networks for automated user profiling,” ser. RAID’10, 2010, pp. 422–441. [11] D. Perito, C. Castelluccia, M. A. K aafar, and P. Manils, “How unique and traceable are usernames?” in PETS, 2011, pp. 1–17. [12] T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, “Identifying users across social tagging systems,” 2011. [Online]. Available: https: //www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2779 [13] D. V. Kalashnikov and S. Mehrotra, “Domain-independent data cleaning via analysis of entity-relationship graph,” ACM Trans. Database Syst., vol. 31, no. 2, pp. 716–767, Jun. 2006. [14] M. Rowe, “Applying semantic social graphs to disambiguate iden- tity references,” in 6th Annual European Semantic Web Conference (ESWC2009), June 2009, pp. 461–475. [15] F. Carmagnola, F. Osborne, and I. Torre, “Cross-systems identification of users in the social web,” in 8th IADIS Int. Conf. WWW/INTERNET, Rome, Italy, 2009, pp. 129–134. [16] ——, “User data distributed on the social web: how to identify users on different social systems and collecting data about them.” [17] J. Vosecky, D. Hong, and V. Y. Shen, “User identification across multiple social networks,” in NDT’09, July 2009. [18] G. Kontaxis, I. Polakis, S. Ioannidis, and E. Markatos, “Detecting social network profile cloning,” in PerCom, march 2011, pp. 295 –300. [19] http://nltk.googlecode.com/svn/trunk/doc/api/nltk.corpus.reader. wordnet-module.html. [20] P. Bhattacharyya, A. Garg, and S. F. Wu, “Analysis of user keyword similarity in online social networks,” Social Netw. Analys. Mining, vol. 1, no. 3, pp. 143–158, 2011. [21] K. Kira and L. A. Rendell, “The feature selection problem: traditional methods and a new algorithm,” ser. AAAI’92, 1992, pp. 129–134. [22] A. R. Barron, J. Rissanen, and B. Yu, “The minimum description length principle in coding and modeling,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2743–, 1998. [23] S. R. Singh, H. A. Murthy, and T. A. Gonsalves, “Feature selection for text classification based on gini coefficient of inequality.” Journal of Fig. 4: Relation between the position in the rank r and the percentage of times the right profile is found in a position lower or equal to r . V I I . D I SCU S S ION In this work, we applied automated techniques along with users’ online digital footprints from one social network to identify her on another social network. We extracted the users’ online digital footprints entirely from the public profile information. We used multiple profile features and sophisti- cated similarity metrics to compare them and assessed their discriminative capacity for user profile disambiguation. UserID and Name when compared using the Jaro-Winkler metric were the most discriminative ones. Using the most promising set of features and similarity metrics, we achieved accuracy, precision and recall as 98%, 99% and 96% respectively. We tested our system in real world to find candidate user profiles on Twitter, using the display name of a LinkedIn user. Seventy five percent of the times, the correct user profile was in the top 3 results returned by our system. Our proposed user profile disambiguation system can help security analysts compare and analyze two different social networks. In future, we plan to incorporate more profile fields and generalize our model to make it applicable to include other social networks. We also want to adapt our system to handle missing and incorrect profile attributes. R E F ER ENC E S [1] D. Irani, S. Webb, K. Li, and C. Pu, “Large online social footprints–an emerging threat,” in CSE ’09, vol. 3, aug. 2009, pp. 271 –276. 0 0.2 0.4 0.6 0.8 1MatchNon Matchuserid jw 0 0.2 0.4 0.6 0.8 1MatchNon Matchname jw 0 0.1 0.2 0.3 0.4 0.5MatchNon Matchdescription jaccard 0 0.1MatchNon Matchdescription ontology 0 1 2 3 4 5MatchNon Matchconnections class 0 5 10 15 20 25 30MatchNon Matchimage psnr 0.8 0.9 1MatchNon Matchimage levenshtein 0 0.2 0.4 0.6 0.8 1MatchNon Matchlocation jw 0 0.2 0.4 0.6 0.8 1MatchNon Matchlocation jaccard 0 50 100 150 200 250 300MatchNon Matchlocation geo 40 45 50 55 60 65 70 75 80 5 10 15 20Profiles Found (%)Rank positionAll featuresBest Features Machine Learning Research - Proceedings Track, vol. 10, pp. 76–85, 2010. Irani, “Multi-interval discretization of [24] U. M. Fayyad and K. B. continuous-valued attributes for classification learning.” in IJCAI, 1993, pp. 1022–1029.
1904.04583
1
1904
2019-04-09T10:53:11
Correlation-Based Community Detection
[ "cs.SI", "physics.soc-ph" ]
Mining community structures from the complex network is an important problem across a variety of fields. Many existing community detection methods detect communities through optimizing a community evaluation function. However, most of these functions even have high values on random graphs and may fail to detect small communities in the large-scale network (the so-called resolution limit problem). In this paper, we introduce two novel node-centric community evaluation functions by connecting correlation analysis with community detection. We will further show that the correlation analysis can provide a novel theoretical framework which unifies some existing evaluation functions in the context of a correlation-based optimization problem. In this framework, we can mitigate the resolution limit problem and eliminate the influence of random fluctuations by selecting the right correlation function. Furthermore, we introduce three key properties used in mining association rule into the context of community detection to help us choose the appropriate correlation function. Based on our introduced correlation functions, we propose a community detection algorithm called CBCD. Our proposed algorithm outperforms existing state-of-the-art algorithms on both synthetic benchmark networks and real-world networks.
cs.SI
cs
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Correlation-Based Community Detection Zheng Chen, Zengyou He, Hao Liang, Can Zhao and Yan Liu Abstract -- Mining community structures from the complex network is an important problem across a variety of fields. Many existing community detection methods detect communities through optimizing a community evaluation function. However, most of these functions even have high values on random graphs and may fail to detect small communities in the large-scale network (the so-called resolution limit problem). In this paper, we introduce two novel node-centric community evaluation functions by connecting correlation analysis with community detection. We will further show that the correlation analysis can provide a novel theoretical framework which unifies some existing evaluation functions in the context of a correlation-based optimization problem. In this framework, we can mitigate the resolution limit problem and eliminate the influence of random fluctuations by selecting the right correlation function. Furthermore, we introduce three key properties used in mining association rule into the context of community detection to help us choose the appropriate correlation function. Based on our introduced correlation functions, we propose a community detection algorithm called CBCD. Our proposed algorithm outperforms existing state-of-the-art algorithms on both synthetic benchmark networks and real-world networks. Index Terms -- Complex networks, community detection, correlation analysis, random graph, node-centric function. ! 1 INTRODUCTION C OMMUNITY detection plays a key role in network science, bioinformatics [1], sociological analysis [2] and data mining. It not only helps us identify the network modules, but also offers insight into how the entire network is organized by local structures. The detected communities could be interpreted as the basic modules of various kind of networks, e.g. social circles in social networks [3], protein complexes in protein interaction network [4], or groups of organisms in food web network [5]. More generally, a widely accepted consensus on community [6] is that the community should be a set of vertices that has more edges within the community than edges linking vertices of the community with the rest of the graph. Although community detection has been extensively investigated during the past decades, there is still no com- mon agreement on a formal definition regarding what a community exactly is. Many existing community detection algorithms are based on the previously mentioned crite- rion (more internal connections than external connections), with proposed quality metrics that quantify how commu- nity nodes connect internal nodes densely and external nodes sparsely. For example, popular metrics such as be- tweenness [5], modularity [7], conductance [8], ratio cut [9], density [10] and normalized cut [11] are all based on this intuitive idea. And existing related algorithms first utilize these metrics to derive globally-defined objective functions, then maximize (or minimize) the objective function by par- titioning the whole graph [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22]. The traditional view on community evaluation relies on counting edges in different ways. Simply doing that University of Technology, Dalian, China. • Z. Chen, H. Liang and Y. Liu are with School of Software, Dalian • Z. He is with School of Software, Dalian University of Technology, Dalian,China, and Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China. E-mail: [email protected] • C. Zhao is with Institute of Information Engineering, CAS. is not a sensible way, and it is not sufficient to convince people that identified community structure is pronounced. In [23], Fortunato and Hric pointed out an amazing fact that an Erdos-Renyi (E-R) random graph [24] can generate the modular structures. To exemplify this phenomenon, a 400×400 matrix of E-R random graph is illustrated in Fig. 1. As shown in Fig. 1(a), the matrix is evidently disordered and random such that no one believes there exist community structures. However, as long as rearranging the entries of the matrix by reorganizing the index of the vertices, the modular structures emerge at the diagonal of the matrix. Such structures should not be real and are generated due to the random fluctuations in the network construction pro- cess [23]. This weird phenomenon causes that many cluster- ing algorithms whose metrics do not consider the influence of random fluctuations identify communities even in the random networks as well. From the above illustrations, it makes sense that community metrics should be considered how significant their result is. Probably the most popular community quality metric is the modularity introduced by Newman and Girvan [7]. This metric is based on a prior work about a measure of assortative mixing which is proposed in [25]. It evaluates the quality of a partition of the network. The global expression of the modularity function is: (cid:88) ij Q = 1 2m (Wij − Eij)δ(Ci, Cj), (1) where m is the number of edges, Wij is the element of the adjacency matrix W , δ(x, y) is the kronecker delta function whose value is 1 if x = y and 0 otherwise, Ci and Cj represent the community index of i and j respectively, Eij is the expected number of edges that connect vertex i and vertex j under the random graph null model. The null model specifies how to generate a random graph that preserves some characteristics of the original graph. The most com- monly used null model is the configuration model [26] [27], JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 solution to the problem [29]. In addition, it is also known that the modularity can be a high value even in the E-R random graph [30]. This seems counterintuitive, but it is the fact since the modularity is a kind of measurement which measures the distance between real network structure and the "average" of random network structures. As a result, there is no sufficient information to confirm the distribution of the modularity. In addition, the community is a local structure of the network. We should examine the community from the local view. The strength of connectedness between one node and a community embeds the local feature of that community. Using these local features to construct a global evaluation function for a community helps us avoid from missing the local structural information. However, how to assess the strength of connectedness between one node and the community is a challenging task since there is no convinced definition on what the strength of connectedness is. Our Contributions. In this paper, we propose a correlation-based community detection framework, in which the local connectedness strength between each node and a community is assessed through correlation analysis. More precisely, we represent the basic structural information of a node as the corresponding row vector embedded in the adjacency matrix and encode the structural information of a community into a binary vector. To demonstrate the feasibility and advantages of this framework, we intro- duce two concrete node-centric community metrics based on the correlation between a node and a community, PS- metric (node version of modularity) and φ-Coefficient met- ric. Moreover, we provide the detailed theoretical analysis for our metrics, which show that these metrics are capable of mitigating the resolution limit problem and alleviating the fake community issue in E-R random graph. Besides, we present a correlation-based community detection (CBCD) method which adopts two introduced metrics to identify the community structure. Experimental results on both real net- works and the LFR networks show that CBCD outperforms state-of-the-art methods. The summary of contributions of this paper is listed as follows: • To the best of our knowledge, we are the first to intro- duce correlation analysis into the node-centric metrics, which calculate the correlation value between a node and a community. Besides, we slightly modify three key properties for mining association rule [31] in the context of community detection, which can guide us select the right correlation function for community detection. • We further investigate the relationship between the correlation analysis and community detection. It has been found that correlation analysis can be viewed as a theoretical interpretation framework for community de- tection, which unifies some exiting metrics and provide the potential of the deriving new and better community evaluation measures. • The introduced PS-metric (node version of modularity) is less affected by the random fluctuations. We not only give the detailed theoretical proof, but also show the empirical results to validate the effectiveness of this metric under the E-R model. Moreover, we prove that the φ-Coefficient metric can mitigate the resolution limit problem and give an intuitive interpretation. (a) (b) Fig. 1. Two matrices of the same random graph that is generated according to the E-R model. Fig. 1(a) shows the original matrix. Fig. 1(b) is a matrix obtained by reshuffling the order of vertices. where the degrees of all vertexes are preserved in the ran- dom graph. Under the configuration model, one can derive that Eij = didj/2m (di and dj are the degree of i and j, respectively). Now we can reformulate the modularity as: Q = , (2) (cid:88) (cid:104) lj m j (cid:17)2(cid:105) −(cid:16) Kj 2m where Kj represents the sum of degrees of all vertexes in community j and lj is the number of internal edges within community j. At the same time, we could use lj/m − (Kj/2m)2 as a metric for evaluating the quality of community j. The intuition behind this formula is that simply counting edges are not sufficient to determine a true community structure so that the number of expected edges in the null model should be incorporated as well. Unfortunately, the modularity maximum does not equal to the most pronounced community structure. This is the well- known resolution limit problem which modularity suffers from, i.e., the modularity function may fail to detect mod- ules which are smaller than a scale in large networks. Many techniques have been used to mitigate the resolution limit problem [28], such as the multi-resolution method. Note that the multi-resolution method does not provide a reliable JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 • Experimental results demonstrate that our method out- performs state-of-the-art methods on real networks and LFR networks. The organization of this paper is structured as follows: Section 2 discusses the related work. Section 3 introduces several basic definitions of correlation analysis and proves some properties of proposed metrics. Section 3 describes our corresponding community detection method. Section 4 presents the experimental results of CBCD along with the other methods. Section 5 concludes this paper. 2 RELATED WORK 2.1 Correlation-Based Method There are already some algorithms in the literature that utilize the different types of correlation information hid- den behind the network structure to solve the community detection problem. Once the correlation definition is spec- ified, community detection can be cast as an optimization problem by maximizing a correlation-based objective func- tion. The existing community detection algorithms based on correlation can be categorized according to the different correlation definitions. 2.1.1 Node-Node Similarity The pairwise similarity between two nodes can be viewed as a kind of correlation. The goal of community detection based on node-node similarity is to put the nodes which are close to each other into the same group. In [32], a random- walk based node similarity was proposed, which can be used in an agglomerative algorithm to efficiently detect the communities in the network. The method in [33] is based on the node similarity proposed in [34] to find communities in an iterative manner. 2.1.2 Node-Node Correlation A covariance matrix of the network is derived from the incidence matrix in [35], which can be viewed as the un- biased version of the well-known modularity matrix. A correlation matrix is obtained through introducing the re- scaling transformation into the covariance matrix, which significantly outperforms the covariance matrix on the iden- tification of communities. The algorithm in [36] constructs a node-node correlation matrix based on the Laplacian matrix so as to incorporate the feature of NMF (non-negative matrix factorization) method. In [37], MacMahon et al. introduce the appropriate correlation-based counterparts of the most popular community detection techniques via a consistent redefinition of null models based on random matrix theory. A correlation clustering [38] based community detection framework is proposed in [39], which unifies the modular- ity, normalized cut, sparsest cut, correlation clustering and cluster deletion by introducing a single resolution parameter λ. 2.1.3 Edge-Community Correlation In [40] [41], Duan et al. connect the modularity with correla- tion analysis by reformulating modularity's objective func- tion as a correlation function based on the probability that an edge falls into the community under the configuration model. Hence, it can be viewed as a method based on edge- community correlation information. 3 2.2 Node-Centric Method Almost all classical community detection metrics implicitly assume that all nodes in a community are equally important. These metrics, viewing the community as a whole, only focus on the total number of edges within the community, the sum of degree of all nodes or the size of the com- munity. The connection strength between each vertex and the community is not involved in these metrics. This may result in missing important structural information so that two distinct communities cannot be distinguished in certain circumstances. Node-centric methods take into account how each vertex connects the community densely. This is consis- tent with the fact that the community is a local structure of the network. Chakraborty et al. [42] [43] [44] propose a new node- centric metric called permanence, which describes the mem- bership strength of a node to a community. The central idea behind permanence is to consider the following two factors: (1) the distribution of the external edges rather than the number of all external connections (2) the strength of the internal-connectivity instead of the number of all internal edges. The corresponding algorithm is to maximize the permanence-based objective function. WCC is another node-centric metric proposed in [45] [46], which considers the triangle as the basic structure instead of the edge or node. WCC of a node consists of two parts: isolation and intra-connectivity. The proposed algorithm aims at the op- timization of a WCC-based objective function. Focs [47] is a heuristic method that accounts for local connectedness. The local connectedness of a node to a community depends upon two scores of the node with respect to the community: community connectedness and neighborhood connected- ness. Focs mainly consists of two phases: leave phase and expand phase, which is respectively based on community connectedness and neighborhood connectedness. 2.3 Summary Our method is different from all above existing methods. Although the proposed metrics in our method are node- centric as well, they are derived from the perspective of correlation analysis. Different from the existing correlation- based methods, our method utilizes the correlation between the node and the community based on a 2 × 2 contingency table. Thus, our method can be viwed as a node-community correlation based method. Besides, we will choose appro- priate correlation functions to mitigate the resolution limit problem under the guidance of [48] [49]. The further analy- sis will be given in section 3. 3 CORRELATION ANALYSIS IN NETWORK In this section, we first formalize the community detec- tion problem, then, introduce two correlation measures and extend it for community structure evaluation. Two new correlation metrics for community detection will be pro- posed in this section. Next we will describe modularity from correlation analysis perspective and discuss its relation with our metrics. At last, we will discuss the desirable properties for new correlation metric. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 3.1 Preliminaries Undirected Graph. Let G = (V, E, W ) be an undirected graph with n nodes and m edges, where V is the node set, E is the edge set, W is the adjacency matrix. If an edge (u, v) ∈ E, then Wuv = 1 and Wuv = 0 otherwise. In the case of undirected graph, Wuv = Wvu, it means that the adjacency matrix W is a symmetric matrix. Community Detection. Given a graph G = (V, E, W ), the goal of community detection is to partition the graph with V = n vertices into l pairwise disjoint groups P = {S1, ..., Sl}, where S1 for any i, j. (cid:83) ..(cid:83) Sl = V and Si (cid:84) Sj = ∅ To begin with, we define f (u, S) as a measurement func- tion which takes a vertex u and a community S containing u as the input, and return a real value which indicates the connectivity of vertex u regarding the community S. The function f (u, S) should satisfy certain basic requirements so that it can be used to evaluate the structure of commu- nity S. First, f (u, S) must be bounded to guarantee the convergence of community search algorithms. Second, the more strongly a vertex connects to a community, the higher f (u, S) becomes. The detailed properties that a measure- ment function needs to possess for satisfying the second requirement will be further discussed in section 3.2. Now, we can define the vertex-centric metric of a community S as the sum of the function f (u, S) of all members u that belong to the community S: F (S) = f (u, S). (3) (cid:88) u∈S l(cid:88) Analogously to what we have done before, we define the objective function of a partition P through taking the sum of the vertex-centric metric value of each community Si ∈ P : Γ(P ) = F (Sj). (4) j=1 Given a graph G = (V, E, W ), community detection can be cast as an optimization problem with (4) as the objective function. The partition P is optimal when Γ(P ) achieves a maximum value, and we call this partition the optimal partition. Now the key point lies in how to formulate a feasible f (u, S). A natural idea is to use the correlation function between u and S as f (u, S). The correlation function mea- sures the correlation relationship between u and S, in which a higher correlation value indicates that there is a strong affinity between u and S. However, we need to choose an appropriate correlation model to represent the connectivity cohesion of vertex u regarding community S. Moreover, the information about the topology structure of a node and a community should also be considered in this model. In this paper, we convert the set of nodes which belong to a community into a binary vector to embody the basic structural information of the community. The positions of nodes in the graph are determined by their neighbourhoods, that is, if two nodes connect to the same set of neighbors, then the whole graph will retain the same structure after exchanging the positions of these two nodes. Therefore, the local structure of a node can be depicted by its row vector 4 embedded in the adjacency matrix. In summary, we have the following definitions. Community vector and Neighbor vector. The com- munity vector of u with respect to S, ΨS\{u} = (e1, ...eu−1, eu+1, ...en), is a binary vector of length n − 1, where ev = 1 if vertex v belongs to community S and ev = 0 otherwise. ΨS\{u}[v] denotes the value of vector element ev. ψu = (g1, ...gu−1, gu+1, ...gn) is called the neighbor vector of vertex u, where gv = 1 if there exists an edge between u and v, and gv = 0 otherwise. ψu[v] denotes the value of vector element gv. Note that vertex u is excluded from the vector, we will give an explanation from the probabilistic perspective in the following part. The above two binary vectors can be viewed as the samples of two binary variables C(x, u) and G(x, S\{u}), where C(x, u) = ψu[x] and G(x, S\{u}) = ΨS\{u}[x]. A 2 × 2 contingency table for these two variables is given in Table 2. The entry f11 is denoted by ω, that represents the count of inner connections of vertex u regarding community S. The entry f11 + f10 is denoted by ,  = S − 1 and S is the size of community S. The entry f11 + f01 is denoted A 2 × 2 contingency table for vertex u and community S . TABLE 1 C(x, u) = 0 (cid:80) G(x, S\{u}) = 1 G(x, S\{u}) = 0 (cid:80) i fij C(x, u) = 1 ω f01 du j fij  f01 + f00 f10 f00 f10 + f00 N by du, where du is the degree of vertex u. The uppercase Roman letter N is the length of the binary vector, where N = n − 1. Now we can give several probability definitions that will be used in the correlation measure. Firstly, to simplify the notations, C is used to denote C(x, u) = 1, and G is used to denote G(x, S\{u}) = 1. Then, P (CG) = ω N is the probability that a randomly chosen vertex from the vertex set V \{u} connects to vertex u and belongs to community S simultaneously. P (C) = du N is the probability that a randomly selected vertex from V \{u} has a connection with u. P (G) =  N is the probability that a randomly chosen vertex from V \{u} belongs to community S. Under the assumption of independence, the probability of CG can be calculated by P (CG) = P (C)P (G) = du/N 2. The above definitions and notations are exemplified in Fig. 2, where there is a community S of size 5. Here we let u = 5, C denotes C(x, 5) = 1 and G denotes G(x, S\{5}) = 1. We will calculate P (G), P (C) and P (CG). To begin with, we should know how to get two vectors ΨS\{5} and ψ5. In Fig. 2, since node 5 connects almost all the nodes except node 3, ψ5 has only one zero entry g3. Since node 6 and node 7 are not included in community S , their corresponding entries e6 and e7 are both zeros. After getting these two binary vectors, ω, d5, N and  can be calculated accordingly, that is, ω = 3, d5 = 5, N = 6,  = 4. Then, we have: P (G) = , P (C) = 4 6 5 6 , P (CG) = 3 6 . JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 5 ΨS\{5} = (e1, e2, e3, e4, e6, e7) = (1, 1, 1, 1, 0, 0) ψ5 = (g1, g2, g3, g4, g6, g7) = (1, 1, 0, 1, 1, 1) Fig. 2. One example graph with 7 nodes and 10 edges, and S is a community of size 5. The community vector ΨS\{5} and neighbor vector ψ5 are given in the right part of the figure. 3.2 Correlation Measure Many functions have been proposed to measure the cor- relation between two binary vectors in statistics, data mining and machine learning. There are some guide- lines [48] [50] [49] provided for users to select the right mea- sure according to their needs. The most measures consist of P (G), P (C) and P (CG). Here we will list several properties to instruct us in choosing the appropriate measure for community detection. Let M be a measure for correlation analysis between two variables C and G. In [31], Piatetsky- Shaprio came up with three key properties about a good correlation measure for association analysis: P1: M = 0 if C and G are statistically independent; P2: M monotonically increases with P (CG) when P (C) and P (G) are both fixed; P3: M monotonically decreases with P (C) (or P (G)) when P (CG) and P (G) (or P (CG) and P (C)) are fixed. Note that these three properties are used in association analysis, we need further investigation in the context of community detection. P1 indicates that M should be able to measure the deviation from statistical independence. Then, the higher M is, the stronger dependence between C and G is. Node u can be regarded as the member of community S when M > 0. In this paper, we use the E-R model as the underlying random graph model to describe the statistical independence. Given the graph G with n nodes and m edges, one random graph under the E-R model is generated by forming an edge between any two nodes randomly and independently with the probability p = 2m/(n(n − 1)). By redefining P1, M should be a measure such that the expected value of M equals to zero for any node u and community S under the E-R model. According to the definitions introduced in section 3.1, P (CG), P (C) and P (G) are respectively decided by ω, du and  since N is fixed. As a result, the monotonicity of P (CG), P (C) and P (G) is respectively determined by ω, du and  as well. P2 and P3 describe two features of the cohesion of u with respect to community S: intra-connection and isolation. The intra-connection of node u with respect to community S indicates how node u connects community S densely, and it can be quantified by ω/. This is exemplified Fig. 3. Node 7 has stronger intra-connection than node 6. in Fig. 3, where node 7 connects four nodes of subgraph S and node 6 connects two nodes of subgraph S. Despite node 6 connects subgraph S with all its edges, node 7 has more links than node 6 within subgraph S. Apparently, node 7 is more qualified for the member of community S. Note that the increase of ω will lead to the increase of ω/ when  and du are both fixed. According to P2, M should increase with the increment of ω/, which means that strength of the intra-connection between u and S is becoming higher. In a similar way for P3, M should monotonically decrease with the increment of  when ω and du are both fixed since ω/ will decrease. On the other hand, it will lead to the biased result if we exclusively maximize the intra-connection. In Fig. 4, node u have connections with all the left three nodes, but we cannot confidently infer that node u and the left three nodes should be put together to form a community. This is because the number of links from u connecting the rest of the graph is twice its number of links with the left three nodes. A node belonging to a community should have strong isolation from the rest of the graph. The isolation can be quantified by ω/du, where the higher ω/du indicates that node u connects external nodes sparsely. It is easy to see that 4567123S861357S 24 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 6 the probability du N and belongs to community S with the probability  N . In the case of random graph, the expected probability that the chosen node simultaneously connects vertex u and belongs to community S is  N · du N . The modularity function has a few variants, but they are all identical in nature. Without loss of generality, we will adopt the definition given in Equation (2) as our modularity function. Given a community S, the partial modularity of S is reformulated as: (cid:17)2 −(cid:16) KS 2m QS = lS m (cid:80) (cid:80) = − lS m j∈S dj 2m · i∈S di 2m , i∈S di j∈S dj (cid:80) (cid:80) 2m · where m is the number of the edges in graph G and lS is the number of the edges inside community S. If we randomly choose an edge from the edge set E, the probability of the chosen edge inside community S is lS/m. Likewise, the probability that one randomly chosen edge has at least one j∈S dj end inside community S is 2m . Then, the expected (cid:80) probability of the chosen edge inside community S is 2m when G is a random graph. Let H denotes a binary random variable where H = 1 if the randomly chosen edge has at least one end inside community S and H = 0 otherwise. Then, the partial modularity QS can be rewritten as: P (HH) − P (H)P (H). We can find that the partial modularity owns the same idea with our measurement function in (5), i.e., they are both the concrete examples of Piatetsky-Shaprio Rule-Interest. However, the derivation of the partial modularity and our function starts from two different perspectives respectively. The partial modularity is edge-centric, which utilizes the relationship between edge and community. Our formulation in (5) is node-centric, which utilizes the relationship between node and community. For the sake of simplicity, we will use PS to denote our measurement function in (5) and we can also call it "node modularity". Despite the PS function can be used for evaluating the strength of the correlation between a node and a community, it is still not clear if it satisfies aforementioned three proper- ties. A thorough analysis is essential to confirm the utility of PS in the context of community detection. P2 and P3 are necessary properties that a good community correlation measure should have. Essentially, these two properties can be interpreted as "a higher value of P S(u, S) indicates a strong correlation between u and S". P1 is concerned how far the correlation between u and S is away from what it is in the random graph. For the PS measure, we have the following two theorems, where Theorem 1 proves that P2 and P3 hold and Theorem 2 proves that P1 is correct. Theorem 1. For fixed N > 0, we have 0 <  < N, 0 < du < N and 0 < ω ≤ min(, du). Let P S(u, S) be the correlation value between u and S defined in (5), then 1) P S(u, S) monotonically increases with the increment of ω when  and du are fixed, 2) P S(u, S) monotonically decreases with the increment of  when ω and du are fixed, and 3) P S(u, S) monotonically decreases with the increment of du when  and ω are fixed. Proof. Let P S(u, S) = J(ω, , du). We will directly calculate Fig. 4. Node u does not have strong isolation from the rest of graph which is circled by dash line. P (GC) P (C) P (GC) P (G) ω d ω  = , the increment of ω will lead to the increment of ω/du when  and du are both fixed. In regard to P2, M should increase with the increment of ω/du, which means that the isolation of u from the rest of the graph is becoming stronger. In a similar way for P3, M should monotonically decrease with the increment of du when ω and  are both fixed since ω/ will decrease. To further analyze the relationship between correlation measure and community detection, let us consider the con- fidence measure of C and G. We have: confidence(C ⇒ G) = P (GC) = = , confidence(G ⇒ C) = P (CG) = where confidence(C ⇒ G) and confidence(G ⇒ C) are defined as the neighborhood connectedness score (nb-score) of a node and the community connectedness score (com-score) of a node in the Focs algorithm [47], respectively. These two node-based measures are the theoretical basis of the Focs algorithm. This fact tells us that correlation analysis can be appropriately applied in community detection. 3.2.1 Piatetsky-Shapiro's Rule-Interest Piatetsky-Shapiro's rule-interest [31] measures the differ- ence between the true probability and the expected prob- ability under the assumption of independence between C and G. Piatetsky-Shapiro's rule-interest is appropriate for the task of community detection, and we will show that modularity can be explained under our framework when the correlation measure is Piatetsky-Shapiro's rule-interest later on. Our measurement function based on Piatetsky- Shapiro's rule-interest is calculated as: P S(u, S) = P (CG) − P (C)P (G) = ω N − du N 2 . (5) Recalling the aforementioned variables in Table 2, the de- gree of vertex u is du, the size of set S\{u} is  and the number of links between vertex u and community S is ω. If we randomly select a node from the node set V \{u}, the probability that the selected node simultaneously connects vertex u and belongs to community S is ω N . Similarly, a randomly selected node from V \{u} connects vertex u with u JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 the partial derivatives of P S(u, S) regarding to , ω and du. ∂J(ω, , du) ∂ω ∂J(ω, , du) ∂du = = > 0, 1 N − N 2 < 0. ∂J(ω, , du) ∂ −du N 2 < 0, = Overall, the monotonicity of P S(u, S) is consistent with the monotonicity of ω,  and du respectively. Theorem 2. Given the E-R model G(n, m) with the probability p = 2m/(n(n − 1)) and let P S(u, S) be the correlation value between u and S, then E[P S(u, S)] = 0 holds for any subgraph S ∈ GS and node u ∈ S, where GS is the set of all the subgraphs of G. Proof. Let Xv be a random variable such that: (cid:40) (cid:80)n i=1 Xi and ω =(cid:80) Clearly, E[Xv] = 1 · P(Xv = 1) + 0 · P(Xv = 0) = p, du = v∈S Xv. By the linearity of expectations, 1 if v has a link with u, 0 otherwise. Xv = 7 Let Y = P S(u, S), the second moment of Y can be obtained by the linearity of expectations: (cid:16) ω (cid:17)2 E[Y 2] = E[ − du N 2 N E[ω2] − 2 N 3 ] = E[ ω2 N 2 − 2duω N 3 + E[du 2]. 2 N 4 E[duω] + 2d2 u N 4 ] = 1 N 2 Calculating E[ω2], E[duω] and E[du have 2] independently, we E[ω2] = E[ = i∈S E[duω] = E[ i∈S j∈S (cid:16)(cid:88) (cid:88) (cid:88) (cid:16) n(cid:88) n(cid:88) (cid:88) (cid:16) n(cid:88) j∈S i=1 i=1 Xj (cid:17) ] = E[ (cid:17)(cid:16)(cid:88) (cid:88) (cid:88) Xi j∈S E[XiXj] = ( − 1)p2 + p, (cid:88) n(cid:88) (cid:17)(cid:16)(cid:88) (cid:17) j∈S i∈S Xj ] = E[ Xi i=1 j∈S XiXj] XiXj] j∈S (cid:17)(cid:16) n(cid:88) (cid:17) n(cid:88) n(cid:88) = E[XiXj] = N p2 + p = λp + p, du N 2 ] E[du 2] = E[ Xi Xj ] = E[XiXj] i=1 j=1 i=1 j=1 = N (N − 1)p2 + N p = λ(λ − p + 1). du = Xi, ω = Xv. lim N→+∞,p→0 E[P S(u, S)] = E[ = = = 1 N 1 N p N ω N E[ − du (cid:88) N 2 ] = E[ Xv] −  (cid:88) N 2 v∈S E[Xv] −  N 2 v∈S −  N 2 · N p = 0. ] − E[ ω N E[ n(cid:88) n(cid:88) i=1 i=1 Xi] E[Xi] Theorem 2 shows that PS can be regarded as the distance between the correlation value of u and S in a real network and the average correlation value of u and S over all the random networks. However, this theoretic result ignores the variance of PS variable over all the random networks. If the distribution of PS values is not strongly peaked, it is very likely that most PS values will far exceed zero even in the random networks. Thus, we should investigate the variance of PS values as well. Then, we have the following Lemma. Lemma 1. Given the E-R model G(n, m) with the probability p = 2m/(n(n − 1)). Let λ = N p, which is the expected degree under the E-R model. P S(u, S) is correlation value between u and S. Let GS be the set of all the subgraphs of G. Then, ∀κ > 0, ∀S ∈ GS and ∀u ∈ S, we have the upper bound on the probability that PS(u, S) is no less than (cid:17) P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ √ (cid:105) (cid:16) p22 − p2 + p λ2(λ − p + 1) √ κ: κ N 2 + N 4 − 2p2(λ + 1) . N 3 ≤ 1 κ Proof. Analogously to what we have done in the proof of Theorem 2, we will use the sum of random variable Xi to denote ω and du: n(cid:88) i=1 (cid:88) v∈S To obtain the variance of Y , we first apply Theorem 2: V ar[Y ] = E[Y 2] − (E[Y ])2 = E[Y 2] ( − 1)p2 + p = N 2 − 2p2(λ + 1) N 3 + λ2(λ − p + 1) N 4 . Then, by the Chebyshev inequality, we finish the proof: P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ √ (cid:105) (cid:16) ( − 1)p2 + p κ = 1 κ N 2 = P(cid:104)(cid:12)(cid:12)Y − E[Y ](cid:12)(cid:12) ≥ √ − 2p2(λ + 1) N 3 + (cid:105) ≤ V ar[Y ] (cid:17) λ2(λ − p + 1) κ κ . N 4 Most appear networks large-scale real be sparse [51] [52] [53], in which the number of edges is generally the order n rather than n2 [52]. In addition, sparse graphs are particularly sensitive to random fluctuations [23]. Therefore, we should concentrate more on the performance of PS on the sparse graph. With respect to the sparsity under the E-R model, we have the following Theorem. to Theorem 3. Given the ER model G(n, m) with the probability p = 2m/(n(n− 1)) and λ = N p is the expected degree under E- R model. Assuming λ always remains finite in the limit of infinite size [23]. P S(u, S) is the correlation value between u and S. Then, ∀κ > 0, any subgraph S and ∀u ∈ S, we have: P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ (cid:105) = 0. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 Proof. We first apply Lemma 1: P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ (cid:105) (cid:16) ( − 1)p2 + p (cid:16) ( − 1)p2 + p (cid:16) (N p)2 + pN (cid:16) 2(λ)2 + 2λ − λp ≤ 1 κ2 ≤ 1 κ2 ≤ 1 κ2 1 κ2 N 2 N 2 N 2 N 2 = + λ2(λ − p + 1) N 4 N 3 + λ2(λ − p + 1) − 2p2(λ + 1) (cid:17) + N 4 λ(λ − p + 1) (cid:17) (cid:17) . N 2 Then, we take the limit: P(cid:104)(cid:12)(cid:12)P S(u, S)(cid:12)(cid:12) ≥ κ (cid:105) (cid:16) 2(λ)2 + 2λ − λp N 2 lim N→+∞,p→0 ≤ lim N→+∞,p→0 1 κ2 (cid:17) = 0. 8 (cid:17) node u will have all its links connecting all the members of community S and have no other links with the rest of graph. The above discussions are subjective and intuitive. To further analyze φ(u, S), we have some similar theoretic results as PS owns. Theorem 4. For fixed N > 0, we have 0 <  < N, 0 < du < N and 0 < ω ≤ min(, du). Let φ(u, S) be φ-Coefficient value between u and S defined in (8), then 1) φ(u, S) monotonically increases with the increment of ω when  and du are fixed, 2) φ(u, S) monotonically decreases with the increment of  when ω and du are fixed, and 3) φ(u, S) monotonically decreases with the increase of du when  and ω are fixed. = N ∂ ∂ω > 0 ∂J(ω, , du) ∂J(ω, , du) ∂J(ω, , du) Proof. Let φ(u, S) = J(ω, , du). We will directly calculate the partial derivatives of φ(u, S) regarding to , ω and du. (cid:112)(N − )du(N − du) =(cid:0)du(N − du)(cid:1)− 1 =(cid:0)(N − )(cid:1)− 1 2 · −N(cid:2)(du − 2ω) + ωN(cid:3) 2(cid:0)(N − )(cid:1) 3 2 · −N(cid:2)du( − 2ω) + ωN(cid:3) 2(cid:0)du(N − du)(cid:1) 3 We only need to focus on the term −N(cid:2)du( − 2ω) + ωN(cid:3). This term is obviously negative when  ≥ 2ω. Now assum- ing  < 2ω. Since ω ≤ , we have 2ω −  ≤ ω. Then, −N(cid:2)du( − 2ω) + ωN(cid:3) = −N(cid:2)ωN − du(2ω − )(cid:3) ≤ −N(cid:0)ωN − duω(cid:1) < −N(cid:0)ωN − N ω(cid:1) = 0. ∂du . 2 2 < 0 holds. In a similar way, ∂J(ω,,du) Thus, ∂J(ω,,du) < 0 holds as well. Overall, the monotonicity of φ(u, S) is consis- tent with the monotonicity of ω,  and du respectively. ∂du ∂ Theorem 5. Given the E-R model G(n, m) with the probability p = 2m/(n(n − 1)) and let φ(u, S) be φ-Coefficient value between u and S. For fixed 0 <  < N, E[φ(u, S)] = 0 holds for any subgraph S ∈ GS and node u ∈ S, where GS is the set of all the subgraphs of G. Proof. Firstly, we introduce a random variable: 1(cid:112)du(N − du) . Y = (cid:40) At the same time, let Xv be a random variable such that: (8) Xv = 1 if v has a link with u, 0 otherwise. Theorem 3 shows that it is difficult to obtain a high PS value in the large sparse random network. This theoretic result indicates that the distribution of PS values is strongly peaked, that is, most PS values are near by zero. In fact, even in the small random network, the upper bound intro- duced in Lemma 1 is often a small value. For example, let κ = 0.0001, N = 280,  = 20 and λ = 8, then we have P r(cid:2)P S(u, S) ≥ 0.01(cid:3) ≤ 6.54%. Overall, the high PS value between u and S in the real sparse network is an indicator that there is a significant correlation between u and S. This provides us a theoretical basis for our community detection algorithm. To formulate a vertex-centric metric of a community, we have: F (S) = P S(u, S) = 2lS N − KS N 2 , (6) (cid:88) u∈S where lS is the number of the edges inside community S and KS represents the sum of degrees of all vertexes in community S. Then, the objective function for a community partition is: M(cid:88) M(cid:88) (cid:16) 2lSj Γ(P ) = F (Sj) = j=1 j=1 − KSj N 2 N (7) (cid:17) . 3.2.2 φ-Coefficient φ-Coefficient [54] is a variant of Pearson's Product-moment Correlation Coefficient for binary variables. In association mining, it is often used to estimate whether there is a non- random pattern. Our measurement function based on φ- Coefficient is calculated as: φ(u, S) = = P (CG) − P (C)P (G) (cid:112)P (C)(1 − P (C))P (G)(1 − P (G)) (cid:112)(N − )du(N − du) ωN − du . A positive φ(u, S) value indicates that node u has denser intra-connection with community S and stronger isolation from the rest of graph. Moreover, φ(u, S) has the same range of values as Pearson's Product-moment Correlation Coefficient, i.e. −1 ≤ φ(u, S) ≤ 1. When φ(u, S) = 1, Integrating these two random variables, we have: E[XvY ] = E[Y Xv = 1] · P(Xv = 1) + 0 · P(Xv = 0) = E[Hv]p, 1(cid:112)du(N − du) (cid:105) Xv = 1 = p · E(cid:104) E[φ(u, S)] = E[ JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 (cid:80)n i=1 Xi and ω = (cid:80) where E[Hv] = E[Y Xv = 1]. Besides, we have du = 2 . By the linearity of expectations, v∈S Xv. Let K = (cid:0)(N − )(cid:1)− 1 (cid:112)(N − )du(N − du) n(cid:88) ωN − du (cid:88) ] = K · E[(ωN − du)Y ] = K · E[(N Xv −  = K ·(cid:16) (cid:88) = K · E[HV ] ·(cid:16) v∈S N · E[Y Xi)Y ] i=1 Xv] −  · E[Y (cid:17) v∈S N p − N p = 0. (cid:17) Xi] n(cid:88) i=1 Theorem 4 and Theorem 5 indicate that φ(u, S) is a good community measurement function since it owns the necessary properties P1,P2 and P3. This is the theoretic basis for φ(u, S) to be employed in community detection. Now we can take the sum of φ(u, S) over all u ∈ S to formulate a vertex-centric metric: (cid:88) (cid:88) 2 (cid:88) =(cid:0)(N − )(cid:1)− 1 φ(u, S) = u∈S u∈S u∈S ωN − du (cid:112)(N − )du(N − du) (cid:112)du(N − du) ωN − du . Φ(S) = Despite different definitions on what a community should be have been proposed, some general ideas are widely accepted by most scholars. One of them is that the clique can be regarded as a perfect community. Thus, the loosely connected cliques should be separated from each other as different communities. The modularity function may fail to detect modules which are smaller than a scale in large networks, which is called the resolution limit prob- lem [28] [29]. A more general example in real network has been given in [28], which is shown in Fig. 5. There are two cliques of the same size Cs and Ct, and there is an edge connecting one node u from Cs and another node v from Ct. When the network is large enough, the modularity- 9 a bigger community since this operation will help increase the value of modularity function. Apparently, it is counter- intuitive and disturbing. Fortunately, we can prove that such issue does not occur in Φ(S). Theorem 6. Given a graph G(n, m) with a subgraph which consists of two equal-sized cliques Cs and Ct. There is only one (cid:83)Ct and I = Cs = Ct. Two nodes c and o, where c ∈ Cs edge connecting u and v, where u ∈ Cs and v ∈ Ct. Let P = Cs and o ∈ Ct, both have one edge connecting the rest of graph respectively. Assuming 5 ≤ I < n 4 , then we have Φ(Cs) + Φ(Ct) > Φ(P ). Proof. From I < n 4 . Let ∆Φ = Φ(P ) − (Φ(Cs) + Φ(Ct)) and T = 2 + 1, then ∆Φ can be calculated as: 4 , we can know that  < n 2 (cid:88) ∆Φ =(cid:0)T (N − T )(cid:1)− 1 (cid:88) (cid:112)di(N − di) i∈P ωiN − di N(cid:112)du(N − du) i∈Cs = 2 + 2 (9) Let L = √ ωiN−di di(N−di) N√ du(N−du) , we have: ∆Φ = B( 1 2 Since T = 2 + 1 ≤ n We can obtain: ∆Φ < −B( 1 2 2 . i∈Cs φ(i, P ) − 2Φ(Cs) 2(cid:17) 2 −(cid:0)(N − )(cid:1)− 1 2 and B = (cid:80) (cid:16)(cid:0)T (N − T )(cid:1)− 1 (cid:0)T (N − T )(cid:1)− 1 (cid:0)T (N − T )(cid:1)− 1 (cid:112)(N − ) −(cid:112)T (N − T ) (cid:112)T (N − T )(N − ) 2 , then(cid:112)2(N − 2) < (cid:112)T (N − T ). (cid:112)2(N − 2) −(cid:112)(N − ) (cid:112)T (N − T )(N − ) (cid:88) (N − di) ) + L. ) + L. (cid:112)di(N − di) ωi====== i∈Cs Now we need to analyze B. Firstly, B can be calculated as: Cs u c v o Ct B = = (cid:88) (cid:88) i∈Cs i∈Cs (cid:112)di(N − di) ωiN − di (cid:115) N − di . di  Fig. 5. A network with two equal-sized cliques Cs and Ct, in which there is only one edge between these two cliques. In addition, there is only one edge between each clique and the rest of graph. If network is large enough, modularity optimization will merge these two small modules into one community. based algorithms prefer to merge these two cliques to form We have di = ωi =  for i (cid:54)= u and i (cid:54)= c and dc = du = +1, then: (cid:113) (cid:113) B =( − 1) >( − 1) (N − ) + 2 (N − ). (cid:115) N − ( + 1)  + 1 Next, we will analyze L as well. Since  < du < n 2 , we have: L < N(cid:112)(N − ) (cid:0)T (N − T )(cid:1)− 1 2 . (cid:113) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 Thus, we have a upper bound of 1 2 ∆Φ as: (cid:112)2(N − 2) −(cid:112)(N − ) (cid:112)T (N − T )(N − ) ) ∆Φ < − ( − 1) (N − )( 1 2 = + N (cid:112)(N − )T (N − T ) −( − 1)(cid:112)(N − )(cid:0)(cid:112)2(N − 2) −(cid:112)(N − )(cid:1) + N −( − 1)(N − )(cid:0)(cid:113) −( − 1)(N − )(cid:0)(cid:113) 4 (cid:112)(N − )T (N − T ) Let g() = −(− 1)(N − )(cid:0)(cid:113) 4 (cid:112)(N − )T (N − T ) N− ) − 1(cid:1) + N (cid:112)(N − )T (N − T ) 3 − 1(cid:1) + N 3 − 1(cid:1) + N. Since 4 ≤  < n 2(2 − N 2 , < = . g() decreases as  increases. Then, we have: g() ≤ g(4) < −1.8(N − 4) + N < 0. Thus, ∆Φ < 0. We finish the proof. Theorem 6 reveals the fact that Φ(S) can avoid merging two very pronounced communities. The reason is that Φ(S) takes into account the local structural information of every vertex. Now we will provide a comprehensible interpreta- tion on this point. Firstly, it can be found that all the φ(u, S) values of vertices from Cs are 1 or approximately 1. The value 1 is the maximum value that a vertex can achieve, which indicates that a node completely belongs to a com- munity in the sense that this node connects every member of the community and has no external links. Obviously, the φ(u, S) value will be reduced after merging Cs and Ct if the number of edges across Cs and Ct are too few. If we want to retain the correlation value 1 for each vertex, the vertices from Cs should connect all vertices from Ct. However, it is a far cry from the situation shown in Fig. 6. We can observe that the number of inter-edges across two communities which allows two communities to merge is affected by the Φ(S) values in two communities. When Φ(S) values of two communities are both higher, it will require more inter-edges. One of the main causes of the resolution limit problem is that the modularity only considers the whole community rather than every vertex. Besides, it only depends on the number of edges m when the network is sufficiently large. Let Q be the modularity sum of two communities before the mergence and ´Q be the modularity value after the union. Then, we have: ∆Q = ´Q − Q = ∆l 2m − K1K2 2m2 , where K1 is the degree sum of community 1, K2 is the de- gree sum of community 2 and ∆l is the difference between the number of intra-edges after merging two communities and that before the combination. If ∆Q > 0, it requires ∆l > K1K2 2m . As we can see, when m increases, the number of inter-edges needed will be reduced. As m tends to infinity, any two communities will be merged even if there is only one edge between them. The reason why this happens is that ∆l only embodies the overall structural information of a community and the modularity misses local structural 10 information. To avoid the resolution limit problem as much as possible, first of all, the community metric should con- sider every vertex rather than view the community as a single unit. Second, the community metric should take full advantage of the local structural information. Then, we have the following Theorem. Theorem 7. Given a graph G(n, m) with a vertex u and a community S. To simplify the notations, let Ψ = ΨS\{u} and ψ = ψu, where Ψ is the community vector of S and ψ is the neighbor vector of u. For fixed  > 0, du > 0 and ω > 0, we have: Ψ · ψ N→+∞ φ(u, S) = lim (cid:107)Ψ(cid:107)2(cid:107)ψ(cid:107)2 , where (cid:107).(cid:107)2 is Euclidean norm. Proof. We directly calculate the limit of φ(u, S) as N tends to infinity. lim N→+∞ φ(u, S) = lim N→+∞ = lim N→+∞ ωN − du (cid:112)(N − )du(N − du) (cid:113) ω − du (cid:80)N N )du(1 − du N ) (cid:113)(cid:80)N (cid:113)(cid:80)N i=1 Ψiψi (1 −  N i=1 Ψ2 i i=1 ψ2 i = ω√ du Ψ · ψ = = (cid:107)Ψ(cid:107)2(cid:107)ψ(cid:107)2 . Theorem 7 indicates that φ(u, S) is the Cosine similarity between Ψ and ψ as N tends to infinity. Then, we can recalculate Φ(S) in the limit: Φ(S) = Cos(S) = ωu√ du . (10) (cid:88) u∈S Obviously, it considers the Cosine similarity values between each node and the community. As a result, it is unlikely to perform the community mergence operation in the case of weak inter-connections between two communities. Theorem 6 and Theorem 7 both indicate Φ(S) can mitigate the reso- lution limit problem. 3.3 Summary As a short summary, we would like to present the following remarks. First of all, the use of different correlation functions in our node-centric framework may lead to some different but known community evaluation measures. As shown, modularity, node modularity, neighborhood connectedness and community connectedness in Focs [47] are all concrete examples in our abstract framework. More importantly, we may explore more correlation functions to obtain more effective community evaluation measures in the future. 4 CORRELATION-BASED COMMUNITY DETECTION In this section, we propose a Correlation-Based Community Detection (CBCD) algorithm, which is based on PS measure and φ-Coefficient. CBCD takes a graph G(V, E) as input and generates a partition of G which is the set of detected JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 11 node modularity modularity H M eas u re ofC a n d G f o e r u s a S M e P confidence of C ⇒ G confidenceofG⇒C nb-score com-score P S Correlation Measure Fig. 6. The use of different correlation functions may lead to several different known community evaluation measures. communities. The algorithm is divided into three phases: Seed Selection, Local Optimization Iteration and Commu- nity Merging. 4.1 Seed Selection The goal of Seed Selection is to initialize a set of seed com- munities for our next phase. Our algorithm adopts a local search strategy to optimize the objective function defined in (7), which requires seed nodes to start with. Triadic closure is an important property of social network, which describes the basic process of social network formation [55] [56] [57]. Triangle (clique of size 3) in the network embodies this property. A node contained by a large number of triangles has higher probability of being the core of a community. Thus, we will use the number of triangles as the criterion to select the seed nodes. The specific process is described in Algorithm 1. We first count the number of triangles of every node in the graph and then sort the nodes by their triangle numbers decreasingly. For those nodes with the same number of triangles, we compare their degrees. Then, we go through all the nodes in this order. For every node u that has not been previously visited, we mark u and its neighbor nodes as visited and then put u into the seed node set P . Triangle counting is an important task in data mining and network science [58], which has been widely used in many applications such as community detection and link prediction. There are many exact triangle counting algorithms in the literature [59] [60] [61] [62]. Here we modify the Ayz-Node-Counting algorithm [61] to imple- ment the Triangle-Counting function in Algorithm 1. Ayz- Node-Counting divides the nodes into two parts with a degree threshold β: one set of nodes whose degrees are at most β and another set of nodes whose degrees are at least β. Ayz-Node-Counting enumerates node-pairs that are adjacent to each node from the low degree node set. For the subgraph G induced from the high degree node set, Ayz- Node-Counting uses the fast matrix product to compute the number of triangles for each node in G. By choosing appro- priate β, the worst time complexity of Ayz-Node-Counting is O(m1.4). Since matrix multiplication-based methods may Algorithm 1 Seed Selection. Input: A graph G(V, E). Output: The set of seed nodes P . 1: Initial P = ∅. 2: Triangle-Counting(G). 3: Sort V by the number of triangles decreasingly. 4: for each u ∈ V do 5: 6: 7: 8: 9: 10: 11: 12: end for 13: return P ; Mark u visited. for each v ∈ neighbors(u) do P = P(cid:83){u}. if not visited(u) then Mark v visited. end for end if require large memory due to adjacency matrix storage, we also enumerate over node-pairs in the induced subgraph G. Since the total degree is 2m, then the number of high of Algorithm 2 is O((cid:80) degree nodes is at most 2m β . The worst time complexity β )3). Since we deg(u)2 ≤ (cid:88) have:(cid:88) u∈U deg(u)2) + O(( 2m deg(u)β ≤ β deg(u) = 2mβ, (cid:88) u∈U u∈U u∈V √ √ 2m, we have time complexity O(m the time complexity can be written as O(2mβ) + O(( 2m β )3). Let β = m). In fact, in large sparse network, the number of high degree nodes is small even for low β. In this case, the time complexity of Triangle Counting can be viewed as O(βm). 4.2 Local Optimization Iteration In this phase, we aim at finding a partition that maximizes the objective function defined in (7). Let P be a partition of graph G and P (u) represents the index of the community of a node u. Since the local search strategy (Line 5 to 20) is adopted in this phase, we initially start with a set of seed nodes. Suppose we obtain a partition P = {S1, ..., SM} with P = M from Seed Selection. Despite we call P the "partition", every Sj ∈ P has only one seed node and many other nodes are not assigned to any community. To deal with this initial state, for each node u that is not assigned to any community, we let P (u) = −1. Then, we reformulate the objective function (7) to make it convenient for implementing Local Optimization Iteration: arg max P Γ(P ) = arg max P (cid:88) M(cid:88) u∈V j=1 δ(cid:0)P (u), j(cid:1)(cid:16) lu,Sj N (cid:17) , − Sj du N 2 (10) where lu,Sj is the number of edges between u and Sj, δ(x, y) is the kronecker delta function whose value is 1 if x = y and 0 otherwise. Our optimization algorithm is an iterative process. In each iteration, it will reorganize the partition to improve the value of (9) until a locally optimal solution is achieved. First, we should consider how to assign those end if else end if if u < v then triangles containing u. else if deg(v) < β then if deg(u) ≤ β then if deg(v) < β and deg(w) < β then Increase T C[u], T C[v] and T C[w] by 1. for each pair (v, w) of neighbors of u do if (v, w) exist an edge and v < w then JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 Algorithm 2 Triangle Counting. Input: A graph G(V, E). Output: A array T C such that T C[u] is the number of 1: Initial T C[u] = 0 for all u, U = ∅ and V = ∅. 2: for each u ∈ V do 3: Add u to U. 4: 5: Add u to V. 6: 7: 8: end for 9: for each u ∈ U do 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: end for 30: Induce a subgraph G(V, E(cid:48)) by V. 31: for each u ∈ U do 32: 33: 34: 35: 36: 37: 38: 39: end for 40: return T C; for each pair (v, w) of neighbors of u in G do Increase T C[u], T C[v] and T C[w] by 1. Increase T C[u], T C[v] and T C[w] by 1. Increase T C[u], T C[v] and T C[w] by 1. Increase T C[u], T C[v] and T C[w] by 1. if (v, w) exist an edge and v < w then else if deg(w) < β then end if end for end if end for if u < v then if u < w then if u < v then else end if end if end if end if nodes that are not contained in any community. According to (9), for any partition P , we have: Γ(P ) = (cid:88) ≤ (cid:88) u∈V u∈V M(cid:88) j=1 δ(cid:0)P (u), j(cid:1)(cid:16) lu,Sj (cid:16) lu,S N max S∈AC(u) N − Sdu N 2 (cid:17) − Sj du N 2 (cid:17) , (11) where AC(u) is the set of communities whose nodes are adjacent to node u. Obviously, (10) is more easily to find the maximum value than (9) if we do not modify the current partition and the PS value of each node is computed independently from others. Thus, we will find a community S for each unassigned node u by maximizing P S(u, S) 12 (cid:1) − SKS N 2 (Line 7 to 13). Then, we put node u into community S and update Γ(P ) with the difference brought by this operation (Line 14 to 18): ∆F = F (S(cid:48)) − F (S) = 2(lS(cid:48) − lS) 2lS(cid:48) N − S(cid:48)KS(cid:48) − S(cid:48)KS(cid:48) − SKS N 2 −(cid:0) 2lS − (S + 1)(KS + du) − SKS N 2 − (S + 1)du + KS N 2 N . N 2 = = = N 2lu,S N 2lu,S N In practice, for each node, the partition is modified after performing the steps described in Line 7 to 18, which is to make the algorithm more robust to local maxima. Next, we consider the nodes that have already been assigned to a community. Line 21 to 39 in Algorithm 3 describes the parti- tion refinement step. It refines the partition obtained in local search step (Line 5 to 20) using a hill climbing method. In each iteration, we perform the movements of nodes between communities to improve the value of Γ(P ). For each node u belonging to a community S, we compute the difference brought by removing u from S, ∆F = F (S)−F (S(cid:48)) (Line 23 to Line 25). For a community Sj, we compute the difference j) − F (Sj). We brought by adding u to Sj, ∆Fj = F (S(cid:48) choose a community Si such that ∆Fi > ∆F and ∆Fi−∆F are maximized. Then, we add u to Si and remove u from S to update the partition. The local search step and the partition refinement step are performed alternately until every node has been assigned to a community and objective function Γ(P ) converges. 4.3 Community Merging After Local Optimization Iteration, there may be many small but significant communities. We need a merging operation to find communities with suitable size. The theoretical basis of Community Merging comes from section 3.2.2. Φ(S) is the criterion used in Community Merging to judge whether two communities should be merged. Note that here Φ(S) is just used to implement the merging operation instead of being an objective function. In the whole process, we maintain a max-heap which contains a set of elements and supports delete or insert operation in O(log n) time. Community Merging is described in Algorithm 4. First, we start off with each community Si ∈ P being the sole node of a graph F and establish an edge between Si and Sj if at least one edge links them. F is a weighted graph, in which the weight between community i and j is ∆Wij = Φ(Si pair (i, j) that ∆Wij > T h, we put a triad (i, j, ∆Wij) into max-heap M ax H. In each iteration, we take the triad (i, j, ∆Wij) from the top of M ax H whose ∆Wij is the maximum and merge community i and community j. For the union operation, we can use the disjoint-set data struc- ture to implement it. Next, we update the graph F and put the new triad (i, k, ∆Wik) whose ∆Wik > T h into M ax H. We continue these steps until M ax H is empty. The threshold T h controls the size of communities we find. If T h is too high, the detected communities may be too small. If T h is too low, the detected communities may be too (cid:83) Sj) − Φ(Si) − Φ(Sj). Then, for each i = −1, t = −∞. for each S ∈ neighbor community(u) do N − (S +1)du+KS N 2 . i = −1, j = Pk(u). t = 0, H = Sj\{u}. M = 2lu,H for each S ∈ neighbor community(u) do . N − (S +1)du+KS N 2 N 2 − M. end if end for if i (cid:54)= −1 then if u not in any community then Compute P S = lu,S if P S > t then k + +. Pk = Pk−1. for each u ∈ V do Γ(Pk) = Γ(Pk) + 2lu,S Add u to Si. Update Pk. N − S du N 2 . i = index(S), t = P S. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 Algorithm 3 Local Optimization Iteration. Input: A graph G(V, E) and a seed set P . Output: A partition of graph G. 1: Initial P0 = P , k = 0 and Γ(Pk) = 0. 2: repeat 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: until Γ(Pk) < Γ(Pk−1) 41: return Pk−1; N − H du+KH Compute ∆Γ = 2lu,S if ∆Γ > t then Γ(Pk) = Γ(Pk) + t. Add u to Si. Remove u from Sj. Update Pk. end for for each u ∈ V do if u assigned to a community then end for if i (cid:54)= −1 then i = index(S), t = ∆Γ. end for end if end if end if end if end if big so that even the resolution limit problem will happen. In practice, Φ(S) often requires a great number of inter- connections for merging two communities. Thus, we need to properly relax T h to be an appropriate small negative value. Such a relaxation will not lead to the resolution limit problem, but can help us find communities with suitable size. To give a theoretical analysis in large network, recalling Theorem 7 introduced in section 3.2.2, the mathematical expression of Cos(S) is given in (10). If we do not want to merge two equal-sized cliques C1 and C2 (C1 = C2 ≥ 5 and there is only one edge between C1 and C1), we should have: T h > Cos(C1 (cid:91)C2) − Cos(C1) − Cos(C2) = −2.947214. 13 end if end for if ∆Wuv > T h then M ax H. push( (cid:104)u, v, Wuv(cid:105) ). for each Sv ∈ neighbors(Su) do Algorithm 4 Community Merging. Input: A graph G(V, E) , a threshold T h and a partition P . Output: Detected communities. 1: Initialize a max-heap M ax H = ∅. 2: Construct a community graph F(P, ∆W ) by G and P . 3: for each Su ∈ P do 4: 5: 6: 7: 8: 9: end for 10: while M ax H not empty do 11: 12: M ax H.pop( ). 13: 14: 15: 16: 17: 18: 19: 20: end if 21: 22: end while 23: Update P . 24: return P ; Union Sv and Su. for each Sw ∈ neighbors(Sv) do Update ∆Wuw and ∆Wwu. if ∆Wuw > T h then (cid:104)u, v, ∆W (cid:48) uv(cid:105) = M ax H.top( ). if Su exist and Sv exist and ∆W (cid:48) M ax H.push( (cid:104)u, w, Wuw(cid:105) ). uv = ∆Wuv then end for end if We suggest the user to choose an appropriate threshold T h such that −2.9 < T h < 0. 4.4 Complexity Analysis As it has been discussed, the time complexity of Seed Selec- tion is O(βm), where β is a constant. As for Local Optimiza- tion Iteration, we need to go through all the edges in each iteration. Thus, its time complexity is O(M ax It·m), where M ax It is the number of iterations that Local Optimization Iteration needs. In practice, we can set M ax It = 20 and it is sufficient for Local Optimization Iteration to converge. For Community Merging, we need to merge two communities and insert new elements into a max-heap in each iteration. We use both path compression and union by size to en- sure that the amortized time per union operation is only O(α(n)) [63] [64], where α(n) is the inverse Ackermann function which can be viewed as a constant. Thus, we have O(n) for the union operation in general. For insert operation, the worst time complexity is O(m log n) since we have to go through every neighbor of the community in each iteration. Totally, the time complexity is O(m + n + m log n). 5 EXPERIMENTAL RESULTS In this section, the proposed algorithm CBCD is compared with the existing state-of-the-art algorithms on both syn- thetic networks and real networks. Each node in these two different kinds of networks has a ground truth com- munity label. For communities found by the detection algorithms, we need to compare them with the ground truth communities. A criterion is necessary to measure the JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 similarity between the final partition of the algorithm and the actual communities. Many evaluation measures, such as Normalized Mutual Information (NMI) [65], ARI [66] and Purity, have been proposed to evaluate the clustering quality of algorithms. NMI is the most widely-accepted and important evaluation measure, since it is more discrimina- tory and more sensitive to errors in the community detec- tion procedure [65]. We will use NMI as our performance evaluation measure in the experiments. The code of NMI calculation offered by McDaid et al. [67] can be found at https://github.com/aaronmcdaid/Overlapping-NMI. According to the comparative analysis of community detection algorithms [68], Louvain and Infomap are two of the best classical algorithms in the literature. Thus, we will take these two algorithms as the competing algorithms. Besides, some novel algorithms proposed in recent years will also be compared with CBCD. These algorithms are listed as follow: • Louvain [69] is a well-known heuristic algorithm based on modularity. The algorithm is composed of two steps which are performed iteratively. The first step is to move each node to the community that the gain of modularity is positive and maximum. The next step is to build a new weighted network whose nodes are com- munities found in first step. The procedure will con- tinue until modularity achieves a maximum. Louvain can unfold a complete hierarchical community struc- ture for the network. The program can be downloaded from https://sites.google.com/site/findcommunities/. • Infomap [70] is another well-known algorithm based on information theory and random walk. It uses the probability flow of random walks taking place over a network as a description of the network structure and decomposes the network into modules using informa- tion theoretic result to compress the probability flow. It simplifies the organization of network and highlights their relationships. The program can be downloaded from http://www.mapequation.org/code.html. • FOCS [47] is a fast overlapping community detection algorithm, which can detect overlapped communities using the local connectedness. FOCS takes a param- eter OVL as the input, which is a threshold allow- ing for maximum overlapping between two commu- nities. Since our comparison is conducted over the non- overlapped algorithms, we set OVL to 0. The pro- gram can be downloaded from https://github.com/ garishach/focs. • SCD [45] [46] is a community detection algorithm based on a new community metric WCC. WCC considers the triangle as the basic structure instead of the edge or node. The theoretic analysis given in [46] shows that WCC can correctly capture the community structure. The program can be downloaded from https://github. com/DAMA-UPC/SCD. • Attractor [71] is an algorithm based on distance dy- namics. The fundamental basis of Attractor is to view the whole network as an adaptive dynamical system. Each node in this dynamical system interacts with its neighbors and distances among nodes will be changed by the interactions. At the same time, distances will 14 affect the interactions conversely. The dynamical sys- tem eventually evolves a steady system. The Attractor algorithm require a cohesion parameter λ that ranges from 0 to 1, which is used to determine how exclusive neighbors affect distance (positive or negative influ- ence). According to [71], we set λ = 0.5. The pro- gram can be downloaded from https://github.com/ YcheCourseProject/CommunityDetection. For all experiments, without further statement, we set the threshold parameter of our algorithm T h = −2.8 when 0 < V < 4000 and T h = −0.43 when 4000 ≤ V , cor- responding to small networks and large-scale networks. All experimental results have been obtained on a workstation with 3.5 GHz Intel(R) Xeon(R) CPU E5-1620 v3 and 16.0 GB RAM. For Louvain, we adopted the lowest partition of the hierarchy, which is stored in the graph.tree file. For Infomap, the number of outer-most loops to run before picking the best solution is specified to be 10. 5.1 LFR Benchmark LFR Benchmark which is introduced by Lancichinetti et al. [72] is a very popular graph simulation model. The most important parameter of LFR Benchmark is the mixing parameter u. The community structure of LFR network becomes more pronounced as u decreases. In particular, u = 0 indicates that each node only connects the nodes inside its community and u = 1 indicates that each node only connects the nodes outside its community. The pro- gram of LFR Benchmark can be downloaded from https: //sites.google.com/site/santofortunato/inthepress2. We generate several LFR networks characterized by dif- ferent features to compre the performance of various algo- rithms. The number of nodes in all LFR networks is fixed to 1000. We consider 2 × 2 cases, in which the community size parameter is specified within the range [15,30] and [20,50] and the average degree is set to be 15 and 20. For each case, we fix the average degree and the community size, and then increase the mixing parameter u from 0 to 1 to generate a variety of LFR networks for comparison. The performance comparison result in terms of NMI is shown in Fig. 7. As we can see from Fig. 7, CBCD, Louvain and Infomap almost achieve the best clustering performance. The NMI values of all algorithms will decrease when the mixing parameter u tends to 1. This is because the increment of mixing parameter u will introduce more edges among different communities, making it difficult to identify the underlying true communities. CBCD have better perfor- mance when the community size parameter is smaller. Note that even when the community size parameter is relatively big, CBCD still has good performance in comparison with the other algorithms. Except for Infomap and Focs, the performance of other algorithms become better when the average degree parameter is increased, and CBCD is better than all other algorithms when the degree is 20. We can find that Infomap always starts to decrease dramatically when u ranges between 0.6 and 0.7. It is because that Infomap is based on the random walk dynamics and is more sensitive to the noisy inter-edges between commu- nities as u tends to 1. By contrast, CBCD is more robust to these noisy inter-edges despite the fact that Infomap is JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 15 Fig. 7. The performance of different algorithms on LFR benchmark. The panels indicate the NMI value of the detection algorithm as a function of the mixing parameter u. slightly better than CBCD when average degree is 15 and u ranges between 0.55 and 0.65. Compared to Louvain, CBCD is always the winner. Let us consider the maximum community size in the partition obtained by Louvain and CBCD. The relation between the mixing parameter u and the maximum community size of detected partition is plotted in Fig. 8. The maximum community size of both CBCD and Louvain increases as the mixing parameter u is increased. This demonstrates that the detection algorithms tend to combine of two ground-truth communities when u is high. The maximum community size of CBCD is almost always lower than that of Louvain. We can observe that, especially when the mixing parameter u ranges between 0.5 and 0.6, the maximum community size of CBCD is significantly lower than the maximum community size of Louvain. This result show that CBCD can mitigate the resolution problem to some extent. 5.2 Real-World Network In most real-world networks, each node has no ground- truth label. The modularity is typically used to evaluate the quality of detected communities. However, as we have discussed before, modularity is not a good quality measure of communities because of the resolution limit problem. Besides, modularity is found out owning the tendency of following the same general pattern for different classes of networks [73]. Thus, we only conduct our experiment on several well-known real-world networks with ground-truth communities: Karate (karate) [74], Football (football) [5], Personal Facebook (personal) [75], Political blogs (polblogs) [76], Books about US politics (polbooks) [77]. The detailed statistics of real-world networks are given in Table 3, where V denotes the number of the nodes, E denotes the number of the edges, dmax denotes the maximal degree of the nodes, (cid:104)d(cid:105) denotes the average degree of the nodes and C denotes the number of ground-truth communities mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(a) average degree = 15, community size ranging from 15 to 30mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(b) average degree = 15, community size ranging from 20 to 50CBCDInfomapLouvainAttractorSCDFocsmixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(c) average degree = 20, community size ranging from 15 to 30mixing parameter u00.10.20.30.40.50.60.70.80.91NMI00.10.20.30.40.50.60.70.80.91(d) average degree = 20, community size ranging from 20 to 50 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 16 Fig. 8. The maximum community size in the partition generated when the mixing parameter u is ranged from 0 to 0.7. The red curve corresponds to the ground-truth partition. in the network. The performance of the algorithms on the real-world network is shown in Table 4, where NC is the number of communities detected by the algorithm. American college football: American college football network describes football games between Division IA col- leges during the regular season in Fall 2000. It has 115 teams and 631 games between these teams. For each node (team), there is an edge connecting two nodes if two teams played a game. The teams were partitioned into 12 conferences (com- munities). Louvain, Infomap, SCD and Attractor all have good performance on the football data set, and SCD achieve the best performance among these algorithms. We have to admit the fact that these algorithms outperform our method on the football data set. Fig. 9 plots the variation of NMI of the partition detected by CBCD when the threshold T h used in the merging operation increases from -2.8 to 0. As T h increases from -2.8 to -2.2, NMI increases to 0.773 which is the maximal NMI value of CBCD on the football data set. NMI begins to decrease when T h further increases. Note that the number of detected communities increases with the increment of T h. The number of detected communities is 10 when T h = −2.2. The quality of algorithm 4 (Community Merging) is mainly determined by the output of algorithm 3 (Local Optimization Iteration). Although CBCD can achieve a NMI value of 0.773, it still cannot beat other algorithms except Focs. This demonstrates that there is still room for improving algorithm 3. Zachary's karate club network: Karate is a famous network derived from the Zachary's observation about a karate club. The network describes the friendship among the members of a karate club. The network was divided into two parts because of the divergence between administrator and instructor. According to Table 4, CBCD outperforms all other algorithms and achieves a NMI value of 0.840. Two communities are successfully found by CBCD, but our al- gorithm classifies one node '10' into the wrong community. We observe that this node only have two edges and each edge connects one of two communities respectively. It is mixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(a) average degree = 15, community size ranging from 15 to 30LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(b) average degree = 15, community size ranging from 20 to 50LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(c) average degree = 20, community size ranging from 15 to 30LouvainGround-truthCBCDmixing parameter u00.10.20.30.40.50.60.7Maximum Community Size020406080100120140160(d) average degree = 20, community size ranging from 20 to 50LouvainGround-truthCBCD JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 17 The characteristics of real-world network data sets. TABLE 2 Data Sets football karate personal polbooks polblogs V 115 34 561 105 1490 E 613 78 8375 441 19090 (cid:104)d(cid:105) 10.57 4.59 29.91 8.4 27.32 dmax 12 17 166 25 351 C 12 2 8 3 2 The performance of different algorithms on the real-world network. TABLE 3 CBCD Infomap Louvain SCD Focs Attractor football 0.734 0.833 0.838 0.840 0.392 0.833 karate 0.837 0.563 0.259 0.395 0.189 0.04 NMI personal 0.3639 0.248 0.08 0.179 0.171 0.299 polbooks 0.330 0.293 0.158 0.116 0.166 0.315 polblogs 0.391 0.268 0.212 0.085 0.106 0.124 football 9 12 12 14 5 12 karate 2 3 7 8 1 1 NC personal 11 6 17 125 13 56 polbooks 4 5 10 23 9 7 polblogs 6 303 32 664 19 313 tions. CBCD achieves the best performance with relatively high quality (NMI=0.3639) on the personal data set. For Attractor and Infomap, they also achieve good performance. Louvain achieves the worst result. Books about US politics: This network consists of 105 nodes and 441 edges, which is derived from the politic books about US politics published in 2004 when presidential election takes place. Each node represents the book sold at Amazon.com, and each edge represents that two books are frequently co-purchased by the same buyer. Each book is labeled with "liberal", "neutral" or "conservative", that is given by Amazon.com. CBCD gives the best partition with NMI = 0.33 among the comparing algorithms. For Attractor and Infomap yield good performance while Lovain, SCD and Focs have relatively bad performance. U.S. political blog: The polblog network consists of 1490 nodes and 19090 edges, which describes the degree of inter- action between liberal and conservative blogs. Compared to other algorithms, CBCD has the best performance on the polblog data set. Infomap and Louvain also produce good partitions. Attractor, Focs, and SCD yield relatively bad partitions. Fig. 9. The variation of NMI of the partition detected by CBCD when the threshold T h is increased from -2.8 to 0 on the football network. difficult to decide which community it really belongs to. Thus, we consider this node as a noisy node. In fact, it can make sense to assign node '10' to both communities in the context of overlapping community detection. However, this study mainly focuses on non-overlapping community detection. If we delete node '10' from the karate, our CBCD algorithm can achieve the perfect performance of NMI=1. Its output exactly matches the partition of ground-truth com- munities. Infomap achieves the second best performance. For Attractor, the worst performance is due to that it puts all the members into one community. Personal Facebook network: Personal is the network which gives the friendship structure of the first author, where each individual (node) is labeled according to the time period when he or she met the first author. Persons are divided into the different groups according to their loca- 5.3 Large-Scale Real-World Network The large-scale real networks which are provided from [78] all have overlapping ground-truth communities. Despite it is out of the scope of our paper, we will still run CBCD along with other algorithms on these networks to test the performance of our algorithm on large-scale real networks. To evaluate the performance of community detection al- gorithms on the networks with overlapping community structures, Overlapping Normalized Mutual Information (ONMI) [79] is the major evaluation metric in this section. Since we will make a comparison on the networks with overlapping structures, then we set OVL of Focs to 0.6 for detecting overlapping communities. We choose two large- scale networks, Amazon and DBLP, for testing the perfor- mance of different methods. The specific information of these two networks is given as follow. Threshold Th-3-2.5-2-1.5-1-0.500.680.70.720.740.760.780.8 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 18 Fig. 10. The distribution of the PS values of a community for E-R random networks with different parameters. Amazon: It is an undirected network collected by crawl- ing the Amazon website, where each node is a product sold on the website and an edge exists between two nodes (products) if they are frequently co-purchased. The ground- truth communities are determined by the product category. Each connected component in a product category is re- garded as an independent ground-truth community. The whole network have 334863 nodes, 925872 edges and 70928 communities. Ninety-one percent of the nodes participate in at least two communities. DBLP: It is a co-authorship network derived from the DBLP computer science bibliography. Each author of a paper is viewed as a node. Two authors are connected by an edge if they have published at least one paper together. Pub- lication venue, e.g, journal or conference, is the indicator of ground-truth community. The authors who publish papers on the same journal or conference form a community. The whole network have 317080 nodes, 1049866 edges and 13477 communities. Thirty-five percent of the nodes participate in at least two communities. The performance comparison of different algorithms on large-scale real TABLE 4 ET 48s 120s 13s 15s 7s CBCD Infomap Louvain SCD Focs networks with overlapping ground-truth communities Data sets Algorithm ONMI NC 40k 109k 170k 140k 24k 17k 40k 213k 266k 141k 20k 23k 0.132 0.008 0.124 0.146 0.213 0.061 0.246 0.057 0.154 0.158 0.207 0.201 Attractor CBCD Infomap Louvain 43min 42s 132s 16s 6s 5s 22min SCD Focs Attractor DBLP Amazon Table 4 summaries the experimental results of different algorithms on two large-scale real networks, where NC is -0.04-0.03-0.02-0.0100.010.020.030.040.05Bins of PS value00.10.20.30.40.5Fraction of communities(a) community size = 100, 6=10, n=1000-0.04-0.03-0.02-0.0100.010.020.030.04Bins of PS value00.10.20.30.40.5Fraction of communities(b) community size = 100, 6=5, n=1000-2-1012Bins of PS value#10-300.10.20.30.40.5Fraction of communities(c) community size = 100, 6=10, n=10000-101Bins of PS value#10-300.10.20.30.40.5Fraction of communities(d) community size = 100, 6=5, n=10000 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 the number of detected communities and ET is the execution time of various algorithms. For the DBLP network, Focs achieves the best performance and SCD achieves the second- best performance. Despite the performance of CBCD on DBLP is not as good as these two algorithms, CBCD is still better than others. For the Amazon netowrk, CBCD outperforms the other algorithms. Focs is the second-best performer and Attractor is slightly inferior to Focs. Infomap has the worst performance on both DBLP and Amazon, which is in contrast with its performance on small real networks and LFR networks. Although CBCD is effective on detecting meaningful communities, it has no obvious advantage with respect to the execution time. This is what we should focus on in our future work. 5.4 The Distribution of PS Values In this section, we study the distribution of PS values defined in Formula (6) of a community under the E-R model. First, we generate 300 random networks for the specific parameters under the E-R model. These parameters are the average degree λ and the network size n of random net- work. Then, we calculate the PS value of a given community S, which is composed of 100 fixed nodes. Consequently, we obtain 300 PS values of the given communities derived from 300 different random networks. We divide PS values into many bins with equal length, where the low (high) bins correspond to the set of lower (higher) PS values. In Fig. 10, bins are plotted on the x-axis, and for each bin, the fraction of communities whose PS values fall into that bin are plotted on the y-axis. We can observe that the distribution of PS value follows a Gaussian-like distribution. The PS metric values are concentrated near 0 and most values fall into a very narrow interval. This phenomenon corresponds to our theoretical result in section 3.2.1. Comparing Fig. 10 (a) with Fig. 10 (b) and comparing Fig. 10(c) with Fig. 10(d), we can find that the interval that most PS values fall into becomes shorter with the decrease of average degree λ. Besides, the interval that most PS values fall into sharply shortens when the network size n increases. It is a remarkable fact that the PS value of a community in the random networks generated from the E-R model is a very small value. This demonstrates that the PS value of a community is an effective metric for quantifying the goodness of a community structure. 6 CONCLUTION In this paper, we introduce two novel node-centric commu- nity evaluation functions by connecting correlation anal- ysis with community detection. We further show that the correlation analysis is a novel theoretical framework which unifies some existing quality functions and converts community detection into a correlation-based optimization problem. In this framework, we choose PS-metric and φ- coefficient to eliminate the influence of random fluctuations and mitigate the resolution limit problem. Furthermore, we introduce three key properties used in mining association rule into the context of community detection to help us choose the appropriate correlation function. A correlation- based community detection algorithm CBCD that makes use of PS-metric and φ-coefficient is proposed in this paper. 19 Our proposed algorithm outperforms five existing state-of- the-art algorithms on both LFR benchmark networks and real-world networks. In the future, we will investigate more correlation functions and extend our method to overlapping community detection. ACKNOWLEDGMENTS This work was partially supported by the Natural Science Foundation of China under Grant No. 61572094. [2] [3] REFERENCES [1] V. Spirin and L. A. Mirny, "Protein complexes and functional mod- ules in molecular networks," Proceedings of the National Academy of Sciences of the United States of America, vol. 100, no. 21, pp. 12 123 -- 12 128, 2003. S. Papadopoulos, Y. Kompatsiaris, A. Vakali, and P. Spyridonos, "Community detection in social media," Data Mining and Knowl- edge Discovery, vol. 24, no. 3, pp. 515 -- 554, 2012. S. L. Feld, "The focused organization of social ties," American journal of sociology, vol. 86, no. 5, pp. 1015 -- 1035, 1981. [4] N. J. Krogan, G. Cagney, H. Yu, G. Zhong, X. Guo, A. Ignatchenko, J. Li, S. Pu, N. Datta, A. P. Tikuisis et al., "Global landscape of protein complexes in the yeast saccharomyces cerevisiae," Nature, vol. 440, no. 7084, p. 637, 2006. [5] M. Girvan and M. E. Newman, "Community structure in social and biological networks," Proceedings of the National Academy of Sciences of the United States of America, vol. 99, no. 12, pp. 7821 -- 7826, 2002. S. Fortunato, "Community detection in graphs," Physics Reports, vol. 486, no. 3, pp. 75 -- 174, 2009. [7] M. E. Newman and M. Girvan, "Finding and evaluating commu- nity structure in networks," Physical review E, vol. 69, no. 2, p. 026113, 2004. [8] F. Chung, "Spectral graph theory," in Regional Conference Series in [6] Mathematics, 1997, p. 212. [9] Y.-C. Wei and C.-K. Cheng, "Towards efficient hierarchical designs by ratio cut partitioning," in Computer-Aided Design, 1989. ICCAD- 89. Digest of Technical Papers., 1989 IEEE International Conference on. IEEE, 1989, pp. 298 -- 301. [10] S. Mancoridis, B. S. Mitchell, C. Rorres, Y. Chen, and E. R. Gansner, "Using automatic clustering to produce high-level system organi- zations of source code," in Program Comprehension, 1998. IWPC'98. Proceedings., 6th International Workshop on. IEEE, 1998, pp. 45 -- 52. [11] J. Shi and J. Malik, "Normalized cuts and image segmentation," IEEE Transactions on pattern analysis and machine intelligence, vol. 22, no. 8, pp. 888 -- 905, 2000. [12] M. E. Newman, "Fast algorithm for detecting community structure in networks," Physical review E, vol. 69, no. 6, p. 066133, 2004. [13] P. Schuetz and A. Caflisch, "Efficient modularity optimization by multistep greedy algorithm and vertex mover refinement," Physical Review E, vol. 77, no. 4, p. 046112, 2008. [14] J. M. Pujol, J. B´ejar, and J. Delgado, "Clustering algorithm for determining community structure in large networks," Physical Review E, vol. 74, no. 1, p. 016107, 2006. [15] A. Noack and R. Rotta, "Multi-level algorithms for modularity clustering," in International Symposium on Experimental Algorithms. Springer, 2009, pp. 257 -- 268. [16] D. A. Spielman and S.-H. Teng, "Nearly-linear time algorithms for graph partitioning, graph sparsification, and solving linear systems," in Proceedings of the thirty-sixth annual ACM symposium on Theory of computing. ACM, 2004, pp. 81 -- 90. [17] R. Andersen and K. J. Lang, "Communities from seed sets," in Proceedings of the 15th international conference on World Wide Web. ACM, 2006, pp. 223 -- 232. [18] R. Andersen, F. Chung, and K. Lang, "Local graph partitioning using pagerank vectors," in Foundations of Computer Science, 2006. FOCS'06. 47th Annual IEEE Symposium on. IEEE, 2006, pp. 475 -- 486. [19] K. Kloster and D. F. Gleich, "Heat kernel based community detection," in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2014, pp. 1386 -- 1395. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 20 [20] Z. A. Zhu, S. Lattanzi, and V. S. Mirrokni, "A local algorithm for finding well-connected clusters." in ICML (3), 2013, pp. 396 -- 404. [21] T. Van Laarhoven and E. Marchiori, "Local network commu- nity detection with continuous optimization of conductance and weighted kernel k-means," Journal of Machine Learning Research, vol. 17, no. 147, pp. 1 -- 28, 2016. [22] A. R. Benson, D. F. Gleich, and J. Leskovec, "Higher-order organi- zation of complex networks," Science, vol. 353, no. 6295, pp. 163 -- 166, 2016. [23] S. Fortunato and D. Hric, "Community detection in networks: A user guide," Physics Reports, vol. 659, pp. 1 -- 44, 2016. [24] P. Erdos, "On random graphs," Publicationes mathematicae, vol. 6, pp. 290 -- 297, 1959. [25] M. E. Newman, "Mixing patterns in networks," Physical Review E, vol. 67, no. 2, p. 026126, 2003. [26] B. Bollob´as, "A probabilistic proof of an asymptotic formula for the number of labelled regular graphs," European Journal of Combinatorics, vol. 1, no. 4, pp. 311 -- 316, 1980. [27] M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence," Random structures & algorithms, vol. 6, no. 2-3, pp. 161 -- 180, 1995. [28] S. Fortunato and M. Barthlemy, "Resolution limit in community detection." Proceedings of the National Academy of Sciences of the United States of America, vol. 104, no. 1, pp. 36 -- 41, 2007. [29] A. Lancichinetti and S. Fortunato, "Limits of modularity maxi- mization in community detection." Phys.rev.e, vol. 84, no. 2, p. 066122, 2011. [30] R. Guimera, M. Sales-Pardo, and L. A. N. Amaral, "Modularity from fluctuations in random graphs and complex networks," Physical Review E, vol. 70, no. 2, p. 025101, 2004. [31] G. Piatetsky-Shapiro and W. J. Frawley, "Discovery, analysis, and presentation of strong rules," in Knowledge Discovery in Databases, 1991, pp. 229 -- 248. [32] P. Pons and M. Latapy, "Computing communities in large net- works using random walks," in International symposium on com- puter and information sciences. Springer, 2005, pp. 284 -- 293. [33] Y. Pan, D.-H. Li, J.-G. Liu, and J.-Z. Liang, "Detecting community structure in complex networks via node similarity," Physica A: Statistical Mechanics and its Applications, vol. 389, no. 14, pp. 2849 -- 2857, 2010. [34] T. Zhou, L. L u, and Y.-C. Zhang, "Predicting missing links via local information," The European Physical Journal B, vol. 71, no. 4, pp. 623 -- 630, 2009. [35] H.-W. Shen, X.-Q. Cheng, and B.-X. Fang, "Covariance, correlation matrix, and the multiscale community structure of networks," Physical Review E, vol. 82, no. 1, p. 016114, 2010. [36] M. Zarei, D. Izadi, and K. A. Samani, "Detecting overlapping community structure of networks based on vertex -- vertex corre- lations," Journal of Statistical Mechanics: Theory and Experiment, vol. 2009, no. 11, p. P11013, 2009. [37] M. MacMahon and D. Garlaschelli, "Community detection for correlation matrices," Phys. Rev. X, vol. 5, p. 021006, Apr 2015. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevX. 5.021006 [38] N. Bansal, A. Blum, and S. Chawla, "Correlation clustering," Machine learning, vol. 56, no. 1-3, pp. 89 -- 113, 2004. [39] N. Veldt, D. F. Gleich, and A. Wirth, "A correlation clustering framework for community detection," in Proceedings of the 2018 World Wide Web Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2018, pp. 439 -- 448. [40] L. Duan, W. N. Street, Y. Liu, and H. Lu, "Community detection in graphs through correlation," in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2014, pp. 1376 -- 1385. [41] L. Duan, Y. Liu, W. N. Street, and H. Lu, "Utilizing advances in correlation analysis for community structure detection," Expert Systems with Applications, vol. 84, pp. 74 -- 91, 2017. [42] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and S. Bhowmick, "On the permanence of vertices in network com- munities," in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2014, pp. 1396 -- 1405. [43] T. Chakraborty, S. Kumar, N. Ganguly, A. Mukherjee, and S. Bhowmick, "Genperm: a unified method for detecting non- overlapping and overlapping communities," IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 8, pp. 2101 -- 2114, 2016. [44] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and S. Bhowmick, "Permanence and community structure in complex networks," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 11, no. 2, p. 14, 2016. [45] A. Prat-P´erez, D. Dominguez-Sal, and J.-L. Larriba-Pey, "High quality, scalable and parallel community detection for large real graphs," in Proceedings of the 23rd international conference on World wide web. ACM, 2014, pp. 225 -- 236. [46] A. Prat-P´erez, D. Dominguez-Sal, J.-M. Brunat, and J.-L. Larriba- Pey, "Put three and three together: Triangle-driven community detection," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 10, no. 3, p. 22, 2016. [47] S. Bandyopadhyay, G. Chowdhary, and D. Sengupta, "Focs: fast overlapped community search," IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 11, pp. 2974 -- 2985, 2015. [48] P.-N. Tan, V. Kumar, and J. Srivastava, "Selecting the right objec- tive measure for association analysis," Information Systems, vol. 29, no. 4, pp. 293 -- 313, 2004. [49] L. Duan, W. N. Street, Y. Liu, S. Xu, and B. Wu, "Selecting the right correlation measure for binary data," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 9, no. 2, p. 13, 2014. [50] L. Geng and H. J. Hamilton, "Interestingness measures for data mining: A survey," ACM Computing Surveys (CSUR), vol. 38, no. 3, p. 9, 2006. [51] X. F. Wang and G. Chen, "Complex networks: small-world, scale- free and beyond," IEEE circuits and systems magazine, vol. 3, no. 1, pp. 6 -- 20, 2003. [52] R. Albert and A.-L. Barab´asi, "Statistical mechanics of complex networks," Reviews of modern physics, vol. 74, no. 1, p. 47, 2002. [53] C. I. Del Genio, T. Gross, and K. E. Bassler, "All scale-free networks are sparse," Physical review letters, vol. 107, no. 17, p. 178701, 2011. [54] A. Agresti, Categorical Data Analysis, Second Edition, 2003. [55] M. S. Granovetter, "The strength of weak ties," in Social networks. Elsevier, 1977, pp. 347 -- 367. [56] A. Rapoport, "Spread of information through a population with socio-structural bias: I. assumption of transitivity," The bulletin of mathematical biophysics, vol. 15, no. 4, pp. 523 -- 533, 1953. [57] G. Kossinets and D. J. Watts, "Empirical analysis of an evolving social network," science, vol. 311, no. 5757, pp. 88 -- 90, 2006. [58] M. Al Hasan and V. S. Dave, "Triangle counting in large networks: a review," Wiley Interdisciplinary Reviews: Data Mining and Knowl- edge Discovery, vol. 8, no. 2, p. e1226, 2018. [59] A. Itai and M. Rodeh, "Finding a minimum circuit in a graph," SIAM Journal on Computing, vol. 7, no. 4, pp. 413 -- 423, 1978. [60] T. Schank and D. Wagner, "Finding, counting and listing all triangles in large graphs, an experimental study," in International workshop on experimental and efficient algorithms. Springer, 2005, pp. 606 -- 609. [61] N. Alon, R. Yuster, and U. Zwick, "Finding and counting given length cycles," Algorithmica, vol. 17, no. 3, pp. 209 -- 223, 1997. [62] M. Latapy, "Main-memory triangle computations for very large (sparse (power-law)) graphs," Theoretical computer science, vol. 407, no. 1-3, pp. 458 -- 473, 2008. [63] R. E. Tarjan and J. Van Leeuwen, "Worst-case analysis of set union algorithms," Journal of the ACM (JACM), vol. 31, no. 2, pp. 245 -- 281, 1984. [64] R. E. Tarjan, "A class of algorithms which require nonlinear time to maintain disjoint sets," Journal of computer and system sciences, vol. 18, no. 2, pp. 110 -- 127, 1979. [65] L. Danon, A. Diaz-Guilera, J. Duch, and A. Arenas, "Comparing community structure identification," Journal of Statistical Mechan- ics: Theory and Experiment, vol. 2005, no. 09, p. P09008, 2005. [66] L. Hubert and P. Arabie, "Comparing partitions," Journal of classi- fication, vol. 2, no. 1, pp. 193 -- 218, 1985. [67] A. F. McDaid, D. Greene, and N. Hurley, "Normalized mutual information to evaluate overlapping community finding algo- rithms," arXiv preprint arXiv:1110.2515, 2011. [68] A. Lancichinetti and S. Fortunato, "Community detection algo- rithms: a comparative analysis," Physical review E, vol. 80, no. 5, p. 056117, 2009. [69] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," Journal of statistical mechanics: theory and experiment, vol. 2008, no. 10, p. P10008, 2008. [70] M. Rosvall and C. T. Bergstrom, "Maps of random walks on complex networks reveal community structure," Proceedings of the National Academy of Sciences, vol. 105, no. 4, pp. 1118 -- 1123, 2008. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 21 [71] J. Shao, Z. Han, Q. Yang, and T. Zhou, "Community detection based on distance dynamics," in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2015, pp. 1075 -- 1084. [72] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Benchmark graphs for testing community detection algorithms," Physical review E, vol. 78, no. 4, p. 046110, 2008. [73] J. Leskovec, K. J. Lang, and M. Mahoney, "Empirical comparison of algorithms for network community detection," in Proceedings of the 19th international conference on World wide web. ACM, 2010, pp. 631 -- 640. [78] J. Yang and J. Leskovec, "Defining and evaluating network com- munities based on ground-truth," Knowledge and Information Sys- tems, vol. 42, no. 1, pp. 181 -- 213, 2015. [79] A. Lancichinetti, S. Fortunato, and J. Kert´esz, "Detecting the overlapping and hierarchical community structure in complex networks," New Journal of Physics, vol. 11, no. 3, p. 033015, 2009. [74] W. W. Zachary, "An information flow model for conflict and fission in small groups," Journal of anthropological research, vol. 33, no. 4, pp. 452 -- 473, 1977. [75] J. D. Wilson, S. Wang, P. J. Mucha, S. Bhamidi, A. B. Nobel et al., "A testing based extraction algorithm for identifying significant communities in networks," The Annals of Applied Statistics, vol. 8, no. 3, pp. 1853 -- 1891, 2014. [76] L. A. Adamic and N. Glance, "The political blogosphere and the 2004 us election: divided they blog," in Proceedings of the 3rd international workshop on Link discovery. ACM, 2005, pp. 36 -- 43. [77] V. Krebs, "Social network analysis software & services for organi- zations, communities, and their consultants," 2013.
1602.00252
1
1602
2016-01-31T14:31:20
Comment Diffusons-nous sur les R\'eseaux Sociaux ?
[ "cs.SI" ]
The emergence of new communication media such as blogs, online newspapers and social networks allow us to go further in the understanding of human behavior. Indeed, these public exchange spaces are now firmly planted in our modern society and appear to be powerful sensors of social behavior and opinion movements. In this paper, we focus on information spreading and attempt to understand what are the conditions in which a person decides to speak on a subject. For this purpose, we propose a set of measures that aim to characterize the diffusion behavior. Our measures have been used on messages related to two events that took place in January 2015: presentation by Microsoft of a new virtual reality headset and the election of a political party of radical left in Greece.
cs.SI
cs
Comment Diffusons-nous sur les Réseaux Sociaux ? Erick STATTNER Maitre de Conférences en Informatique Université des Antilles [email protected] Information, influences et propagation via les médias en ligne Communication de recherche Mots-clés: Réseaux complexes; Média sociaux; Diffusion; Analyse et fouille de données; Comportement humain RESUME L'émergence des nouveaux moyens de communication tels que les blogs, les journaux en ligne ou les réseaux sociaux nous permettent d'aller plus loin dans la compréhension des comportements humains. En effet, ces espaces d'échange publiques sont aujourd'hui fermement ancrés dans nos sociétés modernes et s'avèrent être de puissants capteurs des comportements sociaux et des mouvements d’opinions. Dans ce travail, nous nous intéressons à la diffusion d'informations et cherchons à comprendre quelles sont les conditions dans lesquelles une personne décide de s'exprimer sur un sujet. Nous proposons pour cela un ensemble de mesures qui visent à caractériser les comportements de diffusion. Nos mesures ont été utilisées sur les messages liés à deux évènements ayant eu lieu au mois de Janvier 2015: la présentation par Microsoft d'un nouveau casque de réalité virtuelle et l'élection d'un parti politique de gauche radical en Grèce. 1 I. INTRODUCTION La capacité qu'ont aujourd'hui les medias sociaux à agréger les écrits, les opinions et les pensées de l'humanité en font des outils puissants pour comprendre l'inconscient collectif et identifier les tendances émergentes. De nombreux travaux ont par exemple montré qu'un réseau social tel que Twitter est un extraordinaire capteur de comportements sociaux qui renferme en son sein des indicateurs qui, une fois traités et fouillés, permettent d'aborder des questions très larges telles que l'incidence d'une épidémie dans une population (Gomide et al., 2011), le résultat d'une élection politique (Tumasjan et al., 2010), l'évolution des indices de marché boursier (Bollen et al., 2011) ou la prévision du revenu d'un film au box office (Asur et Huberman, 2010). Dans ce travail, nous nous intéressons au problème de la diffusion d'informations et cherchons à comprendre quelles sont les conditions dans lesquelles une personne décide de s'exprimer sur un sujet. Ce problème est particulièrement intéressant puisque l'émergence de ces mêmes médias sociaux a également redéfini nos comportements de communication. D'une transmission d'informations de personne à personne, longtemps qualifiée de "bouche à oreille", nous sommes aujourd'hui dans l'ère de la communication impersonnelle, où nous retransmettons de l'information de manière asynchrone sans contact personnalisé avec les potentiels destinataires. Si de nombreux modèles de diffusion ont été proposés dans la littérature, tels que modèles à compartiments (Mollison, 1995; Diekmann and Heesterbeek, 2000), des modèles à métapopulation (Grenfell et al., 1997, Colizza et al. 2007) ou des modèles basés sur les réseaux (Salathe and Jones, 2010; Stattner et al., 2012), ils visent à reproduire les tendances globales observées, à travers des règles de transmission simplifiées qui ne reflètent pas toute la complexité des comportements individuels véritablement impliqués dans ces processus. Par exemple, en étudiant la diffusion de fichiers dans un réseau pair-à-pair, Albano et al. (Albano et al., 2010) ont montré que le modèle de diffusion classique SI (Susceptible-Infecté) ne reproduit pas fidèlement le phénomène. Le réseau social Twitter est un bon cas d'étude pour aborder le problème de la diffusion puisque tous les sujets de société y sont abordés. Il possède une grande variété d'utilisateurs: professionnels, particuliers, politiciens, associations, syndicats, entreprises, etc. La plateforme est, de plus, utilisée par 200 millions d'utilisateurs et 500 millions de messages y sont publiés chaque jour1. Ainsi, les tendances observées sur ce réseau fournissent des indicateurs pertinents pour comprendre comment l'information se transmet et se propage dans une communauté. Dans ce travail, nous utilisons donc Twitter comme média support et cherchons à comprendre les comportements en termes de diffusion. Notre objectif est d'apporter des éléments de réponse à des questions telles que: (Qi) Un individu diffuse t-il parce qu'il se sait très écouté? (Qii) Un individu diffuse t-il parce qu'il est inondé de messages par sa communauté? (Qiii) Combien de temps attend un individu avant de s'exprimer? 1 source: www.blogdumoderateur.com/chiffres-twitter/ 2 Pour répondre à ces questions, nous proposons un ensemble de mesures qui visent à décrire le processus globalement et localement. Nous commençons par utiliser l'API Twitter (Yamamoto, 2010) pour collecter tous les messages émis sur un sujet donné et pour obtenir l'état de voisinage d'un individu à chaque fois qu'il s'exprime sur le sujet ciblé. Nos mesures sont parallèlement calculées sur le jeu de données chaque fois qu'un nouveau message est identifié. Notre approche a été utilisée pour étudier pendant trois jours, les messages liés à deux événements ayant eu lieu en Janvier 2015. Le vendredi 23, la présentation par Microsoft d'un nouveau casque de réalité virtuelle appelé HoloLens et le Samedi 25, l'élection du parti politique de gauche radical Syriza en Grèce. Ces événements ont été choisis pour leur nature différente. D'une part un sujet technologique qu'on suppose être relativement neutre, et de l'autre un sujet politique, naturellement plus clivant, et susceptible de générer des discussions actives au sein du réseau. Les résultats obtenus montrent qu'il existe une les comportements individuels de diffusion. Enfin, notre approche a été implémentée dans un outil graphique, appelé ThotS, qui permet de mener une analyse en temps réel sur toute sorte de sujets ciblés sur Twitter. Ce papier est organisé en sept sections. La Section 2 présente les travaux pionnés menés sur l'analyse de données issues de Twitter pour aborder différents phénomènes. La Section 3 est consacrée à la méthodologie que nous proposons pour caractériser le processus de diffusion. Les Sections 4 et 5 présentent les résultats obtenus sur deux cas d'étude. La Section 6 décrit l'outil graphique ThotS qui implémente l'approche proposée. Enfin, nous concluons dans la Section 7 et présentons nos travaux futurs. forte hétérogénéité dans II. DE TWITTER A LA CONNAISSANCE Twitter offre une gigantesque base de données, qui couvre à la fois les messages publiés sur différentes catégories de sujets et des informations personnelles sur les utilisateurs du système. Bien que les travaux menés sur l'analyse des données issues de Twitter soient relativement récents, ils ont déjà permis d'aborder de nombreux phénomènes du monde réel. Par exemple, Guille et Favre (Guille et Favre, 2014) ont récemment proposé une méthode qui analyse en temps réel les messages postés sur Twitter afin de détecter l'apparition de pics de popularité sur des sujets. Contrairement à l'approche classique appelée Peaky Topics (Shamma et al., 2011), qui repose sur une augmentation soudaine de la fréquence d'apparition d'un mot ou d'une expression, la méthode proposée est basée sur la notion de liens dynamiques, c'est-à-dire des messages faisant référence à d'autres utilisateurs. Les auteurs montrent ainsi que la fréquence des références est un indicateur du niveau d'intérêt que génère le sujet. Dans un autre contexte, Sakaki et al. (Sakaki et al., 2010) s'intéressent à la détection d'événements ciblés et proposent un algorithme capable de surveiller les messages postés sur Twitter et de détecter ces événements. Ils se concentrent en particulier sur la détection des tremblements de terre et ils montrent que leur système détecte les tremblements de terre rapidement avec une forte probabilité (96% des tremblements 3 de terre recensés par l'Agence météorologique japonaise (JMA)). Leur approche a été mise en oeuvre dans un système d'alertes qui fournit des notifications beaucoup plus rapidement que les annonces envoyées par la JMA. Sur le même principe, nous pouvons citer les travaux d'analyse des messages postés sur Twitter menés par Gomide et al. (Gomide et al., 2011) pour évaluer l'incidence de l'épidémie de dengue au Brésil en termes de perception du public et d'évolution spatio-temporelles, ou les travaux de Velardi et al. (Velardi et al., 2014) pour la détection précoce et l'analyse d'une épidémie dans une population. Plus généralement, les messages issus de Twitter ont été utilisés pour étudier différents types d'événements du monde réel. Tumasjan et al. s'intéressent par exemple à l'élection fédérale allemande (Tumasjan et al., 2010). Ils observent que les opinions présentes dans les messages mentionnant un parti reflètent le résultat des élections. Dans (Bollen et al., 2011), les auteurs observent que l'humeur publique extraite de messages sur Twitter peut améliorer la prédiction des indices de marché boursier. Asur et Huberman vont plus loin et déclarent que les médias sociaux tels que Twitter peuvent "prédire le futur" (Asur et Huberman, 2010). Ils démontrent leur assertion en analysant les messages de Twitter pour prédire les recettes de films au box-office. Sakaki et al. tentent de généraliser ce type d'approche en soutenant que des médias sociaux tels que Twitter peuvent être exploités pour étudier tout phénomène présentant trois propriétés principales (Sakaki et al., 2011): (i) une apparition à grande échelle, c'est-à-dire qu'un très grand nombre d'utilisateurs sont concernés, (ii) une influence sur la vie quotidienne des gens, qui est la raison pour laquelle ils décident de poster un ou plusieurs messages sur le sujet, et (iii) une dimension spatiale et temporelle, de sorte qu'une analyse spatio-temporelle soit possible. Ces propriétés sont couvertes par de nombreux phénomènes naturels tels que des tremblements de terre, des ouragans, des tsunamis, etc., mais aussi des événements sociaux tels que des événements sportifs, des conférences, des élections, etc. III. MESURER LA DIFFUSION Le site de micro-blogging Twitter (Le microblog est un dérivé du blog, qui permet de publier des articles courts) peut être vu comme un immense réseau orienté (c’est-à- dire qu’un lien de A vers B, n’implique pas nécessaire l’existence d’un lien de B vers A) dans lequel chaque utilisateur (noeud du réseau) a un ensemble d'abonnés qui le "suivent" appelés Followers et un ensemble d'utilisateurs auxquels il est abonné et qu’il "suit", appelés Followings. L’ensemble des followers et des followings constitue les liens du réseau. La notion de "suivi" fait ici référence à l'intérêt pour le contenu publié par un utilisateur. La Figure 1 montre un exemple du réseau induit par Twitter à travers les liens de suivi. Les utilisateurs 2 et 3 sont les Followers de l’utilisateur 1 et les utilisateurs 4, 5 et 6 sont ses Followings. Figure 1. Exemple de followers et followings de l'utilisateur 1 4 Chaque utilisateur peut publier des messages, appelés Tweets, qui correspondent à des textes courts qui n’excedent pas 140 caractères. Ces messages sont généralement des nouvelles, des opinions sur un sujet donné ou des informations personnelles sur la vie de l’utilisateur. Ils peuvent également contenir des liens vers des images, des vidéos ou des articles. Les tweets sont affichés sur la page de profil de l'utilisateur et sont présentés à ses followers. Un ensemble de meta-données est également associé à chaque tweet telles que la date, le lieu, l’auteur, les liens et les hashtags utilisés, etc. Twitter offre également la possibilité de retransmettre un tweet publié par un utilisateur, ce concept est appelé le retweet. Le retweet est un moyen populaire de propager un contenu intéressant à ses Followers. Ainsi, chaque fois qu'un utilisateur publie un message, ses followers sont susceptibles de le lire et de le retransmettre à l'attention de leurs propres followers, soit en retweetant le message original, soit en publiant un nouveau tweet sur le même sujet. Notre objectif est de comprendre quelles sont les conditions dans lesquelles une personne décide de s’exprimer sur un sujet. Nous proposons pour cela un ensemble de mesures que nous utilisons pour répondre aux questions (Qi), (Qii) et (Qiii) présentées dans l'introduction. Plus concrètement, nous utilisons l'API Twitter pour capturer en temps réel l'ensemble des messages émis sur un sujet donné. Chaque fois qu’un message est publié sur le sujet ciblé, nous maintenons à jour deux types d’indicateurs : 1. Indicateurs globaux, qui visent à décrire globalement le processus et son évolution dans le temps :  NbTw, NbRTw, NbUs: correspondent respectivement aux nombres de tweets, de retweets et d’utilisateurs enregistrés sur la période d’étude.  AVG(Tw/Us), AVG(RTw/Us) : correspondent respectivement aux nombres moyens de tweets et de retweets publiés par utilisateur.  AVG(Ttw), AVG(Trtw): correspondent respectivement à la durée moyenne (en secondes) entre deux tweets et deux retweets publiés sur le sujet ciblé. 2. Indicateurs locaux, qui visent à caractériser l’environnement d’un utilisateur u donné la première fois qu’il publie un message sur le sujet ciblé.  NbFeu: représente le nombre de followers de l’utilisateur u.  NbFgPu: correspond au nombre de followings de l’utilisateur u qui ont publié un message avant lui sur le sujet ciblé.  NbTu: est le nombre total de tweets publiés sur le sujet par   l’utilisateur u. TotalRu: correspond au nombre total de messages envoyés par les followings de l’utilisateur u. Elapsedu: est le temps écoulé avant que l'utilisateur u s’exprime pour la première fois (en heures). Ces mesures ont été utilisées pour étudier deux événements ayant eu lieu en Janvier 2015: (a) le vendredi 23, la présentation par Microsoft d'un nouveau casque de réalité virtuelle appelé HoloLens et (b) le Samedi 25, l'élection en Grèce du parti politique de gauche radical Syriza. Les messages sur ces deux événements ont été collectés sur 72 5 heures. Nous précisons également que les résultats sont présentés avec le fuseau horaire de Paris en France (UTC+1). Les messages sur l’événement HoloLens ont été obtenus en capturant tous les tweets contenant les mots-clés "HoloLens" ou "Holo Lens". De même, l’ensemble des messages sur Syriza a été obtenu en capturant tous les messages contenant les mots- clés "Syriza" ou "Tsipras". Enfin, nous précisons que la méthode de collecte n’est pas sensible à la casse. IV. COMPORTEMENTS MACROSCOPIQUES (AVG(Ttw) Dans une première approche, nous nous sommes concentrés sur le comportement global des phénomènes étudiés. Notre objectif était de comprendre comment évolue avec le temps la diffusion des messages, au travers des indicateurs globaux proposés dans la section précédente. La Figure 2 montre, pour chacun des évènements, l’évolution de ces indicteurs en fonction du temps : (a) nombre de tweets, de retweets et de nouveaux utilisateurs (NbTw, NbRTw et NbUs), (b) nombre moyen de tweets et de retweets par utilisateur (AVG(Tw/Us) et AVG(RTw/Us) et (c) temps moyen (en secondes) entre deux tweets et retweets et AVG(Trtw)). Nous observons tout d’abord que les deux évènements n’ont pas la même amplitude: 46 317 tweets, 1 5633 retweets et 30 629 utilisateurs ont été collectés pour HoloLens alors que pour Syriza nous dénombrons 255 tweets, 94 780 retweets et 74 101 utilisateurs. Nous également observer que dans les deux cas, l'intérêt pour le sujet diminue avec le temps (cf. Figure 2 (a)). Cela se traduit par une baisse au cours du temps du nombre de messages (tweets et retweets) et du nouveaux utilisateurs s'exprimant. Il est également intéressant de noter la différence dans le comportement des utilisateurs pour ces deux évènements. En effet, pour l'événement HoloLens, le nombre de nouveaux utilisateurs est plus élevé que le nombre de retweets. Ce résultat laisse à penser que pour le sujet technologique, les utilisateurs ont peu utilisé la fonctionnalité de retweet et ont préféré soumettre leur propre message. Figure 2. Evolution des indicateurs globaux nombre de 168 pouvons 6 En ce qui concerne le nombre moyen de messages (tweets et reteweets) par utilisateur (cf. Figure 2 (b)), nous observons que pour les deux évènements, le nombre de tweets par utilisateur est toujours supérieur à celui des retweets. Ce résultat traduit le fait que les utilisateurs tendent à commenter eux-mêmes le sujet plutôt que retweeter un message déjà soumis. En revanche, bien que le nombre d'utilisateurs décroisse avec le temps (observé sur la Figure 2 (a)), nous notons que sur le sujet politique, ceux qui poursuivent les discussions sont beaucoup plus actifs. Cela se traduit en particulier par une hausse du nombre moyen de messages par utilisateur, qui n'est pas observée dans le cas du sujet technologique. Ainsi, alors que la communauté autour du sujet politique décroit, les utilisateurs qui maintiennent les discussions sont, eux, plus actifs. Cela peut s’expliquer par la nature politique du sujet, qui est plus enclin à générer des échanges actifs du type "argument/contre argument". Les résultats obtenus concernant le temps moyen entre deux messages sont très intéressants (cf. Figure 2 (c)). Dans les deux événements, nous notons que le temps écoulé entre deux retweets est toujours plus élevé que celui observé entre deux tweets. Cela confirme notre précédente observation selon laquelle le nombre de retweets est moins important. De plus, sur le cas Syriza, des motifs répétitifs peuvent être observés, durant lesquels le temps entre deux messages est très faible, puis croît considérablement avant de rechuter. Les périodes où le temps est le plus long correspondent aux nuits en Europe. On peut supposer que les citoyens européens, qui sont les plus concernés par l'événement, et donc les plus présents dans les discussions, sont moins actifs durant ces périodes. Ces motifs ne s’observent pas dans le cas de HoloLens. Cela peut être expliqué par le fait que le sujet de la réalité augmentée est un sujet qui va au-delà des zones géographiques et qui fait réagir des communautés présentes dans le monde entier. V. VERS UNE DIFFUSION COMPORTEMENTS INDIVIDUELS INDUITE PAR DES Dans une deuxième approche, nous abordons le problème d’un point de vue local, en étudiant les situations dans lesquelles un individu est le plus susceptible de s’exprimer sur un sujet. Nous cherchons, en particulier, à répondre aux questions soulevées dans l’introduction: (Qi) Un individu diffuse t-il parce qu'il se sait très écouté? (Qii) Un individu diffuse t-il parce qu'il est inondé de messages par sa communauté? (Qiii) Combien de temps attend un individu avant de s'exprimer? Pour répondre à ces questions, nous nous intéressons à la distribution des indicateurs locaux présentés à la Section III. La figure 3 montre les résultats obtenus pour les deux évènements : (a) nombre de tweets envoyés (NbTu), (b) nombre de followers (NbFeu), (c) nombre de followings qui se sont exprimés avant (NbFgPu), (d) nombre total de messages reçus avant de publier son premier message (TotalRu) et (e) le temps écoulé avant tweeting (Elapsedu). Nous pouvons tout d’abord observer que la majorité des utilisateurs n’a publié qu’un seul message (cf. Figure 3 (a)). En effet, environ 80% des utilisateurs n’ont envoyé qu’un message dans le cas de HoloLens, contre 65% dans le cas de Syriza. Ce résultat 7 évènements. En effet, confirme une observation déjà faite dans la section précédente, selon laquelle la majorité des utilisateurs publie finalement peu de messages. En ce qui concerne les résultats obtenus pour le nombre de followers des individus qui publient (cf Figure 3 (b)), les tendances sont similaires pour les deux la distribution suit une loi de puissance ce qui traduit le fait que la grande majorité des personnes qui se sont exprimées ont peu de followers. Il est, de plus, particulièrement intéressant de noter qu’un pourcentage élevé d’utilisateurs ont posté un message alors qu'ils n’ont aucun follower. Par exemple, dans le cas d’HoloLens, environ 20% des individus ont publié un message alors qu’il ne sont suivis par aucun follower (16% dans le cas de Syriza). Ainsi, ces résultats n'accréditent pas la thèse de l'influence du nombre de followers sur le comportement de diffusion comme formulée par la question (Qi). En revanche, les résultats obtenus pour le nombre de followings à avoir publié un message avant que l’utilisateur ne poste lui-même un message sont assez différents pour les deux évènements (cf. Figure 3 (c)). En effet, pour le cas HoloLens, environ 30% des utilisateurs ont publié un message alors qu’aucun de leur followings n’en avait soumis (environ 7% pour Syriza). Ce résultat suggère que, dans le cas du sujet politique étudié, les individus ont tendance à attendre les réactions des personnes qu’ils suivent avant de réagir. Les mêmes tendances sont observées si on s’intéresse au nombre total de messages envoyés par les followings d’un utilisateur avant qu’il publie lui-même un message (cf. Figure 3 (d)). En effet, dans le cas d’HoloLens 30% des utilisateurs ont publié un message sans qu’aucun de leur following n’en ait posté (6,5% for Syriza). Ainsi, les résultats obtenus ne montrent pas clairement que les personnes attendent d'être submergées de messages par leur communauté avant de réagir, comme suggéré par la question (Qii). Nous observons en effet une forte différence dans les comportements de diffusion selon les sujets étudiés. Si pour le sujet technologique les réactions ne semblent pas être dépendantes des messages reçus, Figure 3. Distribution des indicateurs locaux 8 pour le sujet politique, les utilisateurs semblent attendre les premières réactions de leur communauté avant de réagir. Enfin, en ce qui concerne le temps écoulé avant que les utilisateurs postent leur premier message (cf. Figure 3 (e)), nous observons que pour les deux évènements, la majeure partie des premières réactions survient durant les premières 24 heures. Elles décroissent également avec le temps. Par exemple, pour le cas HoloLens, la moitié des messages a été postée au cours des 24 premières heures (environ 62% pour Syriza). Évidemment, le nombre de premières réactions diminue avec le temps, ce qui reflète une perte d’'intérêt pour le sujet déjà observée dans nos résultats précédents. Il est d’ailleurs intéressant de noter que certains utilisateurs postent des messages pour la premiere fois jusqu'à 72 heures après le début de l’évènement : environ 5% des individus pour HoloLens, contre 2% pour Syriza. Ces résultats apportent ainsi des éléments de réponse à la question (Qiii), puisque nous observons que les premières réactions ont lieu dans les premières heures après le début de l'événement et diminuent fortement avec le temps. Pour aller plus loin dans la compréhension de ces processus, nous avons cherché à vérifier s’il existe des corrélations dans certains comportements de diffusion. Plus particulièrement, nous cherchions à savoir si ceux qui postent le plus de messages sont ceux qui ont le plus de followers, ou sont ceux qui ont été exposés au plus grand nombre de messages de leur followings. La figure 4 montre les résultats obtenus entre: le nombre total de messages postés (NbTu)) et le nombre de followers (NbFeu) ; (b) le nombre de messages total des postés messages par les publiés followings (TotalRu). tout d’abord Nous individus qui observer que postent peu de messages (moins de 20) sont très hétérogènes en termes de followers (cf. Figure 4 (a)). Certains ont très peu de followers, alors ont énormément. Cependant, si nous nous concentrons sur les individus qui se sont exprimés le plus, la population est beaucoup plus homogène. En effet, les individus les plus actifs ne possèdent finalement que très peu de followers. Ce résultat confirme, pour les deux évènements étudiés, la non-influence du nombre de followers dans la quantité de messages envoyés par un utilisateur comme le suggère la question (Qi). Des tendances similaires sont observables en ce qui concerne les corrélations entre le nombre de messages postés et le total des messages publiés par les followings (cf. Figure 4 (b)). En effet, les individus qui s’expriment le moins sont très hétérogènes, puisque nous y trouvons des individus dont les followings peuvent avoir envoyé très Figure 4. Correlations d’attributs individuels pouvons (NbTu)) et le les (a) que d’autres en 9 peu ou énormément de messages. Cependant, la population composée des individus les plus actifs est plus homogène, dans le sens où on y retrouve uniquement des individus dont les followings ont publié peu de messages. VI. THOTS: UN OUTIL DE COLLECTE ET D'ANALYSE La méthodologie proposée a été implémentée dans un outil graphique appelé ThotS 2 (cf. capture d’écran Figure 5). ThotS a été conçu pour collecter et analyser en temps réel les messages publiés sur Twitter. L'outil met en oeuvre les mesures globales et locales proposées pour décrire le phénomène et travaille sur trois axes. 1. Collecte. ThotS capture en temps réel tous les messages publiés sur un sujet donné. Les messages filtrés peuvent être selon différents critères : mot-clés, langue, position, etc. (cf. panneau gauche les Figure 5). Tous messages collectés sont sauvegardés dans un fichier texte pour une analyse future ou dans le but d’une analyse avec des logiciels d’analyse spécialisés dans la visualisation, l’extraction de connaissances, le big data, la modélisation, etc. 2. Exploration. ThotS explore les données collectées selon les indicateurs globaux et locaux présentés à la Section III. Les indicateurs sont calculés et accessibles en temps réel, à travers des tableaux récapitulatifs (cf. panneau bas Figure 5) et des graphiques montrant leur évolution au cours du temps (cf. panneau central Figure 5). Les graphiques sont générés en utilisant l’API développée en JAVA JFreeChart (Gilbert, 2002). L’outil permet également de choisir les indicateurs à afficher et de les superposer sur un même graphique. Figure 5. Capture d'écran de ThotS 3. Extraction de connaissances. ThotS analyse enfin jusqu'au contenu des messages pour en extraire toute l'essence, en fournissant une connaissance utile et directement opérationnelle: meilleurs tweets, mots les plus utilisés, utilisateurs les plus actifs, liens les plus cités, etc. (cf. panneau droite Figure 5). 2 ThotS: http://erickstattner.com/thots-analytics/ 10 VII. CONCLUSION ET PERSPECTIVES Dans cet article, nous avons abordé le problème de la diffusion d'informations sur les medias sociaux. Contrairement aux approches traditionnelles qui se concentrent sur différents types de modèles de diffusion pour comprendre ces phénomènes, nous avons abordé ici le problème d'un autre point de vue en étudiant la diffusion à partir de situations réelles survenant sur le site de micro-blogging Twitter. La première étape de notre travail a consisté à proposer un ensemble de mesures qui visent à décrire la diffusion globalement et localement. Ces mesures ont ainsi pu mettre en lumière certaines dynamiques individuelles impliquées dans la diffusion de messages liée à deux évènements ayant eu lieu en janvier 2015. Cependant, bien que ces résultats aient permis d’apporter des éléments de réponse sur les comportements de diffusion, nous devons garder à l'esprit qu’ils ne peuvent être généralisés, puisque nous avons également observé que la sémantique du sujet ciblé est une dimension à prendre en compte pour comprendre pleinement ces phénomènes. Ainsi, à court terme, nous prévoyons d'étendre notre étude à d'autres types de sujets, dans l'objectif de comprendre l’impact de la sémantique du sujet sur les comportements. Les résultats obtenus soulèvent également de nombreuses questions intéressantes concernant la modélisation. En effet, la plupart des modèles de diffusion supposent que la diffusion est induite par des règles très simples. A long terme, nous voulons exploiter les tendances observées pour proposer des modèles plus réalistes tenant compte des comportements individuels et la sémantique du phénomène. Enfin, ce travail ouvre également des perspectives intéressantes en termes de modélisation prédictive. En effet, les données recueillies pourraient être utilisées pour construire des modèles prédictifs qui pourraient être en mesure de prédire, pour un utilisateur donné, s’il transmettra une information. BIBLIOGRAPHIE A. Albano, J.-L. Guillaume, and B. L. Grand, “File diffusion in a dynamic peer-to-peer network,” Mining Social Network Dynamic 2012 Workshop (MSND), 2012. S. Asur and B. A. Huberman, “Predicting the future with social media,” in Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on, vol. 1. IEEE, 2010, pp. 492–499. J. Bollen, H. Mao, and X. Zeng, “Twitter mood predicts the stock market,” Journal of Computational Science, vol. 2, no. 1, pp. 1–8, 2011. V. Colizza, R. Pastor-Satorras, and A. Vespignani. Reaction–diffusion processes and metapopulation models in heterogeneous networks. Nature Physics, 3(4), 276-282, 2007 11 O. Diekmann and J. A. P. Heesterbeek, Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation. Wiley Series in Mathematical & Computational, Biology, 2000 D. Gilbert, “The jfreechart class library,” Developer Guide. Object Refinery, vol. 7, 2002. J. Gomide, A. Veloso, W. Meira Jr, V. Almeida, F. Benevenuto, F. Ferraz, and M. Teixeira, “Dengue surveillance based on a computational model of spatio- temporal locality of twitter,” in Proceedings of the 3rd International Web Science Conference. ACM, 2011, p. 3. B. Grenfell and J. Harwood. "(Meta) population dynamics of infectious diseases." Trends in ecology & evolution 12.10, 1997 A. Guille and C. Favre, “Une methode pour la detection de thematiques populaires sur twitter,” in Actes de la conference EGC, 2014 D. Mollison, Epidemic Models: Their Structure and Relation to Data, Cambridge, Ed. Cambridge University Press, 1995 T. Sakaki, M. Okazaki, and Y. Matsuo, “Earthquake shakes twitter users: real-time event detection by social sensors,” in Proceedings of the 19th international conference on World wide web. ACM, 2010, pp. 851–860. M. Salathe and J. H. Jones, “Dynamics and control of diseases in networks with community structure,” PLoS Comput Biol, vol. 6, 2010. D. A. Shamma, L. Kennedy, and E. F. Churchill, “Peaks and persistence: modeling the shape of microblog conversations,” in Proceedings of the ACM 2011 conference on Computer supported cooperative work. ACM, 2011, pp. 355–358. E. Stattner, R. Eugenie and M. Collard, "How Do We Spread on Twitter?," IEEE Ninth International Conference on Research Challenges in Information Science, May 13- 15 2015, Athens, Greece E. Stattner, M. Collard, and N. Vidot, “D2snet: Dynamics of diffusion and dynamic human behaviour in social networks,” Computers in Human Behavior, 2012. A. Tumasjan, T. O. Sprenger, P. G. Sandner, and I. M. Welpe, “Predicting elections with twitter: What 140 characters reveal about political sentiment.” ICWSM, vol. 10, pp. 178–185, 2010. P. Velardi, G. Stilo, A. E. Tozzi, and F. Gesualdo, “Twitter mining for fine-grained syndromic surveillance,” Artificial Intelligence in Medicine, 2014. Y. Yamamoto. Twitter4J-A Java Library for the Twitter API, 2010. 12
1909.12642
1
1909
2019-09-27T12:15:58
HateMonitors: Language Agnostic Abuse Detection in Social Media
[ "cs.SI", "cs.CL" ]
Reducing hateful and offensive content in online social media pose a dual problem for the moderators. On the one hand, rigid censorship on social media cannot be imposed. On the other, the free flow of such content cannot be allowed. Hence, we require efficient abusive language detection system to detect such harmful content in social media. In this paper, we present our machine learning model, HateMonitor, developed for Hate Speech and Offensive Content Identification in Indo-European Languages (HASOC), a shared task at FIRE 2019. We have used a Gradient Boosting model, along with BERT and LASER embeddings, to make the system language agnostic. Our model came at First position for the German sub-task A. We have also made our model public at https://github.com/punyajoy/HateMonitors-HASOC .
cs.SI
cs
HateMonitors: Language Agnostic Abuse Detection in Social Media Punyajoy Saha1[0000−0002−3952−2514], Binny Mathew1[0000−0003−4853−0345], Pawan Goyal1[0000−0002−9414−8166], and Animesh Mukherjee1[0000−0003−4534−0044] 9 1 0 2 p e S 7 2 ] I S . s c [ 1 v 2 4 6 2 1 . 9 0 9 1 : v i X r a Indian Institute of Technology, Kharagpur, West Bengal, India - 721302 Abstract. Reducing hateful and offensive content in online social me- dia pose a dual problem for the moderators. On the one hand, rigid censorship on social media cannot be imposed. On the other, the free flow of such content cannot be allowed. Hence, we require efficient abu- sive language detection system to detect such harmful content in social media. In this paper, we present our machine learning model, HateMon- itor, developed for Hate Speech and Offensive Content Identification in Indo-European Languages (HASOC) [19], a shared task at FIRE 2019. We have used Gradient Boosting model, along with BERT and LASER embeddings, to make the system language agnostic. Our model came at First position for the German sub-task A. We have also made our model public 1. Keywords: Hate speech · Offensive language · Multilingual · LASER embeddings · BERT embeddings · Classification. 1 Introduction In social media, abusive language denotes a text which contains any form of unacceptable language in a post or a comment. Abusive language can be divided into hate speech, offensive language and profanity. Hate speech is a derogatory comment that hurts an entire group in terms of ethnicity, race or gender. Of- fensive language is similar to derogatory comment, but it is targeted towards an individual. Profanity refers to any use of unacceptable language without a specific target. While profanity is the least threatening, hate speech has the most detrimental effect on the society. Social media moderators are having a hard time in combating the rampant spread of hate speech2 as it is closely related to the other forms of abusive language. The evolution of new slangs and multilingualism, further adding to the complexity. Recently, there has been a sharp rise in hate speech related incidents in India, the lynchings being the clear indication [3]. Arun et al. [3] suggests that hate 1 https://github.com/punyajoy/HateMonitors-HASOC 2 https://tinyurl.com/y6tgv865 2 P. Saha et al. speech in India is very complicated as people are not directly spreading hate but are spreading misinformation against a particular community. Hence, it has become imperative to study hate speech in Indian language. For the first time, a shared task on abusive content detection has been re- leased for Hindi language at HASOC 2019. This will fuel the hate speech and offensive language research for Indian languages. The inclusion of datasets for English and German language will give a performance comparison for detection of abusive content in high and low resource language. In this paper, we focus on the detection of multilingual hate speech detection that are written in Hindi, English, and German and describe our submission (HateMonitors) for HASOC at FIRE 2019 competition. Our system concate- nates two types of sentence embeddings to represent each tweet and use machine learning models for classification. 2 Related works Analyzing abusive language in social media is a daunting task. Waseem et al. [33] categorizes abusive language into two sub-classes -- hate speech and offensive lan- guage. In their analysis of abusive language, Classifying abusive language into these two subtypes is more challenging due to the correlation between offensive language and hate speech [10]. Nobata et al. [22] uses predefined language el- ement and embeddings to train a regression model. With the introduction of better classification models [23,29] and newer features [1,10,30], the research in hate and offensive speech detection has gained momentum. Silva et al. [28] performed a large scale study to understand the target of such hate speech on two social media platforms: Twitter and Whisper. These target could be the Refugees and Immigrants [25], Jews [7,14] and Muslims [4,32]. Peo- ple could become the target of hate speech based on Nationality [12], sex [5,26], and gender [24,16] as well. Public expressions of hate speech affects the devalua- tion of minority members [17], the exclusion of minorities from the society [21], and tend to diffuse through the network at a faster rate [20]. One of the key issues with the current state of the hate and offensive language research is that the majority of the research is dedicated to the English language on [15]. Few researchers have tried to solve the problem of abusive language in other languages [25,27], but the works are mostly monolingual. Any online social media platform contains people of different ethnicity, which results in the spread of information in multiple languages. Hence, a robust classifier is needed, which can deal with abusive language in the multilingual domain. Several shared tasks like HASOC [19], HaSpeeDe [8], GermEval [34], AMI [13], HatEval [6] have focused on detection of abusive text in multiple languages recently. HateMonitors: Language Agnostic Abuse Detection in Social Media 3 3 Dataset and Task description The dataset at HASOC 2019 3 were given in three languages: Hindi, English, and German. Dataset in Hindi and English had three subtasks each, while German had only two subtasks. We participated in all the tasks provided by the organisers and decided to develop a single model that would be language agnostic. We used the same model architecture for all the three languages. 3.1 Datasets We present the statistics for HASOC dataset in Table 1. From the table, we can observe that the dataset for the German language is highly unbalanced, English and Hindi are more or less balanced for sub-task A. For sub-task B German dataset is balanced but others are unbalanced. For sub-task C both the datasets are highly unbalanced. Table 1. This table shows the initial statistics about the training and test data English German Language Sub-Task A Train Test Train Test Train Test 407 136 2469 605 2261 288 3142 714 2196 713 3591 865 5852 1153 3819 850 4665 1318 HOF NOT Total Hindi Sub-Task B Train Test Train Test Train Test 111 556 190 210 676 197 86 1237 218 407 136 2469 605 1141 124 451 71 667 93 2261 288 HATE OFFN PRFN Total 41 77 18 Sub-Task C Train Test Train Test Train Test 1545 542 924 63 2469 605 2041 245 220 43 2261 288 TIN UNT Total - - - - - - - - - - - - 3.2 Tasks Sub-task A consists of building a binary classification model which can predict if a given piece of text is hateful and offensive (HOF) or not (NOT). A data point is annotated as HOF if it contains any form of non-acceptable language such as hate speech, aggression, profanity. Each of the three languages had this subtask. Sub-task B consists of building a multi-class classification model which can predict the three different classes in the data points annotated as HOF: Hate 3 https://hasoc2019.github.io/ 4 P. Saha et al. speech (HATE), Offensive language (OFFN), and Profane (PRFN). Again all three languages have this sub-task. Sub-task C consists of building a binary classification model which can predict the type of offense: Targeted (TIN) and Untargeted (UNT). Sub-task C was not conducted for the German dataset. 4 System Description In this section, we will explain the details about our system, which comprises of two sub-parts- feature generation and model selection. Figure 1 shows the architecture of our system. 4.1 Feature Generation Preprocessing: We preprocess the tweets before performing the feature ex- traction. The following steps were followed: -- We remove all the URLs. -- Convert text to lowercase. This step was not applied to the Hindi language since Devanagari script does not have lowercase and uppercase characters. -- We did not normalize the mentions in the text as they could potentially reveal important information for the embeddings encoders. -- Any numerical figure was normalized to a string 'number'. We did not remove any punctuation and stop-words since the context of the sentence might get lost in such a process. Since we are using sentence embedding, it is essential to keep the context of the sentence intact. Feature vectors: The preprocessed posts are then used to generate features for the classifier. For our model, we decided to generate two types of feature vector: BERT Embeddings and LASER Embeddings. For each post, we generate the BERT and LASER Embedding, which are then concatenated and fed as input to the final classifier. Multilingual BERT embeddings: Bidirectional Encoder Representations from Transformers(BERT) [11] has played a key role in the advancement of natural language processing domain (NLP). BERT is a language model which is trained to predict the masked words in a sentence. To generate the sentence embedding4 for a post, we take the mean of the last 11 layers (out of 12) to get a sentence vector with length of 768. LASER embeddings: Researchers at Facebook released a language agnos- tic sentence embeddings representations (LASER) [2], where the model jointly learns on 93 languages. The model takes the sentence as input and produces a vector representation of length 1024. The model is able to handle code mixing as well [31]. 4 We use the BERT-base-multilingual-cased which has 104 languages, 12-layer, 768- hidden, 12-heads and 110M parameters HateMonitors: Language Agnostic Abuse Detection in Social Media 5 Fig. 1. Architecture of our system We pass the preprocessed sentences through each of these embedding mod- els and got two separate sentence representation. Further, we concatenate the embeddings into one single feature vector of length 1792, which is then passed to the final classification model. 4.2 Our Model The amount of data in each category was insufficient to train a deep learning model. Building such deep models would lead to overfitting. So, we resorted to using simpler models such as SVM and Gradient boosted trees. Gradient boosted trees [9] are often the choice for systems where features are pre-extracted from the raw data5. In the category of gradient boosted trees, Light Gradient Boosting Machine (LGBM) [18] is considered one of the most efficient in terms of memory footprint. Moreover, it has been part of winning solutions of many competition 6. Hence, we used LGBM as model for the downstream tasks in this competition. 5 Results The performance of our models across different languages for sub-task A are shown in table 2. Our model got the first position in the German sub-task with a macro F1 score of 0.62. The results of sub-task B and sub-task C is shown in table 3 and 4 respectively. 5 https://tinyurl.com/yxmuwzla 6 https://tinyurl.com/y2g8nuuo SentencesPre-processing moduleLASERMultilingual BERTsentenceembedding1024 X 1sentenceembedding768 X 1ConcatenateLGBMLabels 6 P. Saha et al. Table 2. This table gives the language wise result of sub-task A by comparing the macro F1 values Language English German Hindi 0.76 0.79 0.78 HOF NOT Total 0.59 0.79 0.69 0.36 0.87 0.62 Table 3. This table gives the language wise result of sub-task B by comparing the macro F1 values Language English German Hindi 0.29 0.29 0.59 0.79 0.49 HATE OFFN PRFN NONE Total 0.28 0.00 0.31 0.79 0.34 0.04 0.0 0.19 0.87 0.28 Table 4. This table gives the language wise result of sub-task C by comparing the macro F1 values Language English Hindi 0.63 0.17 0.79 0.53 TIN UNT NONE Total 0.51 0.11 0.79 0.47 6 Discussion In the results of subtask A, models are mainly affected by imbalance of the dataset. The training dataset of Hindi dataset was more balanced than English or German dataset. Hence, the results were around 0.78. As the dataset in German language was highly imbalanced, the results drops to 0.62. In subtask B, the highest F1 score reached was by the profane class for each language in table 3. The model got confused between OFFN, HATE and PRFN labels which suggests that these models are not able to capture the context in the sentence. The subtask C was again a case of imbalanced dataset as targeted(TIN) label gets the highest F1 score in table 4. 7 Conclusion In this shared task, we experimented with zero-shot transfer learning on abusive text detection with pre-trained BERT and LASER sentence embeddings. We use an LGBM model to train the embeddings to perform downstream task. Our model for German language got the first position. The results provided a strong baseline for further research in multilingual hate speech. We have also made the models public for use by other researchers7. 7 https://github.com/punyajoy/HateMonitors-HASOC HateMonitors: Language Agnostic Abuse Detection in Social Media 7 References 1. Alorainy, W., Burnap, P., Liu, H., Williams, M.: The enemy among us: Detect- ing hate speech with threats based'othering'language embeddings. arXiv preprint arXiv:1801.07495 (2018) 2. Artetxe, M., Schwenk, H.: Massively multilingual sentence embeddings for zero- shot cross-lingual transfer and beyond. CoRR abs/1812.10464 (2018), http:// arxiv.org/abs/1812.10464 3. Arun, C.: On whatsapp, rumours, and lynchings. Economic & Political Weekly 54(6), 30 -- 35 (2019) 4. Awan, I.: Islamophobia on social media: A qualitative analysis of the facebook's walls of hate. International Journal of Cyber Criminology 10(1) (2016) 5. Bartlett, J., Norrie, R., Patel, S., Rumpel, R., Wibberley, S.: Misogyny on twitter. Demos (2014) 6. Basile, V., Bosco, C., Fersini, E., Nozza, D., Patti, V., Pardo, F.M.R., Rosso, P., Sanguinetti, M.: Semeval-2019 task 5: Multilingual detection of hate speech against immigrants and women in twitter. In: Proceedings of the 13th International Workshop on Semantic Evaluation. pp. 54 -- 63 (2019) 7. Bilewicz, M., Winiewski, M., Kofta, M., W´ojcik, A.: Harmful ideas, the structure and consequences of anti-s emitic beliefs in p oland. Political Psychology 34(6), 821 -- 839 (2013) 8. Bosco, C., Felice, D., Poletto, F., Sanguinetti, M., Maurizio, T.: Overview of the evalita 2018 hate speech detection task. In: EVALITA 2018-Sixth Evaluation Cam- paign of Natural Language Processing and Speech Tools for Italian. vol. 2263, pp. 1 -- 9. CEUR (2018) 9. Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. CoRR abs/1603.02754 (2016), http://arxiv.org/abs/1603.02754 10. Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. arXiv preprint arXiv:1703.04009 (2017) 11. Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirec- tional transformers for language understanding. CoRR abs/1810.04805 (2018), http://arxiv.org/abs/1810.04805 12. Erjavec, K., Kovacic, M.P.: you don't understand, this is a new war! analysis of hate speech in news web sites' comments. Mass Communication and Society 15(6), 899 -- 920 (2012) 13. Fersini, E., Nozza, D., Rosso, P.: Overview of the evalita 2018 task on automatic misogyny identification (ami). In: EVALITA@ CLiC-it (2018) 14. Finkelstein, J., Zannettou, S., Bradlyn, B., Blackburn, J.: A quantitative approach to understanding online antisemitism. arXiv preprint arXiv:1809.01644 (2018) 15. Fortuna, P., Nunes, S.: A survey on automatic detection of hate speech in text. ACM Computing Surveys (CSUR) 51(4), 85 (2018) 16. Gatehouse, C., Wood, M., Briggs, J., Pickles, J., Lawson, S.: Troubling vulnerabil- ity: Designing with lgbt young people's ambivalence towards hate crime reporting. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. p. 109. ACM (2018) 17. Greenberg, J., Pyszczynski, T.: The effect of an overheard ethnic slur on evalua- tions of the target: How to spread a social disease. Journal of Experimental Social Psychology 21(1), 61 -- 72 (1985) 18. Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W.J., Ma, W., Ye, Q., Liu, T.M.: Lightgbm: A highly efficient gradient boosting decision tree. In: NIPS (2017) 8 P. Saha et al. 19. Mandl, T., Modha, S., Patel, D., Dave, M., Mandlia, C., Patel, A.: Overview of the HASOC track at FIRE 2019: Hate Speech and Offensive Content Identification in Indo-European Languages). In: Proceedings of the 11th annual meeting of the Forum for Information Retrieval Evaluation (December 2019) 20. Mathew, B., Dutt, R., Goyal, P., Mukherjee, A.: Spread of hate speech in online social media. In: Proceedings of the 10th ACM Conference on Web Science. pp. 173 -- 182. ACM (2019) 21. Mullen, B., Rice, D.R.: Ethnophaulisms and exclusion: The behavioral conse- quences of cognitive representation of ethnic immigrant groups. Personality and Social Psychology Bulletin 29(8), 1056 -- 1067 (2003) 22. Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language detection in online user content. In: Proceedings of the 25th international confer- ence on world wide web. pp. 145 -- 153. International World Wide Web Conferences Steering Committee (2016) 23. Qian, J., ElSherief, M., Belding, E., Wang, W.Y.: Hierarchical cvae for fine-grained hate speech classification. In: Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. pp. 3550 -- 3559 (2018) 24. Reddy, V.: Perverts and sodomites: Homophobia as hate speech in africa. Southern African Linguistics and Applied Language Studies 20(3), 163 -- 175 (2002) 25. Ross, B., Rist, M., Carbonell, G., Cabrera, B., Kurowsky, N., Wojatzki, M.: Mea- suring the reliability of hate speech annotations: The case of the european refugee crisis. arXiv preprint arXiv:1701.08118 (2017) 26. Saha, P., Mathew, B., Goyal, P., Mukherjee, A.: Hateminers: Detecting hate speech against women. arXiv preprint arXiv:1812.06700 (2018) 27. Sanguinetti, M., Poletto, F., Bosco, C., Patti, V., Stranisci, M.: An italian twitter corpus of hate speech against immigrants. In: Proceedings of the Eleventh Inter- national Conference on Language Resources and Evaluation (LREC-2018) (2018) 28. Silva, L.A., Mondal, M., Correa, D., Benevenuto, F., Weber, I.: Analyzing the targets of hate in online social media. In: ICWSM. pp. 687 -- 690 (2016) 29. Stammbach, D., Zahraei, A., Stadnikova, P., Klakow, D.: Offensive language detec- tion with neural networks for germeval task 2018. In: 14th Conference on Natural Language Processing KONVENS 2018. p. 58 (2018) 30. Unsvag, E.F., Gamback, B.: The effects of user features on twitter hate speech detection. In: Proceedings of the 2nd Workshop on Abusive Language Online (ALW2). pp. 75 -- 85 (2018) S.: Code-switching: Hindi-english. Lingua 38(2), -- 31. Verma, (1976). http://www.sciencedirect.com/science/article/pii/0024384176900772 165 https://doi.org/https://doi.org/10.1016/0024-3841(76)90077-2, 153 32. Vidgen, B., Yasseri, T.: Detecting weak and strong islamophobic hate speech on social media. arXiv preprint arXiv:1812.10400 (2018) 33. Waseem, Z., Davidson, T., Warmsley, D., Weber, I.: Understanding abuse: A ty- pology of abusive language detection subtasks. arXiv preprint arXiv:1705.09899 (2017) 34. Wiegand, M., Siegel, M., Ruppenhofer, J.: Overview of the germeval 2018 shared task on the identification of offensive language (2018)
1501.01270
1
1501
2015-01-06T19:21:24
Using Linear Dynamical Topic Model for Inferring Temporal Social Correlation in Latent Space
[ "cs.SI" ]
The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users' items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among users in latent space instead of the original data space. We devise a Linear Dynamical Topic Model (LDTM) that can capture the dynamics of the users' items adoption behaviors in latent (topic) space. Using the time series of temporal topic distributions learned by LDTM, we conduct Granger causality tests to measure the social correlation relationships between pairs of users. We call the combination of our LDTM and Granger causality tests as Temporal Social Correlation. By conducting extensive experiments on bibliographic data, where authors are analogous to users, we show that the ordering of authors' name on their publications plays a statistically significant role in the interaction of research topics among the authors. We also present a case study to illustrate the correlational relationships between pairs of authors.
cs.SI
cs
Using Linear Dynamical Topic Model for Inferring Temporal Social Correlation in Latent Space Freddy Chong Tat Chua, Richard J. Oentaryo, and Ee-Peng Lim Living Analytics Research Centre School of Information Systems Singapore Management University 80 Stamford Road, Singapore 178902 Abstract The abundance of online user data has led to a surge of interests in understanding the dynamics of social relationships using computational methods. Utilizing users’ items adoption data, we develop a new method to compute the Granger-causal (GC) relationships among users. In order to handle the high dimensional and sparse nature of the adoption data, we propose to model the relationships among users in latent space instead of the original data space. We devise a Linear Dynamical Topic Model (LDTM) that can capture the dynamics of the users’ items adoption be- haviors in latent (topic) space. Using the time series of temporal topic distributions learned by LDTM, we conduct Granger causality tests to measure the social correlation relationships between pairs of users. We call the combination of our LDTM and Granger causality tests as Temporal Social Correlation. By conducting extensive experiments on bibliographic data, where authors are analogous to users, we show that the ordering of authors’ name on their publications plays a statistically significant role in the interaction of research topics among the authors. We also present a case study to illustrate the correlational relationships between pairs of authors. 1 Introduction Rapid advances in social media and internet technologies have led to the gen- eration of massive user data in digital forms. This gives rise to an important question: How do users relate to and socially influence one another? Social in- fluence is the mechanism of a user modifying her behavior or attributes so as to be more similar to her other socially connected users. For many decades, social scientists recognize the importance of social influence contributing to homophily in social networks, and have embarked on research that determine and measure the effect of social influence on homophily [32, 23]. Measuring social influence has many practical applications; for instance, it provides an effective means to 1 target influential individuals for product marketing, or to identify pivotal peo- ple in an organization for optimizing corporate management as well as driving innovations. In this paper, we define social influence from a user i to another user j as “the actions of i causes j to perform a set of actions in the future”. Social influence has been previously studied by various researchers [20, 39, 55, 15]. However, their approaches do not take into account the temporal aspects of so- cial influence. Instead of analyzing users’ past and future actions, they consider user actions independent of their timestamps. Many existing works also fail to account for the causality aspect of social influence. Knowing how user i’s past actions can predict user j’s future actions better than j’s past actions is only a necessary condition and not sufficient for finding social influence. Since the definition of social influence reflects the widely discussed notion of causality [27, 43], the sufficient condition for finding social influence requires us to exclude other external factors that could affect the actions of j. That is, we need to eliminate the confounding variables that give doubt to the predictive power of i’s and j’s past on j’s future [28]. It is generally difficult, however, to satisfy this sufficient condition, due to the absence of complete user data capturing all external factors that influence the users’ actions. There is also a need to conduct randomized controlled exper- iments [29, 47], which is very challenging in practice. Given these difficulties, we relax our assumptions and use a simplified notion of social influence, known as Temporal Social Correlation (TSC), whereby we ignore the presence of con- founding variables, and assume that users who are socially correlated tend to make similar choices over time. 1.1 Problem Formulation We apply the aforementioned notion of social influence for the analysis of users’ items adoption behavior. We use the term “users adopting items” to refer to any action of a user on items reflecting her preferences. The concept of users adopting items can be applied in various contexts, e.g., users watching movies, users joining online communities [16, 18], or users producing words [17]. In this research, we model social influence-driven changes in users’ adop- tion behavior as a form of information transfer between users. We first obtain the time series representation of users’ behavior using our proposed Linear Dy- namical Topic Model (LDTM), then we quantify the information transfer us- ing Granger causality (GC) tests [28], resulting in the derived Temporal Social Correlation (TSC) values between two users. We say that “j follows i” or “i transfers information to j” when Temporal Social Correlation (TSC) exists from i to j at the time point of their interaction τ ; we denote this as T SC(i → j, τ ). With respect to our simplified notion of social influence, we shall hereafter use the term “follow”, “information transfer” or “Granger cause” in place of “social influence”, since causality cannot be proven adequately without randomized ex- periments. It is also worth noting that T SC(i → j, τ ) and T SC(j → i, τ ) are not necessarily the same. 2 t = 1 t = 2 t = 3 a b c d e j i a b c d e j i a b c d e j i Adoption Link Social Link Item User Figure 1: Example of Temporal Social Correlation from i to j in temporal adoption data As an illustration for Temporal Social Correlation in temporal item adoption data, consider the pedagogical example in Figure 1. The figure shows two users i and j adopting different subsets of five items over three time steps. When temporal information is missing, we could only observe the adoption states at the last time step (i.e., t = 3), but based on the most recent states alone we cannot tell whether i follows j or j follows i. Only by observing the adoption states of t = 1 and t = 2, we can infer that j progressively follows i in adopting item c at t = 2 and item d at t = 3. The converse is unlikely because i’s adoption states remain the same over time. In other words, i’s adoption states at t = 1 is sufficient to predict her states for t > 1. We can further generalize the example in Figure 1, and arrive at the following problem formulation: Given a set of users U and a set of items V that U adopt from time step 1 to T , determine the T SC(i → j, τ ) and T SC(j → i, τ ) for all pair of users i, j ∈ U when i and j interacts at a specific time point τ ∈ {1, . . . , T }. When T SC(i → j, τ ) > T SC(j → i, τ ), we can say that i influences j, or j follows i. 1.2 Measuring Causality in Adoption Data To quantify T SC(i → j, τ ) in item adoption data, one can take a straightfor- ward approach, directly derived from the data. First, the raw frequencies of the adopted items for users i and j at time step t can be represented as adoption vec- tors vi,t ∈ RM and vj,t ∈ RM respectively, where M is the total number of items. Vectors for each user i over T time steps form a time series {vi,1, . . . , vi,T }. (An additional normalization step, e.g., Term Frequency and Inverse Document Fre- quency (TF-IDF), may be performed a priori on the raw frequencies to balance the importance of popular and unique items.) Subsequently, one can compare the time series {vi,1, . . . , vi,T } and {vj,1, . . . , vj,T } and measure social influence 3 by computing T SC(i → j, τ ) and T SC(j → i, τ ). Despite the simplicity, this direct approach gives rise to several issues: 1. The adoption vectors vi,t are usually high dimensional in practice, i.e., the number of items M is often large. As a result, comparing vectors vi,t and vj,t of two users i and j would be computationally demanding (even with a linear-time algorithm). 2. A related issue is the sparse nature of the adoption vectors vi,t, since each user only adopts a small subset of items at a particular time t. Comparing two sparse vectors will hardly yield any indication of significant relation- ship between them, because we ignore the co-occurrences of different items adopted by the users. 3. Since the adoption counts accumulate over time, the rate of change in vi,t relative to its previous time step vi,t−1 will gradually decay and become marginally small. At this point, the time series representing the user i’s behavior becomes stagnant. As T SC measures how users change their behavior due to other users, stagnant time series can hardly show any correlation effects among the interacting users. 4. If the time series {vi,1, . . . , vi,T } and {vj,1, . . . , vj,T } of users i and j are observed for a long period (i.e., large T ), their comparison may give a misleading conclusion that no influence exists, because the T SC between the two users typically takes place within a specific time window. 1.3 Proposal and Contributions To address issues 1) and 2), there is a need for a temporal latent factor model that can induce from sparse and high dimensional data, a compressed latent representation of the adoption behaviors over time. The latent representation should also exhibit good semantic interpretability. To handle issue 3), one may learn the users’ latent factors at each time step independently. However, such naıve approach is biased towards the most recent information and subject to catastrophic ignorance of the past behaviors. Normally, a user does not change her behavior abruptly and there should be a smooth, decaying transition of the user’s latent factors over time. In consideration of the necessity for smooth transition of users’ latent factors, we develop a method to automatically estimate a set of decay parameters for balancing between the importance of past and recent information. Finally, to address issue 4), we need to specify a time window for constraining the comparison period in which T SC is measured. To fulfill these requirements, we propose in this paper a novel Linear Dynam- ical Topic Model (LDTM). The proposed model represents each user’s adoption behavior as topic distribution (i.e., latent factors) at different time steps, and the evolution of the topic distribution is captured using the concept of Linear Dynamical Systems (LDS) [19, 25, 46, 54]. Based on the topic distributions learned by LDTM, we can then conduct Granger causality tests to determine the social influence between pairs of users. 4 Deviating from the traditional methods that operate on the original data space, the proposed LDTM provides a novel inductive approach facilitating dis- covery of social influence and causality in latent topic space. To the best of our knowledge, LDTM is also the first kind of dynamic topic model that compre- hensively models the dynamics of the users’ adoption behaviors by leveraging on the LDS concept. We summarize our key contributions as follows: 1. Utilizing LDS to model the transition of topic distributions over time, we can automatically compute, for each user n, a dynamics matrix An,t that contains the decay parameters of the user’s adoption behavior at every time step. Such transition modeling via dynamics matrix An,t has not been proposed in any topic models. 2. For LDS estimation on the topic distribution parameters, we develop a forward inference algorithm based on the idea of Kalman Filter (KF) [31]. The optimization of the dynamics matrix An,t is done in such a way that maintains the notion of decaying adoption behavior, while ensuring that the temporal correlations of parameters in each topic distribution remains numerically stable. 3. For inference of the decay parameters in An,t, we develop a new alternative method that aims at minimizing the Kullback-Leibler (KL) divergence be- tween the expected posterior distribution at time step t and the expected prior distribution at time step t. This approach conforms nicely to the notion of smooth transition in the users’ latent factors. In addition, it is computationally simpler and more efficient than traditional LDS methods, which first perform the Rauch-Tung-Striebel (RTS) smoothing algorithm [44] for backward inference and then an additional optimization step to derive the dynamics matrix [25, 46]. 4. Based on the temporal topic distributions derived by LDTM, we are able to identify information transfer between pairs of users by means of Granger causality tests. Through extensive experiments on bibliographic data, including DBLP and ACMDL datasets, we find evidences for Granger causality among the paper co-authors. Our statistical significance tests also reveal that the ordering of the co-authors’ names plays a role in determining the information transfer among them. The remainder of this paper is organized as follows. In Section 2, we first review several works related to our research. Section 3 discusses several desider- ata in modeling temporal adoption data. The proposed LDTM is subsequently presented in Section 4, followed by the procedure for the Granger causality test in Section 5. Section 6 presents the experimental results and discussions using the bibliographic datasets. Finally, Section 7 concludes this paper. 5 2 Related Work We first introduce the classical concepts on social influence in Section 2.1, and present a review of the existing latent factor approaches for modeling temporal data in Section 2.2. We also cover in Section 2.3 some related works that use some of latent factor modeling and influence concepts but in a significantly different way from our approach. 2.1 Social Influence To eliminate confounding variables for proving the existence of social influ- ence, researchers use randomized experiments that involve treatment and con- trol groups. [6] created a Facebook application to test whether broadcast or personalized messages have social influence on friends of a recruited user. [11] conducted experiments on Facebook users to study whether online political mes- sages could influence the voting decisions of users. [42] studied how the votes of news articles affected the articles’ discussions . An alternative to randomized experiments is to perform quasi-experiments. This approach is similar to the traditional randomized experiments, but lacks the element of random assignment to treatment or control. Instead, quasi- experimental designs typically allow us to control the assignment to the treat- ment condition, but using some criterion other than random assignment. [5] adapted matched sampling technique in Yahoo! Messenger data to distinguish between influence and homophily in the adoption of a mobile service applica- tion (Yahoo! Go) . [4] proposed the shuffle test to distinguish influence from homophily. Research on social influence has revolved around the adoption of a single item and satisfaction of the confounding condition. The research we pursue in this paper is different in several ways. First, we consider a set of items adopted by users instead of just a single item. Second, we propose LDTM to translate the high-dimensional set of items adopted by users into a low-dimensional temporal latent representation. While existing works prove the existence of social influence in the adoption of item for users, the social influence is expressed as a discrete value that sim- ply indicates presence or absence of influence. By contrast, we propose to use Granger causality measure to quantify the level of social influence between every pair of users, indicating how correlated their adoption behavior are over time. 2.2 Temporal Latent Factor Models In general, there are two forms of temporal latent factor models. The first form seeks to obtain more accurate latent factors in the temporal domain by obtaining latent factors that globally approximate the observed data [3, 9, 33, 34, 54, 60, 63]. The other form known as online learning focuses on the efficiency of handling real time streaming data by maximizing the likelihood of the latent 6 factors to fit the observed data from the most recent time window only [2, 13, 14, 26, 30, 41, 48, 59]. We note that the online learning models are extensions of latent factor mod- els that are themselves not necessarily designed for dynamic data, but for effi- cient learning of new model parameters given new additional data. In this paper, we are concerned with modeling user behavioral data using some dynamic latent factor models, instead of the online learning of the dynamic models. [9] proposed Dynamic Topic Model (DTM) for text documents. DTM was extended from the Latent Dirichlet Allocation (LDA) [10] to model the evolution of words within topics, i.e. words prominently used in a particular topic at a particular time step will be replaced by a different set of words at a later time. However, our requirement is slightly different. Instead of the evolution of topic- word distributions, we focus on the evolution of document-topic distributions. The evolution of document-topic distributions has not been considered pre- viously in LDA-based models (e.g. DTM), because LDA is mainly used for modeling text documents that remain static over time. Hence, DTM does not consider the evolution of users’ behavior in the way we do. When we apply LDA for modeling users’ behavior, the users replace the role of the documents, while the adopted items replace the words. In our work, we assume that topic- item distributions remain static over time while the human users’ evolve their preferences over time. Since the generative process in DTM does not meet our temporal requirements, we are motivated to develop LDTM that extends static LDA by utilizing the concepts of Linear Dynamical System (LDS). For modeling users’ behavior, [3] used an exponential decay function to model the decay of users’ search intent on search engines. But they assume that the parameters of the decay function remain constant for all topics and all users. On the contrary, we assume that there is a decay parameter for each topic and that the decay parameters vary for each user. We aim to estimate the decay parameters automatically, which are representative of the users’ temporal behavior. To automatically determine the natural decay of each topic, [60] proposed a non-Markovian approach that models the trend of topics evolution. The key idea is to associate additional Beta distribution with each topic in order to generate the time stamps of the words sampled from the topics. But this approach assumes that each topic is only relevant for each specific time period, and does not directly model the evolution of user behavior. Latent factor models have also been widely used for collaborative filtering in recommendation tasks, and several researchers have proposed dynamic latent factor models for handling temporal data [33, 34, 54, 63]. However, these ap- proaches have always been focused on predicting users’ ratings on items, and so their models cannot be directly applied for modeling users’ items adoptions. Nevertheless, owing to the similarity in the fundamental concept of dynamicity in latent factors, we give an overview of these works here. [33, 34] developed TimeSVD++ to address temporal dynamics through a specific parameterization with factors drifting from a central time. Koren as- sumed that users’ item ratings remain static over time, since users do not rate 7 the same items in different time periods. However, in item adoption scenario, users could adopt the same items at different time periods with different fre- quency. [63] extended the factorization of users’ item ratings from a static RM ×N matrix to a RM ×N ×T tensor, where N , M , and T represent the number of users, items, and time steps respectively. Three sets of latent factors were derived from their tensor factorization method (rather than just two in matrix factorization case). The additional set of latent factor, known as the time latent factor, can be used to derive the temporal users’ and items’ latent factors from its multiplication. But such time latent factor assumes that the items’ latent factor evolves over time in the same way as the users’ latent factors. However, we require the items’ latent factor to remain static, while allowing only the users’ latent factors to change. [54] proposed Dynamic Matrix Factorization (DMF) which uses Linear Dy- namical Systems (LDS) [25, 46, 51, 53]. The centerpiece of this work is a dy- namic state-space model that builds upon probabilistic matrix factorization in [50, 49] and Kalman filter/smoothing [31, 44] in order to provide recommenda- tions in the presence of process and measurement noises. Although the LDS component of DMF is able to model the evolution of users’ behavior, the latent factors obtained by [54] are not constrained to be non-negative. Hence, their approach is not able to provide intuitive interpretation on the preferences of users’ adoption behavior. To summarize, all these prior works fail to satisfy the following requirements for inferring temporal social dependencies between users: 1) They are not explic- itly designed to model item adoption data. 2) They do not obtain non-negative latent factors for easy interpretation of the users’ behavior. 3) They neither as- sume that users’ behavior can decay over time nor show how the users’ behavior can evolve over time. We combine the LDA and LDS approaches to obtain LDTM. Our LDTM is able to model the users’ items adoption data, obtain probabilistic (non-negative) latent factors for characterizing user behavior over time, and automatically infer the optimal decay parameters for each user at different time steps. 2.3 Topic-based Influence Measures To model a set of items for diffusion or inferring influence, many authors [20, 22, 24, 39, 40, 55, 56, 57, 61, 62]. have also turned to the use of topic models. [20] proposed an influence matrix to suggest what items a user should share to maximize their individual influence in their own community. Their matrix measures influence between users and items while ours measure between users and users. Similar to [45], [62] extended PageRank [12] to include topic models in the computation of influence between users. [24] extended dynamic LDA to identify the most influential documents in a scientific corpus. But the dynamic LDA assumes that the documents’ latent factors evolve only with small perturbations while words’ latent factors evolve over time. [24]’s work differ from our approach, because we allow greater vari- 8 ability in users’ (documents’) latent factors and assume that items’ (words’) latent factors remain constant. A notable contender to our approach is the work proposed by [57]. They also use topic models to reduce the dimensionality of item adoptions, followed by analysis using an information theoretic measure of causality known as trans- fer entropy. The algorithm to estimate transfer entropy is based on the nearest neighbor approach developed in Statistical Physics [35, 36, 58]. But there are significant drawbacks to this approach. First, it makes no assumption on the joint distributions of the variables, and thus requires many time steps for achiev- ing accurate estimation. It also ignores the temporal correlations between users’ topic distributions and the users’ behavior evolution. Apart from [24, 57], all the prior works which uses latent factors does not use the time information when inferring influence. In this aspect, our work goes beyond the norms by considering temporal users’ items adoption and proposing several temporal models. We distinguish our work by devising a Linear Dynam- ical System (LDS) approach to linearly correlate the users’ topic distributions, and using Granger causality that likewise assumes linear relationship among variables. Due to this linear assumption in Granger causality measure, our method also requires less number of time steps to derive an accurate measure of social influence between (pairs of) users. 3 Desiderata in Modeling Temporal Adoption Data Measuring T SC between two users i and j requires two crucial steps. First, an accurate measure of the users’ adoption behavior represented as time series vectors in latent space is required for every time step. That is, we require latent factors θi,t, θj,t ∈ RK for each user pair (i, j) at time step t. θi,t and θj,t has K dimensions where K is much smaller than M (the total number of items). Sec- ond, a temporal correlation measure is needed to compare between the trends of two time series. Knowing how two time series temporally correlate should help us make better predictions or reduce our uncertainty for their future adop- tion behavior. However, we need to address some issues in modeling temporal adoption data, as elaborated in Sections 3.1 and 3.2. 3.1 Latent Representation of Temporal Adoption Data We propose a new way of representing user’s adoption behavior in temporal latent space as opposed to the traditional method of using only the frequency of adoption in high dimensional space. There are some advantages of representing adoption behavior in temporal latent space as well as some difficulties, which we will elaborate further. For illustration, consider the temporal item adoption problem in Figure 2, involving three users {u1, u2, u3} and eight items {w1, . . . , w8} over two time steps. If we model the topic distributions at each time step independently of 9 w 5 w 6 w 7 w 8 u 1 t=1 u 2 t=1 u 3 t=1 w 1 w 2 w 3 w 4 (a) t = 1 w 5 w 6 w 7 w 8 u 1 t=2 u 2 t=2 u 3 t=2 w 1 w 2 w 3 w 4 (b) t = 2 Figure 2: Topic Modeling in Temporal User Item Adoptions other time steps, we would obtain the scenarios in Figure 2(a) for time step 1, and Figure 2(b) for time step 2. One may see that the edges between users and items are sparse, which does not allow us to draw any meaningful intu- itions about the relationship of items and does not show us any common item adoptions among the users. However, when we combine the temporal adoptions into a single time step, we obtain the scenarios as illustrated in Figure 3(a). Figure 3(a) shows the result of performing topic modeling on data without temporal considerations. The items adopted by users u1, u2 and u3 are clustered according to topics 1 and 2 based on the density of edges between users and items. We therefore require a method of modeling the temporal adoptions such that it allows us to preserve the edge densities across time steps and provides us with the topic distributions at different time steps. Such model could combine the temporal adoptions and construct dependencies between different time steps by having the scenario as shown in Figure 3(b). 3.2 The Need for Temporal Probabilistic Topic Model There are many ways of modeling users’ adoption behavior in latent spaces, and we wish to justify our choice of using probabilistic topic model. Besides probabilistic method, one may use Non-negative Matrix Factorizations (NMF) 10 Cluster (Topic) 1 w 5 w 6 w 7 w 8 u 1 u 2 u 3 w 1 w 2 w 3 w 4 Cluster (Topic) 2 (a) Without time steps Cluster (Topic) 1 w 5 w 6 w 7 w 8 u 1 t=1 u 1 t=2 u 2 t=1 u 2 t=2 u 3 t=1 u 3 t=2 w 1 w 2 w 3 w 4 Cluster (Topic) 2 (b) With time steps Figure 3: Topic Modeling in Static User Item Adoptions to obtain low-rank matrices that can substitute for the users’ and items’ latent factors [64, 38]. Our previous work in temporal item adoptions has also explored the use of LDS with NMF [19] for modeling evolving users’ preferences. LDS with NMF can be stated as follows, xn,t = An,t−1 · xn,t−1 + ǫ, ǫ ∼ N (0, Q) wn,t,m = Cm · xn,t where xn,t ∈ RK is the vector representing user n’s adoption behavior at time step t, An,t−1 ∈ RK×K is the dynamics matrix which evolves user’s behavior from time t − 1 to t, wn,t,m ∈ R is the number of times user n adopts item m at time t, and Cm ∈ RK represents item m’s latent factor. In [19], we estimated the items latent factor matrix C ∈ RM ×K for NMF by minimizing the sum-of-squared errors via stochastic gradient descent (SGD) with non-negativity constraints. The model was subsequently solved as an in- stance of Expectation Maximization (EM) algorithm [8, 21], where the E-step carries out Kalman Filtering and RTS Smoothing, and the M-step serves to optimize the dynamics matrix An,t. In order to obtain interpretable topics, it is imperative that the items latent 11 factor matrix contains only non-negative values [19]. We often rank the impor- tance of items according to the items’ value in the respective latent factor, but this is not true if the latent factors contain negative values. A negative cm,k can also be important for contributing to the value wn,t,m if the corresponding xn,t,k is also negative. Due to the different amounts of item adoptions for each user at different time steps, a single static matrix C that is defined in real space RM ×K does not fit well for the adoption patterns of every user. C was also only estimated once before running EM algorithm to estimate the rest of the parameters. There is thus a strong requirement to have a non-negative items’ latent factor matrix that is normalized across different time steps which is estimated by an algorithm that updates the items’ latent factor iteratively while learning the other parameters. Probabilistic approaches give us normalized parameters that sum to one and are non-negative (since probabilities cannot be less than zero). By alternating Gibbs Sampling with Kalman Filter and additional optimizing steps to derive the dynamics matrix, we derive an algorithm summarized in Algorithm 1 to estimate all the necessary parameters that achieves an overall better fit to the observed data. 4 Linear Dynamical Topic Model Figure 4 shows the probabilistic graphical representation (a.k.a. Bayesian net- work) of LDTM using plate diagram. In essence, LDTM is a combination of Latent Dirichlet Allocation (LDA) and Linear Dynamical System (LDS). We ob- tain the users-topic distributions at each time step by inferring the latent topic variable conditioned on the words written in each time step and the topic-item distributions. 4.1 Modeling Assumptions We assume that the topic item distribution remains static over time, while the users’ topic distribution evolves over time through a linear dynamical process conditioned on the previous time steps and the inferred latent variables in cur- rent time step. We further elaborate our assumptions of LDTM as follows: 1. Given that there are K topics and temporal adoption data, the topic dis- tribution θn,t of user n at time step t is defined by the Dirichlet distribution with parameters xn,t ∈ RK . θn,t ∼ Dir(xn,t) 2. To relate the current parameters xn,t with the previous time step param- eters xn,t−1, we assume a linear distribution as defined by, xn,t = An,t−1 · xn,t−1 12 An,1 xn,1 xn,2 θn,1 θn,2 α z w z w Mn,1 Mn,2  K β An,T xn,T θn,T z w Mn,T N Figure 4: Probabilistic graphical representation of the proposed LDTM where An,t ∈ RK×K represents the dynamics matrix of user n at t. This step distinguishes our model from all other topic models, i.e., we model the evolution of users’ topic distribution using a dynamics matrix. We also derive a whole new set of inference equations for estimating the model parameters in Section 4.3. 3. The topic zn,t,m of an item m adopted by user n at time t is given by, zn,t,m ∼ M ult(θn,t) Each topic item distribution is given by a simple symmetric Dirichlet distribution, φk ∼ Dir(β) Then each item m adopted by user n at time t conditioned on topic variable zn,t,m is given by, [wn,t,m (zn,t,m = k)] ∼ M ult(φk) 4.2 Estimating Topic Distribution Parameters To calculate T SC, we require the topic distributions for each user n at each time step t conditioned on the information up to t as denoted by θn,tt, also known as the posterior topic distribution. Since we have defined θn,t as a Dirichlet distri- bution with parameters xn,t, knowing xn,tt is sufficient for deriving θn,tt. θn,tt, 13 the posterior topic distribution of user n at time t conditioned on information up to time step t is given by, θn,tt ∼ Dir(xn,tt) xn,tt, the posterior parameters of the Dirichlet distribution for user n at time t conditioned on information up to time step t is given by a slight modification of the Kalman Filter [31] algorithm, xn,tt = xn,tt−1 + ψn,t where ψn,t ∈ RK and ψn,t,k denote the number of times user n at time t gen- erated topic k. xn,tt−1 is the prior parameters of the Dirichlet distribution for user n at time t conditioned on information up to time step t − 1, xn,tt−1 = An,t−1 · xn,t−1t−1 where An,t−1 ∈ RK×K is the dynamics matrix that evolves the parameters from t − 1 to t. If An,t for all time steps t is assumed to be an identity matrix, the model reduces to the traditional LDA model for temporal data sets. In previous works that use LDA on static data, there is a lack of emphasis on the importance of posterior and prior distributions. In temporal data, it is more important to distinguish between the two, as the posterior parameters of time step t − 1 becomes the prior parameters at time step t after factoring in the dynamics matrix An,t−1. 4.3 Estimating the Decay Parameters for Dynamics Ma- trix Since the dynamics matrix An,t−1 gives us the prior distribution θn,tt−1, an ideal dynamics matrix should be able to predict the posterior distribution θn,tt well. Therefore, to find the optimal dynamics matrix would require us to minimize the divergence between the expected prior and expected posterior distribution. A simple divergence to use would be the Kullback-Leibler (KL) Divergence. We minimize the KL Divergence between the expected posterior topic distribution θn,tt and expected prior topic distribution θn,tt−1 of user n at time t as follows, minimize T Xt=2 DKL(cid:2)E(cid:0)θn,tt(cid:1) E(cid:0)θn,tt−1(cid:1)(cid:3) The KL divergence is defined in terms of topic counts and Dirichlet parameters: An,t−1 · xn,t−1t−1 + ψn,t + α E(cid:0)θn,tt(cid:1) = DKL(cid:2)E(cid:0)θn,tt(cid:1) E(cid:0)θn,tt−1(cid:1)(cid:3) = 1′(cid:0)An,t−1 · xn,t−1t−1 + ψn,t(cid:1) + Kα 14 E(cid:0)θn,tt−1(cid:1) = An,t−1 · xn,t−1t−1 + α 1′An,t−1 · xn,t−1t−1 + Kα K Xk=1 E(cid:0)θn,t,kt(cid:1)(cid:2)log E(cid:0)θn,t,kt(cid:1) − log E(cid:0)θn,t,kt−1(cid:1)(cid:3) We then find the dynamics matrix An,t−1 that minimizes the objective func- tion L given by Equation 1, T K L = Xt=2 Xk=1 E(cid:0)θn,t,kt(cid:1)(cid:2)log E(cid:0)θn,t,kt(cid:1) − log E(cid:0)θn,t,kt−1(cid:1)(cid:3) (1) Assume that An,t−1 ∈ RK×K is a diagonal matrix with entries µn,t−1,k. Taking this into consideration, we can now try to minimize L by performing gradient descent with respect to the parameters µn,t−1,k. The gradient term is given in Equation 2, dL dµn,t−1,k = dµn,t−1,k "log dE(cid:0)θn,t,kt(cid:1) E(cid:0)θn,t,kt(cid:1) E(cid:0)θn,t,kt−1(cid:1) # + E(cid:0)θn,t,kt(cid:1)" d log E(cid:0)θn,t,kt(cid:1) dµn,t−1,k where the individual components can be respectively solved as, − d log E(cid:0)θn,t,kt−1(cid:1) dµn,t−1,k # xn,t−1,kt−1 (1′ψn,t + Kα) − 1′xn,t−1t−1 (ψn,t,k + α) (cid:2)1′(cid:0)An,t−1 · xn,t−1t−1 + ψn,t(cid:1) + Kα(cid:3)2 (2) (3) (4) dE(cid:0)θn,t,kt(cid:1) dµn,t−1,k = dµn,t−1,k d log E(cid:0)θn,t,kt(cid:1) d log E(cid:0)θn,t,kt−1(cid:1) dµn,t−1,k = = 1 dE(cid:0)θn,t,kt(cid:1) dµn,t−1,k E(cid:0)θn,t,kt(cid:1) xn,t−1,kt−1 µn,t−1,k · xn,t−1,kt−1 + α − 1′xn,t−1t−1 1′An,t−1 · xn,t−1t−1 + Kα (5) According to Siddiqi et al. [52], an LDS is Lyapunov (a.k.a. numerically) stable if the eigenvalues of the dynamics matrix An,t is less than or equal to one. The eigenvalues of any general matrix are guaranteed to be less than or equals to one if the sum of each row in the matrix is less than or equals to one. To ensure stability of LDTM, we enforce µn,t,k to stay within [0, 1]. By staying within the [0, 1] range, the µn,t,k is also able to represent decay of the parameters learned in previous time steps. 4.4 Outline of Parameter Estimation Algorithm 1 summarizes the procedure to estimate all parameters of the LDTM model depicted in Figure 4. It begins by randomly initializing the latent vari- ables zn,t,m, followed by Gibbs sampling iterations which consist of several steps. First, the prior topic distributions are estimated using Kalman Filter. Then the latent variable zn,t,m is sampled by conditioning on the prior parameters xn,tt−1, sampled variables ψn,t from previous iterations and the constant pa- rameters α, β. p(zn,t,m = kxn,tt−1, ψn,t, ξk, α, β) =(cid:0)xn,t,kt−1 + ψn,t,k + α(cid:1) ξk,m + β 1′ξk + Kβ (6) 15 Using the sampled latent variables, we derive the posterior parameters xn,tt via Kalman Filter. Finally, we estimate the dynamics matrix An,t via gradient descent of equation (2) for minimizing the KL between the prior and posterior distributions. We repeat these steps until a maximum number of iterations is reached. 5 Computing Temporal Social Correlation in Topic Space using Granger Causality After obtaining the posterior topic distributions θn,tt, ∀n ∈ U , we can construct time series of the distributions and calculate the Temporal Social Correlation (TSC) using Granger causality (GC) [27]. For a pair of users (i, j), T SC can be measured in two directions, T SC(i → j, τ ) and T SC(j → i, τ ), pivoted at a specific time step τ . One should appropriately choose τ to indicate the starting point for information transfer between i and j. Given τ , we could then select a time window [τ − W, τ + L] to constrain time series used for comparison, where L is the number of time steps to “lookahead” for measuring T SC and W is the “width” of past time steps for predicting the future. For notational simplicity, we denote the topic distributions for users i and j at t as it and jt respectively. Specifically, given two users i and j who interact at time τ , T SC(i → j, τ ) is computed as follows: 1. Formulate the two linear regression tasks: R1 = τ +L jt = η0 + W Xw=1 ηwjt−w! Xt=τ (cid:0)jt − jt(cid:1)′(cid:0)jt − jt(cid:1) ηwjt−w + λwit−w! ¯jt = η0 + W Xw=1 Xt=τ R2 = τ +L (jt − ¯jt)′ (jt − ¯jt) (7) (8) where τ is the time point when i and j begins transferring information between one another. 2. Estimate for the parameters {η0, . . . , ηW } by minimizing the least squares error in (7) using coordinate descent [7], and then estimate only for the parameters {λ1, . . . , λW } by minimizing (8). The first linear regression given by (7) uses j’s past information to predict j’s future, while the second linear regression (8) uses additional information from i’s past to predict y’s future. 16 3. To obtain the T SC(i → j, τ ), we measure how much i’s past improves the prediction of j’s future by computing the F-statistic (F-stat), T SC(i → j, τ ) = F-stat = R1 − R2 R2 · 2L − 1 W Because the formula (8) uses more parameters than (7), the sum-of-squares error given by R2 is always smaller than R1, i.e. R2 < R1, which implies that F-stat is always positive. 4. Repeat the steps for computing T SC(j → i, τ ) and compare whether T SC(i → j, τ ) > T SC(j → i, τ ) or otherwise. 6 Experiments To evaluate the effectiveness of LDTM and the T SC calculated for pairs of users, we require datasets that provide users’ temporal adoptions and the in- teractions between users that lead to information transfer between them. The publicly available DBLP [37] and ACM Digital Library (ACMDL) [1] biblio- graphic datasets provide the information we require. We first describe how we obtain subsets of the data from DBLP and ACMDL for our evaluation needs. Then we evaluate the effectiveness of LDTM for several scenarios of the dynam- ics matrix An,t: 1. LDA: To reduce LDTM to the baseline LDA, we simply set An,t as identity matrix for every user n and every time step t, i.e. An,t = I. 2. Half Decay: We set An,t as diagonal matrix with constant values of 0.5, i.e. An,t = 0.5 · I. 3. Full Decay: We set An,t as zero matrix, i.e. An,t = 0. 4. LDTM: We automatically determine the values of the dynamics matrix An,t. We show that automatically estimating An,t in the LDTM case gives us better representations of authors’ temporal adoption behavior than setting con- stant values for An,t. Using a case study as example, we show how the topic distributions over time for an author and his co-authors can be used to deter- mine the information transfer relationship between them. Finally, we compare and compute the T SC between every pair of authors using topic distributions from the four scenarios of the dynamics matrix An,t (i.e., LDA, Half Decay, Full Decay and LDTM). 6.1 Data Set We used the DBLP and ACMDL data to obtain the required users and items. The authors who wrote papers together are treated as users, and the words in 17 their papers are seen as adopted items. We used the words in the abstract for ACMDL, and those in the paper title for DBLP. The co-authorship information provides a time point where interaction occurred between the two authors. Given the large number of publications in DBLP and ACMDL, we only used a subset of papers from DBLP and ACMDL. We sampled a data subset that covers a wide variety of fields in computer science, with the papers published in the Journal of ACM (JACM) as a seed set. We then expanded the coverage by including other non-JACM publications by authors with at least one JACM publication. The sample set obtained here is termed ego-1. By including the co-authors of the authors in ego-1 and their papers, we get a larger set called ego-2. We repeat the process once again to get ego-3. ACMDL (ego-2) ACMDL (ego-3) DBLP (ego-2) DBLP (ego-3) #authors #words 33,044 44,308 20,080 40,463 24,569 157,715 52,754 388,092 Table 1: Data Set Sizes period 1952-2011 1952-2011 1936-2013 1936-2013 Table 1 gives the sizes of the ego-2 and ego-3 datasets. DBLP has more authors than ACMDL, because DBLP covers a longer history of publications and has more sources of publications. On the other hand, ACMDL focuses mainly on ACM-related publications. After pruning the stop-words and non- frequent (less than ten occurrences) words, the ACMDL sampled dataset have slightly more words than DBLP, as ACMDL provides words in the abstract of publications while DBLP only has words in the paper titles. We used the smaller ego-2 samples for experiments that require repetitions, and the much larger ego-3 samples for experiments that only require a single run. Because JACM lists a total of 26 major fields in Computer Science, we used 26 as the number of topics for training our models in all the subsequent experiments. 6.2 Convergence of Log Likelihood We first evaluate the convergence of the log likelihood for the case where the dynamics matrix An,t is automatically computed, and for other cases where An,t is set to constant values. We used the ego-2 samples for evaluating log likelihood convergence, because ego-2 will be used later for the predictive evaluations. Figures 5(a) and 5(b) show how the log likelihood varies with the number of iterations for ACMDL (ego-2) and DBLP (ego-2). We can see that LDTM achieves the highest likelihood in DBLP and is able to converge with log likeli- hood comparable to that of Half Decay and Full Decay. Figures 5(a) and 5(b) also reveal another interesting observation: the Full Decay model is able to perform well in ACMDL, but not as well in DBLP. This can be explained as follows, since ACMDL provide words from papers’ abstract, the information within each time step is sufficient for estimating accu- 18 x 108 −1.7 d o o h i l e k L i g o L −1.72 −1.74 −1.76 −1.78 −5.6 −5.7 −5.8 −5.9 −6 −6.1 d o o h i l e k L i g o L LDA Half Decay Full Decay LDTM x 107 LDA Half Decay Full Decay LDTM −1.8 0 10 20 30 Iterations (a) ACMDL 40 50 −6.2 0 10 20 30 Iterations 40 50 (b) DBLP Figure 5: Log Likelihood vs # of Iterations rate parameters. But in DBLP, only the words in the paper titles are available, providing less information for parameter estimation. As a result, decaying the parameters of previous time steps does not allow Full Decay to leverage on the previously observed data, which explains the poor likelihood in DBLP. The same explanation applies to LDA, since LDA shows an opposite performance to Full Decay. Based on the ACMDL and DBLP results in Figure 5, we can see that fixing the decay parameters of the dynamics matrix does not give consistent perfor- mance in comparison to that of LDTM. This shows that the automatic estima- tion of dynamics matrix in LDTM can better model the different properties of the available data. 6.3 Comparison Results on Held-out Test Set We compared the automatic estimation of dynamics matrix An,t for LDTM against the fixed values of An,t (i.e., Full Decay, Half Decay, LDA) in a pre- diction task. We repeated the prediction experiments for five runs and took the average results. For each run, we generated five sets of training and testing data by hiding in incremental proportions of 10% from the sampled ACMDL (ego-2) and DBLP (ego-2) datasets. When creating the test sets, we ensure that each subsequent test set is a superset of the previous test set. We trained LDTM and other baseline models on the remaining data sets for 50 iterations, and evaluated their predictive performances on the held-out test sets. The pre- dictive performance on the held-out test sets is measured in terms of average log likelihood for each time step t (ALL@t), defined as, m log p(wn,t,mθn, φ) n Mn,t Essentially, the ALL@t gives us a measure of how well the estimated parame- ters can predict the test sets. Normalization of the log likelihood (over the total ALL@t = PN n PMn,t PN 19 number of words) in each time step is necessary to avoid over-deflating the log likelihood at different time steps. For example, larger t would have more words and hence smaller (more negative) log likelihood as compared to smaller t. The log likelihood normalization at each t would thus allow for a better compari- son across different time steps. A higher ALL@t suggests a better predictive performance for the respective model. d o o h i l i e k L g o L e g a r e v A d o o h i l e k L i g o L e g a r e v A −7.55 −7.6 −7.65 −7.7 −7.75 −7.8 −7.85 30 d o o h i l i e k L g o L e g a r e v A 55 60 LDA Half Decay Full Decay LDTM 45 50 Time 35 40 −7.6 −7.65 −7.7 −7.75 −7.8 −7.85 30 LDA Half Decay Full Decay LDTM 45 50 Time 35 40 (a) Test size=20% (b) Test size=30% −7.6 −7.65 −7.7 −7.75 −7.8 −7.85 −7.9 30 d o o h i l e k L i LDA Half Decay Full Decay LDTM 45 50 Time 35 40 g o L e g a r e v A 55 60 −7.6 −7.65 −7.7 −7.75 −7.8 −7.85 −7.9 30 LDA Half Decay Full Decay LDTM 45 50 Time 35 40 55 60 55 60 (c) Test size=40% (d) Test size=50% Figure 6: ACMDL: Log Likelihood over Time for Held-out Test Set Figures 6(a)-6(d) and 7(a)-7(d) show the ALL@t for every t. All these figures show that LDTM outperforms all other baseline models in terms of ALL@t, while Full Decay performs the worst. Although Full Decay gives highest log likelihood performance in the convergence results as shown in Figure 5(a), the result in Figure 6 does not show the same correlations, which may be attributed to the fact that Full Decay overfits the data. Meanwhile, Half Decay shows that it fits the data relatively well (cf. Figure 5), but it does not perform as well as LDTM (cf. Figure 6) and it performs worse than LDA (cf. Figure 7). While LDA performs better than Half Decay and Full Decay in Figure 7, it does not outperform Half Decay in Figure 6. By contrast, LDTM is able to achieve consistently good performance in both datasets, winning over Full Decay, Half Decay and LDA. This suggests that the dynamics matrix estimated using the 20 d o o h i l e k L i g o L e g a r e v A d o o h i l e k L i g o L e g a r e v A −7.2 −7.3 −7.4 −7.5 −7.6 −7.7 40 −7.3 −7.4 −7.5 −7.6 −7.7 −7.8 40 LDA Half Decay Full Decay LDTM 60 Time 50 (a) Test size=20% 70 80 LDA Half Decay Full Decay LDTM 60 Time 50 70 80 d o o h i l e k L i g o L e g a r e v A d o o h i l e k L i g o L e g a r e v A −7.2 −7.3 −7.4 −7.5 −7.6 −7.7 40 −7.3 −7.4 −7.5 −7.6 −7.7 −7.8 40 LDA Half Decay Full Decay LDTM 60 Time 50 (b) Test size=30% 70 80 LDA Half Decay Full Decay LDTM 60 Time 50 70 80 (c) Test size=40% (d) Test size=50% Figure 7: DBLP: Log Likelihood over Time for Held-out Test Set algorithm in Section 4.3 can capture the dynamic patterns of each user more accurately. 6.4 Case Study This section provides a case study to illustrate Granger causality among au- thors. We first show how an author’s topic interests change over the years. Subsequently, we describe how the changes in his co-authors’ topic interests explain the changes in his own topic interests. In this study, we focus on the profile of Professor Duminda Wijesekera (D. Wijesekera), so as to remain consistent with the case study in our earlier work [17]. For this case study, we performed our analysis on the DBLP (ego-3) dataset, due to its wider coverage of authors and years. Based on our earlier results of various temporal topic models on the DBLP dataset, we choose to analyze the Granger causality based on the topic distributions computed by LDTM and LDA, as the two yielded the best performance on DBLP. By com- paring LDTM and LDA, we also show the importance of using the correct latent factor model for Granger causality analysis. 21 6.4.1 Granger Causality using LDTM Duminda Wijesekera − Security Duminda Wijesekera − Data Mining Duminda Wijesekera − Logic & Computation Duminda Wijesekera − Distributed Computing 0.35 0.3 0.25 y t i l i b a b o r P 0.2 0.15 0.1 0.05 Duminda Wijesekera After: Sushil Jajodia After: Jaideep Srivastava Before: Csilla Farkas Before: Lingyu Wang Before: Naren Kodali 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 90 92 94 96 98 Year 00 02 04 06 0 90 92 94 96 98 00 02 04 06 (a) Top Four Topics (b) Co-Authors’ Security Topic Proportion Figure 8: LDTM Results: Duminda Wijesekera’s and His Co-Authors’ Topic Interests from 1990 to 2006 Table 2: Topics Derived from LDTM Security Data Mining Logic & Computation Distributed Computing security secure scheme efficient privacy computing framework reasoning languages data mining fuzzy verification programming databases query logic service management grid Figure 8(a) shows the LDTM-induced topic distribution of D. Wijesekera from year 1990 to 2006 (top four topics), with the corresponding topic words shown in Table 2. During this period, the “Security” topic has the largest area under the curve. For illustration purposes, we show the “Security” topic proportion of D. Wijesekera’s co-authors for the same time period. Due to space limitation, we only show five co-authors who collaborated with D. Wijesekera frequently in Figure 8(b). Among them, Sushil Jajodia’s and Jaideep Srivastava’s names are placed after D. Wijesekera in the papers they wrote, while Csilla Farkas’, Lingyu Wang’s and Naren Kodali’s names appear before D. Wijesekera. From Figure 8(b), we can also see clearly that D. Wije- sekera’s -o- line follows the trend of Sushil Jajodia’s -*- line. 6.4.2 Granger causality using LDA Figure 9(a) shows the LDA-induced topic distribution of D. Wijesekera from year 1990 to 2006 (also the top four topics), and Table 3 shows the corresponding topic words. Instead of the “Security” topic, the “Computation & Logic” topic occupies the largest area here. 22 We then analyzed the topic proportions of the “Computation & Logic” topic for D. Wijesekera’s co-authors, as given in Figure 9(b). Unlike the previous LDTM case, we could not find any co-authors who have significant correlation with D. Wijesekera in the “Computation & Logic” topic. This indicates that the accuracy of the topic distributions are important for us to infer the Granger causality between the authors. The LDTM model is able to appropriately decay the importance of other topics and focus on emergence of new topics such as “Security” in D. Wijesek- era’s case. Granger causality would then allow us to find co-authors who are socially correlated to D. Wijesekera in order to explain the emergence or change of academic interests over time. Duminda Wijesekera − Computation & Logic Duminda Wijesekera − Database Systems Duminda Wijesekera − Distributed Computing Duminda Wijesekera − Security 0.18 0.16 0.14 0.12 0.1 0.08 0.06 0.04 y t i l i b a b o r P Duminda Wijesekera After: Sushil Jajodia After: Jaideep Srivastava Before: Csilla Farkas Before: Lingyu Wang Before: Naren Kodali 0.16 0.14 0.12 0.1 0.08 0.06 0.04 0.02 0.02 90 92 94 96 98 Year 00 02 04 06 0 90 92 94 96 98 00 02 04 06 (a) Top Four Topics (b) Co-Authors’ Computation & Logic Topic Figure 9: LDA Results: Duminda Wijesekera’s and His Co-Authors’ Topic Interests from 1990 to 2006 Table 3: Topics Derived from LDA Security Database Systems Logic & Computation Distributed Computing security secure scheme efficient privacy verification languages adaptive content computing mobile programming service management grid video peer multimedia logic formal 6.5 Knowledge Discovery using Temporal Social Correla- tion We now show the application of topic distributions as time series for computing the T SC between two authors i and j at a time point τ . The parameters “width” and “lookahead” are both set as 4. Using the co-authorship information in our sampled ego-3 datasets, we choose some pairs of authors and the year 23 of publication at time point τ in order to compute T SC. We formulate the following three hypotheses: 1. AB: If j is the first author and i is the second author of a publication written at τ , then i transfers information to j, i.e. T SC(i → j, τ ) > T SC(j → i, τ ). 2. AZ: If j is the first author and i is the last author of a publication written at τ , then i transfers information to j, i.e. T SC(i → j, τ ) > T SC(j → i, τ ). 3. Bf Af : If j and i are authors of a publication written at τ with more than two authors and j comes before i, then i transfers information to j, i.e. T SC(i → j, τ ) > T SC(j → i, τ ). and compute a Ratio metric for each scenario, defined as: Ratio = P(i,j)∈P I(T SC(i → j, τ ) > T SC(j → i, τ )) P where I(.) is the indicator function, and P is the set of all user pairs (i, j) considered in the evaluation. In other words, the Ratio may be interpreted as the proportion (or probability) of the T SC from user i to j being greater than that from j to i. To prevent confounding factors in our experiments, we excluded the pub- lications that have the authors’ last name arranged in ascending order. We removed 41% from ACMDL and 44% from DBLP, although some papers might have authors last name in ascending order due to coincidence. o i t a R 0.18 0.17 0.16 0.15 0.14 0.13 0.12 0.11 1 AB: LDA AB: Half Decay AB: Full Decay AB: LDTM 1.5 2 2.5 3 3.5 Sustained interactions 0.3 0.28 0.26 0.24 0.22 0.2 o i t a R 4 0.18 0 AB: LDA AB: Half Decay AB: Full Decay AB: LDTM 2 4 6 Sustained interactions 8 (a) ACMDL: Ratio (b) DBLP: Ratio Figure 10: AB: Ratio based on Time Series of Various Models For every i, j author pair who co-authored at least once, we computed the Ratio for each time step τ . We then analyzed the Ratio values for every pair with respect to the number of time steps in which they had sustained the co- author relationship. Figures 10 to 12 show the Ratio values versus the number 24 o i t a R o i t a R 0.22 0.2 0.18 0.16 0.14 0.12 0.1 0.08 1 0.16 0.14 0.12 0.1 0.08 0.06 0.04 0 0.35 0.3 o i t a R 0.25 0.2 AZ: LDA AZ: Half Decay AZ: Full Decay AZ: LDTM AZ: LDA AZ: Half Decay AZ: Full Decay AZ: LDTM 1.5 2 2.5 3 3.5 Sustained interactions 4 1 2 3 4 5 Sustained interactions (a) ACMDL: Ratio (b) DBLP: Ratio Figure 11: AZ: Ratio based on Time Series of Various Models 0.25 o i t a R 0.2 0.15 Bf_Af: LDA Bf_Af: Half Decay Bf_Af: Full Decay Bf_Af: LDTM 2 8 Sustained interactions 4 6 10 0.1 0 Bf_Af: LDA Bf_Af: Half Decay Bf_Af: Full Decay Bf_Af: LDTM 5 Sustained interactions 10 6 7 15 (a) ACMDL: Ratio (b) DBLP: Ratio Figure 12: Bf Af: Ratio based on Time Series of Various Models of time steps the author pairs have sustained their co-authorships. The subplots (a) of Figures 10 to 12 present the Ratio values for ACMDL, while subplots (b) of Figures 10 to 12 give the Ratio values for DBLP. Only bins with more than 90 data points are shown in the Figures. Figures 10 to 12 reveal several interesting phenomena. To describe the phe- nomena, we use the notation I to denote the set of authors whose names are placed at the back, and J to denote the set of authors whose names are placed in front. In general, since we have earlier filtered out the papers with alphabet- ical ordering, researchers (J) who do the bulk of the research have their names placed in front of their co-authors (I). 1. All models and hypotheses show that the ratio is always below 0.5. This indicates I does not necessarily influence J. On the contrary, the results show a high probability of J influencing I, i.e. Researchers who do the most work influence their co-authors. 2. The ratio is always on a downtrend which indicates that the influence I 25 has on J decreases over time. As researchers progress in their research career, the influence their co-authors have on them decreases over time. 3. By comparing between the Ratio of Figures 10 and 12, the second author i has more influence on the first author j, as compared to the generic case where j can be any author (e.g. 2nd, 3rd, etc.) and i comes after j. 4. By comparing between the Ratio of Figures 10 and 11, the last author i influence the first author j, more than the second author. Based on these results, we can conclude that, for pairs of authors who wrote a paper together, it is highly likely that the author whose name appears in front (Granger) causes those whose names appear at the back to change their topic distributions over time. We therefore reject the earlier hypotheses of AB, AZ and Bf Af. 7 Conclusion This paper presents a means for identifying Temporal Social Correlation (TSC) based on latent topic representation of item adoptions that users perform over time. We propose a Linear Dynamical Topic Model (LDTM) that synergizes the merits of probabilistic topic models and Linear Dynamical Systems (LDS) in order to capture users’ adoption behavior over time. The EM algorithm for solving the model draws upon Gibbs Sampling and Kalman Filter for inference in the E-Step, followed by the M-Step which minimizes the Kullback-Leibler (KL) divergence between the prior and posterior distributions for estimating the dynamics matrix. By taking into account both the stability and non-negativity constraints, we derive a dynamics matrix that represents how users decay their adoption behaviors and preferences over time. By using the users’ topic distributions at different time steps, we construct each user’s time series and compare it with their co-authors’ using Granger- causal tests. Our experiments on bibliographic datasets demonstrate that, by employing Granger causality on the time series, we can calculate the TSC be- tween authors of the paper and discover that the ordering of authors’ names plays a role in how information transfer among them. Ultimately, all the measurements we made is to further the science of pre- dicting the future. However, it remains to be seen whether quantifying social influence through TSC could be used for making recommendations to users on what items to adopt, and that could be a future direction in our work. References [1] ACM. Association for Computing Machinery. ACM Digital Library, 2011. [2] D. Agarwal, B.-C. Chen, and P. Elango. Fast online learning through offline initialization for time-sensitive recommendation. In Proceedings of 26 the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, pages 703–712, New York, NY, 2010. [3] A. Ahmed, Y. Low, M. Aly, V. Josifovski, and A. J. Smola. Scalable distributed inference of dynamic user interests for behavioral targeting. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’11, pages 114–122, New York, NY, 2011. [4] A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation In Proceedings of the ACM SIGKDD International in social networks. Conference on Knowledge Discovery and Data Mining, KDD ’08, pages 7–15, New York, NY, USA, 2008. ACM. [5] S. Aral, L. Muchnik, and A. Sundararajan. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceed- ings of the National Academy of Sciences, 106(51):21544–21549, 2009. [6] S. Aral and D. Walker. Identifying social influence in networks using ran- domized experiments. IEEE Intelligent Systems, 26(5):91–96, 2011. [7] J. C. Bezdek, R. J. Hathaway, R. E. Howard, C. A. Wilson, and M. P. Wind- ham. Local convergence analysis of a grouped variable version of coordinate descent. Journal of Optimization Theory and Applications, 54(3):471–477, 1987. [8] J. Bilmes. A gentle tutorial of the EM algorithm and its application to pa- rameter estimation for Gaussian mixture and hidden Markov models. Tech- nical Report TR-97-021, International Computer Science Institute, 1997. [9] D. M. Blei and J. D. Lafferty. Dynamic topic models. In Proceedings of the International Conference on Machine Learning, ICML ’06, pages 113–120, 2006. [10] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. Journal of Machine Learning Research, 3:993–1022, 2003. [11] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow, J. E. Settle, and J. H. Fowler. A 61-million-person experiment in social influence and political mobilization. Nature, 489(7415):295–298, 2012. [12] S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(17):107–117, 1998. [13] K. R. Canini, L. Shi, and T. L. Griffiths. Online inference of topics with latent Dirichlet allocation. In Proceedings of the International Conference on Artificial Intelligence and Statistics, AISTATS ’09, pages 65–72, 2009. [14] B. Cao, D. Shen, J.-T. Sun, X. Wang, Q. Yang, and Z. Chen. Detect and track latent factors with online nonnegative matrix factorization. In Proceedings of the International Joint Conference on Artifical Intelligence, 27 IJCAI ’07, pages 2689–2694, San Francisco, CA, USA, 2007. Morgan Kauf- mann Publishers Inc. [15] C. Cheng, H. Yang, I. King, and M. Lyu. Fused matrix factorization with geographical and social influence in location-based social networks. In Pro- ceedings of the AAAI National Conference on Artificial Intelligence, AAAI ’12, pages 17–23, 2012. [16] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Predicting item adoption using social correlation. In Proceedings of the SIAM International Conference on Data Mining, SDM ’11. SIAM, 2011. [17] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Mining social dependencies in dynamic interaction networks. In Proceedings of the SIAM International Conference on Data Mining, SDM ’12, pages 720–731, Philadelphia, PA, 2012. [18] F. C. T. Chua, H. W. Lauw, and E.-P. Lim. Generative models for item adoptions using social correlation. IEEE Transactions on Knowledge and Data Engineering, 25(9):2036–2048, 2013. [19] F. C. T. Chua, R. J. Oentaryo, and E.-P. Lim. Modeling temporal adoptions using dynamic matrix factorization. In Proceedings of the IEEE Interna- tional Conference on Data Mining, ICDM ’13, pages 91–100, Dallas, TX, 2013. [20] P. Cui, F. Wang, S. Liu, M. Ou, S. Yang, and L. Sun. Who should share what? item-level social influence prediction for users and posts ranking. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’11, pages 185–194, New York, NY, USA, 2011. ACM. [21] A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society. Series B (Methodological), 39(1):1–38, 1977. [22] L. Dietz, S. Bickel, and T. Scheffer. Unsupervised prediction of citation in- fluences. In Proceedings of the International Conference on Machine Learn- ing, ICML ’07, pages 233–240, New York, NY, USA, 2007. ACM. [23] N. Friedkin. A structural theory of social influence. Cambridge University Press, 1998. [24] S. Gerrish and D. M. Blei. A language-based approach to measuring schol- arly impact. In J. Frnkranz and T. Joachims, editors, Proceedings of the International Conference on Machine Learning, ICML ’10, pages 375–382. Omnipress, 2010. [25] Z. Ghahramani and G. E. Hinton. Parameter estimation for linear dynam- ical systems. Technical report, 1996. 28 [26] A. Gohr, A. Hinnerburg, R. Schult, and M. Spiliopoulou. Topic evolution in a stream of documents. In Proceedings of the SIAM International Con- ference on Data Mining, SDM ’09, pages 859–870, Sparks, Nevada, 2009. [27] C. W. J. Granger. Testing for causality: A personal viewpoint. Journal of Economic Dynamics and Control, 2(0):329 – 352, 1980. [28] C. W. J. Granger. Essays in econometrics. chapter Investigating causal relations by econometric models and cross-spectral methods, pages 31–47. Harvard University Press, Cambridge, MA, USA, 2001. [29] S. Greenland. Randomization, statistics, and causal inference. Epidemiol- ogy, 1(6), 1990. [30] M. D. Hoffman, D. M. Blei, and F. Bach. Online learning for latent dirichlet allocation. In Proceedings of the Advances in Neural Information Processing Systems, NIPS’ 10, pages 1–9, 2010. [31] R. E. Kalman. A new approach to linear filtering and prediction prob- lems. Transactions of the ASME, Journal of Basic Engineering, 82(1):35– 45, 1960. [32] D. B. Kandel. Homophily, selection, and socialization in adolescent friend- ships. American Journal of Sociology, 84(2):427–436, 1978. [33] Y. Koren. Collaborative filtering with temporal dynamics. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’09, pages 447–456, New York, NY, USA, 2009. ACM. [34] Y. Koren, R. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 42(8):30–37, Aug. 2009. [35] L. F. Kozachenko and N. N. Leonenko. Sample estimate of the entropy of a random vector. Problemy Peredachi Informatsii, 23(1-2):95–101, 1987. [36] A. Kraskov, H. Stogbauer, and P. Grassberger. Estimating mutual infor- mation. Physical Review E, 69:066138, 2004. [37] M. Ley. DBLP Computer Science Bibliography, 2005. [38] C. Liu, H.-C. Yang, J. Fan, L.-W. He, and Y.-M. Wang. Distributed non- negative matrix factorization for web-scale dyadic data analysis on mapre- duce. In Proceedings of the 19th international conference on World wide web, WWW ’10, pages 681–690, New York, NY, 2010. [39] L. Liu, J. Tang, J.-W. Han, M. Jiang, and S. Yang. Mining topic-level influence in heterogeneous networks. In Proceedings of the ACM Interna- tional Conference on Information and Knowledge Management, CIKM ’10, pages 199–208, New York, NY, USA, 2010. ACM. 29 [40] L. Liu, J. Tang, J.-W. Han, and S. Yang. Learning influence from heteroge- neous social networks. Data Mining and Knowledge Discovery, 25(3):511– 544, 2012. [41] J. Mairal, F. Bach, J. Ponce, and G. Sapiro. Online learning for matrix factorization and sparse coding. Journal of Machine Learning Research, 11:19–60, 2010. [42] L. Muchnik, S. Aral, and S. J. Taylor. Social influence bias: A randomized experiment. Science, 341(6146):647–651, 2013. [43] J. Pearl. Causality: Models, reasoning and inference. Cambridge University Press, 2000. [44] H. E. Rauch, C. T. Striebel, and F. Tung. Maximum likelihood estimates of linear dynamic systems. Journal of the American Institute of Aeronautics and Astronautics, 3(8):1445–1450, 1965. [45] D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman. Influence and passivity in social media. In D. Gunopulos, T. Hofmann, D. Malerba, and M. Vazirgiannis, editors, Machine Learning and Knowledge Discovery in Databases, volume 6913 of Lecture Notes in Computer Science, pages 18– 33. Springer Berlin Heidelberg, 2011. [46] S. Roweis and Z. Ghahramani. A unifying review of linear gaussian models. Neural Computation, 11(2):305–345, 1999. [47] D. B. Rubin. Bayesian inference for causal effects: The role of randomiza- tion. The Annals of Statistics, 6(1):34–58, 1978. [48] A. Saha and V. Sindhwani. Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization. In Proceed- ings of the ACM International Conference on Web Search and Data Mining, WSDM ’12, pages 693–702, New York, NY, USA, 2012. ACM. [49] R. Salakhutdinov and A. Mnih. Bayesian probabilistic matrix factorization using markov chain monte carlo. In Proceedings of the International Con- ference on Machine Learning, ICML ’08, pages 880–887, New York, NY, USA, 2008. ACM. [50] R. Salakhutdinov and A. Mnih. Probabilistic matrix factorization. In Proceedings of the Advances in Neural Information Processing Systems, NIPS ’08, pages 1257–1264, Cambridge, MA, 2008. MIT Press. [51] R. H. Shumway and D. S. Stoffer. Time series analysis and its applications: With R examples. Springer, 3rd edition, May 2006. [52] S. Siddiqi, B. Boots, and G. Gordon. A constraint generation approach to learning stable linear dynamical systems. In Proceedings of the Advances in Neural Information Processing Systems, NIPS ’07, December 2007. 30 [53] D. Simon. Optimal state estimation: Kalman, H infinity, and nonlinear approaches. Wiley-Interscience, 2006. [54] J. Z. Sun, K. R. Varschney, and K. Subbian. Dynamic matrix factorization: A state space approach. In Proceedings of the IEEE International Confer- ence on Speech and Signal Processing, ICASSP ’12, pages 1897–1900, 2012. [55] J. Tang, J.-M. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’09, pages 807–816, New York, NY, USA, 2009. ACM. [56] J. Tang, S. Wu, and J.-M. Sun. Confluence: Conformity influence in large social networks. In Proceedings of the ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining, KDD ’13, pages 347–355, New York, NY, USA, 2013. ACM. [57] G. Ver Steeg and A. Galstyan. Information-theoretic measures of influ- ence based on content dynamics. In Proceedings of the ACM International Conference on Web Search and Data Mining, WSDM ’13, pages 3–12, New York, NY, USA, 2013. ACM. [58] J. D. Victor. Binless strategies for estimation of information from neural data. Physical Review E, 66:051903, Nov 2002. [59] F. Wang, P. Li, and C. Konig. Efficient document clustering via online nonnegative matrix factorization. In Proceedings of the SIAM International Conference on Data Mining, SDM ’11, pages 908–919, 2011. [60] X.-R. Wang and A. McCallum. Topics over time: a non-markov continuous- time model of topical trends. In Proceedings of the ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining, KDD ’06, pages 424–433, New York, NY, USA, 2006. ACM. [61] Z. Wen and C.-Y. Lin. On the quality of inferring interests from social neighbors. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, pages 373–382, New York, NY, USA, 2010. ACM. [62] J. Weng, E.-P. Lim, J. Jiang, and Q. He. Twitterrank: Finding topic- sensitive influential twitterers. In Proceedings of the ACM International Conference on Web Search and Data Mining, WSDM ’10, pages 261–270, New York, NY, USA, 2010. ACM. [63] L. Xiong, X. Chen, T.-K. Huang, J. Schneider, and J. G. Carbonell. Tempo- ral collaborative filtering with Bayesian probabilistic tensor factorization. In Proceedings of the SIAM International Conference on Data Mining, SDM ’10, pages 211–222, Columbus, OH, 2010. 31 [64] W. Xu, X. Liu, and Y. Gong. Document clustering based on non-negative matrix factorization. In Proceedings of the International ACM SIGIR Con- ference on Research and Development in Information Retrieval, SIGIR ’03, pages 267–273, New York, NY, USA, 2003. ACM. 32 Algorithm 1 LDTM Inference 1: Input: Adoption data for each user n at each time step t 2: Output: Estimated parameters 3: Define: ψn,t,k is the number of times user n at time t generates topic k. 4: Define: ξk,m is the number of times topic k generates item m. 5: // Initialization 6: for n ← 1 to N do 7: 8: 9: for m ← 1 to Mn,t do for t ← 1 to Tn do 10: 11: 12: k ← unif ormRandom(1, K) ψn,t,k ← ψn,t,k + 1; ξk,m ← ξk,m + 1; zn,t,m ← k; end for end for 13: 14: 15: end for 16: // Gibbs sampling iterations 17: repeat 18: for n ← 1 to N do 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: // Estimating topic distribution parameters: Kalman filter for t ← 1 to Tn do xn,tt−1 ← An,t−1 · xn,t−1t−1; for m ← 1 to Mn,t do k ← zn,t,m; ψn,t,k ← ψn,t,k − 1; ξk,m ← ξk,m − 1; k ← sample(m, xn,tt−1 + ψn,t, ξk, α, β); // Sample using Equation (6). ψn,t,k ← ψn,t,k + 1; ξk,m ← ξk,m + 1; zn,t,m ← k; end for xn,tt ← xn,tt−1 + ψn,t; end for // Estimating decay parameters: KL divergence minimization for t ← 2 to Tn do for k ← 1 to K do Update the diagonal entries µn,t−1,k ∈ An,t−1 using Equation (2) end for end for 38: 39: 40: until maximum iterations end for 33
1410.6976
4
1410
2016-01-31T19:09:23
Distance-Based Influence in Networks: Computation and Maximization
[ "cs.SI" ]
A premise at a heart of network analysis is that entities in a network derive utilities from their connections. The {\em influence} of a seed set $S$ of nodes is defined as the sum over nodes $u$ of the {\em utility} of $S$ to $u$. {\em Distance-based} utility, which is a decreasing function of the distance from $S$ to $u$, was explored in several successful research threads from social network analysis and economics: Network formation games [Bloch andJackson 2007], Reachability-based influence [Richardson and Domingos 2002, Kempe et al. 2003], "threshold" influence [Gomez-Rodriguez et al. 2011], and {\em closeness centrality} [Bavelas 1948]. We formulate a model that unifies and extends this previous work and address the two fundamental computational problems in this domain: {\em Influence oracles} and {\em influence maximization} (IM). An oracle performs some preprocessing, after which influence queries for arbitrary seed sets can be efficiently computed. With IM, we seek a set of nodes of a given size with maximum influence. Since the IM problem is computationally hard, we instead seek a {\em greedy sequence} of nodes, with each prefix having influence that is at least $1-1/e$ of that of the optimal seed set of the same size. We present the first highly scalable algorithms for both problems, providing statistical guarantees on approximation quality and near-linear worst-case bounds on the computation. We perform an experimental evaluation which demonstrates the effectiveness of our designs on networks with hundreds of millions of edges.
cs.SI
cs
Distance-Based Influence in Networks: Computation and Maximization Edith Cohen Tel Aviv University Google Research Daniel Delling Sunnyvale USA [email protected] [email protected] [email protected] [email protected] Thomas Pajor Cupertino USA Renato F. Werneck San Francisco USA 6 1 0 2 n a J 1 3 ] I S . s c [ 4 v 6 7 9 6 . 0 1 4 1 : v i X r a ABSTRACT A premise at a heart of network analysis is that entities in a network derive utilities from their connections. The influence of a seed set S of nodes is defined as the sum over nodes u of the utility of S to u. Distance-based utility, which is a decreasing function of the distance from S to u, was explored in several successful research threads from social network analysis and economics: Network formation games [Bloch and Jackson 2007], Reachability-based influence [Richardson and Domingos 2002; Kempe et al. 2003]; "threshold" influence [Gomez-Rodriguez et al. 2011]; and closeness centrality [Bavelas 1948]. We formulate a model that unifies and extends this previous work and address the two fundamental computational problems in this domain: Influence oracles and influence maximization (IM). An oracle performs some preprocessing, after which influence queries for arbitrary seed sets can be efficiently computed. With IM, we seek a set of nodes of a given size with maximum influence. Since the IM problem is computationally hard, we instead seek a greedy sequence of nodes, with each prefix having influence that is at least 1− 1/e of that of the optimal seed set of the same size. We present the first highly scalable algorithms for both problems, providing statistical guarantees on approximation quality and near-linear worst-case bounds on the computation. We perform an experimental evaluation which demonstrates the effectiveness of our designs on networks with hundreds of millions of edges. 1. INTRODUCTION Structural notions of the influence of a set of entities in a network which are based on the utility an entity derives from its connectivity to others, are central to network analysis and were studied in the context of social and economic models [3, 4, 16, 25, 29, 31, 39, 42] with applications that include ranking, covering, clustering, and understanding diffusion and network formation games. More for- mally, influence is typically defined in terms of utilities ui j between ordered pairs of entities. The influence of a single entity i, also known as its centrality, is the sum of utilities Inf(i) = ∑ j ui j over entities j. The influence of a set S of entities is the sum over entities of the highest utility match from S: Inf(S) = ∑ ui j . max i∈S j One of the simplest and more popular definitions of influence relies on reachability-based utility [26, 31, 40]. The network here is a directed graph, where entities correspond to nodes. We have ui j = 1 when the node j is reachable from node i. Therefore, the influence of S is the number of entities reachable from S. A powerful enhancement of this model is to allow for multiple instances, where each instance is a set of directed edges, or for a distribution over 1 instances, and accordingly, define ui j as the respective average or ex- pectation. The popular Independent Cascade (IC) model of Kempe et al. [31] uses a distribution defined by a graph with independent inclusion probabilities for edges. More expressive utility is based on shortest-path distances [3, 4, 16, 25, 31, 39, 42]. Specifically, the utility is ui j = α(di j), where α(d) ≥ 0 is a non-increasing function [4, 16, 20, 41] applied to the respective shortest-path distance. Reachability-based utility falls out as a special case, using α(x) = 1 for finite x and α(+∞) = 0. Popular kernels include exponential decay α(x) = exp(−λ x), polynomial decay α(x) = 1/poly(x), Gaussian α(x) = exp(−λ x2), and threshold, which is obtained using α(x) = 1 when x ≤ T and α(x) = 0 otherwise. This variety, used in practice, demonstrates the value of this modeling flexibility. A distance-based model for information diffusion in social net- works was recently proposed by Gomez-Rodriguez et al. [27]. In their model, the seed set S corresponds to the "infected" nodes and edge lengths correspond to propagation time. The shortest paths distance from S to a node v corresponds to the elapsed time until v is "infected." The decay function models the amount by which slower propagaing is less valuable. Again, the modelling power is enhanced by working with multiple instances (each instance is a set of directed edges with lengths), or with a distribution over such instances, and defining the utility as the average of α(di j) over in- stances or as the expectation ui j = E[α(di j)] . In particular, a natural model associates independent randomized edge lengths (REL) with live edges [1,14,23,27], using exponential [1,14,27] or Weibull [23] distributions. We provide an intuitive explanation to the power of randomiza- tion to improve the quality of reachability-based and distance-based utility measures. We expect the utility ui j to be higher when there is a short path and also to when there are more paths. The deter- ministic shortest-path distance does not reflect paths multiplicity, but with REL, a pair connected by more paths will have a shorter expected distance than another pair, even when distances according to expected edge lengths are equal [14]. In addition, randomization, even as introduction of random noise, is a powerful tool in learning, as it reduces the sensitivity of the results to insignificant variations in the input and overfitting the data. We note here that the work of Gomez-Rodriguez et al. and subse- quent work on distance-based diffusion [23, 27] was focused specifi- cally on threshold decay functions, where for a threshold parameter T , ui j = 1 only when the distance is at most T . Distance-based utility with smooth decay functions, which we study here, naturally occur in the physical world and was extensively studied also in the context of data analysis [41] and networks [4, 16, 29, 39]. In par- ticular, distance-based influence generalizes the distance-decaying variant [6, 12, 16, 21, 39] of closeness centrality [3], which was studied with exponential, harmonic, threshold, and general decay functions. The two fundamental algorithmic problems in applications of influence are influence computation and influence maximization (IM). Influence computation is the problem of computing the influence of a specified seed set S of nodes. This can be done using multiple single-source shortest-paths computations from the seed set, but the computation does not scale well when there are many queries on very large networks. Cohen et al. for reachability-based influence [15] and Du et al. for threshold influence [23] designed influence oracles which preprocess the input so that influence queries Inf(G ,S) for a specified seed set S can be approximated quickly. In both cases, a sketch, based on [11], is computed for each node so that the influence of a seed set S can be estimated from the sketches of the nodes in S. For general distance-based influence, we can consider an oracle designed for a pre-specified function α (say reachability- based or threshold), or a more powerful oracle which allows α to be specified at query time. Influence maximization is the problem of finding a seed set S ⊂ V with maximum influence, where S = s is given. Since reachability-based and threshold influence [27, 31] are special cases, we know that distance-based influence maximization with general α is NP-complete and hard to approximate to anything better than 1− (1− 1/s)s of the optimum for a seed set of size s (the hardness result is asymptotic in s) [24]. Fortunately, from monotonicity and submodularity of these influence functions [27, 31], we obtain that the greedy algorithm (GREEDY), which iteratively adds to the seed set the node with maximum marginal influence, is guaranteed to provide a solution that is at least 1− (1− 1/s)s > 1− 1/e of the op- timum [37]. This (worst-case) guarantee holds for every prefix size of the sequence of seeds reported, which means that the GREEDY sequence approximates the Pareto front of the trade-off of seed set size versus its influence. The Pareto front provides added value since it characterizes the influence coverage of the network and can be used to find bi-criteria sweet spots between the size of the seed set and its coverage. In terms of solution quality, also in practice, GREEDY had been the gold standard for submodular maximization. Scalability, how- ever, remains an issue for reachability-based influence even with various optimizations [9, 34], and even when working with a single instance. As a result, extensive research work on reachability-based influence maximization proposes scalable heuristics [30], scalabil- ity with guarantees only for a small number of seeds [7, 46], and, more recently, SKIM, which computes a full approximate GREEDY sequence [15] while scaling nearly linearly with input size. For threshold influence, existing maximization algorithms are by Du et al. [23] based on sketches [11] and by [45] based on an extension of the reachability-based algorithm of [46]. These designs, when using near-linear computation, can only provide approximation guaran- tees for a small number of seeds, even when edge lengths are not randomized.1 1Note that SKIM, which is the design we build on here, pro- vides strong worst-case statistical guarantees on both accuracy and running time, for producing a full approximate greedy sequence of seeds. The computation is proportional to the size of the in- stances and is near-linear when the number of instances is small. Other existing algorithms, even related ones also based on reverse searches [7,11,23,46], do not compute a full sequence in near-linear time: The running time grows with the number of seeds even on a single instance, which is the same as an IC model with all probabili- ties being 0 or 1. The inherent issue is the quality of the approximate greedy solution. The performance of an approximate greedy algo- rithm on a sample deteriorates quickly with the number of seeds, so Contributions. Our contributions are as follows. Our distance- based influence model is presented in Section 2. We define exact and approximate GREEDY sequences and establish approximation guarantees of both. We then formulate a representation of a residual problem with respect to a seed set S, which facilitates the greedy computation of the next seed. Finally, we establish a probabilistic bound on residual updates, which magically holds for the approxi- mate but not for the exact greedy. This bound is a critical component in obtaining near-linear computation of a full approximate greedy sequence. In Section 3 we consider the threshold influence model [23, 27]. We extend the (approximate) influence oracles and the SKIM reachability-based influence maximization algorithm [15], to obtain oracles and T -SKIM for threshold influence. The extension itself replaces reachability searches with pruned Dijkstra computations. The statistical guarantees on approximation quality are inherited from SKIM. The worst-case running time analysis, establishing that T -SKIM computes the full approximate greedy sequence in near- linear time, required our probabilistic bound on residual updates. In Section 4, we present distance-based influence oracles, which take as input a seed set S and (any) decay function α, which can be specified at query time. As explained earlier, many different decay/kernel functions are used extensively in practice, which makes the flexibility of the oracle to handle arbitrary α valuable. Our oracle computes a novel sketch for each node; the combined All-Distances sketch (cADS), which generalizes All-Distances Sketches (ADS) [5, 11,12,16,17], used for closeness centrality computation, to multiple instances or probabilistic models. These per-node sketches have expected size at most k ln(nmin{k, (cid:96)}) (with good concentration), where n is the number of nodes, (cid:96) is the number of instances, and k is a sketch parameter that determines a trade-off between information and the amounts of computation and space required. We estimate the distance-based influence of a seed set S from the sketches of the nodes in S. Our estimator uses HIP probabilities [12] with the L∗ estimator [13], which optimally uses the information in the sketches, and has worst-case coefficient of variation (CV) ≤ 1/√2k− 2. In Section 5 we present α-SKIM, the first scalable influence maximization algorithm that applies with general decay functions α. Our design is a strong contribution from both theoretical and practi- cal perspectives, providing a novel near-linear worst-case bound on the computation, performance guarantees that nearly match those of exact GREEDY, and a scalable implementation that runs on large networks. The heart of our design is a novel algorithmic technique of efficiently maintaining weighted samples from influence sets that allows us to accurately estimate marginal influences as nodes are added to the seed set. Section 6 presents a comprehensive experimental evaluation of our algorithms. For threshold influence oracles and maximization, we obtain three orders of magnitude speedups over the algorithms of Du et al. [23], with no loss in quality. Even though both ap- proaches apply the sketches of Cohen [11], we are able to obtain improvements by working with combined sketches, applying better estimators, and, in our IM algorithm, only computing sketches to the point needed to determine the next node. We also show that the a very large sample size, O(sn) in total, may be needed when we are interested in good approximation with respect to all seed sets of size s, which is needed in order to correctly identify the maximum one. The power and novelty of SKIM comes from efficiently maintaining a residual problem, which allows for samples which provide relative error guarantees on marginal contributions of new seed candidates. We also note that SKIM runs in worst-case near-linear time on inputs specified as a set of (arbitrary) instances. It is not known if near-linear time algorithms that compute an approximate greedy sequence exist for the IC model. 2 generalization to arbitrary decay functions α is only slightly slower, and can easily handle graphs with hundreds of millions of edges. We conclude in Section 7. 2. DISTANCE-BASED MODEL For a set of entities V , utility uvu for v,u ∈ V , and a seed set S ⊂ V , we define the influence of S as Inf(S) = ∑ u∈V min v∈S uuv . Distance-based utility is defined with respect to a non-increasing function α such that α(∞) ≡ 0 and (a set or distribution over) edge- weighted graphs G = (V,E,w), where the nodes correspond to enti- ties and edges e ∈ E have lengths w(e) > 0. We refer to a single graph G as an instance. We denote by dvu the shortest-path distance in G from v to u. When there is no path from v to u in G we define dvu ≡ ∞. For a set of nodes S, we let dSu = minv∈S dvu be the shortest-path distance in G from S to u. The utility with respect to a single instance is defined as uvu = α(dvu), yielding the influence function Inf(G,S) = ∑ u∈V α(dSu). For a set G = {G(i)} of (cid:96) ≥ 1 instances G(i) = (V,E(i),w(i)), we define the utility as the average uvu = 1 vu ) and accordingly the influence is the average of the single-instance influence: i=1 α(d(i) (cid:96) ∑(cid:96) Inf(G ,S) = Inf({G(i)},S) = 1 (cid:96) ∑ i∈[(cid:96)] Inf(G(i),S). (1) Our algorithms work with inputs specified as a set of one or more instances and with respect to the influence function (1). A set of instances can be derived from traces or generated by Monte-Carlo simulations of a probabilistic model G . Such a model defines a distribution over instances G ∼ G which share a set V of nodes. The respective utility is then uuv = E[α(duv)] and the influence of G is then the expectation Inf(G ,S) = EG∼G Inf(G,S). (2) When Inf is well concentrated around its expectation, a small num- ber of simulations suffices to approximate the results. 2.1 The Exact Greedy Sequence We present the exact greedy algorithm for the distance-based influ- ence objective Inf({G(i)},S), as defined in Equation (1). GREEDY starts with an empty seed set S = /0. In each iteration, it adds the node with maximum marginal gain, that is, the node u that maxi- mizes the influence of S∪{u}. GREEDY thus produces a sequence of nodes, providing an approximation guarantee for the seed set defined by each prefix. We now elaborate on the computation of the marginal gain of u given S. To do so efficiently as S grows, we work with a residual problem. We denote the residual problem of G with respect to seed set S as GS. The influence of a set of nodes U in the residual problem is equal to the marginal influence in the original problem: Inf(GS,U) = Inf(G ,S∪U)− Inf(G ,S). A residual problem has a slightly more general specification. The input has the form (G ,δ ), where δ (i) v ≥ 0 maps node-instance pairs (v,i) to nonnegative numbers. The δ values we use for the residual problem GS are the respective distances from the seed set (but can be truncated without violating correctness at any distance x in which α(x) = 0): δ (i) v = d(i) Sv ≡ min u∈S d(i) uv . v = ∞ or any δ (i) When the seed set is empty or the node v is either not reachable from S in instance i or has distance d(i) Sv > supx{α(x) > 0}, we can use δ (i) We now extend the influence definition for inputs of the form (G ,δ ). For a node u, we consider the contribution of each node- instance pair (v,i) to the influence of u: ∆(i) uv ≡ max{0,α(d(i) v > supx{α(x) > 0}, which is equivalent. uv )− α(δ (i) v )}. (3) The influence of u in the residual problem is the (normalized) sum of these contributions over all nodes in all instances: Inf((G ,δ ),u) ≡ It is not hard to verify the following. 1 (cid:96) ∑ i ∆(i) uv . ∑ v (4) LEMMA 2.1. For any set of nodes U, the influence of U in GS is the same as marginal influence of U with respect to S in G . Given a residual input (G ,δ ), the influence of a node u (which is the same as its marginal influence in the original input G ) can be computed using a pruned application of Dijkstra's algorithm from u. A pseudocode is provided as the function MargGain(u) in Appendix D.1. The pruning is performed for efficiency reasons by avoiding expanding the search in futile directions. In particular, we can always prune at distance d when α(d) = 0 or when d ≥ δ (i) v . The correctness of the pruning follows by observing that all nodes u Dijkstra could reach from the pruned node have ∆(i) uv = 0. At each step, GREEDY selects a node with maximum influence in the residual input. It then updates the distances δ so that they capture the residual problem GS∪{u}. A pseudocode for updating δ is provided as the function AddSeed(u) in Appendix D.1. To update, we perform a pruned single-source shortest-paths computation in each instance i from u, as in MargGain(u). A straightforward implementation of GREEDY will recompute MargGain(u) for all nodes u after each iteration. A common ac- celeration is instead to perform lazy evaluations: one keeps older values of marginal gains, which are upper bounds on the current values, and updates the current values only for the candidates at the top of the queue as needed to determine the maximum one. Lazy evaluations for reachability-based influence were used by Leskovec et al. [34] in their CELF algorithm. The correctness of lazy eval- uations follows from the submodularity and monotonicity of the objective, which imply that the marginal gain of a node can only decrease as the seed set grows. 2.2 Approximate Greedy Sequences APPROXIMATE GREEDY is similar to exact GREEDY, but in each iteration, instead of selecting a seed node with maximum marginal gain, we select a seed node with marginal contribution that is within a small relative error ε of the maximum with high probability. It also suffices to require that the relative error is bounded by ε in expectation and is concentrated, that is, ∀a > 1, the probability of error exceeding aε decreases exponentially in a. It turns out that the approximation ratio of APPROXIMATE GREEDY is 1− (1− 1/s)s − O(ε) with corresponding guarantees [15]. The SKIM algorithm applies approximate greedy to reachability- based influence. It works with partial sketches (samples) from "influence sets" of nodes to determine a node with approximately 3 maximum marginal gain. These partial sketches need to be updated very efficiently after each seed is selected. A critical component for the scalability and accuracy of SKIM is sampling with respect to the residual problem. This is because the marginal influence of a node can be much smaller than its initial influence and we can get good accuracy with a small sample only if we use the residual problem. The residual problem (and current samples) are updated after each seed selection, both with exact and approximate GREEDY. We now consider the total number of edge traversals used in these up- dates. With reachability-based influence, with exact or approximate GREEDY, the number of traversals is linear in input size: This is because there can be at most one search which progresses through a node in each instance. Once a node is reachable from the seed set in that instance, it is influenced, and everything reachable from the node in the same instance is reachable, and influenced, as well. So these nodes never need to be visited again and can be removed. This is not true, however, for distance-based influence: For each node-instance pair (v,i), the distance δ (i) v can be updated many times. Moreover, when the distance to the seed set decreases, as a result of adding a new seed node, the node v and its outgoing edges in the instance i are traversed. Therefore, to bound the number of edge traversals we must bound the number of updates of δ (i) v . For exact GREEDY, there are pathological inputs with Ω(sn) updates, which roughly translates to Ω(sE) edge traversals, even on a single instance and threshold influence. 2 On realistic inputs, however, we expect the number of updates to be no more than lns per node. This is because even if seed nodes are added in random order, the expected number of times the distance to the seed set decreases is well concentrated around lns. Therefore, since selected seeds should typically be closer than other nodes, we would expect a small number of updates. Remarkably, we show that our APPROXIMATE GREEDY selection circumvents this worst-case behavior of the exact algorithm and guarantees a near-linear number of updates : THEOREM 2.1. Suppose that the approximate greedy selection has the property that for some ε, the next seed is selected in a near uniform way from all nodes with marginal influence that is at least (1− ε) of the maximum. Then the expected total number of updates of δ (i) v at a node-instance pair (v,i) is bounded by O(ε−1 log2 n). PROOF. Consider the candidate next seeds S(cid:48) (those with marginal influence that is within (1− ε) of the maximum). For a node in- stance pair (v,i), consider all nodes u ∈ S(cid:48) with duv < δ (i) v . Then the probability that the jth selected node from this group would be closer than all previously selected ones is 1/ j. We obtain that the expected number of updates to δ (i) from nodes in this group v is at most lnn. We now consider, for the sake of analysis only, partitioning the greedy selection to steps, according to a decrease by a factor of (1− ε) of the maximum marginal influence of a node. We showed that the expected number of selections in a step is at most lnn. Also note that the marginal influence of a node can only decrease after another node is selected, so it is possible that it moves to the next step. We now bound the number of steps. Because we 2Consider a deterministic instance (directed graph) and threshold influence with T > 1. The nodes {ai} have edges to all nodes in a set M with length T (1− i/(2A)) and special nodes {b1, . . . ,bi} with distance 1. The greedy selection, and in fact also the optimal one, selects the nodes {ai} by decreasing index. But each selection updates the δ for all nodes in M. We can choose number of a nodes M and number of b nodes roughly M. Obtaining that each of the first √n seeds (where n is the total number of nodes) results in δ updates for Ω(n) nodes. roughly(cid:112) 4 are interested in ε approximation, we can stop the greedy algorithm once the maximum marginal influence is below ε/n of the initial one. Therefore, there are at most ε−1 logn steps. 3. THRESHOLD INFLUENCE We present both an oracle and an approximate greedy IM al- gorithm for threshold influence [23, 27]. In this model, a node is considered influenced by S in an instance if it is within distance at most T from the seed set. Formally, α(x) = 1 when x ≤ T and α(x) = 0 otherwise. The simpler structure of the kernel allows for simpler algorithms, intuitively, because the contributions to influ- ence ∆(i) 3.1 Threshold-Influence Oracle uv are in {0,1}, as with reachability-based influence. Our influence oracle for a prespecified threshold T generalizes the reachability-based influence oracle of Cohen et al. [15]. The reachability-based influence oracle preprocesses the input to com- pute a combined reachability sketch for each node. Each node- instance pair is assigned a random permutation rank (a number in [n(cid:96)]) and the combined reachability sketch of a node u is a set con- sisting of the k smallest ranks amongst node-instance pairs (v,i) such that v is reachable from u in instance i. This is also called a bottom-k sketch of reachable pairs. The oracle uses the sketches of the nodes in S to estimate their influence by applying the union size estimator for bottom-k sketches [18]. The combined reachability sketches are built by first computing a set of reachability sketches (one for each node) [11] in each instance and then combining, for each node, the sketches obtained in different instances to obtain one size-k sketch. In turn, the computation for each instance uses reverse (backward) reachability computations. The algorithm of Cohen [11] initiates these reversed reachability searches from all nodes in a random permutation order. These searches are pruned at nodes already visited k times. For threshold influence, we instead consider a pair (v,i) reachable from u if d(i) uv ≤ T . We then compute for each node the bottom-k sketch of these "reachable" pairs under the modified definition. The oracle estimator [18] is the same one used for the reachability-based case; the estimate has (worst-case) CV that is at most 1/√k− 2 with good concentration. The computation of the sketches is nearly as efficient as for the reachability-based case. Instead of using re- verse reachability searches, for threshold influence we use reverse Dijkstra computations (single-source shortest-path searches on the graph with reversed edges). These computations are pruned both at distance T and (as with reachability sketches) at nodes already visited k times. The sets of sketches obtained for the different in- stances are combined as in [15] to obtain a set of combined sketches (one combined sketch with k entries for each node). The running time is dominated by the computation of the sketches. i=1E(i)logn), the sketch The preprocessing computation is O(k∑(cid:96) representation is O(kn), and each influence query for a set S takes O(Sk logS) time. Oracle for a distance-based IC model. A distance-based Independent Cascade (IC) model G is specified by associating an independent random length w(e) ∈ [0, +∞] with each edge e according to a distribution that is associated with the edge. The probability that e is live is pe = Pr[w(e) < ∞] and its length if it is live is w(e). We use the convention that an edge e that is not explicitly specified has w(e) ≡ ∞ (is never live). As with the IC model for reachability-based influence [15, 36], we can compute oracles based on sketches that have the same size, query time, and approximation guarantees, but with respect to a distance-based IC model (where the exact influence is defined as the expectation over the model instead of the average of (cid:96) determin- istic instances). The worst-case computation involved, however, is higher. The algorithm performs up to k = O(ε−2 logn) reverse Di- jkstra searches (pruned to distance T ) from each node. Each search randomly instantiates incoming edges of scanned nodes according to the model. Pseudocode is provided as Algorithm 1. Note that in contrast to sketching instances, the searches are not pruned at nodes that already have a size-k sketch. Therefore we can not bound the total number of node scans by as we did with instances, and have a worst-case bound of O(kn2). On the positive size, we do maintain the property that the sketch sizes are k. The correctness arguments of the approximation guarantees with respect to the expectation of the IC model carry over from [15]. // Initialize sketches nodes V Algorithm 1: Build sketches S(v), v ∈ V for an IC model foreach v ∈ V do S(v) ← /0; // Iterate over k random permutations of the for j = 0, . . . ,k− 1 do Draw a random permutation of the nodes π : [n] → V for i = 1, . . . ,n do Perform a reverse Dijkstra search from node π(i) pruned to distance T foreach scanned node u do if S(u) < k then S(u) ← S(u)∪{n∗ j + i} if all nodes z have S(z) = k then Instantiate and process length and presence of incoming edges of u exit return S(v) for all v ∈ V 3.2 Threshold-Influence Maximization Our algorithm for threshold influence maximization, which we call T -SKIM, generalizes SKIM [15], which was designed for reachability-based influence. A pseudocode for T -SKIM is pro- vided as Algorithm 3 in Appendix D.2. Our algorithm T -SKIM builds sketches, but only to the point of determining the node with maximum estimated influence. We then compute a residual problem which updates the sketches. T -SKIM build sketches using reverse single-source shortest path computa- tions that are pruned at distance T (depth-T Dijkstra). As with exact greedy for distance-based influence (Section 2), T -SKIM maintains a residual problem. This requires updating the distances δ [v,i] = d(i) Sv from the current seed set S, as in AddSeed(u), and also updating the sketches to remove the contributions of pairs that are already covered by the seed set. The (worst-case) estimation quality guarantee of T -SKIM is similar to that of SKIM. When using k = O(ε−2 logn) we obtain that, with high probability (greater than 1−1/poly(n)), for all s ≥ 1, the influence of the first s selected nodes is at least 1− (1−1/s)s−ε of the maximum influence of a seed set of size s. The computation time analysis of T -SKIM is deferred to Appendix A. set S of nodes and any function α, can be approximated from the sketches of the query seed nodes. Note that the same set of sketches can be used to estimate distance- based influence with respect to any non-increasing function α. That is, α can be specified on the fly, after the sketches are computed. When we are only interested in a specific α, such as a threshold function with a given T (Section 3) or reachability-based influence [15], the sketch size and construction time can be reduced. In the following we present in detail the three components of our oracle: the definition of the sketches, estimation of influence from sketches (queries), and building the sketches (preprocessing). The sketches are defined in Section 4.1 and we show that for an input specified as either a set of instances or as a distance-based IC model, each sketch Xv has a (well concentrated) expected size that is at most k ln(nk). The total storage of our oracle is therefore O(nk log(nk)). The sketch-based influence estimator is presented in Section 4.2. We establish the following worst-case bounds on estimation quality. THEOREM 4.1. Influence queries Inf(G ,S), specified by a set S of seed nodes and a function α, can be estimated in O(Sk logn) time from the sketches {Xu u ∈ S}. The estimate is nonnegative and unbiased, has CV ≤ 1/√2k− 2, and is well concentrated (the prob- ability that the relative error exceeds a/√k decreases exponentially with a > 1). We also show that our estimators are designed to fully exploit the information in the sketches in an instance-optimal manner. The preprocessing is discussed in Section 4.3. We show that for a set of (cid:96) instances G = {G(i)}, the preprocessing is performed in expected time O(k∑(cid:96) 4.1 Combined ADS i=1E(i)logn). Our combined All-Distances Sketches (cADS) are a multi-instance generalization of All-Distances Sketches (ADS) [11, 12, 17] and build on the related combined reachability sketches [15] used for reachability-based influence. The cADS sketches are randomized structures defined with re- spect to random rank values r(i) u ∼ U[0,1] associated with each node-instance pair (u,i). To improve estimation quality in practice, we restrict ourselves to a particular form of structured permuta- tion ranks [15]: For a set of instances, the ranks are a permutation of 1, . . . ,nmin{(cid:96),k}, where each block of positions of the form in, (i + 1)n− 1 (for integral i) corresponds to an independent ran- dom permutation of the nodes. For each node u, the instances i j in r(i j) , when ordered by increasing rank, are a uniform random u selection (without replacement). u ,d(i) For each node v, cADS(v) is a set of rank-distance pairs of the form (r(i) vu ) which includes min{(cid:96),k} pairs of distance 0, that is, all such pairs if (cid:96) ≤ k and the k smallest rank values otherwise. It also includes pairs with positive distance when the rank value is at most the kth smallest amongst closer nodes (across all instances). Formally, cADS(v) =  (cid:8)(r(i) (cid:8)(r(i) v ,0) r(i) u ,d(i) vu ) r(i) v ∈ BOTTOM-k{r( j) u < kth vy <d(i) vu (y, j)d( j) (cid:9) (cid:9) v j ∈ [(cid:96)]} r( j) y . (5) 4. INFLUENCE ORACLE We now present our oracle for distance-based influence, as defined in Equation (1). We preprocess the input G to compute a sketch Xv for each node v. Influence queries, which are specified by a seed Here BOTTOM-k refers to the smallest k elements in the set and kth denotes the kth smallest element in the set. When there are fewer than k elements, we define kth as the domain maximum. For the purpose of sketch definition, we treat all positive distances across instances as unique; we apply some arbitrary tie-breaking, 5 for example according to node-instance index, when this is not the case. The size of cADS sketches is a random variable, but we can bound its expectation. Moreover, cADS(u) is well concentrated around the expectation. The proof resembles that for the basic ADS [11]. LEMMA 4.1. ∀u, E[cADS(u)] ≤ k ln(nmin{k, (cid:96)}). PROOF. We consider all node-instance pairs (v,i) such that r(i) v ∈ BOTTOM-k{r( j) v j ∈ [(cid:96)]} by increasing distance from u. The prob- ability that the jth item contributes to cADS(u) is the probability that its rank is amongst the k smallest in the first j nodes, which is min{1,k/ j}. Summing over i ≤ Ru we obtain the bound. Note that we can also define cADS sketches with respect to a probabilistic model. The definition emulates working with an infi- nite set of instances generated according to the model. Since there are at most nk distinct rank values in the sketches, and they are all from the first nk structured permutation ranks, the entries in the sketches are integers in [nk]. 4.2 Estimating Influence Our estimators use the HIP threshold, τv(x), defined with respect to a node v and a positive distance value x > 0 [12]: τv(x) = kth r( j) u (u, j)d( j) vu <x = kth{r (r,d) ∈ cADS(v) and d < x}. (6) The value τv(x) is the kth smallest rank value amongst pairs (y, j) whose distance d( j) vy is smaller than x. If there are fewer than k pairs with distance smaller than x, then the threshold is defined to be the maximum value in the rank domain. Note that, since the cADS contains the k smallest ranks within each distance, τv(x) is also the kth smallest amongst such pairs that are in cADS(v). Therefore, the threshold values τv(x) can be computed from cADS(v) for all x. vu ) is the largest rank value r(i) The HIP threshold has the following interpretation. For a node- instance pair (u,i), τv(d(i) u that would allow the (rank of the) pair to be included in cADS(v), conditioned on fixing the ranks of all other pairs. We now can consider the probability that the pair (y, j) is included in cADS(v), fixing the ranks of all pairs other than (y, j). This is exactly the probability that a random rank value is smaller than the HIP threshold τv(x). In particular, if τv(x) is the domain maximum, the inclusion probably is 1. We refer to this probability as the HIP inclusion probability. When ranks are uniformly drawn from [0,1] the HIP inclusion probability is equal to the HIP threshold τv(x) and we use the same notation. When we work with integral structured ranks, we divide them by n(cid:96) to obtain values in [0,1]. We now present the estimator for the influence Inf({G(i)},S) = = 1 (cid:96) ∑ (v,i) α(min u∈S max u∈S 1 (cid:96) ∑ (v,i) d(i) uv ) = α(d(i) uv ) 1 (cid:96) ∑ (v,i) α(d(i) Sv ) (7) from {cADS(u) u ∈ S}. We first discuss S = 1. We use the HIP estimator [12](cid:99)Inf({G(i)},u) = α(0) + 1 (cid:96) ∑ (r,d)∈cADS(u)d>0 α(d) τu(d) , (8) which is the sum over "sampled" pairs (r,d) (those included in cADS(u)) of the contribution α(d)/(cid:96) of the pair to the influence of u, divided by the HIP inclusion probability of the pair. LEMMA 4.2. The estimator (8) is unbiased and has CV that is at most 1/√2k− 2. PROOF. A node always influences itself (the only node of dis- tance 0 from it), and the estimate for that contribution is α(0). We apply the HIP estimator of [12] to estimate the contribution of nodes with positive distance from u. For a pair (v,i), the HIP estimate is 0 for pairs not in cADS(u). When the pair is in cADS(u), we can compute the HIP probability τu(d(i) uv ) and obtain the estimate α(d(i) uv ). Since we are considering node-instance pairs, we divide by the number of instances (cid:96). The variance analysis is very similar to [12]. uv )/τu(d(i) We now consider a seed set S with multiple nodes. The simplest way to handle such a set is to generate the union cADS, which is a cADS computed with respect to the minimum distances from any node in S. The union cADS can be computed by merging the cADS of the seed nodes using a similar procedure to Algorithm 6 (in Appendix D.3) which will be presented in Section 4.3. We then estimate the contribution of the nodes in S by Sα(0) and estimate the contribution of all nodes that have a positive distance from S by applying the HIP estimator to the entries in the union cADS. This estimator has the worst-case bounds on estimation quality claimed in Theorem 4.1, but discards a lot of information in the union of the sketches which could be used to tighten the estimate. 4.2.1 Optimal Oracle Estimator The estimator we propose and implement uses the information in the sketches of nodes in S in an optimal way. This means the variance can be smaller, up to a factor of S, than that of the union es- timator. A pseudocode is provided as Algorithm 4 in Appendix D.3. The estimator first computes the set Z of rank values r that appear with distance 0 in at least one sketch. These ranks correspond to node-instance pairs involving a seed node. For each rank value r that appears in at least one sketch in S and is not in Z (has positive dis- tance in all sketches), we build the set Tr of threshold-contribution pairs that correspond to occurrences of r in sketches of S. We then compute from Tr the sorted skyline (Pareto set) skylines[r] of Tr. The skyline skylines[r] includes a pair (τ,α) ∈ Tr if and only if the pair is not dominated by any other pair. That is, any pair with a larger τ value must have a smaller α value. We compute skylines[r] from Tr as follows. We first sort Tr lexicographically, first by decreasing τ, and then if there are multiple entries with same τ, by decreasing α. We then obtain skylines[r] by a linear scan of the sorted Tr which removes pairs with a lower α value than the maximum α value seen so far. The entries of the computed skylines[r] are sorted by decreasing τ j (and increasing α j). For each r for which we computed a skyline (appears in at least one sketch of a node in S and is not in Z), we apply the L∗ estimator [13] to the sorted skylines(r) = {(τ j,α j)}. The pseudocode for L∗ tailored to our application is in Algorithm 5 in Section D.3, and details on the derivation and applicability of the estimator are provided in Appendix B. Finally, the influence estimate (cid:99)Inf({G(i)},S) returned by Algo- rithm 4 has two components. The first summand (Sα(0)) is the contribution of the seed nodes themselves. The second component is the sum, over all node-instance pairs of positive distance from S, of their estimated contribution to the influence (normalized by the number of instances (cid:96)). We estimate this by the sum of the L∗ estimates applied to skylines(r). 4.3 Computing the Set of cADS We compute a set of cADS sketches by computing a set of ADS sketches ADS(i)(v) for each instance i [11, 12]. The computation 6 of sketches for all nodes v in a single instance can be done us- ing PRUNED DIJKSTRAs [11, 17] or the node-centric LOCAL UP- DATES [12]. An ADS is a cADS of a single instance and has the same basic form: a list of rank-distance pairs sorted by increasing distance. It can have, however, at most one entry of distance 0. For each node v, we compute cADS(v) by combining ADS(i)(v) for all instances i.A pseudocode for combining two rank-distance lists to a cADS format list is provided as Algorithm 6. The algorithm can be applied repeatedly to ADS(i)(v) and the current cADS(v), or in any combination order of rank-distance lists to obtain the same end result. The computation of the set of cADS sketches is dominated by computing a set of All-Distances Sketches [11, 12, 17] in each in- stance. The computation for instance i takes O(kE(i)logn) time. Algorithm 2: Distance-based IM (α-SKIM) Input: Directed graphs {G(i)(V,E (i),w(i))}, α Output: Sequence of node and marginal influence pairs // Initialization // List of (u,d(i) uv ) rank ← map node-instance pairs (v,i) to j/(n(cid:96)) where j ∈ [n(cid:96)]; forall the node-instance pairs (v,i) do index[v,i] ←⊥; scanned by reverse Dijkstra (v,i) forall the pairs (u,i) do δ [u,i] ← ∞; // Distance from S forall the nodes v do Est.H[v] ← 0; Est.M[v] ← 0 seedlist ←⊥ // List of seeds & marg. influences forall the node-instance pairs (v,i) do Insert (v,i) to Qpairs with priority α(0)/rank[v,i]; s ← 0; τ ← α(0)n(cid:96)/(2k); coverage ← 0 set while coverage < n(cid:96)α(0) do // Initialize Qpairs // coverage of current seed // Build PPS samples of marginal influence sets until confidence in next seed while ((x, Ix) ← NextSeed()) =⊥ do τ ← τλ ; MoveUp() forall the pairs (v,i) in Qpairs with priority ≥ τ do // Update est. components Remove (v,i) from Qpairs Resume reverse Dijkstra from (v,i). foreach scanned node u of distance d do c ← α(d)− α(δ [v,i]); if c ≤ 0 then Terminate rev. Dijkstra from (v,i) if c/rank[v,i] < τ then place (v,i) with priority c/rank[v,i] in Qpairs; Pause reverse Dijkstra from (v,i) else append (u,d) to index[v,i] if c ≥ τ then Est.H[u] +←c; else Est.M[u] +←1 if HM[v,i] =⊥ then // c/rank[v,i] ≥ τ // H entry // M entry HM[v,i] ← index[v,i]; Insert (v,i) with priority c to Qhml Update the priority of u in Qcands to Est.H[u] + τEst.M[u] // Process new seed node x Ix ← 0 foreach instance i do // Exact marginal influence Perform a forward Dijkstra from x in G(i). foreach visited node v at distance d do if d ≥ δ [v,i] then Pruneelse ; rank[v,i] priority(v,i) in Qpairs −← α(d)−α(δ [v,i]) if priority of (v,i) in Qpairs ≤ 0 then terminate rev. Dijkstra (v,i) and remove (v,i) from Qpairs MoveDown((v,i),δ [v,i],d); +←α(d)− α(δ [v,i]); δ [v,i] ← d Ix s +←1; coverage +←Ix; seedlist.append(x, Ix/(cid:96),Ix/(cid:96)) return seedlist 5. INFLUENCE MAXIMIZATION We present α-SKIM (pseudocode in Algorithm 2), which com- putes an approximate greedy sequence for distance-based influence with respect to an arbitrary non-increasing α. The input to α-SKIM is a set of instances G and a decay function α. The output is a sequence of nodes, so that each prefix approximates the maximum influence seed set of the same size. Like exact greedy (Section 2) and T -SKIM (Section 3), α-SKIM maintains a residual problem, specified by the original input G and distances δ (i) v . It also maintains, for each node, a sample of its influence set, weighted by the respective contribution of each element. The sampling is governed by a global sampling threshold τ, which inversely determines the inclusion probability in the sample (the lower τ is, the larger is the sample). The weighted sample has the same role as the partial sketches maintained in T -SKIM, as it allow us to estimate the influence of nodes. At a high level, α-SKIM alternates between two subroutines. The first subroutine examines the influence estimates of nodes. We pause if we have sufficient confidence that the node with the maxi- mum estimated influence (in the current residual problem) has actual influence that is sufficiently close to the maximum influence. Other- wise, we decrease τ, by multiplying it by a (fixed) λ < 1 (we used λ = 0.5 in our implementation), extend the samples, and update the estimates on the influence of nodes to be with respect to the new threshold τ. We pause only when we are happy with the node with maximum estimated influence. The second subroutine is invoked when a new node x is selected to be added to the seed set; α-SKIM updates the residual problem, that is, the distances δ and the samples. We provide an overview of our presentation of the components of α-SKIM. In Section 5.1 we precisely define the weighted samples we use. In Section 5.2 we present our main data structure, index, which stores the (inverted) samples. The building of index, which dominates the computation, is done using applications of pruned reverse Dijkstra, discussed in Section 5.3. The selection of the next seed node is detailed in Section 5.4. The samples are defined with respect to the current residual problem and the sampling threshold τ. Therefore, they need to be updated when τ is decreased or when a new seed node is selected. While the new estimates can always be computed by simply scanning index, this is inefficient. In Section 5.5 we present additional structures which support efficient updates of samples and estimates. Finally, Section 5.6 includes a worst-case analysis. 5.1 PPS Samples of Influence Sets We start by specifying the sampling scheme, which is the core of our approach. The sample we maintain for each node u is a Probability Proportional to Size (PPS) sample of all node-instance pairs (v,i), where the weighting is with respect to the contribution values ∆(i) uv , as defined in Equation (3). Recall from Equation (4) that the influence, which we are estimating from the sample, is the sum of these contributions. PPS sampling can be equivalently defined with respect to a threshold τ [43]: Each entry (v,i) has an independent r(i) v ∼ U[0,1] and it is included in the sample of u if ∆(i) uv v ≥ τ. r(i) (9) From the PPS sample we can unbiasedly estimate the influence of u, using the classic inverse-probability estimator [28]. We denote by Hu the set of all pairs (v,i) such that ∆(i) uv ≥ τ and by Mu the set of all other sampled pairs, that is, those where ∆(i) v τ,τ). Note uv ∈ [r(i) 7 τ that pairs in Hu are sampled with probability 1, whereas pairs in Mu are sampled with probability ∆(i)(u) (this is the probability of having (cid:32) a rank value so that (9) is satisfied). The estimate is the sum of the ratio of contribution to inclusion probability: τMu + ∑ (v,i)∈Hu (cid:99)Inf((G ,δ ),u) = (cid:33) ∆(i) uv (10) 1 (cid:96) With PPS sampling, when τ is low enough so that the estimate is at least kτ, which always happens when we have k samples, the CV is at most 1/√k. The estimate is also well concentrated according to the Chernoff bound. . We note that our use of PPS sampling, rather than uniform sam- pling, is critical to performance with general α. When using (for example) exponential or polynomial decay, the positive contribu- tions of different pairs to the influence of a node can vary by orders of magnitude. Therefore, we must use weighted sampling, where heavier contributions are more likely to be sampled, to obtain good accuracy with a small sample size. With threshold influence, in con- trast, contributions were either 0 or 1, which meant that we could get good performance with uniform sampling. The PPS samples we will maintain for different nodes are com- puted with respect to the same threshold τ. The samples are also coordinated, meaning that the same values r(i) v are used in the sam- ples of all nodes. Coordination also helps us to maintain the samples when the contribution values ∆ are modified, since the sample itself minimally changes to reflect the new values [8, 19, 38]. In our im- plementation, node-instance pairs are assigned structured random permutation ranks, which are integers in [n(cid:96)], and for permutation rank h we use rank[v,i] ≡ r(i) 5.2 The Index Structure v = h/(n(cid:96)). The main structure we maintain is index, which can be viewed as an inverted index of the PPS samples (but technically can include entries that used to be included in the PPS sample and may still be relevant). For each node-instance pair (v,i), index[v,i] is an ordered list of node-distance pairs (u,d(i) uv ). Note that typically the lists are empty or very small for most pairs (v,i). The list is ordered by increasing d(i) uv , which is the order in which a reverse Dijkstra algorithm performed from v on the graph G(i) (with all edges reversed) scans new nodes. List index[v,i] always stores (a prefix) of the scanned nodes, in scanning order. It always includes all nodes u for which the pair (v,i) is included in the PPS sample of u, that is, nodes u that satisfy (9). Each list index[v,i] is trimmed from its tail so that it only contains entries (u,d) where ∆(i) uv > 0, that is, α(d)− α(δ (i) v ) > 0. This is because other entries have no contribution to the marginal influence of u. Note that the lists are always a prefix of the Dijkstra scan order, and once they are trimmed (from the end), they do not grow, and the respective reverse Dijkstra computation never resumed, even if τ decreases. Each list index[v,i] is logically viewed as having three consecutive parts (that could be empty). The H part of the list are all entries (u,d) with α(d)− α(δ (i) v ) ≥ τ. These are the nodes u for which the pair (v,i) contributes to the Hu part of the PPS sample. The M part of the list are all entries with α(d)− α(δ (i) v ) ∈ [r(i) v τ,τ), which include nodes u for which (v,i) contributes to Mu. Finally, the L part of the list includes nodes for which 0 < α(d)−α(δ (i) v τ. The L nodes do not currently include (v,i) in the PPS sample of their influence sets, but are still relevant, since this may change when τ decreases. v ) < r(i) To support efficient updates of this classification, we maintain HM[v,i] and ML[v,i], which contain the positions in the list index[v,i] of the first M and the first L items (and are empty if there are no M or L items, respectively). To efficiently compute the influence estimates, we maintain for each node u the values Est.H[u] = ∆(i) uv ∑ (v,i)∆(i) uv≥τ uv ∈ [r(i) The PPS estimate (10) on the influence of u is Est.M[u] = {(v,i) ∆(i) v τ,τ)} 1 (cid:96) (Est.H[u] + τEst.M[u]) . (11) 5.3 Reverse Dijkstra Computations We build the samples using reverse Dijkstra computations starting at node-instance pairs (v,i). The computation is from source v in the transpose graph of G(i) and reveals all nodes u for which the pair (v,i) is included in the PPS sample for u as defined in (9). The nodes scanned by the reverse Dijkstra on [v,i] are maintained as index[v,i], in the same order. The computation for (v,i) is paused once the distance d from the source satisfies v ) < r(i) v τ. (12) α(d)− α(δ (i) The computation may resume when τ is decreased and the pause rule (12) no longer holds. It is not hard to verify that this pause rule suffices to obtain all entries of (v,i) in the PPS samples of nodes. When the depth d satisfies α(d)− α(δ (i) v ) ≤ 0, the computation of the reverse Dijkstra (v,i) is (permanently) terminated, releasing all auxiliary data structures. Note that the reverse Dijkstra computations for different pairs are paused and resumed according to the global threshold τ, and can be performed concurrently. The algorithm maintains "state" for all active Dijkstras. We use the notation µ(v,i) = d for the next distance the reverse Dijkstra from (v,i) would process when resumed. Initially, µ(v,i) = 0. In or- der to efficiently determine the pairs (v,i) for which reverse Dijkstra needs to be resumed, we maintain a max priority queue Qpairs over node-instance pairs (v,i), prioritized by α(µ(v,i))− α(δ (i) v ) (13) . r(i)(v) This priority is the sampling threshold that is required to get (v,i) into the PPS sample of the next node to be scanned by the reverse Dijkstra of (v,i). We only need to resume the reverse Dijkstra (v,i) when its priority (13) is at least τ. Note that the priority of a pair (v,i) can only decrease over time, when δ (i) v decreases or when the reverse Dijkstra progresses and µ(v,i) increases. This allows us to maintain Qpairs with lazy updates. In order to determine, after we decrease τ, all the pairs for which the reverse Dijkstra computation should resume (or start), we simply extract all the top elements of the queue Qpairs which have priority at least τ. These top elements are removed from Qpairs. The reverse Dijkstra is resumed on each removed pair (v,i) until the pause rule holds again, that is, we reach a distance d such that α(d)−α(δ (i) v ) < r(i) v τ. At this point the reverse Dijkstra is terminated or paused. If it is paused, we set µ(v,i) ← d, and the pair (v,i) is placed in Qpairs with the new priority (13). Note that the resume and pause rules of the reverse Dijkstras are consistent with identifying all sampled pairs according to (9), ensuring correctness. 8 Table 1: Performance of TSKIM using k = 64, (cid:96) = 64, and exponentially distributed edge weights. We evaluate the influence on 512 (different) sampled instances for thresholds 0.1 and 0.01. instance AstroPh Epinions Slashdot Gowalla TwitterF's LiveJournal Orkut # nodes 14,845 75,888 77,360 196,591 456,631 4,847,571 3,072,627 # edges 239,304 508,837 828,161 1,900,654 14,855,852 68,475,391 234,370,166 INFLUENCE [%] RUNNING TIME [SEC] 50 seeds 0.01 1.02 0.53 0.72 0.62 0.20 0.07 2.82 0.1 19.17 8.52 19.97 14.13 19.38 9.16 74.44 1000 seeds 0.1 0.01 9.96 39.25 12.68 2.88 25.04 3.90 17.61 1.93 24.26 1.64 13.81 0.33 4.61 77.47 50 seeds 0.01 0.9 2.0 1.9 4.4 9.9 34.6 779.7 0.1 2.0 5.2 14.6 21.8 133.4 606.0 5,490.5 1000 seeds 0.01 2.0 6.3 7.6 14.8 36.4 117.5 1,788.7 0.1 4.0 11.1 27.9 36.9 269.6 1,244.4 11,060.7 n seeds 0.01 3.7 14.1 18.9 47.6 269.9 1,983.4 7,360.9 0.1 6.6 21.3 40.5 81.7 648.4 4,553.9 24,520.3 Figure 1: Evaluating influence permutations (left) and running times (right) on several instances for threshold decays 0.01 and 0.1. The legend applies to all plots. 5.4 Selecting the Next Seed Node The algorithm decreases τ until we have sufficient confidence in the node with maximum estimated marginal influence. The selec- tion of the next node into the seed set is given in the pseudocode NextSeed in Appendix D.4. We first discuss how we determine when we are happy with the maximum estimate. When looking at a particular node, and the value of the estimate is at least τk, we know that the value is well concentrated with CV that is 1/√k. We are, however, looking at the maximum estimate among n nodes. To ensure an expected relative error of ε in the worst case, we need to apply a union bound and use k = O(ε−2 logn). The union bound ensures that the estimates for all nodes have a well concentrated maximum error of ε times the maximum influence. In particular, the estimated maximum has a relative error of ε with good concentration. In practice, however, the influence distribution is skewed and therefore the union bound is too pessimistic [15]. Instead, we pro- pose the following adaptive approach which yields tighter bounds for realistic instances. Consider the node u with maximum estimated marginal influence Iu and let Iu be its exact marginal influence Iu. The exact marginal influence can be compute, using MargGain(u) (Section 2), and is also computed anyway when u is added to the seed set. The key to the adaptive approach is the following observation. When working with a parameter k = ε−2 and the maximum estimate is at least kτ, then under-estimates of the true maximum are still well concentrated but over-estimates can be large. Fortunately, however, over-estimates are easy to test for by comparing Iu and Iu(1− ε). We can use this as follows. In our experiments we run the al- gorithm with a fixed k, always selecting the node with maximum estimate when the estimate exceeds kτ. We obtain, however, much tighter confidence interval than through the worst case bound. In particular, for the sequence of computed seeds, we track the sum 9 Er = ∑u max{0, (1− ε) Iu − Iu}. This sum is added as a fixed com- ponent to the confidence bound, which means that with high prob- ability the error for any prefix size is Er plus a well concentrated value around ε times the estimate. In particular, the approxima- tion ratio we obtain with good probability for a prefix s is at least 1− (1− 1/s)s − ε − Er/(cid:99)Inf. Alternatively, (this is in the pseudocode) we can perform seed selection with respect to a specified accuracy ε. Thus obtaining approximation ratio of 1 − (1 − 1/s)s − ε with good probability. We use k that is ε−2 but when we have a candidate (a node with maximum estimated marginal gain which exceeds kτ) we apply MargGain(u) to compute its exact marginal influence Iu. If we find that Iu ≥ (1− ε)Iu, we do not select u and instead decrease τ which returns to sampling. Otherwise, we select u into the seed set. We now consider tracking the node with maximum estimated influence. To do that efficiently, we work with a max priority queue Qcands, which contains nodes prioritized by their estimated influ- ence, or more precisely, by Est.H[u] + τEst.M[u]. For efficiency, we use lazy updates, which allows priorities not to be promptly updated when the estimate changes and instead, updated only for elements which are the current maximum in the queue. The function NextSeed repeats the following until a node is selected or ⊥ is returned. If the maximum estimated priority in Qcands is less than τk, we return ⊥. Otherwise, we remove from Qcands the node u with maximum priority, compute Iu ← Est.H[u]+ τEst.M[u], and check if Iu is at lest the current maximum entry on the queue and is larger than τk. When using the first option, we sim- ply return (u, Iu). When working with a specified error, we further test u as follows. We compute the actual marginal gain Iu of u. If it is lower than (1− ε) Iu, we place u back in Qcands with priority Iu and return ⊥. Otherwise, we return u. We now consider maintaining Qcands. Priorities are promptly up- dated to estimate values only when there is a possibility of increase 0.1110100050100T=0.01:seedsetsize[%]influence[%],AstroPh,Epinions,Slashdot,Gowalla,TwitterF's,LiveJournal,Orkut0.111010020406080100T=0.1:seedsetsize[%]0.11101000255075100T=0.01:seedsetsize[%]runningtime[%]0.11101000255075100T=0.1:seedsetsize[%] in the estimate. This is necessary for correctness of the priority queue when using lazy updates. The estimated influence of a node u can only decrease when δ decreases for an element in the sample of u (as a result of adding a new seed) or when τ decreases and no new entries are added to the sample. Therefore, in these cases, we do not update the priorities promptly. The priority of u in Qcands is promptly updates when (as a result of decreasing τ) a new entry is added to the sample of u. Note that our algorithm always maintains the estimation compo- nents Est.H[u] and Est.M[u] updated for all nodes u, so the current estimate for a node u can at any time be quickly computed from these two values and the current τ. Lastly, as in the pseudocode, Algorithm 2 is executed to exhaus- tion, until the seed set influences all nodes. The algorithm can be stopped also when the seed set S is of certain desired size or when a desired coverage ∑u∈S Iu/(n(cid:96)α(0)) is achieved. 5.5 Updating PPS Estimate Components The positions HM[v,i] and ML[v,i], and accordingly the classifi- cation of entries (u,d) as H,M, or L, can be updated both when τ or δ (i) v decreases. When τ decreases, entries can only "move up:" L entries can become M or H entries and M entries can become H entries. New entries can also be generated by a reverse Dijkstra on (v,i). Newly generated entries are always H or M entries. When δ (i) v decreases, entries can "move down." In addition, entries at the tail of index[v,i], those with α(d) ≤ α(δ (i) When an entry (u,d) changes its classification, or when a new entry is generated by a reverse Dijkstra, we may need to update the estimate components Est.H[u] and Est.M[u]. v ), get removed. Initial Updates When τ Decreases 5.5.1 When τ decreases, we first (before resuming the reverse Dijk- stra's) need to update the classification of existing entries and the implied changes on Est. The pseudocode for this update is provided as the function MoveUp() in Appendix D.4. To efficiently identify the index lists that have entries that change their classification, we maintain a max priority queues Qhml. It contains node-instance pairs with priority equal to the reclassifica- tion threshold, the highest τ that would require reclassification of at least one entry in the list. The procedure UpdateReclassThresh computes the reclassification threshold for a pair (v,i) and places the pair with this priority in Qhml. When τ is decreased, we only need to process lists of pairs that are at the top of the queue Qhml. Lastly, we discuss the processing of a list (v,i) which requires reclassification. The reclassification, the updates of the estimation components Est, and the update of the reclassification threshold us- ing UpdateReclassThresh(v,i), are all performed in computation that is proportional to the number of reclassified entries. In particu- lar, processing does not require scanning the full list index[v,i]. This is enabled by the pointers HM[v,i] and ML[v,i]. 5.5.2 New Scanned Node The estimation components also need to be updated when a new entry is appended to the index[v,i] list when running a reverse Di- jkstra for (v,i). The pseudocode for this update is included in Al- gorithm 2. The new scanned node u with distance d creates a new entry (u,d) which is appended to the end of index[v,i]. A new en- try is always an H or M entry (otherwise the pause rule applies). If HM[v,i] (cid:54)=⊥, that is, there is at least one M entry in index[v,i], the new entry must also be an M entry. In this case, we increase Est.M[u] by 1. If HM[v,i] =⊥, we check if (c ← α(d)−α(δ (i) v )) ≥ τ. If so, the new entry is an H entry and we increase Est.H[u] by c. Otherwise, it is the first M entry. We set HM[v,i] ← index[v,i]− 1, Est.M[u] = 1, and insert the pair (v,i) to the queue Qhml with pri- ority c. After updates are completed, we recompute the estimated influence Est.H[u] + τEst.M[u] of the node u and update accord- ingly the priority of u in Qcands. 5.5.3 New Seed Node When a new seed node u is selected, we perform a forward Dijkstra from the seed in each instance i. We update δ (i) at visited v nodes v and compute the exact marginal influence of the new seed. The forward Dijkstra is pruned at nodes v with δ (i) that is smaller v or equal to their distance from u. When we update δ (i) v , we also may need to reclassify entries in index[v,i], update the positions HM[v,i] and ML[v,i] and update estimation components Est.H[u] and Est.M[u] of reclassified entries (u,d) . A pseudocode for this update is provided as the function MoveDown() in Appendix D.4. We also update the priority of the pair (v,i) in Qhml and decrease its priority in Qpairs to (α(µ(v,i))− α(δ (i) (since we do not track µ(v,i) explicitly in the pseudocode, we instead decrease the priority to reflect the decrease in δ (i) v ). If the updated priority in Qpairs is ≤ 0, the reverse Dijkstra of (v,i) is terminated and it is removed from Qpairs. Note that in this update, entries can only be reclassified "down:" E.g. an entry (u,d) that was in H can move to M, L, or be purged, if α(d) ≤ α(δ (i) v ). 5.6 Analysis v ))/r(i) v When we run the algorithm with fixed k = O(ε−2 logn) or use the adaptive approach in seed selection (as detailed in Section 5.4), we have the following guarantee on the approximation quality: THEOREM 5.1. α-SKIM returns a sequence of seeds so that for each prefix S of size s, with high probability, Inf(G ,S) ≥ (1− (1− 1/s)s − ε) max UU=s Inf(G ,U). (14) PROOF. The algorithm, with very high probability, selects a node with marginal influence that is at least 1− ε of the maximum one. This follows from a union bound over all steps and nodes of the quality of the estimate obtained from a PPS sample. We then apply an approximate variant (e.g., [15]) of the classic proof [37] of the approximation ratio of GREEDY for monotone submodular problems. The worst-case bound on the (expected) running time of α- SKIMis as follows.The proof is provided in Appendix C. We note that our design exploits properties of real instances and the poly-logarithmic overheads are not observed in experiments. THEOREM 5.2. α-SKIM runs in expected time O log3 n (cid:96)∑ i=1E(i) + providing the guarantee (14). ε log3 n ε3 n + logn ε2 (cid:32) (cid:33) E(i) (cid:96)(cid:91) i=1 6. EXPERIMENTS Our algorithms were implemented in C++ and compiled using Visual Studio 2013 with full optimization. Our test machine runs Windows 2008R2 Server and has two Intel Xeon E5-2690 CPUs and 384 GiB of DDR3-1066 RAM. Each CPU has 8 cores (2.90 GHz, 8× 64 kiB L1, 8 × 256 kiB, and 20 MiB L3 cache). For consistency, all runs are sequential. 10 The datasets in our experiments are obtained from the SNAP [44] project and represent social (Epinions, Slashdot [35], Gowalla [10], TwitterFollowers [22], LiveJournal [2], Orkut [47]) and collabora- tion (AstroPh [33]) networks. All these graphs are unweighted. Unless otherwise mentioned, we test our algorithms using (cid:96) = 64 independent instances generated from the graph by assigning inde- pendent random length to every edge according to an exponential distribution with expected value 1 [1, 14, 27]. To do so, we sample a value x uniformly at random from the range (0,1], then set the edge length to −lnx. We use ADS parameter k = 64. 6.1 Distance-Based Influence Maximization We start with the Influence Maximization problem. Recall that we consider two variants of this problem: threshold influence and general distance-based influence. We discuss each in turn. 6.1.1 Threshold Influence Our first experiment considers the performance of T -SKIM (Al- gorithm 3, Section 3), which finds a sequence of seed nodes such that each prefix of the sequence approximately maximizes the influ- ence. Our results are summarized in Table 1. For each dataset, we first report its total numbers of nodes and edges. This is followed by the total influence (as a percentage of the total number of nodes of the graph) of the seed set found by our algorithm. We report figures for 50 and 1000 seeds and for threshold values T = 0.01 and T = 0.1. Finally, we show the total running time of our algorithm when it is stopped after computing an approximate greedy sequence of 50, 1000, or all n nodes. Note that we omit the respective influ- ence figure for the seed set that contains all nodes, since it is 100% by definition. The table shows that, unsurprisingly, the higher threshold has higher influence values. This is because the coverage function is monotone non-decreasing in T . The running time of our algorithm depends on that influence (since its graph searches must run for longer), but it is still practical even for fairly large thresholds and even if we compute the entire permutation. For the largest graph we test (Orkut), with hundreds of millions of edges, we can compute the top 50 seeds in less than 15 minutes, and order all nodes in a few hours using a single CPU core. Figure 1 presents a more detailed perspective on the same ex- periment. It shows, for T = 0.01 and T = 0.1, how total influence and the running times depend on the size of the seed set. We note that the first few seeds contribute with a disproportionate fraction of the total influence, particularly with T = 0.1, and an even higher percentage of the total running time. The overall shape of the curves is quite similar, with Orkut as a noticeable outlier: its first few seeds contribute relatively more to the overall influence than in other instances. Note that Orkut is also the densest instance in our testbed. We now compare T -SKIM to ConTinEst, the algorithm by Du et al. [23]. Although their sequential implementation is publicly available, we were unable to run it on our inputs within reasonable time. (A preliminary test on AstroPh, our smallest instance, did not produce any output within five hours.) Note that to evaluate graphs with more than 1024 vertices, they actually use a distributed implementation, which they run on a cluster with 192 cores. Unfor- tunately, we had access neither to such a cluster nor to the distributed implementation of their algorithm. In order to still be able to make some comparison, we generated the same instances as they used in their evaluation: core-periphery Kronecker networks [44] (parameter matrix: [0.9 0.5; 0.5 0.3]) of varying size, using the Weibull distribution e−(x/λ )β 11 (cid:17)β−1 (cid:16) x λ f (x,λ ,β ) = β λ Figure 2: Left: Comparing T -SKIM to ConTinEst. Right: Er- ror of T -SKIM and α-SKIM. for the edge lengths [32]. (Note that λ controls scale and β shape.) For each edge we chose λ and β uniformly at random from (0,10]. We ran the same experiment as they did, setting S = 10, and T = 10. Figure 2 (left) shows the running times for Kronecker networks of varying size. We observe that our approach run on a single CPU core is consistently about 3 orders of magnitude faster than their algorithm run on a cluster. Unfortunately, we were not able to compare the computed influence, as those figures are not reported in [23]. 6.1.2 General Distance-Based Influence We now evaluate α-SKIM, a more general version of our IM algo- rithm that can handle arbitrary decay functions. For this experiment, we consider both harmonic and exponential decay functions, the most commonly used in the literature. To test harmonic decay, we use α(x) = 1/(10x + 1); for exponential decay, we use α = e−10x. These functions turn out to give interesting influence profiles. In α-SKIM we initialize τ to n(cid:96)/k and set λ to 0.5. Table 2 shows, for both functions, the influence values (in per- cent) obtained by α-SKIM for 50 and 1000 seeds, as well as the corresponding running times. Table 2: Performance of α-SKIM using k = 64, (cid:96) = 64, and exponentially distributed edge weights for 50 and 1000 seeds. We use exponential (exp.: α : x (cid:55)→ e−10x) and har- monic (harm.: α : x (cid:55)→ 1/(10x + 1)) decay functions. INFLUENCE [%] RUNNING TIME [SEC] 50 seeds 1000 seeds exp. harm. exp. harm. exp. harm. harm. 15 44.9 17.6 40 AstroPh 40 18.2 7.6 99 Epinions 88 32.8 16.9 224 Slashdot 28.2 13.1 213 455 Gowalla 29.2 1,500 1,387 16.0 2,816 TwitterF's 25.8 5,637 7,765 11,906 13,016 LiveJournal 10.6 1000 seeds exp. 43 93 238 323 2,459 31.4 33.5 14.9 11.2 29.1 21.3 25.9 15.9 26.3 19.7 23.5 13.4 15 35 104 166 50 seeds instance The table shows that α-SKIM is slower than T -SKIM by up to an order of magnitude for comparable influence. In fact, if we ran α-SKIM with a threshold function (not shown in the table), it would be about three times as slow as T -SKIM, while producing the exact same results. However, this is to be expected, since α-SKIM is a much more sophisticated (and flexible) algorithm, which, unlike T -SKIM, can handle smooth decay functions with guarantees. Even though α-SKIM is slower, it is still practical. It scales well with the number of seeds (increasing from 50 to 1000 barely doubles the total running time) and can still handle very large graphs. 10210310410510610−2100102104≈numberofverticesrunningtime[sec]ConTinEstT-SKIM1500100001234seedsetsizeerrorwrt.GREEDY[%]thresh.exp.harm. Figure 3: Evaluating influence permutations (left) and running time (right) on several instances for exponential (exp.: α : x (cid:55)→ e−10x) and harmonic (harm.: α : x (cid:55)→: 1/(10x + 1)) decays. The legend applies to all plots. Figure 4: Evaluating different numbers of simulations ((cid:96)-values) for different decay functions on AstroPh. Solution Quality Figure 3 presents a more detailed view of the same experiment (for a few graphs), with up to n seeds. It shows that computing a full permutation (with n seeds) is not much more expensive than computing n/1000 (a few dozen) seeds. An interesting difference between these results and those for T -SKIM (reported in Figure 1) is that for α-SKIM the running time grows less smoothly with the number of seeds. The discontinuities correspond to decreases in the sampling threshold τ, causing additional sampling. 6.1.3 Figure 2 (right) compares the quality of the seed sets found by T - SKIM (for threshold decay) and α-SKIM (for exponential and harmonic decays) with those found by exact GREEDY on AstroPh ((cid:96) = 64 simulations). We consider sets of size 1 to 103 and the same decay functions as above. Each point of the curve represents the error (in percent) of our algorithm when compared to GREEDY. We observe that the error is very low in general (less than 1% for exponential and harmonic decay, and less than 4% for threshold). Considering the fact that SKIM is many orders of magnitude faster than GREEDY (while still providing strong guarantees), these errors are acceptable. Note that the error of the first seed vertex is very low in all cases (close to 0%), indicating that SKIM does very well in finding the most influential node. The quality of the solutions provided by the algorithm with re- spect to the probabilistic input (graph distribution) depends on the number of instances (simulations) (cid:96). Our experiments so far have used (cid:96) = 64. We now compare this with other choices of (cid:96). Figure 4 compares the quality of the seed sets found by GREEDY for AstroPh for (cid:96) = 4,16,64,128 with those found by (cid:96) = 256. We consider sets of size 1 to 50 and three different decay functions: exponential, harmonic, and threshold (with T = 0.01). Each point in the curve represents the error (in percent) relative to the solution with (cid:96) = 256. Although the error is consistently high for the threshold IM when (cid:96) is very small, it becomes negligible for (cid:96) ≥ 64, justifying our choice of parameters. For smoother (exponential or harmonic) decay, all errors are significantly smaller, and even smaller values of (cid:96) would be acceptable. 6.2 Distance-Based Influence Oracle We now evaluate our influence oracles. Recall that this setting has two stages. The preprocessing stage takes as input only the graph and computes sketches. The query stage takes a set S of seeds and a function α and uses the sketches to estimate the influence of S with respect to α. Note that same preprocessing stage can be used to answer queries for any decay function α. For this experi- ment, we consider three such functions: exponential (α(x) = e−10x), harmonic (α(x) = 1/(10x + 1)), and threshold (with T = 0.01). Table 3 summarizes our results in this setting. For each dataset tested, it first shows the preprocessing time and the total space required to store all sketches. Then, for each decay function, we report the query time (in microseconds) and the estimation error for random sets S of sizes 1, 50, and 1000. (Note that measuring the error requires computing exact influence of each seed set with multiple Dijkstra searches; this time is not included in the table.) Each entry in the table is the average of 100 random seed sets. The table shows that, as predicted, query times are almost inde- pendent of the α function, the size of the influenced set, and the size of the graph. Moreover, they have a slightly superlinear depen- dence on the number of seeds. Queries are somewhat slower than for reachability-based IC (as reported in [15]), since sketches are bigger and the estimator is more involved. Our oracles are much more flexible, however, and still practical. For 50 seeds, one can answer queries in a few milliseconds, whereas an exact computation could take minutes or more on large graphs. Moreover, its error is consistently low, regardless of the number of seeds. 7. CONCLUSION 12 0.111010020406080100exp.:seedsetsize[%]influence[%],AstroPh,Epinions,Slashdot,Gowalla0.111010020406080100harm.:seedsetsize[%]0.11101000255075100exp.:seedsetsize[%]runningtime[%]0.11101000255075100harm.:seedsetsize[%]0204000.20.40.6α:x7→e−x:seedsetsizeerrorwrt.'=256[%]416641280204000.20.4α:x7→1/(x+1):seedsetsizeerrorwrt.'=256[%]416641280204001020T=0.01:seedsetsizeerrorwrt.'=256[%]41664128 We formulate and study a model of distance-based influence which captures decay of relevance with distance, and unifies and extends several established research threads. We design novel near- linear algorithms for greedy influence maximization and a construc- tion of influence oracles. In future, we hope to apply our novel weighted-sampling approach for approximate greedy influence max- imization to scale up other submodular maximization problems. Acknowledgements. We would like to thank the authors of [23] for helping us reproduce their inputs and pointing us to their imple- mentation of ConTinEst. 8. REFERENCES [1] B. D. Abrahao, F. Chierichetti, R. Kleinberg, and A. Panconesi. Trace complexity of network inference. In KDD, 2013. [2] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: Membership, growth, and evolution. In KDD. ACM, 2006. [3] A. Bavelas. A mathematical model for small group structures. Human Organization, 7:16 -- 30, 1948. [4] F. Bloch and M. O. Jackson. The formation of networks with transfers among players. Journal of Economic Theory, 133(1):83 -- 110, 2007. [5] P. Boldi and S. Vigna. In-core computation of geometric centralities with hyperball: A hundred billion nodes and beyond. In ICDM workshops, 2013. http://arxiv.org/abs/1308.2144. [6] P. Boldi and S. Vigna. Axioms for centrality. Internet Mathematics, 2014. [7] C. Borg, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, 2014. [8] K. R. W. Brewer, L. J. Early, and S. F. Joyce. Selecting several samples from a single population. Australian Journal of Statistics, 14(3):231 -- 239, 1972. [9] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD. ACM, 2009. [10] E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: user movement in location-based social networks. In SIGKDD. ACM, 2011. [11] E. Cohen. Size-estimation framework with applications to transitive closure and reachability. J. Comput. System Sci., 55:441 -- 453, 1997. [12] E. Cohen. All-distances sketches, revisited: HIP estimators for massive graphs analysis. In PODS. ACM, 2014. [13] E. Cohen. Estimation for monotone sampling: Competitiveness and customization. In PODC. ACM, 2014. full version http://arxiv.org/abs/1212.0243. [14] E. Cohen, D. Delling, F. Fuchs, A. Goldberg, M. Goldszmidt, and R. Werneck. Scalable similarity estimation in social networks: Closeness, node labels, and random edge lengths. In COSN. ACM, 2013. [15] E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. Sketch-based influence maximization and computation: Scaling up with guarantees. In CIKM. ACM, 2014. [16] E. Cohen and H. Kaplan. Spatially-decaying aggregation over a network: Model and algorithms. J. Comput. System Sci., 73:265 -- 288, 2007. Full version of a SIGMOD 2004 paper. [17] E. Cohen and H. Kaplan. Summarizing data using bottom-k sketches. In ACM PODC, 2007. [18] E. Cohen and H. Kaplan. Leveraging discarded samples for tighter estimation of multiple-set aggregates. In ACM SIGMETRICS, 2009. [24] U. Feige. A threshold of lnn for approximating set cover. J. Assoc. Comput. Mach., 45:634 -- 652, 1998. [25] L. C. Freeman. Centrality in social networks: Conceptual clarification. Social Networks, 1, 1979. [26] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12(3), 2001. [27] M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In ICML, 2011. [28] D. G. Horvitz and D. J. Thompson. A generalization of sampling without replacement from a finite universe. Journal of the American Statistical Association, 47(260):663 -- 685, 1952. [29] M. O. Jackson. Social and economic networks. Princeton University Press, 2010. [30] K. Jung, W. Heo, and W. Chen. Irie: Scalable and robust influence maximization in social networks. In ICDM. ACM, 2012. [31] D. Kempe, J. M. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD. ACM, 2003. [32] J. F. Lawless. Statistical models and methods for lifetime data, volume 362. John Wiley & Sons, 2011. [33] J. Leskovec, J. M. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. TKDD, 1, 2007. [34] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and Glance N. Cost-effective outbreak detection in networks. In KDD. ACM, 2007. [35] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29 -- 123, 2009. [36] B. Lucier, J. Oren, and Y. Singer. Influence at scale: Distributed computation of complex contagion in networks. In KDD, 2015. [37] G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of the approximations of maximizing submodular set functions. Mathematical Programming, 14, 1978. [38] E. Ohlsson. Coordination of pps samples over time. In The 2nd International Conference on Establishment Surveys, pages 255 -- 264. American Statistical Association, 2000. [39] T. Opsahl, F. Agneessens, and J. Skvoretz. Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32, 2010. http://toreopsahl.com/2010/03/20/. [40] M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD. ACM, 2002. [41] M. Rosenblatt. Remarks on some nonparametric estimates of a density function. The Annals of Mathematical Statistics, 27(3):832, 1956. [42] G. Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 -- 603, 1966. [43] C-E. Särndal, B. Swensson, and J. Wretman. Model Assisted Survey Sampling. Springer, 1992. [44] Stanford network analysis project. http://snap.stanford.edu. [45] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear time: A martingale approach. In SIGMOD, 2015. [46] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD, 2014. [47] J. Yang and J. Leskovec. Defining and evaluating network communities based on ground-truth. In ICDM, 2012. [19] E. Cohen, H. Kaplan, and S. Sen. Coordinated weighted sampling for estimating aggregates over multiple weight assignments. VLDB, 2(1 -- 2), 2009. full: http://arxiv.org/abs/0906.4560. [20] E. Cohen and M. Strauss. Maintaining time-decaying stream aggregates. J. Algorithms, 59:19 -- 36, 2006. [21] Ch. Dangalchev. Residual closeness in networks. Phisica A, 365, 2006. [22] M. De Domenico, A. Lima, P. Mougel, and M. Musolesi. The anatomy of a scientific rumor. Scientific Reports, 3, 2013. [23] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In NIPS. Curran Associates, Inc., 2013. 13 PREPROCESSING Table 3: Evaluating the distance-based influence oracle with (cid:96) = 64. QUERIES WITH α : x (cid:55)→ e−10x QUERIES WITH T = 0.01 50 seeds time err. [µs] [%] 1 seed 1000 seeds time err. time err. [µs] [%] [µs] [%] 8,855 0.4 204,551 2.8 27 1.1 22 0.5 8,267 0.3 191,709 0.6 73 0.6 13,768 0.4 247,509 0.6 61 1.2 16,092 0.6 329,976 0.3 39 2.3 13,912 0.7 360,766 0.2 instance time [h:m] 0:10 AstroPh 0:46 Epinions 1:10 Slashdot 3:55 Gowalla TwitterF's 19:33 1 seed 50 seeds time err. [µs] [%] 1000 seeds time err. space time err. [µs] [%] [µs] [%] [MiB] 9,695 1.2 229,340 0.5 38 7.2 149.2 32 3.2 674.0 8,552 1.1 222,470 1.0 46 5.6 11,884 1.5 310,170 0.4 851.4 2,558.6 52 3.8 17,109 1.0 356,818 0.4 51 3.8 13,816 1.4 365,366 0.7 6,165.1 50 seeds time err. [µs] [%] QUERIES WITH α : x (cid:55)→ 1/(10x + 1) 1000 seeds 1 seed time err. time err. [µs] [%] [µs] [%] 9,152 4.1 227,943 0.5 31 4.4 26 2.2 9,203 1.2 196,717 0.5 38 3.2 10,970 1.9 291,185 1.2 47 2.9 14,151 2.2 289,318 0.8 42 2.6 13,166 1.5 379,296 0.9 14 APPENDIX A. RUNNING TIME ANALYSIS FOR T -SKIM The computation is dominated by two components. The first is the reversed pruned Dijkstra searches which build the inverted sketches. The second is the forward pruned Dijkstra searches that we use to compute and update the residual problem after a new seed node is selected. In both components we use pruned shortest- paths computations (whereas SKIM for reachability-based influence uses generic searches). The bound on the number of reversed edge traversals performed for sketch building and the analysis deriving this bound are essentially the same as with reachability-based SKIM [15]: We bound the total number of increments to the entries in the array size. Each entry in that array corresponds to a node and the size (number of entries) in the partial sketch. Recall that the sketches themselves are maintained in an inverted structure. The number of forward traversals from u in instance i corresponds to the number of times the distance δ [u,i] of node u in instance i from the seed set is updated. As we discussed in Section 2.2 the worst-case number of updates can depend on the number of seeds with exact distance-based greedy. The approximate selection of T - SKIM, however, is such that all seed nodes with marginal influence that is close to the maximum one (within k−0.5) have approximately the same probability of being selected. This means that we can invoke Theorem 2.1 to obtain an expected O(ε−1 log2 n) bound. We therefore obtain the following time bound for an exhaustive execution of T -SKIM (until influence of S approaches n): THEOREM A.1. T -SKIM guarantees with high probability, for all s, that the first s selected seeds have influence that is at least 1− (1− 1/s)s − ε times the maximum influence of a seed set of size s, and runs in expected time O(ε−1∑ i E(i)log3 n + mε−2 log3 n) , (cid:83) i E(i) is the sum over nodes of the maximum in-degree (15) where m ≤ over instances. We note that this upper bounds the worst-case behavior. Our experiments verify that typically the computation is dominated by the reverse searches and the number of edge traversals is much smaller. We propose another solution of theoretical interest which provides worst-case robustness of the number of forward traversals at the cost of a slight softening of the sharp threshold. This design was not implemented. We first formalize the notion of a softened threshold T in the influence function: For a parameter ν ∈ (0,1), we only require approximation with respect to the maximum influence of a seed set of size s when the threshold is (1− ν)T . Since we expect the value of the threshold used in an application not be precise anyway, this relaxation approximates the intended semantics of using a threshold of T . We next outline a slight modification of T -SKIM which provides a bound on the running time and approximation quality with respect to the soft threshold. THEOREM A.2. Our modified T -SKIM, guarantees with high probability, for all s that the first s selected seeds have influence for threshold function α(x) = x ≤ T ?1 : 0 that is at least 1− (1− 1/s)s − ε times the maximum influence of a seed set of size s with respect to a threshold function α(x) = x ≤ (1− ν)T ?1 : 0. The algorithm runs in time O(ν−1∑ i E(i)logn + mε−2 log3 n) , (16) (cid:83) i E(i) is the sum over nodes of the maximum in-degree where m ≤ over instances. PROOF. We outline the modifications needed to support the soft threshold. Sv ≤ (1− νT ) then δ [v,i] ∈ [d(i) In the forward searches, we only propagate updates to δ [v,i] when the decrease in distance is at least νT . In particular, the reversed Dijkstras are always pruned at distance T (1− ν) and the forward Dijkstras are pruned when d ≤ T or d > δ [v,i]− νT . This means that at any given time, if d(i) Sv ,d(i) Sv + νT ]. That is, node-instance pairs of distance at most (1 − ν)T are counted as influenced and pairs of distance greater than T are not influenced, but other pairs can be counted either way and our estimation guarantee is with respect to a threshold of (1− ν)T . When discretizing to νT , we obtain a worst-case guarantee of 1/ν on the number of updates of δ [v,i] in each node-instance pair. In total, we obtain the claimed worst-case bound on the running time. B. OPTIMAL ORACLE ESTIMATOR We show that the distance-based influence estimator presented in Algorithm 4 is an instance of the L∗ estimator of [13]. We first explain the derivation of the estimator. Similarly to the single node, this is a sum estimator applied to each summand (v,i) in Equation (7) to obtain an unbiased estimate of α(minu∈S d(i) uv ). Rank values r that belong to pairs (v,i) where v ∈ S can be iden- tified because they must appear as (r,0) in cADS(v) when we use structured permutation ranks. For these pairs, we do not compute an estimate but simply add an exact contribution of Sα(0) to the estimated influence. The remaining rank values are those associated with pairs that have a positive distance from S. That is, a pair (v,i) so that d(i) Sv > 0. We would like to estimate α(minu∈S d(i) uv ) for each such pair (v,i). We apply the L∗ estimator of Cohen [13], which is applicable to any monotone estimation problem (MEP) and is the unique admissible (nonnegative unbiased) monotone estimator. We first show that our estimation problem is a MEP. To represent the problem as a MEP, we fix the rank values of all pairs, and consider the outcome (presence in cADS(u) for u ∈ S) as a function of the "random seed" r(i) v . Clearly, the lower r(i) is, the more information we have (a v tighter upper bound) on α(d(i) Sv ). Therefore, the problem is a MEP. The information in the outcome is actually contained in the sky- v ] derived from the set of occurrences of the rank r(i) line skylines[r(i) v in the sketches of S. When the skyline for a pair (v,i) is empty (r(i) v is not included in any of the sketches of nodes in S), the L∗ estimate is 0 and is not explicitly computed. (cid:112)2(k− 1). Note that Note that the estimator is applied to each rank value r(i) v (cid:54)∈ Z (and does not require explicit knowledge of the corresponding pair (v,i)). Since the L∗ estimator is admissible, it dominates the union es- expect the estimate quality to be up to a factor of(cid:112) timator and in particular has CV at most 1/ this is an upper bound on the CV; the worst case is S = 1 or when sketches are very similar. As with reachability sketches, we can S smaller when the "coverage" of different seed nodes are sufficiently dif- ferent. Similarly, Chernoff concentration bounds apply here: If we use k = ε−2clnn, the relative error exceeds ε with probability ≤ 1/nc. Therefore, with high probability, we can be accurate on polynomially many queries. C. RUNNING TIME OF α-SKIM 15 This section provides the proof of Theorem 5.2. We also provide a slightly tighter worst-case bound on the (expected) running time for (i) the important cases of polynomial or exponential decay (both are instances of α with nonpositive relative rate of change) and (ii) general decay functions when we consider approximation with respect to relaxed influence computed with slight perturbations in distances: THEOREM C.1. A modified Algorithm α-SKIM runs in expected providing the guarantee (14) when (lnα(x))(cid:48) ≤ 0 (α has nonpos- itive relative rate of change). For a general decay function α, we obtain with high probability approximation with respect to maxUU=s Inf(G ,U), where Inf(G ,S) ≡ ∑u∈V α((1 + ε)dSu). We first list the main components of the α-SKIM computation, the bounds we obtain on the computation of each component, and pointers to the proofs in the sequel. The analysis assumes that λ = 0.5. • The reversed Dijkstra runs when building the sketches, includ- ing updating the sample and estimation data structures as new entries are inserted. Since we use efficient structures to identify which runs need to be resumed and to update estimates and samples, this component is dominated by the Dijkstra compu- tations. We obtain a bound of O(k log2 n∑v maxi∈[(cid:96)] deg(i)(v)) on the number of operations (see Lemma C.5). • The forward Dijkstra runs which update the residual prob- lem after a seed node is selected. We express the bound in terms of the maximum number of times, which we de- note by X, that δ (i) is decreased for a pair (i,v). We con- v sider both bounding X and its impact on the time bound In Section C.3. We show that the forward Dijkstra runs take O(X ∑i∈[(cid:96)]E(i)logn) operations (see Lemma C.6). We ob- tain a bound of X = O(ε−1 log2 n) using Theorem 2.1. We also obtain a slightly tighter bound of X = O(ε−1 logn) for a slightly modified algorithm. The modified algorithm has the same approximation guarantee (as in Theorem 5.1) when α has nonpositive relative rate of change. For general α, the guarantee is with respect to a relaxed condition. In practice on realistic inputs, however, we expect X to be small and we observed good running times even without the modifications. • Updating the sample and estimation structures when entries are reclassified down. This happens after a seed is added when the forward Dijkstra run from the seed in instance i updates δ (i) v . This means all samples which include a (v,i) entry need to be updated. Expressed in terms of X, this cost is O(Xnk logn) (see Lemma C.7). • Updating the sampling and estimation structures when entries are reclassified up. This can happen after τ is decreased. We obtain a bound of O(nk log2 n) (in Section C.1). C.1 The threshold τ An immediate upper bound on the maximum influence of a node is nα(0). This means that we can safely initialize our algorithm with τ = (nα(0)(cid:96))/k and have an expected initial sample sizes O(k) for each node. We next observe that we can safely terminate the algorithm when τ decreases to below τ ≤ εα(0)(cid:96)/k and incur at most O(ε) contribu- tion to the error. To establish that, first observe that the threshold τ time O( log2 n ε (cid:96)∑ i=1E(i)+ log2 n ε3 n+ logn ε2 E(i)) = O(ε−3 (cid:96)∑ i=1E(i)log2 n) (cid:96)(cid:91) i=1 is decreased only when the maximum estimated marginal influence, over all nodes, is less than τk. Therefore, when τ ≤ εα(0)(cid:96)/kl, the maximum marginal influence of all nodes is at most εα(0). Now observe that at this point, for all s(cid:48) ≥ 0, if we add s(cid:48) addi- tional seed nodes, the relative contribution of these nodes is at most ≤ (s(cid:48)εα(0)/((s + s(cid:48))α(0)) ≤ ε (The denominator (s + s(cid:48))α(0) is a lower bound on the total influence of any seed set of size s + s(cid:48)). Combining the start and end values of τ, we obtain the following bound on the total number of times τ is decreased: LEMMA C.1. τ can decrease at most log1/λ (n/ε) = O(logn) times. When τ decreases, we have the property that the PPS samples of all nodes are of size smaller than k (otherwise we have an estimate that exceeds kτ). After τ is decreased, we extend the samples to be with respect to the new τ. We show that the expected sample size remains O(k): LEMMA C.2. For every node, the expected number of entries after a threshold decrease τ ← λτ is at most k/λ , with good con- centration. PROOF. Equivalently, we consider the size of a PPS sample with threshold λτ when the total weight of the set is at most kτ. We are now ready to bound the total number of reclassification of sample entries. LEMMA C.3. The total number of reclassifications of entries in the sample is O(nk logn) PROOF. An entry in index[v,i] can only be reclassified down 3 times before it is removed from the sample (from H to M, M to L, or L to removal), unless it is reclassified up. An entry can be reclassified up only when τ decreases, which happens at most O(logn) times. Each decrease "resets" at most kn entries to class H: Either existing entries reclassified up or at most new entries (since by Lemma C.2 expected sample sizes remain O(k)). These entries can then be reclassified down at most 3 times before they are eliminated from the sample. So the total number is O(nk logn). We are now ready to bound the total work performed by updating the sample and estimation components by entries being reclassified up as a result of a τ decrease (MoveUp calls). The cost of each such call is proportional to the number of reclassified entries. It also requires a call to the priority queue to efficiently find all inverted samples with at least one reclassified element. In the worst case, the cost is O(log(n(cid:96)) = O(logn) times the number of reclassifica- tions. In total using Lemma C.3, we obtain a worst case bound of O(nk log2 n) on the reclassification-up component of the computa- tion. C.2 Bounding the reversed Dijkstra computa- tions We bound the expected total number of distinct entries (pairs (v,i)) that were included in the PPS sample of a node u at any point during the execution of the algorithm. LEMMA C.4. For a node v, the number of distinct entries in the sample of v during the execution of the algorithm is O(k logn) with good concentration (of the upper bound). PROOF. Each decrease of τ introduces in expectation O(k) new entries, and there are O(logn) such decreases (Lemma C.1). We can now bound the work of the reverse Dijkstra runs used to construct the sketches 16 PROOF. The requirement (lnα(x))(cid:48) ≥ 0 implies that for all x ≥ 0, d ≥ 0, and ∆ ≥ 0, α(d − ∆)− α(d) α(d) α(x + d − ∆)− α(d) α(x + d) . ≥ This means that when we apply the following prune rules on forward updates of δ (i) v : We prune at nodes where α(d − ∆)− α(d) ≤ ε , (17) α(d) where d is the current value of δ (i) and d − ∆ is the updated value, v the condition (17) would actually hold for all nodes in instance i reachable from v via the Dijkstra search (since all these nodes have larger δ (i) v . The prune condition implies that for (v,i) and all nodes Dijkstra would have reached from the pruned one, the updated influence contribution by the better (closer) coverage is at most ε times the previous value. So with this pruning, the influence of the seed set is captured with relative error of at most ε. We also observe that we can also always prune the Dijkstra com- putations when the distance satisfies α(d) ≤ α(0)/n2 ≤ εα(0)/n. Combining, it means that with the prune rules, the total number of updates of δ (i) v per node-instance pair is O(ε−1 logn). LEMMA C.9. We can modify the algorithm so that for any gen- eral decay function α, X = O(ε−1 logn). With the modification, we obtain that with high probability, Inf(G ,S) ≥ (1− (1− 1/s)s − ε) max UU=S Inf(G ,U) , where Inf(G ,S) ≡ ∑u∈V α((1 + ε)dSu). PROOF. We can apply a similar prune rule in the forward Dijkstra runs which updates only when the decrease to distance is at least ε times the current distance. This would give us a bound on the number of updates, but a weaker approximation guarantee that holds with respect to a softened influence function ∑u∈V α((1 + ε)dSu). D. PSEUDOCODE D.1 Functions for Distance-Based GREEDY This appendix contains the pseudocode of functions for our distance-based version of GREEDY from Section 2. // sum of marginal contributions Function MargGain(u): Marginal influence of u Input: Residual instance (G ,δ ) and node u Output: Inf((G ,δ ),u) Iu ← 0 ; foreach instance i do Run Dijkstra from u in G(i), during which foreach visited node v at distance d do if α(d) = 0 or d ≥ δ [v,i] then Pruneelse +←α(d)− α(δ [v,i]) Iu return Iu/(cid:96) LEMMA C.5. The number of operations performed by the re- verse Dijkstra runs is O(k log2 n∑v maxi∈[(cid:96)] deg(i)(v)) PROOF. Each productive scan of a node u by a reverse Dijkstra sourced at (v,i) (productive means that the node was next on the Dijkstra state priority queue) means that the entry (v,i) is inserted into a PPS sample of u, updating the estimation structure accordingly. This involves O(logn) operations in updating priority queues in the state of the Dijkstra run, structures maintaining the samples, and looking at all outgoing edges of the node in the transposed instance G(i). Each such scan can be charged to an entry inserted into a PPS sample. From Lemma C.4, we obtain that each node, in expectation, can have O(k logn) such entries. Therefore, the node is scanned O(k logn) times. We remark that if the instances are generated by an IC model, we can replace maxi∈[(cid:96)] deg(i)(v) by the expected degree E[deg(v)] and accordingly obtain the bound O(k log2 nE[E]). C.3 Bounding the expected number of times v decreases for a certain pair (v,i) δ (i) We now bound the n umber of updates of δ (i) are added when maintaining the residual problem. v performed as seed If we have a bound of X on the number of updates per node- instance pair, then LEMMA C.6. The computation of the forward Dijkstra runs is O(X ∑i∈[(cid:96)]E(i)logn). PROOF. Each node-instance scan can be charged to a decrease of δ (i) v . We also can express the total cost of the MoveDown() calls by X. LEMMA C.7. The total computation of all MoveDown calls is O(Xnk logn) . PROOF. Each call to MoveDown for (v,i) updates a value for (v,i) in a priority queue (at O(logn) cost), which is of the order of the forward Dijkstra computation that generated the update of δ (i) v . Otherwise, the MoveDown call performs a number of operations that is linear in the number of active entries in index[v,i] (entries that are in a sample of some node). In addition, MoveDown may also permanently discard entries at the tail of the index[v,i], but the removal of these entries is charged to their insertion. It remains to bound the computation of MoveDown when process- ing active entries of index[v,i]. Using Lemma C.4, there is a total of O(nk logn) entries that were active in a sample at any point during the execution. Each such entry can be affected at most X times. We now bound X. As argued in Section 3, we expect X = O(logn) on realistic instances. Now noting that our sampled-based greedy selection satisfies the condition of Theorem 2.1, we obtain a bound of X = O(ε−2 log2 n). Here we propose modifications of the algorithm that allow us to obtain a slightly tighter bound on X in interesting cases. The first case covers all smooth decay functions that are exponential or slower: LEMMA C.8. We can modify α-SKIM so that when α(x) has a nonpositive relative rate of change, that is, (lnα(x))(cid:48) ≥ 0, then X = O(ε−1 logn) . The modification preserves the approximation ratio stated in Theo- rem 5.1. 17 Function AddSeed(u): Update δ according to u Input: Residual instance (G ,δ ) and node u foreach instance i do Run Dijkstra from u in G(i), during which foreach visited node v at distance d do if α(d) = 0 or d ≥ δ [v,i] then Pruneelse δ [v,i] ← d D.2 Algorithms for Threshold Model This appendix contains the pseudocode of algorithms for thresh- old influence maximization (Section 3) Algorithm 3: Threshold IM (T -SKIM) Input: Directed graphs {G(i)}, threshold T , parameter k Output: Sequence of node and marginal influence pairs // Initialization forall the node/instance pairs (u,i) do δ [u,i] ← ∞ forall the nodes v do size[v] ← 0 index ← hash map of node-instance pairs to nodes seedlist ←⊥ rank ← 0 shuffle the n(cid:96) node-instance pairs (u,i) // List of seeds & marg. influences // Compute seed nodes while seedlist < n do while rank < n(cid:96) do rank ← rank + 1 (u,i) ← rank-th pair in shuffled sequence if δ [u,i] < ∞ then skip; // Pair (u,i) is covered run Dijkstra from u in reverse graph G(i), during which foreach scanned node v in distance d do // Build sketches // Prune at depth T if d > T then prune; size[v] ← size[v] + 1 index[u,i] ← index[u,i]∪{v} if size[v] = k then x ← v abort sketch building // Next seed node D.3 Algorithms for Distance-Based Influence Oracle This appendix contains the pseudocode for our distance-based influence oracle (Section 4). Algorithm 4: Distance-Based Influence Oracle Input: Seed set S, function α, sketches cADS(u) for u ∈ S Output: Estimated influence for S // Remember ranks who have distance zero in at least one sketch with respect to S Z ← empty set (e.g. hash map) of ranks forall the nodes u ∈ S do foreach entry (r,d) ∈ cADS(u) with d = 0 do Z.insert(r) // Build for each appearing rank a set of threshold rank/influence pairs skylines ← new hash map from rank to array of pairs forall the nodes u ∈ S do Q ← new max-heap of k smallest rank values foreach entry (r,d) ∈ cADS(u) do if Q < k then if r (cid:54)∈ Z then skylines[r].append((1.0,α(d)) Q.insert(r) else skylines[r].append((Q.max_element(),α(d)) if r (cid:54)∈ Z then Q.insert(r) Q.delete_max(r) // Eliminate dominated entries forall the ranks r ∈ skylines do // Sort by threshold rank in decreasing order. Break ties by decreasing α sort(skylines[r]) α∗ ← 0 forall the thresh. rank/infl. pairs (τ,α) ∈ skylines[r] do if α < α∗ then skylines[r].erase((τ,α)) else α∗ ← α if all nodes u have size[u] < k then x ← argmaxu∈V size[u] // This calls the L* estimator for each skyline return S· α(0) + (1/(cid:96))· ∑r∈skylines L*(skylines[r]) Ix ← 0 forall the instances i do // The coverage of x // Residual problem run Dijkstra from x in forward graph G(i), during which foreach scanned node v in distance d do if δ [v,i] ≤ d or d > T then prune if δ [v,i] = ∞ then Ix ← Ix + 1 δ [v,i] ← d forall the nodes w in index[v,i] do size[w] ← size[w]− 1 // Erase (v,i) from index index[v,i] ← ⊥ seedlist.append(x, Ix/(cid:96)) return seedlist 18 Algorithm 5: L∗estimator applied to a sorted skyline Input: A sorted skyline skylines[r] = {(τ j,α j)} Output: L∗(skylines[r]) S ← 0; x ← 0 for i = 1, . . . ,skylines[r] do x ← (αi − S)/τi if i < skylines[r] then S ← S + x· (τi − τi+1) return x // Note that x is overwritten Algorithm 6: Combine rank-distance lists Input: Two rank-distance lists A1 and A2 Output: Combined all-distance sketch ADSc ADSc ← new (empty) ADS // Merge sketches by increasing distance, breaking ties by increasing rank // Handle entries with distance 0 tempsketch ← merge(A1, A2) numzero ← 0 Q ← new max-heap of k smallest rank values foreach entry (r,d) ∈ tempsketch with d = 0 do if numzero < k then ADSc(u).append((r,d)) Q.insert(r) if Q > k then Q.delete_max() numzero ← numzero + 1 // Handle the rest of the entries foreach entry (r,d) ∈ tempsketch with d > 0 do if Q < k or r < Q.max_element() then ADSc(u).append((r,d)) Q.insert(r) if Q > k then Q.delete_max() return ADSc 19 D.4 Functions for α-SKIM This appendix contains the subroutines of Algorithm 2 (α-SKIM), our fast algorithm for distance-based influence maximization. Function NextSeed Output: The node u which maximizes Est.H[u] + τEst.M[u], if happy with estimate. Otherwise ⊥. while true do if max priority in Qcands < kτ then return ⊥ else Remove maximum priority u from Qcands; Iu ← Est.H[u] + τEst.M[u]; if Iu ≥ kτ and Iu ≥ max in Qcands then Iu ← MargGain(u); if Iu ≥ (1− 1/√k) Iu then return (u, Iu)else Place u with priority Iu in Qcands; return ⊥ else Place u with priority Iu in Qcands Function MoveUp Update estimates after decrreasing τ foreach (v,i) in Qhml with priority ≥ τ do delete (v,i) from Qhml // Process index[v,i] if HM[v,i] (cid:54)=⊥ then // move entries from M/L to H while HM[v,i] < index[v,i] and (u,d) ← index[v,i][HM[v,i]] satisfies (c ← α(d)− α(δ (i) v )) ≥ τ do +←c Est.H[u] if ML[v,i] =⊥ or ML[v,i] > HM[v,i] then // Entry was M Est.M[u] −←1 HM[v,i] +←1 if ML[v,i] (cid:54)=⊥ then if ML[v,i] (cid:54)=⊥ and ML[v,i] < HM[v,i] then ML[v,i] ← HM[v,i] if HM[v,i] ≥ index[v,i] then HM[v,i] ←⊥; ML[v,i] ←⊥ while ML[v,i] < index[v,i] and (u,d) ← index[v,i][ML[v,i]] satisfies α(d)− α(δ (i) ML[v,i] if ML[v,i] ≥ index[v,i] then ML[v,i] ←⊥ v ) ≥ r(i) v τ do +←1; Est.M[u] UpdateReclassThresh(v,i) +←1 // Move from L to M // update Qhml Function UpdateReclassThresh(v,i) Output: Update priority of (v,i) in Qhml c ← 0; if HM[v,i] (cid:54)=⊥ then if ML[v,i] (cid:54)=⊥ then (u,d) ← index[v,i][HM[v,i]]; c ← α(d)− α(δ (i) v ) (u,d) ← index[v,i][ML[v,i]]; v ))/r(i) c ← max{c, (α(d)− α(δ (i) v } update priority of (v,i) in Qhml to c if c > 0 then Function MoveDown ((v,i),δ0,δt ) Output: Update estimation components for (v,i) when δ (i) v decreases from δ0 to δt j ← 0; t ←⊥; HM[v,i] ←⊥; z ← index[v,i]− 1; if ML[v,i] (cid:54)=⊥ then z ← ML[v,i] ML[v,i] ←⊥ while j ≤ z do (u,d) ← index[v,i][ j]; if α(d)− α(δ0) ≥ τ then +←1; if HM[v,i] =⊥ then HM[v,i] = j // truncate +←α(d)− α(δt ) Est.H[u] Est.H[u] −←α(d)− α(δ0); if α(d)− α(δt ) ≥ τ then else if α(d)− α(δt ) ≥ r(i) else if α(d) ≤ α(δt ) then else Est.M[u] if t =⊥ then t = j if ML[v,i] =⊥ then ML[v,i] ← j v τ then else if α(d)− α(δ0) ≥ r(i) if α(d)− α(δt ) ≥ r(i) else v τ then v τ then if HM[v,i] =⊥ then HM[v,i] ← j Est.M[u] −←1; if α(d) ≤ α(δt ) then if t =⊥ then t = j else if ML[v,i] =⊥ then ML[v,i] ← j // entry was H // is H // is M // is L // entry was M // is M // is not M // truncate // is L // clean j +←1 if t (cid:54)=⊥ then truncate index[v,i] from t on. else tail t ← index[v,i]− 1; while t ≥ 0 and (u,d) ← index[v,i][t] has α(d) ≤ α(δt ) do truncate index[v,i] at position t + 1 on t −←1 Remove pair (v,i) from Qhml UpdateReclassThresh(v,i) // Update Qhml 20
1909.01087
1
1909
2019-08-20T04:35:10
AHINE: Adaptive Heterogeneous Information Network Embedding
[ "cs.SI", "cs.LG" ]
Network embedding is an effective way to solve the network analytics problems such as node classification, link prediction, etc. It represents network elements using low dimensional vectors such that the graph structural information and properties are maximumly preserved. Many prior works focused on embeddings for networks with the same type of edges or vertices, while some works tried to generate embeddings for heterogeneous network using mechanisms like specially designed meta paths. In this paper, we propose two novel algorithms, GHINE (General Heterogeneous Information Network Embedding) and AHINE (Adaptive Heterogeneous Information Network Embedding), to compute distributed representations for elements in heterogeneous networks. Specially, AHINE uses an adaptive deep model to learn network embeddings that maximizes the likelihood of preserving the relationship chains between non-adjacent nodes. We apply our embeddings to a large network of points of interest (POIs) and achieve superior accuracy on some prediction problems on a ride-hailing platform. In addition, we show that AHINE outperforms state-of-the-art methods on a set of learning tasks on public datasets, including node labelling and similarity ranking in bibliographic networks.
cs.SI
cs
AHINE: Adaptive Heterogeneous Information Network Embedding Yucheng Lin AI Labs, Didi Chuxing Xiaoqing Yang AI Labs, Didi Chuxing [email protected] [email protected] Zang Li Jieping Ye AI Labs, Didi Chuxing [email protected] AI Labs, Didi Chuxing [email protected] 9 1 0 2 g u A 0 2 ] I S . s c [ 1 v 7 8 0 1 0 . 9 0 9 1 : v i X r a Abstract -- Network embedding is an effective way to solve the network analytics problems such as node classification, link prediction, etc. It represents network elements using low dimensional vectors such that the graph structural information and properties are maximumly preserved. Many prior works focused on embeddings for networks with the same type of edges or vertices, while some works tried to generate embeddings for heterogeneous network using mechanisms like specially designed meta paths. In this paper, we propose two novel algorithms, GHINE (General Heterogeneous Information Network Embed- ding) and AHINE (Adaptive Heterogeneous Information Network Embedding), to compute distributed representations for elements in heterogeneous networks. Specially, AHINE uses an adaptive deep model to learn network embeddings that maximizes the likelihood of preserving the relationship chains between non- adjacent nodes. We apply our embeddings to a large network of points of interest (POIs) and achieve superior accuracy on some prediction problems on a ride-hailing platform. In addition, we show that AHINE outperforms state-of-the-art methods on a set of learning tasks on public datasets, including node labelling and similarity ranking in bibliographic networks. Index Terms -- Network embedding, heterogeneous information network, deep learning I. INTRODUCTION Understanding and encoding interconnected relationships between the various elements in a network is important for solving many real-world problems, such as fraud detection [1], ride-hailing demand forecasting [2], search ranking [3]. To learn feature representations for nodes and edges, many approaches such as [4], [5], [6], [7] were proposed in the past few years, aiming to embed network elements into a low- dimensional space. A graph embedding system can be viewed as a mapping system, where the input is a graph with a set of vertices and edges, and the output are vectors for vertices. However, most existing methods such as [4], [5], [6], [7], [8], [9] are for embedding homogeneous network, i.e., they can deal only with networks containing nodes and edges of one type. As there are many different types of nodes and relations in heterogeneous information networks (HINs) such as DBLP [10], YAGO [11], DBpedia [12] and Freebase [13], network embedding algorithms that capture these semantics become more important. HINs are also widely used in industries, such as ride-hailing [2], accommodation [3], etc. Previous homoge- neous methods are not applicable for generating embeddings for heterogeneous networks. Relations between nodes in a HIN are much more complex than those in homogeneous networks. The proximity among nodes is not just a measure of closeness or distance, but also some other semantics (e.g., type of relations between author and paper, type of relations between co-authors in DBLP). Thus embedding models based on node closeness are not suitable for HINs. There are several meta path based methods that try to explore and maintain the rich semantic and structural information in HINs, such as [14], [15], [16], [17], [18], [19], [20], [21], [22]. The meta path based methods often require experts to specify the meta paths or provide supervision to select meta paths. Furthermore, the set of meta paths often reflects part of the semantic meanings in the HINs as experts only supply part of patterns of relationships in the HINs. Other kinds of semantic relations which are not in the set of meta paths cannot be captured by these methods. There are other methods that deal with HIN embeddings without the usage of meta paths, such as network partition based methods [23] [24], neural network based methods [25] [26] [27]. These methods are usually only applicable to specific tasks or networks and are not well suited for use in general scenarios. To cope with the challenges of HIN embedding, we pro- pose two novel methods, General Heterogeneous Information Network Embedding (GHINE) and Adaptive Heterogeneous Information Network Embedding (AHINE). By modeling re- lation types as deep neural layers, the two algorithms are able to transform nodes in a heterogeneous network into distributed representations while preserving the semantic prox- imities between nodes. We summarize our major contributions as follows: (1) We propose two unsupervised learning algorithms, GH- INE and AHINE, for generating HIN embeddings that preserve complex relationships between nodes without any knowledge about meta paths or predefined rules. (2) The edge-based algorithm (GHINE) and chain-based algorithm (AHINE) are presented to encode first order and higher order semantic relations among nodes. Different types of edges are modeled by different deep neural networks . (3) Experiments based on HIN datasets demonstrate the effectiveness of AHINE and GHINE. They outperform state- of-the-art methods in tasks on two public HINs. We also apply AHINE on a real-world large-scale ride-hailing dataset collected in Beijing to get embeddings for POI grid cells. paths to capture different graph semantics. This makes these methods difficult to apply widely. In addiction to meta path based methods, some methods such as HERec [23] and EOE [24] decompose the HIN into sub-networks and optimize node proximity within each sub- network. Some other works are inspired by deep learning technology and learn non-linear mapping functions for HIN embedding by training neural networks, such as HNE [25], BL-MNE [26], SHINE [27], etc. These methods usually target at some specific tasks and are hard to handle general cases. III. PRELIMINARIES Definition 3.1: An information network is a directed graph G = (V, E) with a node type mapping function φ : V → Γ and an edge type mapping ψ : E → Ω, where each node v ∈ V belongs to a node type φ(v) ∈ Γ, and each edge r ∈ E belongs to an edge type ψ(r) ∈ Ω. Definition 3.2: An information network G = (V, E) is a heterogeneous information network (HIN) if φ(v1) (cid:54)= φ(v2), ∃ v1, v2 ∈ V or ψ(r1) (cid:54)= ψ(r2), ∃ r1, r2 ∈ E. Fig. 1 shows the schema of DBLP HIN, where nodes A, T, P, V correspond to author, topic, paper and venue, respectively. There are also different kinds of relations between nodes, such as "publish", "write", "cited by", etc. The embeddings help greatly improve the ride-hailing activity prediction service. II. RELATED WORK A. Homogeneous Network Embedding Network embedding has attracted extensive attention re- cently. Inspired by word2vec [28], DeepWalk proposed in [5] generates truncated random walks and treats these walks as the equivalent of sentences. By applying Skip-gram model to the "sentences", latent representations of nodes are well extracted. Node2vec [7] further extended DeepWalk by de- signing a flexible objective function and providing parameters p, q to tune the explored search space. LINE [6] is another widely used network embedding model, which learns feature representations in two separate phases. In the first phase, it learns first-order embedding by simulation over immediate neighbors of nodes. In the second phase, it learns second- order embedding by sampling nodes at a 2-hop distance. Struc2vec [29] focuses on capturing structural equivalence between nodes. Over the last few years, there has been a surge of Graph Neural Networks (GNNs) studies [30], which operate deep learning based methods on graph domain, such as Graph Convolutional Networks (GCNs) [31], GraphSage [32], Graph Attention Networks (GATs) [33], etc. Though they show high interpretability and achieve convincing performance, most GNNs still seem to have serveral limitations: (1) only focus on homogeneous networks (2) supervised labels are required (3) hard to deal with large-scale graphs due to high memory requirement. B. Heterogeneous Network Embedding The aforementioned methods focus on homogeneous infor- mation networks, where all the nodes are of the same type and all the edges share the same relation. In recent years, a few works have been done to learn latent representations from heterogeneous information networks (HINs). A main class of embedding studies for HINs are based on meta paths proximities. Take bibliographic datasets for example. Meta paths like "Author-Paper-Author" ("APA") or "Author-Paper-Venue-Paper-Author" ("APVPA") are generated first, which preserve the information of coauthor or similar research field. ESim [34] accepts user-defined meta paths as guidance to learn vertex vectors in a user-preferred embedding space. Metapath2vec [16] formalizes random walks on a meta path scheme like "APVPA", and performs the Skip-gram model on it for HIN embedding. Metapath2vec++ [16] proposes an advanced Skip-gram framework, in which the softmax function is normalized with respect to the node type of the context. HIN2Vec [35] learns HIN embeddings by conducting multiple prediction training tasks jointly to learn representation from meta paths. HHNE [22] measures the node proximity in hyperbolic spaces instead of Euclidean. However, most of these models show poor generality, as meta paths are required to be ready in advance. In many practical applications, users have to design different meta Fig. 1. Schemas of DBLP Heterogeneous Information Network Definition 3.3: A meta path P is an ordered list of node types γ1, γ2, ..., γn connected by edge types e1, e2, ..., en−1 as follows: P = γ1 e1−→ γ2 ··· γn−1 en−1−→ γn. An instance of the meta path P is a real path in the HIN with the pattern of P . Fig. 2 illustrates two examples of meta paths for DBLP HIN shown in Fig. 1. Fig. 2. Meta path examples for DBLP HIN in Fig. 1 Definition 3.4: Heterogeneous Information Network Embedding: Given a heterogeneous information network G, find a d-dimensional representation Φ ∈ RV ∗d, d << V that is able to explore and maintain the semantic and structural relations among them. IV. METHODOLOGY In this section, we introduce our methodology for embed- ding HINs. We first discuss how to model the heterogeneous information network embedding problem in a general way in Section IV-A. Then, we introduce an adaptive version which is called AHINE in Section IV-B. Finally, we present an example from the ride-hailing application in Section IV-C. A. General HINE An effective embedding learning method should con- sider the differences between different relationships. GH- INE (General Heterogenous Information Network Embedding) treats each relationship as a non-linear function which is formulated by a deep learning model. For example, if there exists an edge type e from node v1 to node v2, we would like to formulate it as follows: fe(Φ(v1)) = Φ(v2), (1) where fe is the function for edge type e, Φ(v1) is GHINE for v1 and Φ(v2) is GHINE for v2. Like DeepWalk [5] does, our algorithms extend Skip-gram [28] architecture to networks. In DeepWalk, it constrains a nodes embedding to be similar to its context nodes in random walk by calculating their similarities. However such method only encodes network closeness but does not take into account relation information. Thus, we define the similarity between adjacent nodes by considering the relation types. If there is an edge type e from node vi to vj, we define the similarity between vi and vj via relation e as se(vi, vj) = fe(Φ(vi))T · Φ(vj), (2) where Φ(vi) (or Φ(vj)) ∈ Rd is the embedding of node vi (or vj). The probability of P r(vjvi, e) is modeled via softmax: (cid:80) . (3) P r(vjvi, e) = To learn node embeddings, ese(vi,vj ) v(cid:48)∈V ese(vi,v(cid:48)) the GHINE algorithm first generates a set of triples (vi, e, vj) by random edge sampling on HIN. After that, stochastic gradient descent is used to learn the parameters of Φ and fe. At each iteration, a set of triples with the same edge type as a mini batch is processed to update the gradients to minimize the following objective: Lij = −logP r(vjvi, e). (4) We use negative sampling to approximate the objective function in order to speed up training process. Formally, parameters of Φ and fe are updated as follows: Φ = Φ − η ∂Lij ∂Φ , (5) fe = fe − η ∂Lij ∂fe , (6) where η is the learning rate. Algorithm 1 THE GHINE ALGORITHM Input: (1) A heterogeneous information network: G = (V, E); (2) Maximum number of iterations: MaxIterations; (3) mini batch size: b; (4) learning rate: η; (5) Edge type list: L. Output: Node embedding Φ(·) for each v ∈ V 1: Initialize L neural networks with the same input / output dimension 2: S ← generate a set of triples (vi, ek, vj) according to G where ek ∈ L 3: Iterations ← 0 4: repeat 5: get a mini batch of size b of (vi, ek, vj) from S with the same edge type ek; update parameters of Φ and fek by Eq. 5 and Eq. 6 Iterations ← Iterations + 1 6: 7: 8: until Iterations (cid:62) MaxIterations or convergence 9: return Φ In GHINE, the layers of embedding and softmax share the same weights. Each type of edge has a different deep network layer to represent. The only constraint for these layers is that the number of dimensions of the input and output layers of the deep networks must be the same as the number of dimensions of node embeddings. During the training process, it selects the proper DNN layers for the specific relation. e2−→ v1), p3 (v4 e4−→ v5), and p4 (v1 The key steps of GHINE are described in Algorithm 1. e1−→ Fig. 3 gives an example of GHINE. Four triples p1 (v3 e1−→ v2) are v4), p2 (v4 sampled from a HIN. e1, e2, e4 are types of edges. Different types of edges are colored differently. GHINE models each edge type using a distinct DNN. When processing the training samples p1 or p4, the weights of the embedding/softmax layers and DNN layers corresponding to type e1 will be updated. B. Adaptive HINE Furthermore, we have proposed a more flexible model, called Adaptive Heterogenous Information Network Embedding (AHINE). AHINE tries to encode the rela- tionships between nodes with distance > 1 in the HIN. In order to achieve this, relation chains (of length ≥ 1) are generated as training examples by random walks or by designing meta paths. These training samples preserve the relationship between both adjacent and non-adjacent nodes. In this sense, GHINE is a special case of AHINE, i.e., the length of each relation chain is always 1. In this method, as each input training example may have different lengths and different types of relations, the computa- tion graph will change accordingly. For every input chain, the algorithm tries to predict the last node based on the first node fek = fek − η ∂L(cid:48) ij ∂fek , k ∈ [1, m]. (12) In practice, we use the samples where the length of edges is 1 to initialize dense layers and embeddings for nodes first. In other words, GHINE is used to initialize dense layers and embeddings for node. And then, the samples where the length of edges is more than 1 are then used to optimize the total network weights. e2−→ v1 e1−→ v2 e4−→ v5) and c2 (v4 Fig. 4 follows the same example as above. Two chains c1 e3−→ v6) are e1−→ v4 (v3 sampled from the HIN by random walks. For training example c1, AHINE tries to predict v5 by giving v3's node embedding. When processing c1, the weights of the embedding/softmax layers and DNN layers corresponding to type e1 and e4 will be updated. Fig. 3. General Heterogeneous Information Network Embedding and the information carried by the relation chains between them. em−→ vj, AHINE tries to predict vj's embedding by a neural network fem (...(fe1 )...) as Suppose there is a relation chain vi e1−→ ... fem(fem−1(....fe1 (Φ(vi))...)) = Φ(vj). (7) The proximity between vi and vj via a relation chain (e1, e2, ... em) can be modeled as: se1,e2,...em (vi, vj) = fem(fem−1(...fe1(Φ(vi))...))T · Φ(vj). (8) Then the probability P r(vjvi, e1, e2, ..., em) is: P r(vjvi, e1, e2, ..., em) = (cid:80) ese1 ,e2 ,...em (vi,vj ) v(cid:48)∈V ese1,e2,...em (vi,v(cid:48)) . (9) The AHINE algorithm generates samples like (vi, e1, ...em, vj) by random walks or meta path patterns. During the training process, the structure of network model is determined by the relation chain between vi and vj. This mechanism allows us to feed any kind of meta paths into the model. Stochastic gradient descent is used to learn the parameters of Φ and fe . At each iteration, a set of samples with the same relation chains is processed as a mini batch to update the gradients to minimize the following objective, ij = −logP r(vjvi, e1, e2, ...., em). L(cid:48) (10) Same as GHINE, negative sampling is used to speed up training process. Parameters Φ and fek , k ∈ [1, m] are updated as follows: Φ = Φ − η ∂L(cid:48) ij ∂Φ , (11) Fig. 4. Adaptive Heterogeneous Information Network Embedding Algorithm 2 describes the details of how to construct dynamic computation graph for each relation chain. The main steps of AHINE are shown in Algorithm 3. C. AHINE in Ride-hailing Platform We carry out experiments in a large-scale ride-hailing platform. We built a large graph where each node represents one of the 28, 929 square grid cells in Beijing. We aim to learn a low-dimensional representation for each grid cell, capturing intuitive aspects of locations such as residential areas which have different characteristics from office buildings. In addition, we constrain areas with similar functions to have similar features, and adjacent areas to be close in embedding space. These aspects will allow us to improve other machine learning tasks involving POIs. Our data consists of passenger ride orders. Each order is a triple (P OIi, relt, P OIj), where P OIi is the source cell, P OIj is the destination cell, and relt is one of 10 discrete time values. Time values are members of the cross-product: Algorithm 2 CONSTRUCTION FOR DYNAMIC COMPU- TATION GRAPH ALGORITHM Input: (1) Edge type list: L; (2) Max chain length: c; (3) L neural networks: one neural network for each edge type Output: dynamic computation graph set S 1: Computation graph set S ← φ 2: chain length ← 1 3: repeat 4: 5: 6: 7: P ← get all relation chains with length chain length pind ← 0 repeat g ← construct computation graph according to the sequence of P [pind] add g to S pind ← pind + 1 8: 9: 10: 11: 12: until chain length > c 13: return S until pind (cid:62) P chain length ← chain length + 1 Algorithm 3 THE AHINE ALGORITHM Input: (1) A heterogeneous information network: G = (V, E); (2) Maximum number of iterations: MaxIterations; (3) mini batch size: b; (4) learning rate: η; (5) Edge list: L; (6) Max chain length: c. Output: Node embedding Φ(·) for each v ∈ V 1: Initialize L neural networks and Φ by GHINE described in Algorithm 1 2: construct a dynamic computation graph set by L neural networks with chain length (cid:54) c as described in Algo- rithm 2 3: S ← generate a set of samples (vi, e1...ek...em, vj) according to G where ek ∈ L, 1 (cid:54) k (cid:54) c and m (cid:54) c 4: Iterations ← 0 5: repeat 6: get a mini batch of size b of (vi, e1, ...ek, ...em, vj) from S with the same relation list [e1, ...ek, ...em]; update parameters of Φ and fek by Eq. 11 and Eq. 12 Iterations ← Iterations + 1 7: 8: 9: until Iterations (cid:62) MaxIterations or convergence 10: return Φ   ∗ peak morning day time peak evening dusk to midnight midnight to morning (cid:40) (cid:41) weekday weekend . (13) For each order (P OIi, relt, P OIj), we add to our graph G an edge of type relt from vi to vj. We then run AHINE on this graph, which contains 14, 804, 324 edges. Fig. 5 illustrates an example for ride-hailing POI grid heterogeneous information network. In this example, some passenger calls a taxi from POI grid cell A to POI grid cell B in the peak morning of weekday, while another person generates an order from POI grid cell B to POI grid cell A in the peak evening of weekday. We generate samples such as "POI grid cell A rel1−→ POI grid cell B", "POI grid cell B rel2−→ POI grid cell A" where rel1 means peak morning in weekday and rel2 means peak evening in weekday. These kinds of samples can be used in GHINE to obtain embeddings for each POI grid cell. If we would like to emphasize a continuous trip by the same passenger, we propose to use training samples such as "POI grid cell A rel1−→ POI grid cell B rel2−→ POI grid cell C rel3−→ POI grid cell A" where rel1 means peak morning in weekday, rel2 means daytime in weekday and rel3 means peak evening in weekday. To capture the information contained in this example, the training model selects the dense layers for relation "peak morning-weekday", "daytime-weekday" and "peak evening-weekday" in sequence with both the input and output as POI grid cell A. Fig. 5. Ride-hailing POI Grid Heterogeneous Information Network V. EXPERIMENTS In this section, we demonstrate the effectiveness of the presented AHINE frameworks for HIN representation learning. We first introduce three heterogenous network datasets in Section V-A. Then, in Section V-B, we introduce the exper- imental setup and competing algorithms. In Section V-C and Section V-D, experimental results and analysis are presented. A. Datasets Three heterogenous network datasets are used in our ex- periments, including a ride-hailing dataset from a real-world platform and two public bibliographic datasets. RH Ride-Hailing (RH) dataset is a large, directed, multi- edged HIN, generated from ride-hailing records in Beijing. This graph is composed of 28, 929 nodes and 14, 804, 324 edges of 10 types in total. Each node represents a POI grid cell and each edge represents a ride-hailing record. Detailed information can be found in Section IV-C. DBIS and AMINER We also conduct our experiments on two public bibliographic datasets, including the Database and Information Systems (DBIS) dataset [36] and the Aminer Computer Science (AMINER) dataset [37]. DBIS, a sub- set of DBLP dataset [10], was constructed by Sun et al. [36]. It contains all 464 venues in DBLP and corresponding 60, 694 authors and 72, 902 publications. AMINER consists of 1, 693, 531 computer scientists and 3, 194, 405 papers from 3, 883 computer science venues. Both datasets are HINs with three types of nodes (Author, Paper, Venue) and four corresponding relationships ("write", "written by", "publish", "published by") among them. B. Experimental Setup Traveling graphs and bibliographic graphs share significant distinctions in many aspects. For example, it's difficult to design meta paths for the RH data. Thus, we compare GHINE and AHINE with distinct baseline methods and settings. On RH dataset, DailyWalk, DeepWalk [5], LINE [6], xNetMF [38], struc2vec [29] are implemented for the purpose of comparison. All embeddings are in the same dimension of dim = 30. It is worth noting that the main idea of our DailyWalk model is that there are some hidden connections in all places that a person has been to for a period of time. Instead of using random walks or meta paths, DailyWalk generates walks by sequentially connecting the POIs appeared in real-world daily ride-hailing records. For example, suppose a passenger travels from P OI1 to P OI2, and then moves to P OI3 from P OI2 in the same day, we get a walk "P OI1→P OI2→P OI3". Similar to DeepWalk, we learned embedded representations by applying Skip-gram to the generated daily walks. On DBIS and AMINER data, DeepWalk, LINE, struc2vec, metapath2vec, metapath2vec++ [16], HHNE [22] are included for comparison. All the embeddings share the same dimension of dim = 50. For all the walk based models (DeepWalk, struc2vec, metapath2vec, metapath2vec++, HHNE), we use the same parameters: (1) The number of walks per node w = 100; (2) The max length for each walk l = 50; (3) The context neighborhood size win = 3; (4) The size of negative samples neg = 5. (5) The lower bound of node frequency min count = 5 ··· , reli, nodelast" se- AHINE takes "nodef irst, rel1, quences as input, with max chain length c and 1 ≤ i ≤ c. GHINE is a special case of AHINE that all chain lengths are always 1. It takes "node1, rel1, node2" sequences as input. For RH data, Fig. 6 gives an instruction of generating the training samples of AHINE. We first extract daily walks of POI grid cells from passengers' daily travel trajectories. The walks are represented in the form of a sequence in which each element of the sequence represents a POI grid cell. We then insert relations between adjacent POIs according to the order time. After that, we extracted the subsequence according to the set length. Intermediate nodes are removed for each subsequence, leaving only the edges and the first and last nodes. Fig. 6. Generate the training samples of AHINE. Max chain length c is set to 3 in this experiment. From a daily walk including n (n ≥ 2) POI nodes, we form max(0, n − 3) samples of chain length 3, max(0, n − 2) samples of chain length 2 and n − 1 samples of chain length 1 in total. Then, we construct 10 neural network modules for 10 time- based relations, with the same structure and the identical input/output size, which is 30, equal to the length of rep- resentation. There are numerous ways to construct a neural network module, where the simplest is to construct a two-layer network, without any hidden layer. Deep neural networks are worthwhile trying with adequate hardware supports. In our experiments, we build a 4-layer network module for each relation, with an input layer of length 30, an output layer of length 30 and two hidden layer of length 200. ReLU is used as the activation function between layers and between connected neural network modules. We take advantage of dynamic computation graph in Tensor- Flow [39] to combine these neural network modules dynami- cally. By using dynamic computation graph, it is equivalent to construct 10 types of AHINE structure with single NN module, 100 types of AHINE structure with double NN modules and 1, 000 types of AHINE structure with triple NN modules in total. With training samples prepared and the AHINE model con- structed, we start the training process based on Algorithm 3. Training data is organized in a batch size of 32 and average negative sampling size for each training sample is set as neg = 5. The maximum number of iterations is set as 200. So, we end the training process until the convergence or epoch ≥ 200. For the bibliographic datasets, in the similar way, we generate sequences by adding corresponding relations between adjacent nodes in random walks (or meta paths) and then erase all the nodes except for the first and the last. The walks are generated with the same parameters listed above, namely the number of walks per node w = 100 and walk length l = 50. Same parameters are used to construct the model, except for that relation number is 4 and the length of input/output layer is 50. There are several useful tips for training AHINE. (1) Pre- training is recommended. In our tasks, we pre-train a GHINE, equal to AHINE with max chain length c = 1, with samples containing single relation as training input. (2) The "under- flow" error happens occasionally, aborting the training process directly. This is due to that the parameters of embedding layer (input layer and softmax layer) change slowly, and the weights of hidden layers change rapidly. We recommend you to give a high learning rate for the embedding layer and give a relatively low rate for the other weights. By doing so, the learning procedure of AHINE will be significantly accelerated and the annoying "underflow" error will be fixed. C. Results in RH Node embeddings are learned using the above algorithm and RH graph, in which each node represents a POI grid cell. To evaluate the quality of POI embeddings learned by different methods, several experiments are presented in the following sections. First, we apply them to a real ride-hailing activity prediction in Section V-C1 as there are several kinds of activity predictions, such as demand forecasting [2], destination prediction [40], etc. Then in Section V-C2, we introduce our POI embedding visualization tool on map and show some interesting results. 1) Activity Prediction: We perform one activity prediction experiment on another ride-hailing dataset, which includes 19, 280, 562 historical orders in Beijing. 246, 955 of these orders are labeled as positive and the rest are labeled as negative. For each ride-hailing order, we collect a series of related features, including calling time, weather condition, hotel den- sity for departure or destination POI, etc. We call them "base features". At the same time, for the POI grid cells where the start and end points are located, we mapped them to the embeddings generated by different models. Finally, we concatenated the features of these two parts together into "merged features". We randomly divide the ride-hailing orders into a training set containing 80% of orders and a test set of 20%. With base features or merged features prepared, we train XGBoost [41] classifiers on the training set and make prediction on the test set. The area under the curve (AUC) is used to measure the performance of final prediction. We design two sub tasks of the activity prediction and the results are presented in Table I. "Base" shows the classifier's performance trained on the base features without POI em- beddings. As illustrated in the left part of Table I, we use merged features for classification. As shown in the right part of Table I, we make classification directly on POI embeddings without base features. The top 2 results in each comparison are underlined and the best is marked in bold. As shown in Table I, among all the models, our proposed method AHINE achieved the best results, while GHINE achieved the second best performance. Moreover, experimental result shows the effectiveness of POI embeddings in the activity prediction, as all the embedding methods are superior than Base. 2) Visualization: We build our POI embedding visual- ization tool based on Baidu Map APIs called "mapv" (https://mapv.baidu.com/). We plotted the POIs corresponding to the trained embeddings on the map. In addition, many useful functions are also implemented to explore POIs on the map, such as address-POI translation, POI clustering, similar POI filtering, etc. We perform the POI clustering experiment in the first place. By applying K-means (K = 20) [42], we divide the POIs into 20 groups and then mark these points in different colors on the Beijings map. Fig. 7 shows the POI clustering result of AHINE on Beijing's map. Physically closed POIs are usually in the same cluster. It illustrates ability of the model to automatically learn implicitly the geographical proximity relationships between POIs, as during the training process we did not provide any supervised information about geographical location. However, location information does not need to be learned because they are usually available, other POI characteristics, such as POI category (e.g., bars, residential areas, business dis- tricts, etc.), convenience of transportation facilities, difficulty of parking cars, are much harder to get and represent in form of features. To evaluate if these characteristics are captured by embeddings we can examine top k most similar POI grid cells of unique POI grid cell in the embedding space. Fig. 8 shows the top 30 most similar POIs to Beijing Railway Station. The red point represents the target POI and the blue ones represent the similar POIs. From the map, it is obvious that neighbor POIs do show good similarity. Besides, we surprisingly found other railway stations and airports are also found quite similar to Beijing Railway Station, despite that they are physically far in distance. The result shows that our embeddings are able to capture some semantic relationships (such as type similarity, location proximity, etc.) between nodes in HINs. D. Results in DBIS & AMINER To label nodes in DBIS and AMINER, we adopt the same third-party labels used in metapath2vec's experiments [16]. 8 categories of venues in Google Scholar are matched with DBIS and AMINER data and we use them to label the corresponding author nodes. In general, we get a valid set with 26, 469 labeled authors and 10 labeled venues for DBIS. For AMINER, we get 241, 235 labeled authors and 133 labeled venues. As the number of matched venues is limited, we design three tasks on author including node clustering, node classification and similarity ranking. • Node Clustering The learned node embeddings are inputed to a K-means (K = 8) clustering model. We use normalized mutual information (NMI) [43] to evaluate the clustering results. ACTIVITY PREDICTION RESULTS (AUC) IN RH DATA. TABLE I AUC (with base) Gain over base AUC (without base) Gain over DailyWalk Method Base DailyWalk LINE DeepWalk xNetMF struc2vec GHINE AHINE 0.6884 0.7285 0.7484 0.7526 0.7480 0.7401 0.7594 0.7616 - 5.82% 8.72% 9.32% 8.66% 7.51% 10.31% 10.64% - 0.6801 0.7169 0.7245 0.7134 0.7007 0.7316 0.7327 - - 5.41% 6.53% 4.90% 3.03% 7.57% 7.73% Fig. 7. AHINE POI clustering by K-means (K=20) on Beijing's map. • Node Classification In this task, with the embeddings of labeled nodes as input, we try to predict the categories of target authors. A logistic classifier is trained for this eight-class clas- sification task. 80% of the nodes are used for training and the rest 20% for testing. We report the classification performance in terms of both Micro-F1 and Macro-F1 scores [16]. • Similarity Ranking Given a query and returning a ranked item list is one of the main tasks in learning to rank problem [44]. Mean average precision at K (MAP@K) [15] is widely used for evaluating whether a returned list is well ranked or not. In our task, intuitively, a node ought to show high similarities to nodes with the same label and show low similarity to nodes with different labels. We treat a target node as the "query" and obtain a returned list by ranking the rest nodes according to their similarity with node "query". In the returned list, we define the nodes with the same label as positive samples and the rest are negatives. Thus, we apply the metric MAP@K to our similarity ranking task. RESULTS OF THREE TASKS IN DBIS DATA. TABLE II Method LINE DeepWalk struc2vec metapath2vec metapath2vec++ HHNE GHINE AHINE NMI Macro-F1 Micro-F1 MAP@100 0.0918 0.0923 0.0561 0.0880 0.0802 0.0753 0.1104 0.1100 0.2935 0.2687 0.1212 0.3367 0.3123 0.2564 0.3096 0.3351 0.5278 0.5523 0.4749 0.5602 0.5416 0.5270 0.5489 0.5735 0.4023 0.4093 0.3530 0.4081 0.3987 0.3875 0.3921 0.4144 The results of author nodes in DBIS dataset is summarized in Table II. Same as above, we underline the top 2 results for each metric and mark the best in bold. As we can observe, the proposed AHINE achieves the best Micro-F1 score in node classification and the best MAP@100 in similarity ranking task. In node clustering task, GHINE and AHINE show similar performance and outperform all baselines significantly. And from GHINE to AHINE, by adding relationship chains, both Macro-F1 and Micro-F1 scores improve greatly. Table III shows the results of author nodes in AMINER data. AHINE outperforms all the baseline methods in terms of three Fig. 8. Top 30 similar POIs to Beijing Railway Station. RESULTS OF THREE TASKS IN AMINER DATA. TABLE III Method LINE DeepWalk metapath2vec metapath2vec++ HHNE GHINE AHINE NMI Macro-F1 Micro-F1 MAP@100 0.5385 0.5306 0.6624 0.5328 0.5330 0.6908 0.6816 0.8191 0.8356 0.8763 0.8617 0.8198 0.8846 0.8892 0.8016 0.8181 0.8655 0.8497 0.8049 0.8738 0.8786 0.6976 0.7188 0.7615 0.7544 0.7319 0.7356 0.7825 metrics, and achieves the second best in node clustering task by metric NMI. GHINE also shows satisfactory performance in all tasks except similarity ranking. Overall, plenty of experiments are performed in the ride- hailling and bibliograhic datasets. Their results demonstrate the efficiency of proposed GHINE and AHINE models for large-scale HIN embedding. VI. CONCLUSION In this paper, we propose a general and an adaptive method for the unsupervised embedding learning of heterogeneous information networks. We evaluate the effectiveness of the proposed methods on public datasets. GHINE and AHINE are also applied in a real-world ride-hailing platform to catch the semantic and structure information and help greatly improve the ride-hailing activity prediction service. REFERENCES [1] D. Zhou, J. He, H. Yang, and W. Fan, "SPARC: self-paced network representation for few-shot rare category characterization," in Proceed- ings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, London, UK, August 19-23, 2018, pp. 2807 -- 2816, 2018. [2] G. Xu, L. Yaguang, W. Leye, Z. Lingyu, Y. Qiang, Y. Jieping, and L. Yan, "Spatiotemporal multi-graph convolution network for ride- hailing demand forecasting," in Association for the Advancement of Artificial Intelligence, 2019. [3] M. Grbovic and H. Cheng, "Real-time personalization using embeddings for search ranking at airbnb," in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 311 -- 320, ACM, 2018. [4] S. Cao, W. Lu, and Q. Xu, "Grarep: Learning graph representations with global structural information," in Proceedings of the 24th ACM Inter- national on Conference on Information and Knowledge Management, pp. 891 -- 900, ACM, 2015. [5] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social representations," in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701 -- 710, ACM, 2014. [6] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large-scale information network embedding," in Proceedings of the 24th International Conference on World Wide Web, pp. 1067 -- 1077, International World Wide Web Conferences Steering Committee, 2015. [7] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855 -- 864, ACM, 2016. [8] D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1225 -- 1234, ACM, 2016. [9] D. Zhang, J. Yin, X. Zhu, and C. Zhang, "Homophily, structure, and content augmented network representation learning," in Data Mining (ICDM), 2016 IEEE 16th International Conference on, pp. 609 -- 618, IEEE, 2016. [10] M. Ley, "The dblp computer science bibliography: Evolution, research issues, perspectives," in International symposium on string processing and information retrieval, pp. 1 -- 10, Springer, 2002. [11] F. M. Suchanek, G. Kasneci, and G. Weikum, "Yago: a core of semantic knowledge," in Proceedings of the 16th international conference on World Wide Web, pp. 697 -- 706, ACM, 2007. [12] S. Auer, C. Bizer, G. Kobilarov, J. Lehmann, R. Cyganiak, and Z. Ives, [33] P. Velickovi´c, G. Cucurull, A. Casanova, A. Romero, P. Lio, and Y. Bengio, "Graph attention networks," in International Conference on Learning Representations (ICLR), 2018. [34] J. Shang, M. Qu, J. Liu, L. M. Kaplan, J. Han, and J. Peng, "Meta- path guided embedding for similarity search in large-scale heterogeneous information networks," arXiv preprint arXiv:1610.09769, 2016. [35] T.-y. Fu, W.-C. Lee, and Z. Lei, "Hin2vec: Explore meta-paths in heterogeneous information networks for representation learning," in Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1797 -- 1806, ACM, 2017. [36] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu, "Pathsim: Meta path- based top-k similarity search in heterogeneous information networks," Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 992 -- 1003, 2011. [37] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su, "Arnetminer: extraction and mining of academic social networks," in Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 990 -- 998, ACM, 2008. [38] M. Heimann, H. Shen, T. Safavi, and D. Koutra, "Regal: Representation learning-based graph alignment," in Proceedings of the 27th ACM International Conference on Information and Knowledge Management, pp. 117 -- 126, ACM, 2018. [39] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al., "Tensorflow: a system for large-scale machine learning.," in OSDI, vol. 16, pp. 265 -- 283, 2016. [40] L. Zhang, T. Hu, Y. Min, G. Wu, J. Zhang, P. Feng, P. Gong, and J. Ye, "A taxi order dispatch model based on combinatorial optimization," in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2151 -- 2159, ACM, 2017. [41] T. Chen and C. Guestrin, "Xgboost: A scalable tree boosting system," in Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining, pp. 785 -- 794, ACM, 2016. [42] J. A. Hartigan and M. A. Wong, "Algorithm as 136: A k-means clustering algorithm," Journal of the Royal Statistical Society. Series C (Applied Statistics), vol. 28, no. 1, pp. 100 -- 108, 1979. [43] T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley & Sons, 2012. [44] T.-Y. Liu et al., "Learning to rank for information retrieval," Foundations and Trends® in Information Retrieval, vol. 3, no. 3, pp. 225 -- 331, 2009. "Dbpedia: A nucleus for a web of open data," Semantic Web, vol. 4825, pp. 11 -- 15, 2007. [13] K. Bollacker, C. Evans, P. Paritosh, T. Sturge, and J. Taylor, "Freebase:a collaboratively created graph database for structuring human knowl- edge," in ACM SIGMOD International Conference on Management of Data, pp. 1247 -- 1250, 2008. [14] H. Ji, C. Shi, and B. Wang, "Attention based meta path fusion for hetero- geneous information network embedding," in Pacific Rim International Conference on Artificial Intelligence, pp. 348 -- 360, Springer, 2018. [15] T. Chen and Y. Sun, "Task-guided and path-augmented heterogeneous network embedding for author identification," in Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 295 -- 304, ACM, 2017. [16] Y. Dong, N. V. Chawla, and A. Swami, "metapath2vec: Scalable rep- resentation learning for heterogeneous networks," in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 135 -- 144, ACM, 2017. [17] C. Wang, Y. Song, H. Li, Z. Ming, and J. Han, "Unsupervised meta-path selection for text similarity measure based on heterogeneous information networks," Data Mining & Knowledge Discovery, pp. 1 -- 33, 2018. [18] W. Shen, J. Han, J. Wang, X. Yuan, and Z. Yang, "Shine+: A gen- eral framework for domain-specific entity linking with heterogeneous information networks," IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 2, pp. 353 -- 366, 2018. [19] C. Wang, Y. Song, H. Li, Y. Sun, M. Zhang, and J. Han, "Distant meta- path similarities for text-based heterogeneous information networks," in Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, pp. 1629 -- 1638, ACM, 2017. [20] Y. Shi, P.-W. Chan, H. Zhuang, H. Gui, and J. Han, "Prep: Path-based relevance from a probabilistic perspective in heterogeneous information networks," in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 425 -- 434, ACM, 2017. [21] C. Wang, Y. Song, H. Li, M. Zhang, and J. Han, "Text classification with heterogeneous information network kernels.," in AAAI, pp. 2130 -- 2136, 2016. [22] X. Wang, Y. Zhang, and C. Shi, "Hyperbolic heterogeneous information network embedding," in AAAI, 2019. [23] W. X. Z. Chuan Shi, Binbin Hu and P. S. Yu., "Heterogeneous infor- mation network embedding for recommendation," in IEEE Transactions on Knowledge and Data Engineering (TKDE), IEEE, 2018. [24] L. Xu, X. Wei, J. Cao, and P. S. Yu, "Embedding of embedding (eoe): Joint embedding for coupled heterogeneous networks," in Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 741 -- 749, ACM, 2017. [25] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang, "Heterogeneous network embedding via deep architectures," in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 119 -- 128, ACM, 2015. [26] J. Zhang, C. Xia, C. Zhang, L. Cui, Y. Fu, and S. Y. Philip, "Bl-mne: emerging heterogeneous social network embedding through broad learn- ing with aligned autoencoder," in 2017 IEEE International Conference on Data Mining (ICDM), pp. 605 -- 614, IEEE, 2017. [27] H. Wang, F. Zhang, M. Hou, X. Xie, M. Guo, and Q. Liu, "Shine: Signed heterogeneous information network embedding for sentiment link prediction," in Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 592 -- 600, ACM, 2018. [28] T. Mikolov, I. Sutskever, C. Kai, G. Corrado, and J. Dean, "Distributed representations of words and phrases and their compositionality," Ad- vances in Neural Information Processing Systems, vol. 26, pp. 3111 -- 3119, 2013. [29] L. F. Ribeiro, P. H. Saverese, and D. R. Figueiredo, "struc2vec: Learning node representations from structural identity," in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 385 -- 394, ACM, 2017. [30] J. Zhou, G. Cui, Z. Zhang, C. Yang, Z. Liu, L. Wang, C. Li, and M. Sun, "Graph neural networks: A review of methods and applications," arXiv preprint arXiv:1812.08434, 2018. [31] T. N. Kipf and M. Welling, "Semi-supervised classification with graph convolutional networks," in International Conference on Learning Rep- resentations (ICLR), 2017. [32] W. L. Hamilton, R. Ying, and J. Leskovec, "Inductive representation learning on large graphs," in NIPS, 2017.
1703.09315
1
1703
2017-03-27T21:30:59
Tracing the Use of Practices through Networks of Collaboration
[ "cs.SI", "physics.soc-ph" ]
An active line of research has used on-line data to study the ways in which discrete units of information---including messages, photos, product recommendations, group invitations---spread through social networks. There is relatively little understanding, however, of how on-line data might help in studying the diffusion of more complex {\em practices}---roughly, routines or styles of work that are generally handed down from one person to another through collaboration or mentorship. In this work, we propose a framework together with a novel type of data analysis that seeks to study the spread of such practices by tracking their syntactic signatures in large document collections. Central to this framework is the notion of an "inheritance graph" that represents how people pass the practice on to others through collaboration. Our analysis of these inheritance graphs demonstrates that we can trace a significant number of practices over long time-spans, and we show that the structure of these graphs can help in predicting the longevity of collaborations within a field, as well as the fitness of the practices themselves.
cs.SI
cs
Tracing the Use of Practices through Networks of Collaboration Rahmtin Rotabi Department of Computer Science Cristian Danescu-Niculescu-Mizil Department of Information Science Cornell University Ithaca, NY, 14853 Cornell University Ithaca, NY, 14853 [email protected] [email protected] [email protected] Department of Computer Science Jon Kleinberg Cornell University Ithaca, NY, 14853 7 1 0 2 r a M 7 2 ] I S . s c [ 1 v 5 1 3 9 0 . 3 0 7 1 : v i X r a Abstract An active line of research has used on-line data to study the ways in which discrete units of information-including mes- sages, photos, product recommendations, group invitations- spread through social networks. There is relatively little un- derstanding, however, of how on-line data might help in studying the diffusion of more complex practices-roughly, routines or styles of work that are generally handed down from one person to another through collaboration or mentor- ship. In this work, we propose a framework together with a novel type of data analysis that seeks to study the spread of such practices by tracking their syntactic signatures in large document collections. Central to this framework is the no- tion of an inheritance graph that represents how people pass the practice on to others through collaboration. Our analysis of these inheritance graphs demonstrates that we can trace a significant number of practices over long time-spans, and we show that the structure of these graphs can help in predicting the longevity of collaborations within a field, as well as the fitness of the practices themselves. Introduction On-line domains have provided a rich collection of settings in which to observe how new ideas and innovations spread through social networks. A growing line of research has dis- covered principles for both the local mechanisms and global properties involved in the spread of pieces of information such as messages, quotes, links, news stories, and photos [2, 9, 13, 14, 12, 1, 6, 8, 5], the diffusion of new products through viral marketing [11], and the cascading recruitment to on-line groups [4, 3]. A common feature in these approaches has been to trace some discrete "unit of transmission" that can be feasibly tracked through the underlying system: a piece of text, a link, a product, or membership in a group. This is natural: the power of on-line data for analyzing diffusion comes in part through the large scale and fine-grained resolution with which we can observe things flowing through a network; therefore, to harness this power it is crucial for those things to be algorithmically recognizable and trackable. As a result, certain types of social diffusion have been particularly dif- ficult to approach using on-line data-notably, a broad set Copyright c(cid:13) 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. of cascading behaviors that we could refer to as practices, which are a collection of styles or routines within a commu- nity that are passed down between people over many years, often through direct collaboration, mentorship or instruc- tion. Particular stylistic elements involved in writing soft- ware, or performing music, or playing football, might all be examples of such practices in their respective fields. While complex practices are one of the primary modes studied by qualitative research in diffusion [19], the challenge for large- scale quantitative analysis has been both to recognize when someone has begun to adopt a practice, and also to identify how it was transmitted to them. Tracking the Spread of Practices. A natural approach to tracking the spread of a practice is to find a concretely rec- ognizable "tag" that tends to travel with the practice as it is handed down from one person to another, rendering its use and transmission easily visible. A beautiful instance of this strategy was carried out by David Kaiser in his analysis of the use of Feynman diagrams in physics [10]. Feynman diagrams were proposed by Richard Feynman as a way to organize complex physics calculations, and due to the tech- nical sophistication involved in their use, the initial spread of Feynman diagrams within the physics community pro- ceeded in much the style described above, with young re- searchers adopting the practice through collaboration with colleagues who had already used it. In contrast to many comparable practices, Feynman diagrams had a distinctive syntactic format that made it easy to tell when they were being used. As a result, their spread could be very accu- rately tracked through the physics literature of the mid-20th- century. The result, in Kaiser's analysis, was a detailed map of how an idea spread through the field via networks of men- torship. As he writes: The story of the spread of Feynman diagrams reveals the work required to craft both research tools and the tool users who will put them to work. The great majority of physicists who used the diagrams during the decade after their introduction did so only after working closely with a member of the dia- grammatic network. Postdocs circulated through the Institute for Advanced Study, participating in intense study sessions and collaborative calculations while there. Then they took jobs throughout the United States (and elsewhere) and be- gan to drill their own students in how to use the diagrams. To an overwhelming degree, physicists who remained outside this rapidly expanding network did not pick up the diagrams for their research. Personal contact and individual mentor- ing remained the diagrams' predominant means of circula- tion even years after explicit instructions for the diagrams' use had been in print. [10] The Feynman diagram thus functions in two roles in this analysis: as an important technical innovation, and as a "tracking device" for mapping pathways of mentorship and collaboration. If we want to bring this idea to a setting with large-scale data, we must deal with the following question: where can we find a rich collection of such tracking devices with which to perform this type of analysis? We do not ex- pect most objects in this collection to be technical advances comparable to the Feynman diagram, but we need a large supply of them, and we need to be able to mechanically rec- ognize both their use and their spread. The present work: Diffusion of practices in academic writing. In this paper, we describe a framework for track- ing the spread of practices as they are passed down through networks of collaboration, and we demonstrate a number of ways in which our analysis has predictive value for the un- derlying system. We make use of a setting where practices have the recognizability that we need-a novel dataset of la- tex macros in the e-print arXiv recently developed by Rotabi et al [16]. While the earlier work that developed this dataset used macros for other purposes (specifically, treating macros names as instances of naming conventions), macros in our context have a number of the key properties we need. First, a latex macro is something whose presence can be tracked as it spreads through the papers in the arXiv collection; we can thus see when an author first uses it, and when their co- authors use it. Second, while an arbitrary macro clearly does not correspond in general to an important technical innova- tion, a sufficiently complex macro often does encode some non-trivial technical shorthand within a concrete sub-field, and hence its use signifies the corresponding use of some technical practice within the field. And finally, there are sev- eral hundred thousand latex macros in papers on the arXiv, and so we have the ability to track a huge number of such diffusion events, and to make comparative statements about their properties. If we want to use macros to trace the diffusion of practices between collaborators, we first need to establish whether macros indeed spread via "inheritance" from co-authors: as with the Feynman diagram, can most of the initial set of uses of a macro trace a path back to a single early use through a chain of co-authorship? We find that this is true for a signif- icant fraction of macros, by using an inheritance graph for each macro that records how each author's first use can be imputed to a co-authorship with an earlier user of the macro. Specifically, for each macro we can build a graph on the set of authors who have used it, and we include a directed in- heritance edge from author u to author v if (i) u used the macro before v did, and (ii) v's first use of the macro is in a paper with u. We find that many of these inheritance graphs contain giant directed subtrees rooted at a single early use of the macro, indicating that a significant fraction of the users of the macro can indeed trace a direct path back to a single shared early ancestor under this inheritance relation. These structures represent interesting instances of diffu- sion for several reasons. First, they are "organic" in a way that the spread of many on-line memes are not: when we study on-line diffusion in settings where a user's exposure to content is governed by a recommendation system or rank- ing algorithm, there is the added complexity that part of the diffusion process is being guided by the internals of the algo- rithms underlying the system. With macros in arXiv papers, on the other hand, while authors may use automated tools to format the source of their papers, there is relatively little influence from automated recommendations or rankings in the actual decisions to include specific macros. Second, we are studying processes here that play out over years and even decades; among other findings about the structure of our in- heritance graphs, we observe that their diameters can take multiple years to increase even by one hop. We are thus ob- serving effects that are taking place over multiple academic generations. The present work: Estimating fitness. If these inheri- tance graphs-obtaining by tracing simple syntactic signa- tures in the source files of papers-are telling us something about the spread of practices through the underlying com- munity, then their structural properties may contain latent signals about the outcomes of authors, topics, and relation- ships. In the latter part of the paper, we show that this is the case, by identifying such signals built from the inheritance structures, and showing that they have predictive value. As one instance, suppose we wish to estimate the future longevity of a collaboration between two authors u and v- that is, controlling for the number of papers they have writ- ten thus far, we ask how many papers they will write in the future. If (u, v) is an edge of the inheritance graph for some macro, does this help in performing such an estimate? One might posit that since this edge represents something con- crete that u passed on to v in their collaboration, we should increase our estimate of the strength of the relationship and hence its future longevity. This intuition turns out not to be correct on its own: the existence of a (u, v) edge by itself doesn't significantly modify the estimate. However, we find that something close to this intuition does apply. First, we note that since a (u, v) edge only means that a macro used by u showed up subsequently in a paper that u co-authored with v, it is providing only very weak information about v's role in the interaction. We would have a stronger signal if (u, v) were an internal edge of some inheritance graph, meaning that v has at least one outgoing edge; in this case, v was part of a paper that subsequently passed the macro on to a third party w. We find that if (u, v) is an internal edge of an inheri- tance graph, this does in fact provide a non-trivial predictive signal for increased longevity of the u-v collaboration; in- formally, it is not enough that u passed something on to v, but that v subsequently was part of the process of passing it on to a third party w. In fact, we find something more: when (u, v) is an edge that is not internal (so that u's passing on (a) \hbox{$\rm\thinspace L {\odot}$} (b) \mbox{\boldmath $Y$} (c) \mathrel{\mathpalette\@versim>} Figure 1: Sample subsets of BFS trees for three different macros. At each depth we show the date when the highlighted author (node) uses the macro for the first time; the highlighted edge is a paper in which an author passes on the macro to an author (node) in the next level of the tree. of the macro "ends" at v), it in fact provides a weak predic- tive signal that the collaboration will actually have slightly lower longevity than an arbitrary collaboration between two co-authors (again controlling for the number of joint papers up to the point of observation). In what follows, we formalize this analysis and its conclu- sion. We also develop analyses through which macro inher- itance can be used to help estimate the future longevity of an author-how many papers will they write in the future? -and the fitness of an individual macro itself-how many authors will use it in the future? The remainder of the paper is organized into three main sections. We first briefly describe the structure of the data and how it is used in our analyses. We then formally define the inheritance graphs and survey some of their basic prop- erties. Finally, we analyze the relation between these inheri- tance structures and the longevity of co-authorships, authors, and macros. Data Description The dataset we study contains the macros used in over one million papers submitted to the e-print arXiv from its incep- tion in 1991 through November 2015. The arXiv is a reposi- tory of scientific pre-prints in different formats, primarily in LATEX. Macros have two major components, the name and the body. Whenever the author uses \name the LATEX com- piler replaces it with the body and compiles the text. In our study the body serves as the "tracking device" discussed in the introduction, for studying how a macro is passed be- tween collaborators over time. In general, when we refer to a "macro", we mean a macro body unless specified other- wise. For our study we use macro bodies that have length greater than 20 characters, and which have been used by at least 30 different authors. We apply the length filter so that we can focus on macros that are distinctive enough that we expect them to move primarily through copying and trans- mission, rather than independent invention. Further informa- tion can be found in [16], which introduces this dataset. Method Inheritance Graphs Defining inheritance graphs. We begin by formally defining the inheritance graphs described in the introduc- tion. For each macro m we create a graph (Vm, Em) where Vm is the set of authors who have used macro m in at least one of their papers. We add a directed edge (u, v) to the edge set Em if there is a paper that uses m with u and v as co-authors, such that (i) this is v's first use of m, but (ii) u has used m in at least one previous paper. This is the formal sense in which m is being passed from u to v: v's first use of m occurs in collaboration with u, a prior user of m. Note that there can be multiple edges leading into a single node. (a) (b) (c) Figure 2: (a) The CDF for the ratio of the largest reachable set to the number of nodes in the graph. (b) The average number of months that pass from the date of appearance of the root paper to the date of appearance of nodes at a given depth, grouped by the maximum depth of the tree. (c) The average number of nodes in each depth, for the largest reachable set for each macro. For instance take a paper with authors u, v and z that uses macro m, and assume that u and v have used m before but z is using it for the first time; then both the edges (u, z) and (v, z) are in the graph. Now, if all authors of a paper p are using m for the first time, then the nodes corresponding to these authors will not have any incoming edges. (Nodes of this form are the only ones with no incoming edges.) For each such paper p, we replace the nodes corresponding to the authors of p with a single supernode corresponding to p. We will refer to this as a source node, and to the authors of p as source authors. The resulting graph, with supernodes for papers where no author has used the macro before, and with author nodes for all others, is the inheritance graph Gm for the macro m. Because the process of inheritance, as defined, goes forward in time, Gm is necessarily a directed acyclic graph (DAG). Using these graphs we should be able to trace back a macro's life to its inception and to the authors who first used it. Note that there might be multiple source papers, and hence several groups of co-authors who independently serve as "origins" for the macro. For portions of the analysis where we are interested in looking at the number of authors who all follow from a single source paper, we will identify the source paper that has directed paths to the largest num- ber of nodes in the graph Gm. We will refer to this as the seed paper, and to the set of authors of this paper as the seed authors. (Note that the seed paper might not be the chrono- logically earliest paper to use the macro m; it is simply the one that can reach the most other nodes.) Analyzing the inheritance graphs. Our dataset contains several hundred thousand different macros, and as a first step we analyze the properties of the graphs Gm that they produce. In Figure 1 we take three sample macros and show subsets of the breadth-first search (BFS) trees that are obtained starting from the seed paper. For ex- ample in Figure 1(a) the graph is created on the macro, \hbox{$\rm\thinspace L {\odot}$} and the seed node is the paper astroph/9405052 with authors Xavier Bar- cons and Maria Teresa Ceballos. The seed paper used this macro in 1994, and some of the nodes at depth 6 in the BFS tree are from 2014-a 20-year time span to reach a depth of 6 in the cascading adoption of the macro. This reinforces the sense in which we are studying cascades that play out on a multi-generational time scale of decades, rather than the time scale of minutes or hours that characterizes many on- line cascades. The seed node of Figure 1(b) is the paper hep- th/0106008 with authors Selena Ng and Malcolm Perry, and the seed node of Figure 1(c) is the paper hep-ph/9302234 with authors Jose R Lopez et al. Since all other nodes in these BFS trees have incoming edges, they all correspond to individual authors who enter the graph at their first adoption of the macro, whereas the root node corresponds to a single paper and to the contracted set of authors of this paper. We now consider some of the basic properties of these in- heritance graphs. First, each source paper has a reachable set in Gm-the set of nodes it can reach by directed paths-and recall that we defined the seed paper to be the source paper with the largest reachable set. In Figure 2(a) we observe that a non-trivial fraction of the macros have a seed paper whose reachable set is a large fraction of all the authors who even- tually adopt the macro. This provides a first concrete sense in which the inheritance patterns contained in Gm represent a global structure that spans much of the use of the macro m. In Figure 2(b) and 2(c) we show the properties of the graphs and nodes grouped based on the maximum depth of the BFS tree and the depth of the individual nodes. Figure 2(b) shows the average time it takes for the macro to get from the root to the nodes in each depth grouped by the maxi- mum depth of the tree. This figure shows how these cascades can take multiple years to add a single level of depth to the tree, and a decade or more to reach their eventual maximum depth. In Figure 2(c) we show the median width (number of nodes) of trees at each depth, again grouped by the maxi- mum depth of the tree. Based on this plot we see that most of these trees have are narrow in their top and bottom layers, with fewer nodes, and are wider in the middle. The plots thus far have been concerned with the global structure of the inheritance graph and its shortest paths as represented by breadth-first search trees. Now we take a deeper look at the properties of individual edges in the graph. For this we will first define the notions of local and global experience, and we will use these two terms through- out the paper. At time t the global experience of an author is the number of papers the respective author has written. At time t the local experience of an author is defined with re- spect to a macro m and is the number of papers up to time t in which the author has used m. This is a version of the no- tion of local experience relative to an arbitrary term, as used in [17]. Figure 3: The Cumulative Distribution Function of the global experience difference between the source and desti- nation of an edge. Consider an edge (u, v) in the inheritance graph for a macro m. At the moment when the macro is passed from u to v, the local experience of v with respect to m is 0 by definition, and the local experience of u with respect to m is greater than 0. What do we expect about the global expe- rience of these two nodes? To the extent that passing on a macro is a form of "teaching" from one person to another, we may expect the global experience of u (the "teacher") to be higher than the global experience of v (the "learner"). On the other hand, there is a history of sociological work in the diffusion of innovations suggesting that innovations of- ten originate with outsiders who come from the periphery of the system [7, 15, 18, 20], which would be consistent with v having higher global experience than u. Figure 3 addresses this question by showing the cumulative distribution of the global experience difference between u and v. The median experience difference is clearly shifted in the positive direc- tion, consistent with the "teacher" node u having the higher global experience in general. Fitness Now that we have some insight into how the information dif- fusion process unfolds in our data, we investigate whether these inheritance structures can provide predictive signal for the outcomes of co-authorships, authors, and the macros themselves. In all cases we will think in terms of the fitness of the object in question-the extent to which it survives for a long period of time and/or produces many descendants. Fitness of collaborations We start by considering the fitness of collaborations-given two authors u and v who have written a certain number of papers up to a given point in time, or perhaps who have not yet collaborated, can we use anything in the structure of macro inheritance to help predict how many more papers they will write in the future? A natural hypothesis is that if v inherits macros from u, then this indicates a certain strength to the relationship (fol- lowing the teacher-learner intuition above), and this may be predictive of a longer future history of collaboration. To ex- amine this hypothesis, we perform the following computa- tional test as a controlled paired comparison. We find pairs of co-authorships u-v and u(cid:48)-v(cid:48) with properties that (i) nei- ther pair has collaborated before, (ii) their first co-authorship happens in the same month, (iii) (u, v) is an edge in an in- heritance graph, and (iv) (u(cid:48), v(cid:48)) is not. (Note that since we are looking at pairs of co-authorships, we are looking at four authors in total for each instance: u, v, u(cid:48), and v(cid:48).) Now we can ask, aggregating over many such pairs of co-authorships, whether there is a significant difference in the future number of papers that these pairs of authors write together. (Since their initial co-authorships took place in the same month, they have a comparable future time span in which to write further papers.) In fact, we find that there isn't a significant difference, at odds with our initial hypothesis about macro inheritance. However, there is more going on in the inheritance struc- ture that we can take advantage of. We divide the edges of the inheritance graphs into two sets: internal edges (u, v), where the node v has at least one outgoing edge, and ter- minal edges (u, v), where the node v has no outgoing edge. Internal edges add extra structural information, since they indicate that not only u passed the macro m to v, but that v was then part of the process of passing m in a collaboration subsequent to the one in which they originally inherited it. We find that the fitness of u-v co-authorships is signif- icantly higher when (u, v) forms an internal edge, in con- trast to the lack of effect when (u, v) is an arbitrary edge. We evaluate this using an extension of our previous paired comparison: in conditions (i)-(iv) above for forming pairs of co-authorships, we replace conditions (iii) and (iv) with the following: • Internal edge vs. arbitrary co-authorship: (iii) (u, v) is an • Internal edge vs. terminal edge: (iii) (u, v) is an internal • Terminal edge vs. arbitrary co-authorship: (iii) (u, v) is a internal edge and (iv) (u(cid:48), v(cid:48)) is not an edge. edge and (iv) (u(cid:48), v(cid:48)) is a terminal edge. terminal edge and (iv) (u(cid:48), v(cid:48)) is not an edge. In each of these three settings, we look at the fraction of times that one of the categories produced the co-authorship with more future papers. In our paired setting, if we were to draw two co-authorships uniformly at random over all pos- sible co-authorships (without regard to the type of the edge), ticular author a, we say they change the name of macro m on paper p if the previous time they used m's macro body, the name was different. Then, for a set of authors A and a set of macros M, we define f (A, M, x) to be the probability of an author in A changing the name of a macro in M the xth time they use it. We consider this name-change probability, f (A, M, x) for x ∈ [0, 40] and different groups of authors and macros. In particular we look at groups of authors that have more than θ papers in the entire corpus. We set θ to be 40, 50, . . . , 130 and we let M range over three possible sets: the set of all macros; the set of wide-spread macros (more than 250 authors use the macro body); and the set of narrow- spread macros (at least 20 authors used it and at most 250). One source of variability in this analysis is that even once we fix the minimum number of papers θ written by an au- thor a, as well as the usage number x of the macro m that we are considering, it is still possible that author a's xth use of the macro might come toward the end of their professional lifetime or early in their professional lifetime. (It must come at the xth paper they write or later, since they need time to have used the macro m a total of x times, but this is all we know.) It is easy to believe that authors who use a macro in their early life stages might exhibit different phenomena from those who use it in a later life stage. Therefore, in addi- tion to the measures defined so far, we also consider analyses involving only the set of macro uses that come early in the authors' professional lifetime-specifically only macro uses that happen in the author's first 40 papers. The results for all these settings are shown in Figure 5: the three sets of macros (all macros, wide-spread macros, and narrow-spread macros); for each of these sets, we consider both the authors' full lifetimes and just their early life stages. In each case, the x-axis shows the number of macro uses (i.e. the authors' local experience with respect to the macro), and the different curves represent authors grouped by different values of the minimum number of papers θ. This suggests that overtime authors build a certain "loy- alty" to the names they have used consistently; this is con- sistent with our previous findings regarding the competition between macro-naming conventions[16]. But we also find something else: that (eventually) more prolific authors (larger θ) have a lower name-change prob- ability (compare ordering of curves in each subplot of Fig- ure 5. This suggests that the macro name change probabil- ity might be a signal with predictive value for author fitness (which, again, we define as the number of papers the author will eventually write). To test this idea, we set up an author fitness prediction task as follows. For a given minimum number of papers θ we consider the low-fitness authors to be the ones with fit- ness below the 20th percentile and high-fitness authors to be those above the 80th percentile. We then see whether simply using the frequency with which an author changes macro names in the first θ papers can serve as a predictor for this two-class problem: whether an author's fitness is below the 20th percentile or above the 80th percentile. By using the probability of macro name changes, we are able to predict which of these two classes an author belongs to with a performance that exceeds the random baseline of Figure 4: Comparison of three different co-authorship set- tings through different years in the data. The bars show the win percentage of the first of the two listed categories; e.g., the red bar indicates the percentage of times co-authors with internal edges end up writing more papers than the matched co-authors with terminal edges. The horizontal red line indi- cates the 50% baseline. there is a 50% chance that the first would produce the higher number of future papers. Thus, we can calibrate each of the three comparisons listed above using this 50% baseline. Fig- ure 4 shows these results, grouped into two-year bins: we find that internal edges win a large fraction of the compar- isons against each of the other two categories, whereas there is little difference between terminal edges and arbitrary co- authorships. Fitness of authors We now consider the fitness of the authors themselves; we will show that the way authors use macros can provide a weak but non-trivial signal about how many papers they will eventually write, a quantity that we refer to as the fitness of the author. The particular property we consider is a type of "stabil- ity" in the usage of the macro. For a given macro body, there are many possible names that can be used for it, and authors differ in the extent to which their papers preserve a relatively stable choice of names for the same macro body: some almost always use the same name, while for other au- thors the name changes frequently. (For example, an author who almost always uses the name \vbar for the macro body $\overline{v}$, versus an author whose papers al- ternate between using \vbar, \barv, \vb, \vbarsymb, and others, all for this same macro body.) We could think of the first type of author as exerting more control over the source of her papers than the second type of author, and this distinction between the two types of authors-based on their behavior with respect to macros-naturally raises the ques- tion whether the stability of macro names could provide pre- dictive value for author fitness. Here is how we formally define this measure. For a par- (a) (c) (e) (b) (d) (f) Figure 5: Each panel shows the probability an author changes the name of a macro on their xth use of it. A sin- gle curve in each plot shows the set of all authors with at least θ papers, for θ equal to 40, 50, . . . , 130. Each row of panels corresponds to a different set of macros: the first row shows results for the set of all macros; the second for the set of narrow-spread macros; and the third for the set of wide-spread macros (as defined in the text). The left col- umn of panels shows the analysis for each of these three sets over the authors' full professional lifetimes. The right column of panels shows the analysis for each of these three sets restricted to the authors' early life stages (first 40 pa- pers only). Thus, the panels are (a) full lifetimes, all macros; (b) early life stages, all macros; (c) full lifetimes, narrow- spread macros; (d) early life stages, narrow-spread macros; (e) full lifetimes, wide-spread macros; (f) early life stages, wide-spread macros. 50% by a small but statistically significant amount. Figure 6 shows the performance for different values of θ. We em- phasize that predicting an author's fitness is a challenging task for which one doesn't expect strong performance even from rich feature sets; this makes it all the more striking that one can obtain non-trivial performance from the frequency of macro name changes, a very low-level property about the production of the papers themselves. Moreover, for settings involving large values of θ the name-change probability is more predictive than an arguably more natural structural feature: the author's total number Papers revealed (θ) 20'th Percentile 80'th Percentile 10 20 30 40 50 13 25 36 47 58 38 58 73 87 99 Table 1: Global experience thresholds used in defining the author fitness classes for each number θ of papers revealed. of co-authors (Figure 6). We also note that in such settings the name-change feature also outperforms other more direct macro-based features, such as the total number of macros used, or total number of distinct macro bodies used. Figure 6: The accuracy of predicting the number of publi- cations of an author given her first few papers, θ. We com- pare the performance of the name-change probability fea- tures with the features based on number of co-authors. Fitness of macros Finally, we consider the fitness of the macros themselves. We define the fitness of a macro to be the total number of authors who eventually use the macro body, and investigate which features are predictive of this variable. We set up a prediction task as follows. We first find all macros that get adopted by at least k authors. Each of these macros has a fitness (of at least k), and we define σ(k) to be the median of this multiset of fitness values: of all macros that reach at least k authors, half of them have a fitness of at most σ(k), and half of them have a fitness of at least σ(k). In table 2 we report σ(k) and the number of macro instances for different values of k. We can thus use σ(k) to construct a balanced prediction task, in the style of the cascade prediction analyses from [6]. For a given macro that reaches at least k authors, we observe all the information on the papers and authors up to the point at which the kth author adopts the macro, and the task is then to predict if this macro will eventually reach σ(k) authors. k 40 80 120 160 200 σ(k) 98 156 242 340 437 Instances 49,415 30,107 20,119 14,662 11,794 Table 2: Summary of the macro fitness prediction dataset: For a macro that reaches at least k authors, the task is to predict whether it will eventually reach σ(k) authors (the median fitness of such macros). We learn a logistic regression model for different values of k and report the accuracy in Figure 7 on an 80-20 train-test split.1 In Figure 7 we show the prediction performance for dif- ferent subsets of these features, as a function of k; note that performance increases with increasing k. As observed above, predicting macro fitness is a problem whose syntac- tic form is closely analogous to the prediction of cascade size for memes in social media [6]; given this, and the fact that the spread of macros plays out over so much longer time scales, and without the role of ranking or recommenda- tion algorithms, it is interesting to note the similarities and contrasts in the prediction results. One of the most intrigu- ing contrasts is in the role of diffusion speed features: for cascade prediction in social media, the speed features alone yielded performance almost matching that of the full fea- ture set, and significantly outperforming the set of all non- speed features[6]. For our domain, on the other hand, the speed features perform 5-10% worse than the full feature set; they also perform worse for most values of k than the set of all non-speed features. This suggests that for macro fitness, the speed features are considerably less powerful than they are in the social media context, indicating that there may be more to be gained from the synthesis of a much broader set of features. Conclusions The spread of practices between collaborators is a challeng- ing form of diffusion to track, since one needs to be able to recognize when someone has begun using a practice, and how it was conveyed to them. Motivated by work that used the Feynman diagram as an easily recognizable "tracer" of a complex practice [10], we track the spread of several hun- dred thousand macros through the papers of the e-print arXiv over a 25-year period. Long macros often serve as technical shorthand within a defined sub-field, and their syntactic pre- cision makes it easy to follow their flow through the collab- oration network. We construct inheritance graphs showing how the macro spread between collaborators, and we find that many macros have a clear "seed set" of authors with the property that a large fraction of the subsequent users of the macro can trace a direct inheritance path back to this seed set. The resulting diffusion patterns are intriguing, in that they span multiple academic generations and several decades, and unlike cascades in social media, the spread of these macros takes place with very little influence from rank- ing or recommendation algorithms. We also find that properties of macro inheritance provide signals that are predictive for larger-scale properties that have nothing to do with macros. These include predictions about the longevity of collaborations and the number of pa- pers that an author will write over their professional lifetime on the arXiv. Our work suggests a number of directions for future re- search. First, it would be interesting to develop a compara- tive analysis between the structure of our inheritance graphs and the corresponding structures for the diffusion of on-line memes. Are there systematic ways in which the two types of diffusion patterns differ, and can these be connected to differences in the underlying mechanisms? Second, we be- lieve that there may well be additional links between inheri- tance structures and prediction problems for the trajectory of Figure 7: The accuracy of predicting how widely a macro spreads, using different subsets of features. We use the following features. • Features related to the diffusion speed of the macro: the number of papers that the macro needs in order to reach k 2 and k distinct authors; and the number of months that the macro needs in order to reach k 2 and k distinct authors. • Experience of the macro users: the average usage experi- ence of the first k authors who adopted it. • Structural features of the macro users: the local and global clustering coefficients of the co-authorship graph on the first k authors to use the macro. • Structural features of the macro body: the length of the macro body, the number of dollar signs in the macro (generally used for mathematical notation), the number of non-alphanumerical characters, and the maximum depth of nested curly brackets. 1We can achieve a 1% to 4% better accuracy by using a non- linear classifier such as decision trees, but we opt to use the more interpretable model. [10] D. Kaiser. Physics and Feynmans diagrams. American Scientist, 93:156–165, Mar-Apr 2005. [11] J. Leskovec, L. Adamic, and B. Huberman. The dy- namics of viral marketing. ACM Transactions on the Web, 2007. [12] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme- tracking and the dynamics of the news cycle. In Proc. 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009. [13] J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance, and M. Hurst. Cascading behavior in large blog graphs. In Proc. SIAM International Conference on Data Min- ing, 2007. [14] D. Liben-Nowell and J. Kleinberg. Tracing informa- tion flow on a global scale using Internet chain-letter data. Proc. Natl. Acad. Sci. USA, Mar. 2008. [15] M. W. McLaughlin. The Rand change agent study re- visited: Macro perspectives and micro realities. Edu- cational Researcher, 19(9), 1990. [16] R. Rotabi, C. Danescu-Niculescu-Mizil, and J. Klein- berg. Competition and selection among conventions. In Proc. 26th International World Wide Web Confer- ence, 2017. [17] R. Rotabi and J. Kleinberg. The status gradient of In Proc. 10th International trends in social media. Conference on Weblogs and Social Media, pages 319– 328, 2016. [18] G. Simmel. The Sociology of Georg Simmel. Free Press (translated by Kurt H. Wolf), 1908. [19] D. Strang and S. Soule. Diffusion in organizations and social movements: From hybrid corn to poison pills. Annual Review of Sociology, 24:265–290, 1998. [20] T. Valente. Network interventions. Science, 337(49), 2012. the overall system; for example, can we evaluate the future course of larger sub-areas based on the inheritance patterns that exhibit? And finally, identifying "tracers" for complex practices is a style of analysis that can applied in other do- mains as well; as we broaden the set of contexts in which we can perform this type of analysis, we may better understand the ways in which the flow of practices helps reinforce and illuminate our understanding of large collaborative commu- nities. Acknowledgments We are grateful to Paul Ginsparg for his valuable advice and for his help with the arXiv dataset. We would like to thank Peter Lepage for introducing us to David Kaiser's analysis of the diffusion of Feynman dia- grams, which formed the basis for our thinking about the approach in this paper. This work was supported in part by ARO, Facebook, Google, the Simons Foundation, and a Dis- covery and Innovation Research Seed Award from Cornell's OVPR. References [1] L. A. Adamic, T. M. Lento, and A. T. Fiore. How you met me. In Proc. 6th International Conference on We- blogs and Social Media, 2012. [2] E. Adar, L. Zhang, L. A. Adamic, and R. M. Lukose. Implicit structure and the dynamics of blogspace. In Workshop on the Weblogging Ecosystem, 2004. [3] A. Anderson, D. P. Huttenlocher, J. M. Kleinberg, J. Leskovec, and M. Tiwari. Global diffusion via cas- cading invitations: Structure, growth, and homophily. In Proc. 24th International World Wide Web Confer- ence, pages 66–76, 2015. [4] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: In Proc. 12th Membership, growth, and evolution. ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining, 2006. [5] N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. Knowledge and information systems, 37(3):555–584, 2013. [6] J. Cheng, L. A. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec. Can cascades be predicted? In Proc. 23rd International World Wide Web Conference, pages 925–936, 2014. [7] C. Danescu-Niculescu-Mizil, R. West, D. Jurafsky, J. Leskovec, and C. Potts. No country for old members: User lifecycle and linguistic change in online commu- In Proc. 22nd International World Wide Web nities. Conference, 2013. [8] S. Goel, A. Anderson, J. M. Hofman, and D. J. Watts. The structural virality of online diffusion. Management Science, 62(1):180–196, 2016. [9] D. Gruhl, R. V. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In Proc. 13th International World Wide Web Confer- ence, 2004.
1503.00477
1
1503
2015-03-02T10:40:12
Behavioral Aspects of Social Network Analysis
[ "cs.SI", "cs.CY" ]
Contrary to the structural aspect of conventional social network analysis, a new method in behavioral analysis is proposed. We define behavioral measures including self-loops and multiple links and illustrate the behavioral analysis with the networks of Wikipedia editing. Behavioral social network analysis provides an explanation of human behavior that may be further extended to the explanation of culture through social phenomena.
cs.SI
cs
PROCEEDINGS COINs15 BEHAVIORAL ASPECTS OF SOCIAL NETWORK ANALYSIS Sung Joo Park1*, Jong Woo Kim2, Hong Joo Lee3, Hyun Jung Park4, Peter Gloor5 1KAIST Business School, 2School of Business, Hanyang University, 3Department of Business Administration, The Catholic University of Korea, 4Department of Business Administration, Ewha Woman’s University, Korea 4MIT Center for Collective Intelligence, U.S.A. *Corresponding Author: [email protected] ABSTRACT Contrary to the structural aspect of conventional social network analysis, a new method in behavioral analysis is proposed. We define behavioral measures including self-loops and multiple links and illustrate the networks of the behavioral analysis with Wikipedia editing. Behavioral social network analysis provides an explanation of human behavior that may be further extended to the explanation of culture through social phenomena. INTRODUCTION Although social network analysis methods have been progressing remarkably in the last decade, there are methodological issues still remaining to be solved, including the analysis of reflexive and multiple relations. In conventional social network analysis, the main focus has been on the structural aspect of networks1, while the reflexive feature of self-loops (dialog with the self) and multiple dyadic relations (extended dialog with alters) are largely ignored. Self-loops and multiple links can be observed, however, by monitoring networks of naturally emerging human behavior such as the networks in Wikipedia editing. Taking the English Wikipedia as an example, we found that the number of self-loops is more than half of the total edits and the number of multiple dyadic edits is more than 14% of the total edits. Hence, network analysis excluding this big portion of data will grossly distort the editing behavior of Wikipedians, easily amounting to up to 80% of the total interaction. BEHAVIORAL NETWORK ANALYSIS In this study, we focus on the behavioral aspects of social network analysis that may provide insights into the activities of actors in the network. The behavioral networks are prevalent in precedence relationships such as teamwork, group discussion, decision making, blogs, Wikipedia, and even team links. Likewise, sports such as soccer for example. In teamwork, the repeated work of a person consists of self-loops, and repeated dyadic collaboration between two persons illustrates multiple in group discussion, repeated talk of a single person is an example of self-loops and repeated interaction between two persons is a multiple link. In the case of soccer, repeated dribbling by a player corresponds to self-loops and repeatedly passing the ball between two players corresponds links. In collaborative editing of Wikipedia, we observe many self-loop and multiple link edits. Because of the data availability and reliability, the Wikipedia editing network is chosen to illustrate the behavioral analysis in this study. to multiple For the behavioral analysis of the network, we defined measures to extract the behavioral pattern of actors including self-loop ratio, multiple-link ratio, speed, active ratio, anonymity ratio, Gini coefficient and Pareto ratio, as given in Table 1. Since most of the networks emerging in a natural context follow the power law with the scale-free property, ordinary scale measures are meaningless. As an illustration, the speed of editing is not measured by the ordinary measure of average editing intervals but by the ratio of the number of edits in a certain time frame. Behavioral Measures A self-loop is a circling reflexive link, which, in Wikipedia’s case, is repeated circular editing by a single person before anyone else edits; the self-loop ratio is defined as the ratio of the number of self- loops to the total number of links. The reasons for self-loop editing may be multi-faceted; some people may do it without deliberate thinking before posting an idea, some may prefer to just post fast small increments, while some may find the article too interesting to pause for refinement. Overall, the act of self-loop editing may reflect the behavioral pattern of outgoingness, imprecision. The multiple-link ratio is the ratio of the number of repeated link pairs between the nodes to the total number of links, which implies dyadic collaboration. impatience and DISCUSSION is the least collective or The most collective country is Korea then China, and Japan the most individualistic. Korea is the most extraverted then China, and Japan. Again, Korea is the boldest then China, and Japan. Japan showed the least bold or highly deliberate. Japan exhibited the highest egalitarianism, and Korea and China showed the low egalitarianism. Behavioral network analysis can be a powerful tool for the analysis of human behavior related to performance. For teamwork as an example, structural aspects of degree, density and centrality may not be sufficient to explain the success or failure of a team but the behavior of team members involving traits such as patience, collaboration, speed, active participation, openness and equality may be a better indicator to explain the performance of a team. REFERENCES S. P. Borgatti, A. Mehra, D. J. Brass and G. Labianca, Network Analysis in the Social Sciences, Science 323 892 (2009). S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications (Cambridge University Press, 1994). A. L. Barabasi, Linked: The New Science of Networks (Perseus Books Group, 2002). G. Hopfstede and R. R. McRae, Personality and Culture Revisited: Linking Traits and Dimensions of Culture, Cross-Cultural Research 38:1 52 (2004). Acknowledgements: Supported by a Korea Research Foundation Grant, funded by the Korean Government (MEST)(KRF-2008-220-B00007). As explained previously, speed is defined as the ratio of the number of edits in a certain time interval, e.g. one hour, to the total number of edits, which may express the behavior of quickness. The active ratio is defined as the ratio of the number of editors with more than a certain number of edits, e.g. 10, to the total number of editors, which may represent the behavior of active participation or voluntary contribution. The anonymity ratio is the ratio of the number of anonymous editors without registration to the total number of editors, which may express the behavior of self-concealment and closedness. The Gini coefficient is a measure of the inequality of a distribution of the number of edits among the editors. CULTURAL INTERPRETATIONS Using the newly defined behavioral measures, we analyzed the behaviors of Wikipedia editors. For the analysis, we collected editing data of Wikipedia in 3 languages; Japanese, Chinese and Korean. In order to further explore online culture, cultural dimensions are explored and postulated from behavioral patterns which are extracted by combining the structural and behavioral measures. Also, grouping is performed on the cultural dimensions based on Ward’s minimum-variance cluster analysis, a hierarchical cluster analysis to show the proximity, and the maximum width indicates the optimal number of clusters. the Silhouette width criterion where studies, explored Considering the diverse cultural dimensions from the the online cultural previous culture dimensions are and postulated by combining structural and behavioral measures as follows; collectivism vs. individualism, extraversion vs. introversion, boldness vs. deliberation, and egalitarianism vs. inegalitarianism. Collectivism is explored by a structural measure of the clustering coefficient complemented by the collaborative behavior observed by the multiple link ratio, i.e. dyadic collaboration. Extraversion is assumed to be manifested by the combination of outgoing and revealing behavior, i.e. as represented by the self- loop ratio and (opposite) anonymity ratio. Boldness may be partially related with extraversion and is postulated from outgoing and fastness behavior, i.e. as represented by the combined the self-loop ratio and speed. Egalitarianism to be manifested by the combination of equal and non- concentrated as represented by the Gini coefficient and the Pareto ratio. is assumed i.e. contribution behavior,
1803.10738
1
1803
2018-03-28T17:23:37
Self-Representation on Twitter Using Emoji Skin Color Modifiers
[ "cs.SI" ]
Since 2015, it has been possible to modify certain emoji with a skin tone. The five different skin tones were introduced with the aim of representing more human diversity, but some commentators feared they might be used as a way to negatively represent other users/groups. This paper presents a quantitative analysis of the use of skin tone modifiers on emoji on Twitter, showing that users with darker-skinned profile photos employ them more often than users with lighter-skinned profile photos, and the vast majority of skin tone usage matches the color of a user's profile photo - i.e., tones represent the self, rather than the other. In the few cases where users do use opposite-toned emoji, we find no evidence of negative racial sentiment. Thus, the introduction of skin tones seems to have met the goal of better representing human diversity.
cs.SI
cs
Self-Representation on Twitter Using Emoji Skin Color Modifiers Alexander Robertson, Walid Magdy, Sharon Goldwater Institute for Language, Computation and Cognition School of Informatics, University of Edinburgh [email protected], {wmagdy, sgwater}@inf.ed.ac.uk 8 1 0 2 r a M 8 2 ] I S . s c [ 1 v 8 3 7 0 1 . 3 0 8 1 : v i X r a Abstract Since 2015, it has been possible to modify certain emoji with a skin tone. The five different skin tones were introduced with the aim of representing more human diversity, but some commentators feared they might be used as a way to negatively represent other users/groups. This paper presents a quantitative analysis of the use of skin tone modifiers on emoji on Twitter, showing that users with darker-skinned profile photos employ them more often than users with lighter-skinned profile photos, and the vast majority of skin tone usage matches the color of a user's profile photo-i.e., tones represent the self, rather than the other. In the few cases where users do use opposite-toned emoji, we find no evidence of negative racial sentiment. Thus, the introduction of skin tones seems to have met the goal of better representing human diversity. Introduction Emoji-icons used to represent emotions, ideas, or objects- became a formally recognized component of the Unicode Standard in 2010. At that time, all emoji depicting humans were rendered with the same yellow skin tone. However, in 2015, special modifier codes were introduced to allow users to change the skin tone of certain emoji. Unicode Technical Standard #51 (Davis and Edberg 2014), justified this on the grounds that "people all over the world want to have emoji that reflect more human diversity." Nevertheless, the change was not uncontroversial. Although skin tone modifiers can be used to make emoji more personal to reflect the identity of the user, in principle they can also be used to represent oth- ers. This possibility sparked fears in the mainstream media that users might engage in "digital blackface", negatively us- ing dark emoji for entertainment purposes (Princewill 2017; Dickey 2017)-if people would even use them at all (Zim- merman 2015). But despite this media and popular attention, and considerable academic investigation of emoji in general, we are not aware of any quantitative studies of how people actually use skin tone modifiers. In this paper, we present an analysis of how skin tone mod- ifiers are used in emoji on Twitter. In a sample of 0.6 billion tweets, we find that 42% of the 13 million tone-modifiable emoji (TME) tweeted in 2017 included skin tone modifiers (henceforth, we refer to these modified TME as TME+, in contrast to unmodified TME-) and the majority of these Figure 1: The current 102 tone-modifiable emoji. The first five rows are modified by a skin tone (shown in the left-most column), and the final row contains unmodified emoji. TME+ were light colors. By annotating the profile photos of 4,099 users and analyzing their tweet histories, we show that the overall prevalence of lighter skin tone modifiers is likely due to the prevalence of lighter-skinned users. Indeed, users with darker-skinned profile photos are more likely to use TME, and more likely to modify them. Moreover, the vast majority of TME+ are similar in tone to the user's profile photo, suggesting that TME+ are used overwhelmingly for self-representation. Finally, we analyze the sentiment of the small proportion of tweets containing opposite-toned emoji, and find that positive tweets outweigh negative. Overall, our findings suggest that the Unicode Consortium has success- fully met a real demand for diversity within emoji, with few negative consequences. Emoji and Skin Tones Recent years have seen significant academic interest in emoji. Studies show that emotional interpretation of some emoji is subject to ambiguity (Miller et al. 2017), that addition of emoji to messages (particularly neutral ones) can convey positive/negative tone and sentiment (Hu et al. 2017), and that popularity differences between emoji may be due to their relation to popular words (Ai et al. 2017). Resources commonly available for traditional language such as sense inventories have been compiled (Wijeratne et al. 2017) and emoji usage has been linked to personality traits (Marengo, Giannotta, and Settanni 2017). But despite three years since their introduction, TME have been unstudied until now. Not all emoji can have a skin tone. The traditional emoji Figure 2: Proportion of TME+ using each skin tone, by geographic region. faces (e.g. ) cannot be modified. The current Unicode Stan- dard defines 102 TME, some of which can be combined to create compound emoji (e.g. ) which can also be modified for skin color. Five skin tones, based on the six tones of the Fitzpatrick phototyping scale (Fitzpatrick 1988), are avail- able. We will refer to the five-scale tones as T1 (the lightest) to T5 (the darkest). Figure 1 illustrates the 102 available TME, showing how the tones affect them. Emoji are rendered differently across platforms, which can cause ambiguity in semantic interpretation-e.g., writ- ers/readers may perceive the expressed action or emotion differently (Miller et al. 2017). Since we are only concerned with skin color, we do not expect these ambiguities to be an issue in our study. However, there is slight variation in the rendering of specific skin tones across platforms. We there- fore cannot be sure of the precise tonal values observed by a user, although all platforms have exactly 5-scale tones, where T1 is lighter than T2, T2 lighter than T3, and so forth. Skin Tone Usage, Overall and By Region For our initial analysis we used the Twitter API (1% sample) to create Dataset A, from 1.04 billion tweets made between February and December 2017. This dataset contains 595m original (non-retweet) tweets made by 769m unique users. Of these, 83.3m (14%) contain at least one emoji and 13.1m (2.2%) contain at least one TME. 5.5m (42%) of TME were TME+. Lighter tones dominate: T1 and T2 account for 68% of all TME+. To gain a global view of TME usage by location, we used the Google Maps API to validate the location field of the authors of the 5.5m TME+ tweets 1. We located 169k users, then grouped them on the basis of broad geographic region (figure 2). Most regions follow the overall trend of using far more light tones. The exception is North America, where the distribution of tones is more uniform-though T5 still has relatively little usage, and is the least common tone world- wide. This raises the question of why lighter TME+ are used so much more than darker ones in all regions outside North America. These results would seem to contradict the hypoth- esis that TME+ are used for self-representation, since we might naıvely expect more dark-skinned users in Africa and Asia, whereas the TME+ being used are mainly light. How- 1Though this field is not necessarily reliable (users may travel or give a false location), our aim was to get a broad overview before the main analysis. ever, many countries (particularly in Africa) have lower levels of internet access compared to highly developed countries (such as those in North America)2, and access to the inter- net or modern devices can be even more limited for some ethnic groups due to political oppression (Weidmann et al. 2016) or poverty. So, it could simply be that in most regions, lighter-skinned internet users predominate. Another possible hypothesis for North America's more uniform TME+ distribution (although the demographics do not have similar distributions) is that people use TME+ to refer to both others and themselves. We investigate this hy- pothesis in the next section, looking more closely at TME usage on Twitter by comparing users' actual skin tone to that seen in their TME+. Skin Tone Modifiers for Self-Identification Since our goal is to better understand how TME relate to user identity, we randomly selected 10k users from Dataset A, subject to the condition that they had used at least one TME. Although we cannot perfectly determine the skin color of these users, we estimate it from their profile photos. We assume that photos of a single individual are self-portraits of the user. This might not be true in all cases, since users can use photos of others. We assume this practice is rare, with a negligible effect on our analysis. However, our annotation process was designed with this possibility in mind. We collected the Twitter profile pictures of the selected 10k users. These pictures were then annotated using Crowd- flower3. We instructed annotators to label as "invalid" images that might not represent the Twitter user. "Invalid" images include: non-human (e.g. animals, nature), celebrities, group photos, gray-scale images. Instructions were given before- hand, with examples of valid/invalid photos provided. If a picture was annotated as "valid", annotators compared it to an array of five TME+, as shown in Figure 3. We selected the example emoji for its overall lack of distracting features (e.g. little hair covering the face) and consistent appearance (all versions have the same hair/eye color). Each photo was annotated by at least three annotators. A set of 50 pre-annotated pictures was used to control the quality of the annotators. Only workers achieving over 90% accuracy on the screening pictures were accepted. 2World Bank, World Telecommunication Report, http:// data.worldbank.org/indicator/IT.NET.BBND.P2 3www.crowdflower.com TotalAfricaAsiaEuropeN.AmericaS.America0.00.10.20.30.40.50.6Proportionn = 168,869n = 8334n = 41,059n = 33,975n = 41,684n = 43,817 Figure 3: Example of Crowdflower annotation task. After the annotation process, we retained only those pic- tures annotated as valid where at least two annotators agreed on the same skin tone. The result was 4,099 annotated pic- tures. The inter-annotator agreements for these pictures were 98% for validity, 88% for user skin tone. Figure 4: Number of users (y-axis, log scale) who use TME+ a given proportion (x-axis) of the time. TME Usage Analysis We collected the historical tweets of the 4,099 annotated users using the Twitter API, to create Dataset B. This contains the tweets of these users from January 2018 back to April 2015-the time when TME were enabled. 5.86m original (non-retweet) tweets were collected in total. 2.46m tweets contained emoji, of which 479k contained TME. Before looking at the relationship between a user's skin tone and their use of TME, we first examined the overall usage of TME by user. The histogram in Figure 4 shows that, of the Dataset B users, roughly a quarter only ever use TME-, with about the same proportion always using TME+. The remaining users tend towards one end or the other. Next, we looked at how TME+ usage varies across users according to their annotated skin color. Figure 5 shows the proportion of users in each of the five skin color groups who tweeted at least one TME+. A clear trend is visible, where users with darker skin are more likely to use TME+ than those with lighter skin. In fact, 80+% of users with skin tone 4 and 5 use TME+ in their tweets, which shows the importance of this feature to them. However, not all TME are TME+. Thus, we examined users who use TME and computed the proportion of those tweets which are TME+. Figure 6 shows the percentage of TME+ vs TME- for each user group. Again, the same trend appears: darker skinned users tend to modify the skin tone of TME in their tweets much more than users with lighter skin. For instance, 82% of TME tweets by users with T4 skin change the skin tone of the emoji compared to only 52% of the white (T1 skin) users. This emphasizes how users with darker skin are keen to modify the appearance of their emoji, presumably in order to better reflect their own identity. TME+ for Self-Reference vs Referencing Others Finally, we looked at whether users' choice of modifiers reflects their own skin color or others. For each tone user, we determined the TME+ tone used most often by that user. Figure 7 shows a heatmap of the distribution of the most com- mon skin tones used by each user group in Dataset B. Overall, our results suggest that by far the most common scenario is Figure 5: Percentage of users in each skin tone group (1=light- est, 5=darkest) who used TME+ at least once. Black line (right-hand axis): number of users per group. Figure 6: Percentage of tweets with TME+ made by users in each skin tone group, out of all tweets with TME. Black line (right-hand axis): number of tweets per group. for users to choose skin tone modifiers that roughly match their own complexion, accounting for the variability in ren- dering of these tones across different platforms. There seems to be some tendency for users to choose modifiers towards the lighter end of the available spectrum; for example, users with skin tone 2 mostly select skin tone 1 in their emoji, and users of skin tone 5 mostly select skin tone 4 in their emoji. The (Non)-Prevalence of Digital Blackface The previous analysis shows that for nearly all users, their most common choice of skin tone matches their own skin. However, it still may be the case that users occasionally choose emoji of a different tone. We looked at how often this occurs, and whether there is any noticeable negative sentiment associated with this behavior. For this analysis, we aggregated Dataset B users into two groups based on skin tone: tones 4/5 (dark) and tones 1/2 (light). First, we analysed the tweets of each group that use TME+ with the skin tone of the other group. These comprise 1229 tweets for the dark-skinned users and 1,729 tweets for the light-skinned 05001,0001,5002,0002,5000%20%40%60%80%100%12345% users used applied TME+ for each user groupUsed TME+Never used TME+Users population050,000100,000150,000200,000250,0000%20%40%60%80%100%12345% tweets with TME+ among all tweets with TME% TME+% TME-Tweets volume picture is one where users take advantage of emoji skin tone modifiers to represent an important aspect of their identity, and do so differentially depending on their own skin tone: compared to light-skinned users (the majority on Twitter), a higher proportion of dark-skinned users use skin tone modi- fiers, and they use them more frequently. Here we grouped all geographic regions together in looking at user skin tone, but an interesting question for future work will be to examine the relationship between a user's majority/minority status within their real-life community (i.e., their geographic region) and their use of skin tone modifiers. Acknowledgements This work was supported in part by the EPSRC Centre for Doctoral Training in Data Science, funded by the UK En- gineering and Physical Sciences Research Council (grant EP/L016427/1) and the University of Edinburgh. References [Ai et al. 2017] Ai, W.; Lu, X.; Liu, X.; Wang, N.; Huang, G.; and Mei, Q. 2017. Untangling emoji popularity through semantic embeddings. AAAI press. [Davis and Edberg 2014] Davis, M., and Edberg, P. 2014. Proposed Draft Unicode Technical Report: Unicode Emoji. Technical Report 51, Unicode Consortium. [Dickey 2017] Dickey, M. 2017. Thoughts on white people using dark-skinned emoji. TechCrunch. [Fitzpatrick 1988] Fitzpatrick, T. 1988. The validity and practicality of sun-reactive skin types I through VI. Archives of Dermatology 124(6):869–871. [Hu et al. 2017] Hu, T.; Guo, H.; Sun, H.; Nguyen, T. T.; and Luo, J. 2017. Spice up your chat: The intentions and senti- ment effects of using emoji. CoRR abs/1703.02860. [Marengo, Giannotta, and Settanni 2017] Marengo, D.; Gian- notta, F.; and Settanni, M. 2017. Assessing personality using emoji: An exploratory study. Personality and Individual Differences 112:74 – 78. [Miller et al. 2017] Miller, H.; Kluver, D.; Thebault-Spieker, J.; Terveen, L.; and Hecht, B. 2017. Understanding emoji ambiguity in context: The role of text in emoji-related mis- communication. AAAI Press. 152–161. [Princewill 2017] Princewill, V. 2017. Is it OK to use black emojis and gifs? BBC News. [Thelwall, Buckley, and Paltoglou 2012] Thelwall, M.; Buck- ley, K.; and Paltoglou, G. 2012. Sentiment strength detection for the social web. Journal of the Association for Information Science and Technology 63(1):163–173. [Weidmann et al. 2016] Weidmann, N. B.; Benitez-Baleato, S.; Hunziker, P.; Glatz, E.; and Dimitropoulos, X. 2016. Dig- ital discrimination: Political bias in internet service provision across ethnic groups. Science 353(6304):1151–1155. [Wijeratne et al. 2017] Wijeratne, S.; Balasuriya, L.; Sheth, A. P.; and Doran, D. 2017. EmojiNet: An open service and API for emoji sense discovery. In ICWSM, 437–447. Figure 7: Most common emoji skin tone used vs perceived user skin tone, normalized by row sum. Figure 8: Distribution of non-neutral sentiment for English tweets containing lighter/darker TME+ but written by users having darker/lighter skin. users-a very small proportion of each group's tweets: 0.14% (light group) and 0.24% (dark group). Next, we examined the opposite-tone tweets in English and computed their sentiment using Sentistrength (Thelwall, Buckley, and Paltoglou 2012), which is designed specifically for analyzing short online messages such as Twitter posts. The majority of these tweets were neutral (almost 50% of the tweets of both groups). The distribution of the non-neutral sentiment of tweets for both groups are shown in Figure 8, where 4 is the most positive and -4 is the most negative4. As shown, the distributions for both groups are almost the same, and positive tweets outnumber negative ones. Inspection of tweets with negative sentiment revealed tweets on generally negative topics, rather than anything specifically about race. Overall, we find no evidence to justify fears of widespread "digital blackface" or its black-against-white counterpart. Conclusion In this paper we presented the first quantitative study on the usage of tone-modifiable emoji (TME) on Twitter. We showed that although lighter-toned emoji are more common overall, different populations of users (based on the skin color of their profile picture) show markedly different character- istics in how they use TME and to what extent. The overall 4Sentiment was rated on a -5:+5 scale but no tweets at the ex- tremes of this range were found in this subset of the data. 1234510.60.30.080.010.0071234520.50.20.20.030.008123453Skin tone of user0.20.10.50.20.021234540.030.010.30.60.0412345Emoji tone most often used50.030.0090.20.70.1-4.0-3.0-2.0-1.01.02.03.04.0Sentiment of tweet0.00.20.40.6Proportion1/2 using 4/54/5 using 1/2 [Zimmerman 2015] Zimmerman, J. 2015. Racially diverse emoji are a nice idea. But will anyone use them? The Guardian.
1811.12157
1
1811
2018-09-26T13:43:01
Universal Network Representation for Heterogeneous Information Networks
[ "cs.SI", "cs.AI", "cs.CL" ]
Network representation aims to represent the nodes in a network as continuous and compact vectors, and has attracted much attention in recent years due to its ability to capture complex structure relationships inside networks. However, existing network representation methods are commonly designed for homogeneous information networks where all the nodes (entities) of a network are of the same type, e.g., papers in a citation network. In this paper, we propose a universal network representation approach (UNRA), that represents different types of nodes in heterogeneous information networks in a continuous and common vector space. The UNRA is built on our latest mutually updated neural language module, which simultaneously captures inter-relationship among homogeneous nodes and node-content correlation. Relationships between different types of nodes are also assembled and learned in a unified framework. Experiments validate that the UNRA achieves outstanding performance, compared to six other state-of-the-art algorithms, in node representation, node classification, and network visualization. In node classification, the UNRA achieves a 3\% to 132\% performance improvement in terms of accuracy.
cs.SI
cs
Universal Network Representation for Heterogeneous Information Networks Ruiqi Hu†, Celina Ping Yu∗, Sai-Fu Fung(cid:63), Shirui Pan†, Haishuai Wang†, Guodong Long† † CAI, Faculty of Engineering & Info. Tech., University of Technology Sydney, Australia ∗ Global Business College of Australia, Australia {ruiqi.hu, haishuai.wang@student., shirui.pan, guodong.long}@uts.edu.au; [email protected]; [email protected] (cid:63) City University of Hong Kong, China 8 1 0 2 p e S 6 2 ] I S . s c [ 1 v 7 5 1 2 1 . 1 1 8 1 : v i X r a Abstract -- Network representation aims to represent the nodes in a network as continuous and compact vectors, and has attracted much attention in recent years due to its ability to capture complex structure relationships inside networks. How- ever, existing network representation methods are commonly designed for homogeneous information networks where all the nodes (entities) of a network are of the same type, e.g., papers in a citation network. In this paper, we propose a universal network representation approach (UNRA), that represents different types of nodes in heterogeneous information networks in a continuous and common vector space. The UNRA is built on our latest mutually updated neural language module, which simultaneously captures inter-relationship among homogeneous nodes and node- content correlation. Relationships between different types of nodes are also assembled and learned in a unified framework. Experiments validate that the UNRA achieves outstanding perfor- mance, compared to six other state-of-the-art algorithms, in node representation, node classification, and network visualization. In node classification, the UNRA achieves a 3% to 132% performance improvement in terms of accuracy. I. INTRODUCTION Information networks are ubiquitous in many areas, like medicine (protein-protein and neural networks) [10], [20], [29], social media (social network) [8], [24], [28] and aca- demic engines (paper citation and author connection net- works) [14], [19] and have a variety of applications, such as identifying protein residues [1], social media marketing [23], academic search engines and etc. To implement these applications, network representation of homogeneous informa- tion networks has been widely researched and employed. This research, aims to embed and represent homogeneous nodes with low-dimensional and unified vectors, while preserving the contextual information between nodes, and, as a result, classical machine learning methods can be directly applied. However, the majority of real world information networks are heterogeneous and multi-relational, with many examples in same areas mentioned above, such as DNA-protein interaction networks [15] in medicine or complete publication networks [9], [25], [27] in academic engines. The sources of nodes in these information networks vary but are interrelated. For instance, one example of a DNA-protein interaction network consists of two sources of nodes, DNA and proteins, and each source of homogeneous nodes is profiled by an independent network structure based on their inner reactions, say, a DNA network structure and a protein network structure. Further- more, the interactions between the heterogeneous nodes (DNA and protein) provide a more comprehensive, but complex, multi-relational heterogeneous network, with different sources of nodes, network structures and node contents. Publication networks have the same characteristics: two different sources of nodes (papers and authors) with two independent network expressions (paper citation networks and author collaboration networks) respectively according to their inner-reactions, while papers and authors are naturally connected by a heterogeneous network because of their inherent publication correlations. The obvious variety and complexity of multi-relational heterogeneous information networks (MHIN) limit existing network representation methods in two ways: (1) They can only leverage one perspective of data - either the network structure or the node content - which simply abandons the integrity of the network. (2) The final learned representation can only represent one of the sources of information - either the DNA or the protein in DNA-protein interaction networks; or the papers or the authors in publication networks. Most previous efforts have concentrated on persevering either the network structure or the node content. Network structure analysis-based methods are the more prevalent. Two very popular neural network language models were proposed in [12], [16], where deep learning techniques revealed advantages in natural language processing applications. Illuminated by that, a DeepWalk algorithm was proposed in [2] that learns latent representations of vertices from a corpus of generated random walks in network data. These algorithms only input network structures, without considering any content informa- tion affiliated with each node. Early content-based algorithms employ approaches like, topic model and bag-of-words, to encode each content docu- ment into a vector without considering contextual information (i.e., the order of documents or the order of words), or sub-optimizing the representations. To acquire the contextual information, features are modeled using context-preserving algorithms [4] -- [6], [16], [22] with a certain amount of con- secutive words to represent a document. Obviously, an ex- ponentially increasing number of content features for these algorithms will dramatically increase the training time and weaken performance. Within neural network architectures, alternative algorithms like skip-gram [16] input a certain window of consecutive Fig. 1. An illustrated example of a heterogeneous publication network. The network consists of three different sources of nodes(authors, papers and venues) with two independent network expressions(a paper citation network and an author collaboration network) according to their inner-reactions. Papers, authors and venues are naturally connected within a heterogeneous network because of their inherent publication correlations. We also leverage the content information of the nodes (the title and abstracts of the papers).The network representation is learned from the complete heterogeneous publication network and it simultaneously represents all the sources of the nodes. We then input an author into the network representation, which returns several authors, papers and venues that are most related to the given author. Any source of node can be input to return content from any node source. words in the sentences of a document to learn the repre- sentation of words. Recurrent neural network-based models, say, long short term memory(LSTM) [7] and gated recurrent unit(GRU) [11] are able to capture long term dependencies using internal memory to process arbitrary sequences of text input. Whether network structure exploration approaches or text analysis based ones with three obvious drawbacks identified in the mentioned algorithms: (1) only one source of the en- tire networked information has been leveraged, which lowers representation accuracy; (2) learned representations from these algorithms can only represent one type of network data (i.e., representations from a citation network only represent papers, but ignore authors and venues); and (3) the algorithms are unsupervised. No labeled data are even available to use, which misses the opportunity to enhance performance in tasks like classification. Recently, some methods have attempted to simultaneously consider network structures and node content information. TADW [30] proves that DeepWalk [2] can be processed by factorizing an approximate probability matrix where one node randomly walks to another in certain steps, and incorporates with feature vectors by factorizing a word-association matrix. However, this algorithm is not capable of processing large- scale data because matrix factorization is computationally expensive. It also ignores the contextual information in nodes. TriDNR [21] smoothly solves this problem simultaneously by learning the network structure and node contents in a neural network architecture. However, TriDNR only leverages one source of the network structure and the output only represents one type of network data. The challenges facing complete net- work data input into universal network representation learning are listed below: 1) Comprehensively integrate and feed the complete net- work data with heterogeneous but multi-relational node network structures, node contents and labels; 2) Generate a universal representation for all source of information in heterogeneous network data. In this paper, we propose a UNRA, a universal representa- tion model in heterogeneous networks, which uses mutually enhanced neural network architectures to learn representa- tions for all sources of nodes (DNA and proteins in DNA- protein interaction networks; papers and authors in publica- tion networks) for input heterogeneous networks. From the perspective of network structures, the UNRA jointly learns the relationship among homogeneous nodes and the connections among heterogeneous nodes by maximizing the probability of discovering neighboring nodes given a node in random walks. From the perspective of node content, the UNRA captures the correlations between nodes and content by exploiting the co- occurrence of word sequences given a node. To summarize, our contributions are as follows: 1) We propose a novel network representation model that simultaneously leverages different sources of network structures, node contents and labels in one heteroge- neous network; We propose a novel network representa- tion algorithm that simultaneously generates representa- tions for different sources of nodes in a heterogeneous given authoroutput authorsoutput papersoutput venuesNetwork Representationcontentsvenueauthorpaper network; 2) We conduct a suite of experiments from different per- spectives on real world data sets. The results of accuracy tests prove the effectiveness of our proposed UNRA, and a case study practically shows the implementation of the UNRA in a real world setting. An example demonstrating how the UNRA works in a multi- relational information network is shown in Fig.1. 2) The neural network model training inputs the com- plete multi-relational information network, and embeds the different types of nodes into one continuous vec- tor space. The information network consists of (1) all random walks of the network structures(the node rela- tionships); (2) the text node content corpus (the node- content correlation; (3)the label information to enhance performance in tasks like classification. II. PROBLEM DEFINITION A. Framework Architecture Given a multi-relational A multi-relational information network is defined as N = {Vk, Ek, Dk, S},where Vk = {vki}i=1,··· ,n consists of a set of nodes in the kth source of a network (i.e., V1 denotes the nodes in a citation network, which represents papers while V2 denotes the nodes in an authors network, which represents authors) and ek(i,j) =< vki, vkj >∈ Ek indicates an edge encoding the edge relationship between the nodes. dki ∈ Dki is a text document associated with each node vki and S = L ∪ U is the label information in the network data, where L denotes labeled nodes and U denotes unlabeled ones. Different sources of the network structures and the node contents are associated by an unique index according to their correlations. For example, all cited papers paperA, all authors of paperA, its title and abstract information, have the same unique index. information network defined as N = {Vk, Ek, Dk, S}, the purpose of network representation is to learn a low dimensional vector vvki ∈ Rr (r is a smaller number) for each node vki in kth source of networks. In this way, the nodes sharing connections, or with similar contents, stay closer to each other in the representation space. We as- sume that the network data are partially labeled, but the UNRA is still valid if the set of label S = ∅. An example of the type of heterogeneous information network used in this paper is illustrated in Fig.1. Specifically, each source of a node network structure, with its nodes and edges({Vk, Ek}), is independently extracted from the given heterogeneous information network to generate random walks {vk1, vk2, vk5,··· , vkn}. All sources of the text content associated with one node are integrated into one line to generate a text document {dki ∈ Dki}. Different sources of information are trained independently and multi-updated in the UNRA framework. The details will be explained in the following section. III. THE UNRA ALGORITHM In this section, we demonstrate the details of the algorithm for generating universal network representation for different types of nodes in multi-relational information networks by leveraging different sources of network structures, text node contents and label information. The essence of the UNRA algorithm is two-fold: 1) The random walk path generator inputs each source of network structure, and generates a succession of steps over the nodes. Each walk starts at a node vki and then randomly passes by other nodes each time. The node relationship is captured and stored in a random walk corpus. Since the number of node sources varies from network to network, we use a publication network with two sources of node (papers and authors) as an example to explain how the UNRA works. The general architecture is demonstrated in Fig2. Specifically, the UNRA has five steps in this publication network. The source of the paper nodes are denoted as k = 1, and the source of the author nodes are denoted as k = 2: 1) Papers(Nodes) Relationship Modeling Inspired by the idea of DeepWalk [2], we construct a random walk corpus S on all sources of the network structures. To treat each random walk path (v11 → v12 → v15 → ··· → v1n) as a sentence and each node v1n as a word, we use DeepWalk to train skip- gram models with a generated random walk corpus, obtaining a distributed vector representation for each node. The objective function maximizes the likelihood of the neighboring nodes, given a node v1i for the random walk corpus s ∈ S: L1 = log P(v1(i−b) : v1(i+b) v1i) i=1 s∈S (cid:88)N (cid:88)N (cid:88) (cid:88) = i=1 s∈S −b≤j≤b,j(cid:54)=0 log P(v1(i+j) v1i). (1) where N is the total number of nodes in 1th network. With a soft-max function, the probability of capturing the surrounding papers v1i−b : v1i+b given a paper v1i is calculated by (cid:88) P1(v1(i+j) vi) = (cid:80)N exp(v(cid:62) v=1 exp(v(cid:62) vv1(i+j) ) v1v ) v1i v1i (2) where vv1 is the output representation of the node v1 in the first source (the paper nodes) of the network. 2) Authors(Nodes) Relationship Modeling Following a very similar operation, the probability of finding the surrounding authors v2i−b : v2i+b given a author v2i is calculated by: P2(v2(i+j) vi) = exp(v(cid:62) v=1 exp(v(cid:62) vv2(i+j)) v2v ) (cid:80)N (3) v2i v2i where v2v represents the output representation of the author node v2 in the second source (the author nodes) of the network. 3) Paper-Contents Correlation Modeling We assemble all the text content associated with one node in one line. For example, in the citation data sets, the title and abstract information of the same paper are assembled into one line in the original order of words. Based on Mikolov's work [12], we aim to exploit the neighboring words(context information) within a certain window size, given a particular word. The objective function is achieved by maximizing the below log- likelihood: L2 = logP(wt−b : wt+b wt) (4) (cid:88)T t=1 where b is the window size and wt−b : wt+b is a sequence of words which wt is in the middle of. The conditional probability of sequence wt−b : wt+b given wt is calculated by: P(wt−b : wt+b wt) = P(wt+j wt) (cid:89) (5) which assumes contextual sequence is independent given word wt. The conditional probability of wt+j given wt is calculated: −b≤j≤b,j(cid:54)=0 P(wt+j wt) = (cid:80)W wtvwt+j ) exp(v(cid:62) w=1 exp(v(cid:62) wtvw) where vw and vw are the input and output word vectors of the given word w. Further, given a node vki, the conditional probability of capturing consecutive words wt−b : wt+b is: P(wj vt) = (cid:80)W exp(v(cid:62) vwj ) w=1 exp(v(cid:62) vki vki vw) (6) (7) where W is the total number of words in the entire network and Vwj is the representation of the word wj. 4) Label Information Correspondence Modeling We experimentally prove that label information, which is not leveraged in the majority of current relevant algorithms, could enhance the performance of network representation in tasks like classification. These results are shown in the next section. We input the label of each document with its corresponding text content to simultaneously learn the label and word vectors. The objective function to discover the document and label information can be calculated by: (cid:88)L (cid:88)N t=1 i=1 L3 = + logP(wi−b : wi+b si) logP(wi−b : wi+b vi) (8) where L is the set of label information and si is the label of node vi. Following a similar manipulation, the probability of capturing a word sequence given a label si is: P(wj si) = (cid:80)W exp(v(cid:62) vwj ) w=1 exp(v(cid:62) vsi si vw) (9) 5) Model Assembly The k node relationship models for k sources of each network structure, one node-content correlation model and one label-words correspondence model are assem- bled and mutual-influenced according to their unique correlation index. The final model inputs a complete multi-relational information network with the different sources of the network structures, node contents and label information, defined as N = {Vk, Ek, Dk, S}. The objective of the UNRA model is to maximize the log likelihood function: L = (1 − α) + (1 − α) logP(wi−b : wi+b vi) logP(wi−b : wi+b si) i=1 (cid:88)N (cid:88)L (cid:88)N t=1 (cid:88)K (cid:88) (cid:88) + α k=1 i=1 s∈S −b≤j≤b,j(cid:54)=0 (10) where α is the weight for balancing network structures, text contents and label information, and b is the window size of word sequence. The first term is used to calculate the conditional probability of capturing a sequence of consecutive words {wi−b : wi+b} given a word wj to model the correlation between a paper and its content, while the second is to model the label information cor- respondence by computing the probability of capturing a sequence of words given a label si. Finally differ- ent sources of the node relationships are modeled by calculating the sum of the probabilities of the captured neighboring nodes vki−b : vki+b in the kth source of node network given a node vk. log P(vk(i+j) vki). B. Algorithm Explanation Given a heterogeneous information network, the first three steps are corpus-generation work for different sources of information in the network. Step 1 generates corpus of random walks for each source of the node networks. Steps 2 and 3 generate Huffman binary trees for content and label corpus to significantly save computation costs when computing soft- max equations in Steps 9 to 11(the details are described in the Optimization section). Steps 3 to 6 initialize the vectors for k sources of the nodes, contents and labels respectively. After this preparation work is done, Steps 9 to 11 iteratively optimize the objective functions explained in Eq.(10) to model the relationship between the different sources of the information. Step 9, in particular, discovers the inter-relationship between homogeneous nodes by fixing the word representation vwj and the label representation vci while solving Eq.(10) to update the node representation. Through a similar manipulation, Steps 10 and 11 find the node-content relationships and the label correlations by separately solving the hierarchical soft-max function using a stochastic gradient method. C. Optimization Stochastic gradient descent (SGD) [3] is used to model the relationships between different sources of information (homogeneous and heterogeneous nodes, and the correlations between nodes and contents)Eq.(10), the UNRA performs many expensive computations for conditional probabilities (Eq.(2),Eq.(3),Eq.(7),Eq.(9)). To solve this problem, we took Fig. 2. The CiteSeerX-Avs data set result comparison. From left to right: network graphs from Deepwalk, the Doc2Vec, Deepwalk + Doc2Vec, Tridnr and UNRA. Each color represents a group. The purer the color of a group, the better the performance. ENTERPRISE SOCIAL NETWORK DATASETS USED IN THE PAPER TABLE I Data Set DBLP CiteSeerX-Avs CiteSeerX-M10 #Paper Nodes #Author Nodes #Paper Edges #Author Edges #Content words 56,503 18,720 10,310 58,279 40,139 21,289 106,752 54,601 77,218 142,581 41,458 21,966 3,262,885 2,649,720 1,516,893 #Labela 4 5 10 Fig. 3. Average performance on different percentage of training data of UNRA and six baselines. the advantage of hierarchical soft-max [17], [18] which builds Huffman trees instead of nodes vectors (authors, papers and words).The path to the leaf node vvki can then be represented with a sequence of vertices passing through (s0 → s1 → s2 → ··· → send), where s0 is the root of the tree and send is the target node vvki. This can be computed by the following: P(v = vvki ) = (11) We can further model P(st vvki ) with a binary classifier as a sigmoid function, and the time complexity reduces from O(V ) to O(n log n). t=1 P(st vvki ) (cid:89)end IV. EXPERIMENTAL STUDY The experiments are based on three real world publication data sets. The reported results show (1) the UNRA outperforms the state-of-the-art network representation algorithms based on different techniques in machine learning tasks like node classification; (2) network representation by the UNRA can represent different sources of nodes in heterogeneous networks and this unique characteristic can be very effective and useful in real world applications. TableI provides summarized details of data sets. Algorithm 1 UNRA: Universal Network Representation for Multi-relational Information Networks Require: N = {Vk, Ek, Dk, S}: A heterogeneous information network; n: Expected Number of Dimension; b: Size of Windows; T : Number of Iterations; K: Number of sources of network structure; len: Walk Length of Random Walk each node vki ∈ Vk 1: Generate Random Walk Corpus Sk from kth source of network 2: Generate a Vocabulary Binary Tree Tw 3: Generate Node Binary Trees Tvk 4: Initial input vector vvki ∈ Rr and output vector vvki ∈ Rr for 5: Initial output vector vwj ∈ Rr for each word wj ∈ W 6: Initial input vector vci ∈ Rr for each label class ci 7: for iterator = 1,2,3, ······ , T do 8: 9: for k = 1,2, ······ , K do Fix vwj and vci, solve Eq.(10) to update vvki and vvki; //inter-node relationship Fix vvki and vci, solve Eq.(10) to update vvki and vwj ; // node content correlation Fix all k vvki and vvki, solve Eq.(10) to update vci and vwj ; // label and content correlation 10: 11: end for 12: 13: end for 14: return vvi ∈ Rr,vk ∈ V ,∀vi ∈ V A. Experimental Settings Datesets: We built multi-relational heterogeneous informa- tion networks from three real world publication data sets [13], [14] which each consist of two sources of nodes (authors and papers), two sources of node contents (titles and abstracts), each containing natural label information within the data sets. Different sources of network structure and node content were associated by a unique index according to their correlations. For example, all cited papers paperA, all authors of paperA and its title and abstract information have the same unique index. Further, we combined two sources of the node content (title and abstract) into one line associated with the same index, for simplicity, as both sources of contents were text in this case. However, the different sources of content can be separately in the UNRA model. 1) Baselines: The UNRA was compared to the for paper following network representation algorithms node classification: (1)Network exploration methods: LINE [26]: The state-of-the-art network representation method, designed for embedding very large information networks into low-dimensional vector spaces. DeepWalk [2]: A novel approach for learning latent representations of vertices in a network. These latent representations encode social relations in a continuous vector space (2)Text modeling methods: Doc2Vec [12]: An unsupervised algorithm that learns fixed length feature representations from variable-length pieces of texts, such as sentences, paragraphs, and documents. (3)Methods that consider both network structure and content: TriDNR [21]: A deep network representation model that simultaneously considers network structure and node content within a neural network architecture DeepWalk + Doc2Vec: An approach that simply links different and Doc2Vec TADW [30]: An approach that incorporates the text features of vertices into network representation and learns in a matrix factorization framework. from DeepWalk representations learned 2) Evaluation: We conducted paper node classification and employed Macro F1 and Micro F1 [31] to evaluate the performance of the UNRA with all baselines. We varied the percentages(from 10% to 50%) of the random nodes with labels and the rest will be unlabeled. The complete multi- relational information network will be fed to learn network representation while getting node vectors from baseline al- gorithms. A linear SVM classifier was applied to perform the classification on learned vectors. We repeated each experiment 20 times under the same parameter setting and used the mean value as the final score for each algorithm. 3) Parameter Settings: Training sizes impacted the perfor- mance significantly. We varied the training size from 10% to 50% for the UNRA and the baselines to learn the accuracy trends. The updated weights for the models for different sources of information were practically set to 0.8. B. Experimental Results These experiments compare network representation algo- rithms that independently consider network structure [2], [26], node content [12] and both structure and content [21], [30], by varying the training size from 10% to 50% with three different complete publication information network in a paper nodes classification task. UNRA achieved outstanding performance, increasing the accuracy from 3% compared to TriDNR, 14.6% compared to Doc2Vec, 69.8% compared to LINE to 132% compared to DeepWalk on the DBLP data set. The Macro F1 and Micro F1 scores are illustrated in Tables II and III, and the average performance on the CiteSeerX-M10 data set is demonstrated via the bar charts in Fig.3. The visualization for the paper nodes classification on CiteSeerX-Avs data set (see Fig. 2) intuitively indicates similar results. Each color represents a group and it is obvious that nodes in different groups mix significantly in term of DeepWalk, while the colors in each group are relatively clearer for tridnr, Doc2Vec, but not as clear as the result from UNRA. These results clearly indicate that methods that only con- sider one view of heterogeneous information networks, or a simple combination of the methods (Doc2Vec + DeepWalk) are sub-optimal for multi-relational information networks. The strategy UNRA employs by training different sources of in- formation and using theor inner relations to update each other, dramatically improves performance in node classification. C. Case Study The generated UNRA representation has been tested for its ability to detect the most related heterogeneous nodes in multi-relational networks, whatever the source of given a node. This is achieved by computing the cosine similarity between a simple mean of the projection weight vectors of the given node and the vectors for each node in the model. Given the similarity scores, we can directly capture the heterogeneous nodes that are most related to given node regardless of the source. As our experiments were based on publication data sets, we derived three tests for our UNRA representation: (1) given a paper, return the most related authors and other papers; (2) given an author, return the most related papers and other authors; and (3) given more than one nodes, returns the most other related heterogeneous nodes. First, we input a paper into the representation, Boolean functions and artificial neural networks published by Martin Anthony in CDAM 2003. The most related papers are other versions of this paper which has been slightly renamed, Con- nections between Neural Networks and Boolean Functions, also first-authored by M. Anthony. The similarity score was around 0.961%. The most related author is, with no surprise, M. Anthony with a 0.939% similarity. Despite the paper's other versions and co-authors of the paper, the output included a paper by the same author: Probabilistic Analysis of Learning in Artificial Neural Networks: The PAC Model and its Variants TABLE II MACRO F1 DBLP Training size 10% 20% 30% 40% 50% UNRA 0.732 0.732 0.736 0.739 0.742 TriDNR 0.715 0.727 0.730 0.736 0.738 Doc2Vec(DV) 0.638 0.644 0.643 0.643 0.650 DeepWalk(DW) 0.385 0.320 0.317 0.308 0.320 DV+DW LINE 0.431 0.439 0.445 0.446 0.446 0.659 0.669 0.668 0.668 0.675 TADW 0.670 0.698 0.709 0.711 0.712 TABLE III MICRO F1 DBLP Training size 10% 20% 30% 40% 50% UNRA 0.791 0.792 0.795 0.797 0.798 TriDNR 0.777 0.787 0.788 0.793 0.798 Doc2Vec(DV) 0.717 0.722 0.722 0.722 0.724 DeepWalk(DW) 0.455 0.478 0.478 0.479 0.482 DV+DW LINE 0.488 0.494 0.498 0.499 0.511 0.728 0.737 0.736 0.739 0.740 TADW 0.662 0.670 0.711 0.705 0.716 and other authors with same research direction like Dr. Simone Fiori who published Topics in Blind Signal Processing by Neural Networks. We also input the author Dr. Steve Lawrence and the most related author nodes were three of his co-authors Sandiway Fong(0.960% similarity), A. C. Tsoi(0.885% similarity) and C. Lee Giles (0.895% similarity). Together they have pub- lished papers like On the applicability of neural network and machine learning methodologies to natural language process- ing (0.879% similarity) and Natural language grammatical inference with recurrent neural networks (0.813% similarity)), which were also included in the outputs. Despite the citation and co-author relationship, papers and authors with very similar research direction but no direct citation or co-work relationships were also output. For ex- ample, a paper, Unsupervised Learning in Recurrent Neural Networks, was input to return the author Felix A. Gers who published the paper Kalman filters improve LSTM network performance in problems unsolvable by traditional recurrent nets. The output author was not in the author list of the given paper, meanwhile the papers from the given and output had a very similar research direction - recurrent neural network - with no citation relationship to one another. Through checking these two papers, we found they both specifically focus on long short term memory (LSTM). The most interesting results came when we simultaneously input more than one node into the UNRA representation. Two papers were input: Unsupervised Learning in Recurrent Neural Networks with no mention of natural language processing in its title or the abstract; and Empirical Learning of Natural Language Processing Tasks again not related to neural net- works. The top returned authors were the authors of given two papers : Walter Daelemans, Magdalena Klapper-Rybicka, Nicol N. Schraudolph, Antal Van Den Bosch, Ton Weijters. In terms of the most related papers, beyond the other versions of the given papers, the results returned were papers that use neural network approaches for natural language processing OUTPUTS FROM REPRESENTATIONS. THE MATCHED IS MARKED WITH (cid:12) TABLE IV Input: Learning in Neural Networks URHN: 1. Adjoint-Functions and Temporal Learning Algorithms in Neural Net- works (cid:12) 2. Bit-Serial Neural Networks (cid:12) 3. An Information-theoretic Learning Algorithm for Neural Network Clas- sification (cid:12) 4. Polynomial Time Algorithms for Learning Neural Nets (cid:12) 5. Training of Large-Scale Feed-Forward Neural Networks (cid:12) Doc2Vec: 1. Non-Cumulative Learning in METAXA.3 2. Learning Filaments 3. Learning of Kernel Functions in Support Vector Machines 4. Incremental Learning in SwiftFile 5. Learning While Searching in Constraint-Satisfaction-Problems DeepWalk: 1. Estimating image motion from smear: a sensor system and extensions 2. Inferring 3D Volumetric Shape of Both Moving Objects and Static Background Observed by a Moving Camera 3. Secure face biometric verification in the randomized Radon space 4. An Ensemble Prior of Image Structure for Cross-Modal Inference 5. Closed Non-derivable Itemsets like Natural networks. language processing with subsymbolic neural We also compared the results from the UNRA with the baseline algorithms. The results are listed in TableIV. We input a paper, Learning in Neural Networks (published by Dr. J. Stephen Judd), into each representation and selected the top five most related papers. The results from the UNRA were all relevant to learning in neural networks, while the resulting papers from Doc2Vec and DeepWalk were not really related to the input paper. All tests were conducted on the same UNRA representation. [15] N. M. Luscombe, R. A. Laskowski, and J. M. Thornton. Amino acid -- base interactions: a three-dimensional analysis of protein -- dna interac- tions at an atomic level. Nucleic acids research, 29(13):2860 -- 2874, 2001. [16] T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013. [17] T. Mikolov, A. Joulin, S. Chopra, M. Mathieu, and M. Ranzato. Learning longer memory in recurrent neural networks. arXiv preprint arXiv:1412.7753, 2014. [18] F. Morin and Y. Bengio. Hierarchical probabilistic neural network language model. In Aistats, volume 5, pages 246 -- 252. Citeseer, 2005. [19] S. Pan, J. Wu, X. Zhu, and C. Zhang. Graph ensemble boosting for IEEE transactions on imbalanced noisy graph stream classification. cybernetics, 45(5):954 -- 968, 2015. [20] S. Pan, J. Wu, X. Zhu, C. Zhang, and S. Y. Philip. Joint structure feature exploration and regularization for multi-task graph classification. IEEE Transactions on Knowledge and Data Engineering, 28(3):715 -- 728, 2016. [21] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang. Tri-party deep network representation. Network, 11(9):12, 2016. [22] S. Pan and X. Zhu. Graph classification with imbalanced class distribu- tions and noise. In Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, pages 1586 -- 1592. AAAI Press, 2013. [23] S. Papadopoulos, Y. Kompatsiaris, A. Vakali, and P. Spyridonos. Com- munity detection in social media. Data Mining and Knowledge Discov- ery, 24(3):515 -- 554, 2012. [24] S. Parthasarathy, Y. Ruan, and V. Satuluri. Community discovery in social networks: Applications, methods and emerging trends. In Social network data analytics, pages 79 -- 113. Springer, 2011. [25] R. E. Rice, C. L. Borgman, and B. Reeves. Citation networks of com- munication journals, 1977 -- 1985 cliques and positions, citations made and citations received. Human communication research, 15(2):256 -- 283, 1988. [26] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web, pages 1067 -- 1077. ACM, 2015. [27] B. Verspagen. Mapping technological trajectories as patent citation networks: A study on the history of fuel cell research. Advances in Complex Systems, 10(01):93 -- 115, 2007. [28] H. Wang, J. Wu, S. Pan, P. Zhang, and L. Chen. Towards large-scale social networks with online diffusion provenance detection. Computer Networks, 2016. [29] H. Wang, P. Zhang, X. Zhu, I. W.-H. Tsang, L. Chen, C. Zhang, and X. Wu. Incremental subgraph feature selection for graph classification. IEEE Transactions on Knowledge and Data Engineering, 29(1):128 -- 142, 2017. [30] C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang. Network representation learning with rich text information. In Proceedings of the 24th International Joint Conference on Artificial Intelligence, Buenos Aires, Argentina, pages 2111 -- 2117, 2015. [31] Y. Yang. An evaluation of statistical approaches to text categorization. Information retrieval, 1(1-2):69 -- 90, 1999. V. CONCLUSION In this paper, we proposed a UNRA, a novel network representation algorithm leveraging multiple-sources of infor- mation in multi-relational heterogeneous network data. Our survey shows current network representation works normally only consider one aspect of the information - network struc- ture or node content - within a whole network, while the learned representation only represents one source of the nodes. The network representation from the UNRA learned from all sources of information in a network, and represents all sources of nodes in the network. Experimental results prac- tically show that the UNRA outperforms the state-of-the-art peer algorithms, and that the characteristic of representing all sources of heterogeneous nodes can be very effective and useful in real applications. Our key contributions are summarized by three points:(1) We propose a novel network representation model that simultaneously leverages different sources of network structures, node contents and labels in one heterogeneous network; (2) We propose a novel network representation algorithm that simultaneously generates a repre- sentation for all sources of nodes in a heterogeneous network; and (3) We conduct a thorough suite of experiments from different perspectives on real world data sets. The results of our accuracy tests prove the effectiveness of our proposed UNRA and a case study practically shown the implementation of our UNRA in a real world setting. REFERENCES [1] G. Amitai, A. Shemesh, E. Sitbon, M. Shklar, D. Netanely, I. Venger, and S. Pietrokovski. Network analysis of protein structures identifies functional residues. Journal of molecular biology, 344(4):1135 -- 1146, 2004. [2] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. Journal of machine Learning research, 3(Jan):993 -- 1022, 2003. [3] L. Bottou. Stochastic gradient learning in neural networks. Proceedings of Neuro-Nımes, 91(8), 1991. [4] L. Chi, B. Li, and X. Zhu. Context-preserving hashing for fast text classification. In SDM, pages 100 -- 108. SIAM, 2014. [5] H. Chim and X. Deng. Efficient phrase-based document similarity for IEEE Transactions on Knowledge and Data Engineering, clustering. 20(9):1217 -- 1229, 2008. [6] M. Damashek. Gauging similarity with n-grams: Language-independent categorization of text. Science, 267(5199):843, 1995. [7] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735 -- 1780, 1997. [8] R. Hu, S. Pan, G. Long, X. Zhu, J. Jiang, and C. Zhang. Co- clustering enterprise social networks. In Neural Networks (IJCNN), 2016 International Joint Conference on, pages 107 -- 114. IEEE, 2016. [9] N. P. Hummon and P. Dereian. Connectivity in a citation network: The development of dna theory. Social networks, 11(1):39 -- 63, 1989. [10] H. Jeong, S. P. Mason, A.-L. Barab´asi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41 -- 42, 2001. [11] R. Kiros, Y. Zhu, R. R. Salakhutdinov, R. Zemel, R. Urtasun, A. Tor- In Advances in neural ralba, and S. Fidler. Skip-thought vectors. information processing systems, pages 3294 -- 3302, 2015. [12] Q. V. Le and T. Mikolov. Distributed representations of sentences and documents. In ICML, volume 14, pages 1188 -- 1196, 2014. [13] M. Ley. The dblp computer science bibliography: Evolution, research issues, perspectives. In International Symposium on String Processing and Information Retrieval, pages 1 -- 10. Springer, 2002. [14] H. Li, I. Councill, W.-C. Lee, and C. L. Giles. Citeseerx: an architecture and web service design for an academic document search engine. In Proceedings of the 15th international conference on World Wide Web, pages 883 -- 884. ACM, 2006.
1904.08139
1
1904
2019-04-17T08:50:28
Understanding the Signature of Controversial Wikipedia Articles through Motifs in Editor Revision Networks
[ "cs.SI" ]
Wikipedia serves as a good example of how editors collaborate to form and maintain an article. The relationship between editors, derived from their sequence of editing activity, results in a directed network structure called the revision network, that potentially holds valuable insights into editing activity. In this paper we create revision networks to assess differences between controversial and non-controversial articles, as labelled by Wikipedia. Originating from complex networks, we apply motif analysis, which determines the under or over-representation of induced sub-structures, in this case triads of editors. We analyse 21,631 Wikipedia articles in this way, and use principal component analysis to consider the relationship between their motif subgraph ratio profiles. Results show that a small number of induced triads play an important role in characterising relationships between editors, with controversial articles having a tendency to cluster. This provides useful insight into editing behaviour and interaction capturing counter-narratives, without recourse to semantic analysis. It also provides a potentially useful feature for future prediction of controversial Wikipedia articles.
cs.SI
cs
James R. Ashford [email protected] School of Computer Science and Informatics, Cardiff University, UK Alun Preece [email protected] Crime and Security Research Institute, Cardiff University, UK Networks Liam D. Turner [email protected] School of Computer Science and Informatics, Cardiff University, Diane Felmlee [email protected] UK USA Roger M. Whitaker [email protected] School of Computer Science and Informatics, Cardiff University, UK Don Towsley [email protected] Understanding the Signature of Controversial Wikipedia Articles through Motifs in Editor Revision 9 1 0 2 r p A 7 1 ] I S . s c [ 1 v 9 3 1 8 0 . 4 0 9 1 : v i X r a Dept. of Sociology & Criminology, Pennsylvania State University, College of Information and Computer Sciences, University of Massachusetts Amherst, USA ABSTRACT Wikipedia serves as a good example of how editors collab- orate to form and maintain an article. The relationship be- tween editors, derived from their sequence of editing activity, results in a directed network structure called the revision network, that potentially holds valuable insights into editing activity. In this paper we create revision networks to assess differences between controversial and non-controversial ar- ticles, as labelled by Wikipedia. Originating from complex networks, we apply motif analysis, which determines the un- der or over-representation of induced sub-structures, in this case triads of editors. We analyse 21,631 Wikipedia articles in this way, and use principal component analysis to consider the relationship between their motif subgraph ratio profiles. Results show that a small number of induced triads play an important role in characterising relationships between edi- tors, with controversial articles having a tendency to cluster. This provides useful insight into editing behaviour and in- teraction capturing counter-narratives, without recourse to semantic analysis. It also provides a potentially useful feature for future prediction of controversial Wikipedia articles. KEYWORDS Network Motifs, Wikipedia, Controversy, Complex Networks This paper is published under the Creative Commons Attribution 4.0 Inter- national (CC-BY 4.0) license. Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA © 2019 IW3C2 (International World Wide Web Conference Committee), published under Creative Commons CC-BY 4.0 License. ACM ISBN 978-1-4503-6675-5/19/05. https://doi.org/10.1145/3308560.3316754 ACM Reference Format: James R. Ashford, Liam D. Turner, Roger M. Whitaker, Alun Preece, Diane Felmlee, and Don Towsley. 2019. Understanding the Signa- ture of Controversial Wikipedia Articles through Motifs in Editor Revision Networks. In Companion Proceedings of the 2019 World Wide Web Conference (WWW '19 Companion), May 13 -- 17, 2019, San Francisco, CA, USA. ACM, New York, NY, USA, 8 pages. https: //doi.org/10.1145/3308560.3316754 1 INTRODUCTION Wikipedia has become a tremendous platform for crowd- sourcing knowledge, representing a cornerstone of the World Wide Web [7]. It allows the "wisdom of the crowd" [24] to potentially emerge, providing intelligence on a vast range of topics [4]. However, complex dynamics support the emer- gence of content, since the formation of Wikipedia articles involves both human cooperation and human conflict, based on the extent of convergent and divergent views. Narrative and counter-narrative frequently jostle for presence in a ar- ticles, representing a source of friction that is seen through editor interaction [22] and in the semantics of article content [20]. Wikipedia conveniently provides a list of controver- sial content that are labelled by the Wikipedia community themselves1. In an age of misinformation [1, 17, 26], understanding characteristics of controversial articles has increased in im- portance. Because of the controversial nature of some topics, the narrative in a Wikipedia article may contain misleading information that stops a neutral consensus emerging. Prior work in this area has established insights such as the pre- dictability of controversy from editor behaviour [20], such as deletions, reversions, and statistics from the collabora- tion network, prediction of article quality taking insights 1https://en.wikipedia.org/wiki/Wikipedia:List_of_controversial_issues WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Ashford et al. Editor A Editor B Editor C Editor D Figure 1: A network generated using the editor order A, B, D, A, C, A, from newest edit to oldest. Each editor is char- acterised by a letter A to D, and each occurrence in the list marks a single revision of the article by the corresponding author. An edge is formed between the current editor and its adjacent neighbour in the sequence, forming the directed edges (A, B),(B, D),(D, A),(A, C),(C, A). from multiple models [29], and interactions between users, bots, admin and pages [9]. There has also been a number of different types of network developed to assess Wikipedia articles, including collaboration networks [6] that capture the positive or negative relationship between editors, edit networks that capture "undoing" of edits by a third party [12] and affiliation networks [10]. Our focus in this paper is to further understand the rela- tionship between small groups of editors, as induced by their editing sequences, by using a revision network. This does not require information on the nature of the editing undertaken - it simply captures the ordering in which editing occurs and is therefore a simple metric to infer. Editors are represented by nodes and a directed edge from node A to B indicates that "Editor A edits the article after Editor B" (see Figure 1). From this, we seek to determine the extent to which controversial articles exhibit a distinctive signature relative to those that are deemed non-controversial. There has already been some consideration of revision networks in the literature [8, 11], where more recently the emphasis [27] has been to combine them with other network representations. However, given the fundamental nature of revision networks, it is interesting to question the extent to which they hold sufficient information to characterise controversial Wikipedia articles. Currently this is not well- understood, and motivates our work. Hypotheses We hypothesise that interaction differences between small sub- groups of Wikipedia editors is sufficient to distinguish between controversial articles and non-controversial articles. To ad- dress this we consider the extent to which revision networks of Wikipedia articles have different local induced substruc- tures based on their having controversial classifications. Our approach is based on techniques from complex networks [15, 16], that have been successful in classifying diverse and complex biological networks based on their latent induced subgraphs. To achieve this at scale, and in contrast to previous lit- erature [9, 20, 22], we assess a relatively large sample of Wikipedia articles, involving over 21,000 Wikipedia articles, by determining their subgraph ratio profiles. Each such pro- file represents the under and over representation of induced triads in the revision network of a Wikipedia article using 13 dimensions of connected triads, while also normalising for differences in network size. Understanding the relationship between Wikipedia arti- cles is important, as it allows us to determine the extent to which they may cluster. The sample we are considering represents 21,631 articles each represented in 13 dimensions. Therefore we perform dimensionality reduction, and project the subgraph ratio profiles into lower dimensional spaces. This allows us to examine the relationship both within and between controversial and non-controversial articles. The results draw attention to distinctive clustering pat- terns concerning controversial Wikipedia articles. We further assess the results by examining the correlation with a range of variables, allowing to understand the role of substructures. The findings reaffirm that the sequence of editing provides an important mechanism to understand Wikipedia articles, independent of an article's topic and without recourse to semantic analysis. 2 RELATED WORK Understanding the content of crowd-sourced platforms such as Wikipedia and the behaviour of their contributors is of wide research interest [24]. Wikipedia represents a dynamic network of articles with a structure resembling that of the World Wide Web [30], whereby dominant articles act as connectivity hubs. Dynamics also exist within the formation and maintenance of individual Wikipedia articles, through open and collaborative editing. Interactions between editors range from positive to neg- ative, where debates and arguments lead to different pat- terns of revision (e.g., [14, 20]), capturing behaviours such as vandalism [19] and the propagation of disinformation [13]. Characterising articles and contributors through revisions provides a means for Wikipedia to manage and review its Understanding Wikipedia Articles through Motifs WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Figure 2: 13 possible combinations of connected triads in directed networks. content. This is potentially labour intensive and has led to interest in creating and exploiting methods to detect issues (e.g.,[2, 23]). Controversial articles have become an increasing point of focus, and characterised as such by Wikipedia. Automated methods for classifying articles have received much attention (e.g., [21, 27, 29]. The associated revision log for Wikipedia ar- ticles has been shown to provide a basis to examine potential controversy through examining the collaborative behaviour of individual editors within an article [23] or across multiple articles [28]. An article's revision log identifies the structure underlying temporal interactions [27], and provides insight into how articles and contributors' habits may evolve over time [9]. Features from the aggregation of this, such as num- ber of edits, revision, and previous version restorations have been shown to correlate (e.g., [23]). Treating the revision log as a network between editors [22] has been shown to provide additional useful features using graph theory and social network analysis techniques (e.g., [21]). This has ranged from global features such as the degree distribution (e.g., [23]), through to analysis of local sub-structures concerning the articles with which editors interact (e.g., [28]). However, there has been little investigation of controver- sial articles based on the under or over representation of local-substructures. Called network motif analysis, this ap- proach originated from biology [5, 15], and has been used to good effect in characterising other complex networks, in- cluding technology (e.g., [18]). In terms of Wikipedia, motif analysis has been used to determine how articles point to each other [30] and in assessing interactions between edi- tors and different Wikipedia articles [28]. Our contribution is two-fold: firstly to use motif analysis to understand the fundamental revision networks, and secondly to consider the role of motifs in differentiating between controversial and non-controversial articles. 3 METHODS Dataset We collected revision history logs and article meta-data of a sample of Wikipedia articles (N = 21, 631) through Wikipedia's web API2. The revision logs contain time-series 2https://en.wikipedia.org/w/api.php events and meta-data attributing the revision to a particu- lar user at a given time. Within this set of articles, a subset (N = 2, 661) are considered to be 'controversial' as they are listed in Wikipedia's "List of controversial issues"1. The re- maining articles (N = 18, 970) are random articles that are not contained in the controversial issue list to serve as a basis for comparison. These were taken from an original sample of 23,000 articles (20,000 non-controversial and 3,000 controversial), from which articles were removed if they did not contain sufficient information for motif analysis. Network Construction For each article, we construct a revision network (in the same manner as [11, 27]) where nodes represent unique editors and directed edges show that an editor added a revision after another editor. We traverse the revision log list to build a network that spans the article's lifetime, adding nodes and edges as they appear in each event. Specifically let the revision network of a Wikipedia article be defined by G = (V , E), where each editor is represented by a node v ∈ V . An edge (vi , vj) ∈ V indicates that editor vi edits the article after editor vj. This excludes self-loops and editor vi editing after editor vj multiple times does not result in a multi-edge. A simple example can be found in Figure 1, which de- scribes how the network is constructed. Two extreme ex- amples from the dataset shown in Figures 3a and 3b. This form of representation is potentially useful as large articles do not typically follow a linear or incremental structure. For example, it is highly likely that users will restore work back to an earlier revision should a revision become vandalised or irrelevant. Editors are likely to refer back to previous edi- tor's work. These behaviours result in complex sequential patterns that are captured through revision networks. Network Motif Analysis Network motif analysis focuses on determining the under or over representation of induced subgraphs [5, 16], as com- pared to an alternative sample of graphs (i.e., a null-model that acts a relevant baseline for comparison). Dyads, triads and tetrads are often considered as induced subgraphs such over and under-represented induced subgraphs are called network motifs or anti-motifs. In this analysis, we examine each article's revision network using triads, representing how all possible triples of editors may sequentially interact. Triads are sufficiently large enough to capture both direct WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Ashford et al. (a) A revision network taken from the non- controversial The Web Conference Wikipedia article. (b) A revision network taken from the contro- versial Brexit Wikipedia article. The large vol- ume of editors produces a highly dense clus- ter of interactions. Figure 3: Revision network of two articles - one non controversial and one controversial. and indirect reciprocity between editors, while not being of a scale that is impeded by combinatorial complexity - there are 13 possible connected triads, shown in Figure 2. The coded names listed in Figure 2 are provided as part of the convention used in the triad census algorithm [3]. For each article, we calculate the subgraph ratio profile (SRP) as defined by Milo et al [15]. This accounts for varia- tions in network size. This is achieved by determining the relative abundance of each type of triad compared to random graphs generated by the null-model. For each type of triad i, we firstly calculate ∆i: ∆i = (Nreali− < Nrandi >) (Nreali + < Nrandi >) + ϵ (1) where Nreali is the number of such triads observed in the graph under observation, and Nrandi is the average fre- quency of such triads seen across the sample of networks composed by the null model. In this case the null model uses 100 random graphs with the same number of nodes and edges as the graph under observation. The value of ϵ is set to 4 [15, 25] to prevent the result from being mislead- ingly large when a subgraph rarely appears. This process is repeated for each triad i and normalised across triads to form the subgraph ratio profile (SRP) for a given network. The ith SRP, denoted SRPi, denotes the extent of under or over representation of the triad i, and is defined by: SRPi = ∆i/( i )1/2. ∆2 (2) Article comparison and dimensionality reduction The SRP composed for each article provides a 13-dimensional vector whose components indicate the extent of triad rep- resentation relative to networks in the null model. To as- sess these collectively, we use principal component analysis (PCA) that allows the SRPs to be considered in a lower di- mensional space. We apply three and two dimensional PCA. Finally, we make comparison with a number of external vari- ables (number of editors/nodes, age of article, and revision rate) to understand potential correlations with motifs. 4 RESULTS Subgraph Ratio Profiles We first examine the SRPs that arise from both controversial and non-controversial articles in isolation (Figures 4 and 5 respectively). To find significant triads, we use a cutoff value of +0.3 and -0.3. We determine that controversial articles are strongly represented by triads 111D, 111U and 201, which attain average SRP scores of 0.382, 0.375, 0.372, with relatively low dispersion (SDs of 0.136, 0.149 and 0.124 respectively). Interestingly, together these represent a chain of three nodes, where one edge is reciprocated, with the other edge covering all possible directional types (i.e., reciprocated, directed in, directed out). In contrast, the results for the non-controversial articles provide a different profile. Here 021D and 021U are signif- icantly under represented (average SRP scores of -0.511, - 0.485), albeit with higher standard deviations present (SDs Understanding Wikipedia Articles through Motifs WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Figure 4: Subgraph ratio profiles of all controversial articles. Average displayed in red. Figure 5: Subgraph ratio profiles of all non-controversial ar- ticles. Average displayed in red. Figure 7: PCA scatter plot repression of the 13-point feature vector in 3D clustering space. Figure 6: Subgraph ratio profiles of all articles, with con- troversial articles displayed in red and non-controversial in black. of 0.192, 0.2). Interestingly these anti-motifs (021D and 021U) relate to a lack of subgraphs where directed edges either emanate from or are received by a single node in the triad. Such configurations relate to the role of a mediating editor that may be presented with or respond to the editing of oth- ers. In other words, such mediators have a reduced role in non-controversial articles. The comparison between these subgraph ratio profiles is shown in Figure 6. These profiles are quite distinct. We also calculate the Pearson correlation coefficient for each distinct pair of articles in three groups - controversial articles, non- controversial articles and all articles. Controversial articles provide the greatest correlation to each other (M=0.41193, SD=0.41262). Non-controversial articles have a lower mean correlation (M=0.37498, SD=0.36749) which is similar to the result when considering all articles together (M=0.37569, SD=0.36844). Principal Component Analysis We analyse the 21,631 subgraph ratio profiles to determine the relationship in terms of relative clustering. We apply PCA in order to reduce the 13 dimensions of the SRPs down to a more manageable form. We initially project the SRPs into 3-dimensional space for clarity, as seen in Figure 7. This presents a distinctive region where controversial articles are dominant. This provides evidence for a distinction between the controversial and non-controversial articles, consistent with the variation in motifs identified in the previous section. The PCA coefficients (Table 1) that define the three di- mensions reveals that principal component one (x axis in Figure 7) primarily depends on triads 111D and 111U. Princi- pal component two (y axis in Figure 7) primarily depends on triad 021C. The third principal component primarily depends on triads 021C and 030C. However, we also note that when represented in the three dimensional space, the revision net- works have limited dispersion in the third dimension (i.e., vertical dimension as plotted). Calculating the percentage of explained variance by prin- cipal component confirms that the first principal component produces 53.7% of the shared variance, the second produces 22.3% and the third produces the least with 6.7%. This con- firms that the third principal component provides a limited contribution to representation of the total variance across the significant ratio profiles. This supports representation through two principal components, as plotted in Figure 8, with the relative composition of each principal component being near identical to PC-1 and PC-2 in Table 1. As antic- ipated, this is similar dependency on the first and second primary components in the three dimensional representa- tion. Representation in two dimensions further clarifies the dis- tinction between controversial and non-controversial revi- sion networks. In particular, from Figure 8 we note that both classes of article exhibit a similar maximum and minimum range against principal component two, which is primar- ily defined by the linear path between three nodes (021C). However, it is the variation in the first principal component, dominated by 111D and 111U, which represent linear paths WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Ashford et al. Table 1: PCA coefficients displaying the strongest triads 021D 021U 021C 111D 111U 030T 030C 0.332 0.205 0.104 0.427 0.074 0.441 0.509 -0.278 -0.398 0.522 -0.242 -0.332 -0.126 0.643 -0.609 0.145 0.207 0.136 PC-1 PC-2 PC-3 0.321 0.438 0.127 201 0.318 -0.052 0.115 120D 120U 120C 210 0.078 0.117 0.074 0.059 0.131 0.167 0.204 0.047 0.19 0.079 0.06 0.130 300 0.065 0.06 0.112 Figure 9: Scatter plot of each principal component combined with node count for both non-controversial and controver- sial articles. Figure 8: PCA scatter plot repression of the 13-point feature vectors in 2D clustering space. with reciprocation on one edge, that differentiate the non- controversial from controversial. High values in principal component one correlate with controversial articles - in other words, controversial articles exhibit more reciprocation on top of possible linear paths. Additional Metrics We examine the relationship between revision networks and primary external variables (number of editors/nodes, age of article, and revision rate) using motifs. Specifically, using the dimensions of two-dimensional PCA analysis, we examine the correlation with the external variables, and how this differs between controversial and non-controversial articles. The results are shown in Figures 9, 10 and 11. The greatest differences between controversial and non- controversial articles occur with respect to article age (Figure 10). Here, controversial articles with high age cluster against high values of principal component one, and to some ex- tent this occurs for principal component two. This contrasts against the clustering seen for non-controversial articles. Figure 10 also shows that controversial articles have a ten- dency to be older. The high values in principal component Figure 10: Scatter plot of each principal component com- bined with article age for both non-controversial and con- troversial articles. one and two which align with dense clustering of contro- versial articles show that while such articles accumulate the linear revision path between authors (021C which dominates principal component two), controversial articles also accumu- late instances of linear paths where one edge is reciprocated (i.e., 111D and 111U which dominate principal component one). Understanding Wikipedia Articles through Motifs WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA listed above, correspond to linear paths, i.e., open triads which represent sequences of editing without indirect reci- procity. The extent and format of reciprocated (i.e., bidirec- tional) edges on these open triads is sufficient to define the two principal components. The dominant triads in the first principal component each involve reciprocation on one edge, where as interestingly, in the second principal component, the dominant triads are open triads with no reciprocated edges. From this we deduce that short paths, rather than short loops of editing that represent indirect reciprocity, are important features in characterising Wikipedia revision net- works. We also observe through two-dimensional principal com- ponent analysis that it is the first principal component that strongly distinguishes between the revision networks of con- troversial and non-controversial articles. The dominant tri- ads defining this capture the extent of direct reciprocation being present. Finally, through consideration of the prin- cipal components against additional external variables, we find in particular that article age plays a role in distinguish- ing the controversial articles. High values in both principal components aligns with strongest clustering of controversial articles, which is not the case for non-controversial articles. 6 CONCLUSION The analysis has given insights into the structure underlying revision networks from Wikipedia articles, and has shown that a relatively small number of features, in terms of sub- structures in revision networks, characterise controversial Wikipedia articles. The results have identified key clusters of editorial interactions to this effect, in support of the hy- pothesis. These are distinctive and indicate that the revision networks for controversial and non-controversial Wikipedia articles have differentiated subgraph ratio profiles. Our study gives understanding as to how prediction or classification of articles can be enhanced using the latent structures relating to editor behaviour. This also reaffirms the importance of the revision network as a simple but useful representation for assessment of Wikipedia articles. ACKNOWLEDGEMENTS This research was sponsored by the U.S. Army Research Labora- tory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon. Figure 11: Scatter plot of each principal component com- bined with edit rate (mean number of edits per month) for both non-controversial and controversial articles. 5 DISCUSSION Motif analysis of revision networks gives insight into how the temporal editing relationship between small groups of Wikipedia authors create signatures that allow controversial articles to be distinguished. In contrast to previous work, we have investigated this using a relatively large sample of Wikipedia articles, where distinct patterns emerge. This provides strong support for our hypothesis, and reaffirms the importance of the revision network as a simple but fun- damental element in editing Wikipedia. Through motif analysis, we identify that reciprocation on linear paths among triads of editors in the revision network is over represented in controversial Wikipedia articles. These motifs are defined by the triads 111D, 111U and 201. In con- trast, the revision networks from non-controversial articles exhibit two anti-motifs, involving the under representation of triads involving two directed edges either arriving at or emanating from a mediating node (triads 021D and 021U). These motifs and the underlying subgraph ratio profiles rep- resent an unusual and distinctive profile that we believe represent distinctive "super-families" beyond those seen in other technologically related networks, such as the world wide web [30]. Performing dimensionality reduction upon the subgraph ratio profiles from each revision network allows us to fur- ther understand the relationships between Wikipedia articles. Our analysis shows that the structure of the data is amenable to reduction to two dimensions, where the principal com- ponents are dominated by triads 111D and 111U in the first component, and mainly 021C in the second component, but with lesser contributions from triads 021D and 021U. The results from two-dimensional principal analysis are il- luminating - the dominant triads in both components, as WWW '19 Companion, May 13 -- 17, 2019, San Francisco, CA, USA Ashford et al. REFERENCES [1] Daron Acemoglu, Asuman Ozdaglar, and Ali ParandehGheibi. 2010. Spread of (mis)information in social networks. Games and Economic Behavior 70, 2 (2010), 194 -- 227. [2] B Thomas Adler, Luca De Alfaro, Santiago M Mola-Velasco, Paolo Rosso, and Andrew G West. 2011. Wikipedia vandalism detection: Combining natural language, metadata, and reputation features. In In- ternational Conference on Intelligent Text Processing and Computational Linguistics. Springer, 277 -- 288. [3] Vladimir Batagelj and Andrej Mrvar. 2001. A subquadratic triad cen- sus algorithm for large sparse networks with small maximum de- gree. Social Networks 23, 3 (2001), 237 -- 243. https://doi.org/10.1016/ S0378-8733(01)00035-1 [4] Daren C Brabham. 2008. Crowdsourcing as a Model for Problem Solving: An Introduction and Cases. Convergence 14, 1 (2008), 75 -- 90. [5] Dave Braines, Diane Felmlee, Don Towsley, Kun Tu, Roger M Whitaker, and Liam D Turner. 2018. The role of motifs in understanding behavior in social and engineered networks. In Next-Generation Analyst VI, Vol. 10653. International Society for Optics and Photonics, 106530W. [6] Ulrik Brandes, Patrick Kenis, Jürgen Lerner, and Denise Van Raaij. 2009. Network analysis of collaboration structure in Wikipedia. In Proceedings of the 18th international conference on World wide web. ACM, 731 -- 740. [7] Anhai Doan, Raghu Ramakrishnan, and Alon Y. Halevy. 2011. Crowd- sourcing Systems on the World-Wide Web. Commun. ACM 54, 4 (April 2011), 86 -- 96. [8] Takashi Iba, Keiichi Nemoto, Bernd Peters, and Peter A Gloor. 2010. Analyzing the creative editing behavior of Wikipedia editors: Through dynamic social network analysis. Procedia-Social and Behavioral Sci- ences 2, 4 (2010), 6441 -- 6456. [9] David Jurgens and Tsai-Ching Lu. 2012. Temporal Motifs Reveal the Dynamics of Editor Interactions in Wikipedia. [10] Gerald C Kane and Sam Ransbotham. 2016. Research noteâĂŤcontent and collaboration: an affiliation network approach to information quality in online peer production communities. Information Systems Research 27, 2 (2016), 424 -- 439. [11] Brian Keegan, Darren Gergle, and Noshir Contractor. 2012. Staying in the loop: structure and dynamics of Wikipedia's breaking news collab- orations. In Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration. ACM, 1. [12] Aniket Kittur, Bongwon Suh, Bryan A Pendleton, and Ed H Chi. 2007. He says, she says: conflict and coordination in Wikipedia. In Proceed- ings of the SIGCHI conference on Human factors in computing systems. ACM, 453 -- 462. [13] Srijan Kumar, Robert West, and Jure Leskovec. 2016. Disinformation on the web: Impact, characteristics, and detection of wikipedia hoaxes. In Proceedings of the 25th international conference on World Wide Web. International World Wide Web Conferences Steering Committee, 591 -- 602. [14] David Laniado, Riccardo Tasso, Yana Volkovich, and Andreas Kaltenbrunner. 2011. When the wikipedians talk: Network and tree structure of wikipedia discussion pages.. In Sixth International AAAI Conference on Weblogs and Social Media. 177 -- 184. [15] Ron Milo, Shalev Itzkovitz, Nadav Kashtan, Reuven Levitt, Shai Shen- Orr, Inbal Ayzenshtat, Michal Sheffer, and Uri Alon. 2004. Superfamilies of evolved and designed networks. Science 303, 5663 (2004), 1538 -- 1542. [16] Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri Chklovskii, and Uri Alon. 2002. Network motifs: simple building blocks of complex networks. Science 298, 5594 (2002), 824 -- 827. [17] Delia Mocanu, Luca Rossi, Qian Zhang, Marton Karsai, and Wal- Collective attention in the age of ter Quattrociocchi. 2015. (mis)information. Computers in Human Behavior 51 (2015), 1198 -- 1204. [18] Derek O'Callaghan, Martin Harrigan, Joe Carthy, and Pádraig Cunning- ham. 2012. Network Analysis of Recurring YouTube Spam Campaigns. In Sixth International AAAI Conference on Weblogs and Social Media. [19] Martin Potthast, Benno Stein, and Robert Gerling. 2008. Automatic van- dalism detection in Wikipedia. In European conference on information retrieval. Springer, 663 -- 668. [20] Hoda Sepehri Rad and Denilson Barbosa. 2012. Identifying Controver- sial Articles in Wikipedia: A Comparative Study. In Proceedings of the Eighth Annual International Symposium on Wikis and Open Collabora- tion (WikiSym '12). ACM, New York, NY, USA, Article 7, 10 pages. [21] Hoda Sepehri Rad and Denilson Barbosa. 2012. Identifying controver- sial articles in Wikipedia: A comparative study. In Proceedings of the eighth annual international symposium on wikis and open collaboration. ACM, 7. [22] Hoda Sepehri-Rad and Denilson Barbosa. 2015. Identifying Controver- sial Wikipedia Articles Using Editor Collaboration Networks. ACM Trans. Intell. Syst. Technol. 6, 1, Article 5 (March 2015), 24 pages. [23] Hoda Sepehri-Rad and Denilson Barbosa. 2015. Identifying contro- versial Wikipedia articles using editor collaboration networks. ACM Transactions on Intelligent Systems and Technology (TIST) 6, 1 (2015), 5. [24] James Surowiecki and James. 2005. The wisdom of crowds. Anchor Books. 306 pages. https://dl.acm.org/citation.cfm?id=1095645 [25] Kun Tu, Jian Li, Don Towsley, Dave Braines, and Liam D. Turner. 2018. Network classification in temporal networks using motifs. In Proceedings of the 3rd ECML/PKDD Workshop on Advanced Analytics and Learning on Temporal Data. [26] M Del Vicario, A Bessi, F Zollo, F Petroni, A Scala, and G Caldarelli. 2016. The spreading of misinformation online. Proc National Academy of Sciences 113, 3 (2016). [27] Guangyu Wu and Pádraig Cunningham. 2015. Integration of multiple network views in Wikipedia. Knowledge and Information Systems 45, 2 (2015), 473 -- 490. [28] Guangyu Wu, Martin Harrigan, and Pádraig Cunningham. 2011. Char- acterizing Wikipedia pages using edit network motif profiles. In Pro- ceedings of the 3rd international workshop on Search and mining user- generated contents. ACM, 45 -- 52. [29] Guangyu Wu, Martin Harrigan, and Pádraig Cunningham. 2012. Clas- sifying Wikipedia articles using network motif counts and ratios. In Proceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration - WikiSym '12. [30] Vinko Zlatić, Miran Božičević, Hrvoje Štefančić, and Mladen Domazet. 2006. Wikipedias: Collaborative web-based encyclopedias as complex networks. Physical Review E 74, 1 (2006), 016115.
1705.02399
1
1705
2017-05-05T21:13:44
Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks
[ "cs.SI" ]
Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger correlation to the probability of influence as well as the ability to predict influence.
cs.SI
cs
Temporal Analysis of Influence to Predict Users' Adoption in Online Social Networks Ericsson Marin1, Ruocheng Guo1, and Paulo Shakarian1 Arizona State University, Tempe, Arizona, USA Abstract. Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger correlation to the probability of influence as well as the ability to predict influence. Introduction 1 Research has shown that measures which leverage the people's ego network cor- relate with influence - the confidence at which their neighbors adopt a new behavior [1]. In this paper, we introduce two time constraints to improve these measures: Susceptible Span and Forgettable Span. Susceptible Span (τsus) refers to the interval when people receive social signals from their neighbors (possi- ble influencing actions), blinding individuals to no more interesting connections. Forgettable Span (τf os) refers to the interval before an influencer's action is for- gotten by his neighbors, due to human brain limitation. These constraints define evolving graphs where influence is better measured, as illustrated in Figure 1. Fig. 1. At time t, the ego node 0 has no neighbors. At t + 1, he has 1 neighbor (node 1 at the bottom). From this moment, node 0 will be aware about node 1' actions. At t+2, node 0 has 2 neighbors, nodes 1, 2. This cumulative process continues until t + 5 when node 1 is no more a neighbor of node 0, since τsus was defined as 4. After this time limit, node 0 cannot visualize actions of node 1 anymore. The illustration also shows the node 0's memory inside the balloons. As we made τf os = 2, node 2 (activated at t + 2) fades away from node 0's memory after t + 4, when node 0 is no longer influenced by him. Therefore, at t + 7, node 0 is activated only by nodes 3, 4 and 5. The contributions of this paper are: we introduce a framework to consider τsus and τf os in social influence; we examine the correlation of 10 social network mea- sures to influence under different conditions; we compare the adoption prediction performance of our method with others [1,2,3], showing relevant improvements. For instance, we obtained up to 92.31% gain in correlation of a simple count of the "active" neighbors with the probability of influence. Considering adoption prediction, F1 score improves from 0.606 (using the state-of-the-art [1]) to 0.689 for active neighbors. Similar results are found for the other measures analysed. 22112123tt + 1t + 2t + 3123t + 4345234t + 55345t + 6642000000034456t + 7702Inactive User (Non Adopter)Active User (Adopter)-sus= 4fos= 2 2 This paper is structured as follows: Section II presents the related work. Sec- tion III formalizes a framework to consider the time constraints in our networks. Section IV presents the experimental setup to produce samples. Section V intro- duces the social influence measures and their corresponding gains in correlation coefficient. Section VI details the classification experiments and results for the adoption prediction problem. Finally, section VII concludes the paper. 2 Related Work Many works have been proposed to measure social influence and predict users' adoption. For instance, the seminal work of Kempe et al. [4] describes two pop- ular models for diffusion in social networks that were generalized to the General Threshold Model. In this model, the collective influence from a node's infected neighbors will trigger his infection once his threshold is exceeded. Later, Goyal et al. [3] leveraged a variety of models based on pair-wise influence probabil- ity, finding the probability of adoption increases with more adopters amongst friends. With an alternative approach, Zhang et al. [1] proposed the influence locality, developing two instantiated functions based on pair-wise influence but also on structural diversity to predict adoptions. Comparing two different per- spectives, Fink et al. [2] proposed probabilistic contagion models for simple and complex contagion, with the later producing a superior fit for themed hashtags. In these works, the authors slightly explored the dynamic aspect of social influence. Here, we take the next steps to apply a pair of time constraints to our networks, finding that influence is better measured and predicted dynamically. 3 Framework for Consideration of Time Constraints In this section, we describe the notations of this work. We denote a set of users V , as the nodes in a directed network G = (V, E), a set of topics (hashtags) Θ, and a set of discrete time points T . We will use the symbols v, θ, t to represent a specific node, topic and time point. With nodes being active or inactive w.r.t θ, an active node (adopter) is a user who retweeted a tweet with θ. We denote an activity log A (containing all retweets) as a set of tuples of the form (cid:104)v1, v2, θ, t(cid:105), where v1, v2 ∈ V . It describes that "v1 adopted θ retweeting v2 at time t", creating a directed edge (v1, v2) ∈ E. The intuition behind this edge is that v1 can be influenced by v2 with respect to θ(cid:48), if v2 eventually adopts θ(cid:48) after t. Finally, we integrate into our model the two proposed time constraints τsus and τf os. Due to them, the neighborhood of a user can change over time, affecting the social influence measures that result in his decision to adopt a topic. This way, we define the set of neighbors of a node v at time t as: ηv,t = {v(cid:48) ∃(cid:104)v, v(cid:48), θ, t(cid:48)(cid:105) ∈ A, s.t. t(cid:48) ≤ t and t − t(cid:48) ≤ τsus} ηv,t is the set of users whose adoptions since t − τsus until t will be presented to v. After t(cid:48) + τsus, the adoptions of v(cid:48) will not influence v. Then, we introduce ηθ v,t as the set of users that can influence v to adopt θ at time t as: v,t = {v(cid:48) ∈ ηv,t(cid:48) ∃(cid:104)v(cid:48), v(cid:48)(cid:48), θ, t(cid:48)(cid:48)(cid:105) ∈ A, s.t. t(cid:48) ≤ t(cid:48)(cid:48), t(cid:48)(cid:48) − t(cid:48) ≤ τsus, t(cid:48)(cid:48) ≤ t and t − t(cid:48)(cid:48) ≤ τf os} ηθ Consequently, after t(cid:48)(cid:48) +τf os, the fact that v(cid:48) adopted θ is forgotten by v, with v(cid:48) no more influencing v in terms of θ. Using these generated dynamic networks, we want to measure the influence produced by the individuals' active neighbors. 4 Experimental Setup This section details our dataset, how we collect samples using different values for the time constraints, which filters of users' activity are applied, and how we measure correlation of our features with probability of adoption. 3 Dataset description. The dataset we use is provided by [5]. It contains 1,687,700 retweets (k), made by 314,756 users (the histogram fits a power-law with pk ≈ k−1.8), about 226,488 hashtags on Twitter, from March 24 to April 25, 2012. Sampling. Following previous works [1], we create balanced sets of samples for our experiments. For a given activity (cid:104)v, v(cid:48)(cid:48), θ, t(cid:105) which corresponds to a positive sample, we create a negative sample uniformly getting a user v(cid:48) from the (cid:9). This set includes all users under set:(cid:8)v(cid:48)v ∈ ηθ v(cid:48),t ∧ (cid:104)v(cid:48), u, θ, t(cid:48)(cid:105) (cid:54)∈ A,∀u ∈ ηθ v(cid:48),t influence of v w.r.t θ at t, who did not adopted θ in our dataset. Then, we create (cid:104)v(cid:48), v, θ, t(cid:105) as the related negative sample for (cid:104)v, v(cid:48)(cid:48), θ, t(cid:105), keeping the same timestamp for both users to have similar intervals to accumulate influence. Filters. In addition, we apply 4 filters to exclude users with less actions than a given threshold, as their behaviors are hardly explainable by influence measure- ments [2]. We label R30, R60 for users who retweeted at least 30 or 60 times, and H20, H40 for users who retweeted at least 20 or 40 hashtags respectively. This also enables us to test the robustness of τsus, τf os under a variety of conditions. Correlation between measures and adoption probability. Here, we study how each time constraint correlates with probability of adoption using the Pear- son correlation coefficient. The idea is to identify the values for τsus and τf os ∈ {8, 16, 24, 48, 72, 96, 120, 144, 168, 336, 504, 720} (hours), that produce high qual- ity influence measurements (high positive correlation with adoption probability). Influence Measures 5 Table 1 describes the 10 measures (in 7 categories), which we use to estimate the influence in users' active neighborhood. We define the measures based on the activity a = (cid:104)v, v(cid:48), θ, t(cid:105) by which we create samples. Then, we show the gain (or loss) of correlation coefficient by heat maps, plotting the 144 combinations of τsus and τf os. Cells in the right lower corner have values = 0, as (τsus, τf os) = (720, 720) equals to applying no time constraints (data comprises of 720 hours). Figure 2(a) shows the heat maps for filters R60 and H40 with the gain (or loss) of correlation coefficients between Number of Active Neighbors (NAN) and probability of adoption. Previous work with no time constraints [3,2] argue that a positive correlation is expected here. Even so, many cells present gains for both filters, where combinations of τsus and τf os boost NAN 's ability to explain users' behaviors under influence. Moreover, hot red cells dominate the left lower region of both heat maps where τsus and τf os are relatively high and low respectively, especially when τsus ≥ 168 and τf os ≤ 48, with gains in [9.84%, 92.31%]. Figure 2(b) presents the heat maps for Personal Network Exposure (PNE). Similar to NAN, hot red cells are mainly distributed where τsus >= 168 and τf os <= 24. Although the gains are smaller, in [1.18%, 11.76%], we show how PNE obtains high gains in classification performance. From this moment on, we plot the heat maps only for filter R60, since we get similar results for H40. 4 Table 1. Categories of Features. Category Connectivity Number of Active Neighbors [3] N AN θ Feature Formula v,t Personal Network Exposure [6] P N Eθ v,t Temporal Continuous Decay of Influence [3] CDIθ v,t = Recorrence Previous Reposts [7] Transitivity Closed Triads [7] CLT θ v,t Clustering Coefficient [7] CLCθ v,t Centrality Hubs [7] HU Bθ v,t where tl is the time when the latest neighbor in ηθ and σ is the globally longest identified time-delay for adoption. (cid:104)v, u, θ(cid:48) , t(cid:48)(cid:105) P RRθ adopted θ, v,t v,t v,t v,t exp( σ ) v,t v,t u∈ηθ u∈ηθ {u,z}∈ηθ v,t ,u(cid:54)=z −(tl−tu ) (cid:80) t(cid:48)≤t f ((u, z)θ t = ηθ ηθ ηv,t =(cid:80) =(cid:80) θ(cid:48)(cid:80) =(cid:80) ) =(cid:8) 1, if (cid:104)u, z, θ, t(cid:48)(cid:105) ∈ A ∧ t(cid:48) ≤ t =(cid:80) ) =(cid:8) 1, if (cid:104)u, z, θ, tz(cid:105) ∈ A ∧ tz ≤ t =(cid:80) (cid:110) 1, if(cid:80) θ(cid:48)(cid:80) =(cid:80) 0, otherwise u∈ηθ g((u,z)θ t 2 ηθ (cid:80) {u,z}∈ηθ 0, otherwise 0, otherwise t(cid:48)≤t ,u(cid:54)=z x∈V h(u, t) v,t v,t v,t ) and ) and f ((u, z)θ t g((u, z)θ t h(u, t) = where γ being the minimal number of messages retweeted. Upon some analysis, we made γ = 104, corresponding to 0.042% of all retweets. To reach this value, users should be retweeted at least. M U Rθ i(u, t) =(cid:8) 1, if (cid:104)u, v(cid:48) , θ, t(cid:48)(cid:105) ∈ A ∧ t(cid:48) ≤ t u∈ηθ i(u, t) and v,t v,t 0, otherwise = P (ηθ ) ACCθ where the function P (V (cid:48) ) : V (cid:48) → C maps the set of nodes V (cid:48) v,t v,t to the set of strongly connected components C. and (cid:104)x, u, θ(cid:48) , t(cid:48)(cid:105) >= γ Reciprocity Mutual Reposts [7] Structural Active Strong Connected Diversity Components Count [8] Active Strongly Connected Components Ratio [8] ACRθ v,t = P (ηθ ) P (ηv,t) v,t Figure 2(c) shows the heat map for Continuous Decay of Influence (CDI). Highest gains in [1.72% 60.34%] are observed when τsus ≥ 168 and τf os ≤ 96. Fig. 2. Gains (red) or losses (blue) of correlation between each social influence measure and adoption probability when the time constraints are applied. Figure 2(d) shows the heat map for Previous Reposts (PRR). There is a slight tendency that higher values to τf os and lower values τsus result in higher when compared to the previous features, with gains in [4.76%, 156%]. 5 Figure 2(e) presents the heat map for Closed Triads (CLT). Higher gains in [3.33%, 233.33%] are spread through the majority of cells. However, we can still observe best gains distributed over the area where high values of τsus and low values of τf os are found, specially when τsus >= 144 and τf os <= 48. Figure 2(f) shows the heat map for Clustering coefficient (CLC). Small values for both time constraints produce higher correlation gains in [4.84%, 66.67%]. Figure 2(g) presents the heat map for Hubs (HUB). We again observe the hot spots where τsus and τf os are relatively high and low respectively, with τsus >= 96 and τf os <= 48. Gains in [21.05%, 488.24%] are the highest. Figure 2(h) presents the heat map for Mutual Reposts (MUR), another cu- mulative measurement whose correlation increases with both time constraints. However, we can observe higher gains in [1.61%, 35.48%] found in the area where the values of τsus are relatively high and the values of τf os are intermediate. Figure 2(i) shows the heat map for Active Strong Connected Components Count (ACC). Hot cells are found where τsus and τf os are relatively high and low respectively, mainly when τsus >= 168 and τf os <= 24, with gains in [9.09%, 300%]. Figure 2(j) presents the heat map for Active Strong Connected Components Ratio (ACR). The gains in [1.47%, 45.59%] are spread through the cells, mainly where values of τsus and τf os are both relatively small. 6 Classification Experiments This section presents our classification experiments and results for the adoption prediction task, detailing training and testing sets and baselines comparisons. Training and testing. Our 10 social influence measures are treated here as fea- tures in a machine learning task, such that we can measure their performance for adoption prediction individually and combined. We sort our samples chronolog- ically, using the first 90% for training and the rest for testing (obeying causality which is neglected by some works). We use 2 classifiers, Logistic Regression [9] and Random Forest [9], but only report F1 score for Random Forest under the R60 filter, since Logistic Regression and other filters produce comparable results. Baselines. We compare our model with 3 baselines (Influence Locality (LRC-Q) [1], Static Bernoulli (SB) [3], Complex Probability Model (CPM) [2]), to check if our method outperforms them and if the baselines improve with τsus and τf os. Individual Feature Analysis. Table 2 presents the individual classification performance of our 10 features. As done in the previous section, we run an experiment for each combination of τsus and τf os, sorting this table by the performance gain. The time constraints boosted the performance in all cases, with gains in F1 score in [7.22% and 23.2%]. In the great majority of cases, τsus shows values greater than τf os, repeating the correlation gain pattern. Combined Feature Analysis. In Table 2, we also present the classification performance results when the 10 features are combined as "All", showing an improvement of 10.54% when applying time constraints. The observed pattern for the individual features (social influence is better measured by the measures when τsus > τf os) is found again for the features combined, with performance achieving the best improvements when τsus = 336, while τf os = 48. 6 Table 2. Baselines, Individual and Combined Feature Performances. PNE w/ time constraints PNE w/o time constraints CLC w/ time constraints CLC w/o time constraints τsus τf os F1 score Improv. 23.2% 168 0.658 24 F1 score 0.534 τsus τf os F1 score Improv. 22.0% 0.652 72 16 F1 score 0.534 ACR w/ time constraints ACR w/o time constraints CLT w/ time constraints CLT w/o time constraints τsus τf os F1 score Impro. 336 18.7% 0.632 120 F1 score 0.532 τsus τf os F1 score Impro. 144 17.3% 0.657 8 F1 score 0.560 NAN w/ time constraints NAN w/o time constraints CDI w/ time constraints CDI w/o time constraints τsus τf os F1 score Impro. 144 15.6% τsus τf os F1 score Impro. 144 13.5% ACC w/ time constraints ACC w/o time constraints HUB w/ time constraints F1 score 0.689 0.677 0.596 72 16 τsus τf os F1 score Impro. 13.2% 144 0.675 16 F1 score 0.596 τsus τf os F1 score Impro. 9.99% 120 0.630 16 F1 score 0.596 HUB w/o time constraints F1 score 0.573 PRR w/ time constraints PRR w/o time constraints MUR w/ time constraints MUR w/o time constraints τsus τf os F1 score Impro. 9.82% 0.672 72 8 F1 score 0.612 τsus τf os F1 score Impro. 336 7.23% 0.712 72 F1 score 0.664 All w/ time constraints All w/o time constraints LRC-Q w/ time constraints LRC-Q w/o time constraints τsus τf os F1 score Impro. 336 10.54% 0.755 48 F1 score 0.683 SB w/ time constraints SB w/o time constraints τsus τf os F1 score Impro. 8.69% 0.675 72 8 F1 score 0.621 16 τsus τf os F1 score Impro. 72 8.41% CPM w/ time constraints τsus τf os F1 score Impro. 12.58% 0.657 0.689 72 8 F1 score 0.606 CPM w/o time constraints F1 score 0.612 We interpret these results as: 1). users will start losing attention of their neighbors after 2 weeks, if they do not retweet them anymore; 2). users will no more remember the activations of their neighbors after approximately 2 days. Performance of Baseline Methods. Finally, Table 2 includes the results of baselines. The time constraints boost all performances, with gains of 8.41% for LRC-Q, 8.69% for SB and 12.58% for CPM. These results highlight the effective- ness of τsus and τf os, also consolidating the pattern detected before: τsus > τf os. In addition, our model outperforms the baselines in both situations: when we use only an individual feature such as MUR, and when we use all features combined, with improvements in [3.33%, to 9.6%] (compared with CPM). 7 Conclusion In this paper, we introduce a pair of time constraints to show how the dynamic graphs produced by them better capture the influence between users over time (specially when τsus and τf os are relatively high and low respectively). We vali- date our model under diverse conditions, detailing how it outperforms the state- of-the-art methods that aim to predict users' adoption. We also demonstrate how these constraints can be used to improve the performance of other approaches, enabling practical usage of the concepts for social influence prediction. Acknowledgments Some of the authors of this paper are supported by CNPq-Brazil, AFOSR Young Investigator Pro- gram (YIP) grant FA9550-15-1-0159, ARO grant W911NF-15-1-0282, and the DoD Minerva program. References 1. Zhang, J.; Liu, B.; Tang, J.; Chen, T.; and Li, J. 2013. Social influence locality for modeling retweeting behaviors. In Proceedings of 13th IJCAI '13, 2761-2767. AAAI Press. 2. Fink, C.; Schmidt, A.; Barash, V.; Kelly, J.; Cameron, C.; and Macy, M. 2016. Investigating the observability of complex contagion in empirical social networks. In Proceedings of 10th ICWSM. 3. Goyal, A.; Bonchi, F.; and Lakshmanan, L. 2010. Learning influence probabilities in social net- works. 3rd ACM international conference on Web search and data mining (WSDM '10) 241-250. 4. Kempe, D.; Kleinberg, J.; and Tardos, E. 2003. Maximizing the spread of influence through a social network. In Proceedings of 9th ACM SIGKDD, 137146. New York, NY, USA: ACM. 5. Weng, L.; Menczer, F.; and Ahn, Y. 2013. Virality prediction and community structure in social networks. Scientific Reports 3(2522). 6. Valente, T. W. 1995. Network models of the diffusion of innovations, ser. quantitative methods in communication. Cresskill, N.J.: Hampton Press 153-163. 7. Zafarani, R.; Abbasi, M.; and Liu, H. 2014. Social Media Mining. Cambridge University Press. 8. Ugander, J.; Backstrom, L.; Marlow, C.; and Kleinberg, J. 2012. Structural diversity in social contagion. Proceedings of the National Academy of Sciences 109(16):5962-5966. 9. Attewell, P., David M., and Darren K. Data Mining for the Social Sciences. UC Press, 2015.
1901.06648
1
1901
2019-01-20T09:15:10
Unsupervised User Identity Linkage via Factoid Embedding
[ "cs.SI" ]
User identity linkage (UIL), the problem of matching user account across multiple online social networks (OSNs), is widely studied and important to many real-world applications. Most existing UIL solutions adopt a supervised or semi-supervised approach which generally suffer from scarcity of labeled data. In this paper, we propose Factoid Embedding, a novel framework that adopts an unsupervised approach. It is designed to cope with different profile attributes, content types and network links of different OSNs. The key idea is that each piece of information about a user identity describes the real identity owner, and thus distinguishes the owner from other users. We represent such a piece of information by a factoid and model it as a triplet consisting of user identity, predicate, and an object or another user identity. By embedding these factoids, we learn the user identity latent representations and link two user identities from different OSNs if they are close to each other in the user embedding space. Our Factoid Embedding algorithm is designed such that as we learn the embedding space, each embedded factoid is "translated" into a motion in the user embedding space to bring similar user identities closer, and different user identities further apart. Extensive experiments are conducted to evaluate Factoid Embedding on two real-world OSNs data sets. The experiment results show that Factoid Embedding outperforms the state-of-the-art methods even without training data.
cs.SI
cs
Unsupervised User Identity Linkage via Factoid Embedding Wei Xie∗, Xin Mu†, Roy Ka-Wei Lee∗, Feida Zhu∗ and Ee-Peng Lim∗ ∗Living Analytics Research Centre Singapore Management University, Singapore Email: {weixie,roylee.2013,fdzhu,eplim}@smu.edu.sg †National Key Laboratory for Novel Software Technology Nanjing University, China Email: [email protected] 9 1 0 2 n a J 0 2 ] I S . s c [ 1 v 8 4 6 6 0 . 1 0 9 1 : v i X r a Abstract -- User identity linkage (UIL), the problem of match- ing user account across multiple online social networks (OSNs), is widely studied and important to many real-world applica- tions. Most existing UIL solutions adopt a supervised or semi- supervised approach which generally suffer from scarcity of labeled data. In this paper, we propose Factoid Embedding, a novel framework that adopts an unsupervised approach. It is designed to cope with different profile attributes, content types and network links of different OSNs. The key idea is that each piece of information about a user identity describes the real identity owner, and thus distinguishes the owner from other users. We represent such a piece of information by a factoid and model it as a triplet consisting of user identity, predicate, and an object or another user identity. By embedding these factoids, we learn the user identity latent representations and link two user identities from different OSNs if they are close to each other in the user embedding space. Our Factoid Embedding algorithm is designed such that as we learn the embedding space, each embedded factoid is "translated" into a motion in the user embedding space to bring similar user identities closer, and different user identities further apart. Extensive experiments are conducted to evaluate Factoid Embedding on two real-world OSNs data sets. The experiment results show that Factoid Embedding outperforms the state-of-the-art methods even without training data. Index Terms -- user identity linkage,factoid embedding,network embedding I. INTRODUCTION Motivation. Increasingly, people are using multiple online social networks (OSNs) to meet their communication and relationship needs1. The rise of users using multiple OSNs motivates researchers to study User Identity Linkage (UIL), the problem of linking user accounts from different OSNs belonging to the same person. Tackling UIL is imperative to many applications, particularly user profiling and recom- mender systems. User Identity Linkage Problem. The UIL problem has been widely studied and is usually formulated as a classifica- tion problem, i.e. to predict whether a pair of user identities from different OSNs belong to the same real person [1]. There are many supervised and semi-supervised methods proposed to address UIL but they could not perform well when there is 1www.si.umich.edu/news/more-adults-using-multiple-social-platforms- survey-finds a scarcity of labeled data. One possible way to obtain labeled matching user accounts is to recruit users to manually identify them. Such an approach is very costly and time consuming. In this research, we therefore aim to solve the UIL problem using an unsupervised approach. User Identity Linkage Problem in Unsupervised Setting. We formulate the UIL problem in unsupervised setting as follows. Let u be a user identity in an OSN which belongs to a real person p. Let ou = [ou,1, ..., ou,d] denote a set of data objects associated with u. These objects include username, screen name, profile image, profile description, posts, etc.. We denote an OSN as G = (U,O,E), where U = {u1, ..., uN} is the set of user identities, O = {ou1 , ..., ouN} is the set of corresponding data objects, and E ⊆ U × U is the set of links in the network. Thus, given two OSNs Gs = (U s,Os,E s) (source) and Gt = (U t,Ot,E t) (target), without any known matched user pairs between Gs and Gt, the objective is to return a user ut in target OSN, for every user us in the source OSN, such that the user pair (us, ut) most likely belongs to the same real person p. Research Objectives and Contributions. In this paper, we propose Factoid Embedding, a novel framework that links user identities across multiple OSNs through the use of a network embedding approach. The key idea behind Factoid Embedding is that despite the heterogeneity in information from multiple OSNs, each piece of information about a user identity describes the person who owns it, and thus help to distinguish the person from others. The more information we have, the closer we get to know about the real person. Specifically, we model each piece of information as a factoid, which is a triplet consisting of user identity, predicate and an object or another user identity (as shown in Table I). Embedding these factoids provides the unifying structure to represent the heterogeneous information and data types. Figure 1 shows the framework of Factoid Embedding. Firstly, we generate the factoids from information gathered from different OSNs. Next, we embed heterogeneous objects (e.g. names, texts, and images) into their respective embedding spaces (e.g., names will be embedded into the name embedding space, etc.) incorporating the similarity measures that contribute to matching user identities. Note that when embedding the Fig. 1: Framework of Factoid Embedding heterogeneous objects, we leverage on external and prior knowledge such that if two objects are similar, their embedding vectors will be close to each other in the object embedding space. For example, the user names Desmond and Desmond Ng are similar and therefore, the embedding vectors of the two names will be close to each other in the name embedding space. Finally, leveraging the factoids' triplet structure, we project the various object embeddings into the user embedding space. Essentially, the vectors in the user embedding space represent the user identities, and through iterations of object embedding projections, the user identities that share many similar factoids will be "pushed" closer to one another in the user embedding space. Overall, this paper improves the state-of-the-art by making the following contributions: • We propose a novel unsupervised method called Factoid Embedding to link user identities from different OSNs. Our proposed method is able to integrate heterogeneous information using the triplet structure of factoids and object embeddings. To the best of our knowledge, this is the first work which embeds heterogeneous information to address the UIL problem in an unsupervised manner. • We conduct extensive experiments on three real-world to OSNs, namely, Twitter, Facebook and Foursquare, evaluate our proposed model. The experiment results show that Factoid Embedding outperforms the state- of-the-art methods. It can even outperform some of the existing supervised methods which are given labeled matching user pairs for training. II. PROPOSED SOLUTION We propose an integrated three-step solution which is illus- trated in Figure 1. In the first step, we use the information from Gs and Gt to generate a set of factoids. Next, we embed the heterogeneous data objects (e.g. names, text and images) into their respective embedding spaces. Finally, we learn and project the user identities and their links into user embedding space using factoid embedding, a process where we integrate the object embeddings and factoids. TABLE I: Examples of Generated Factoids Twitter (cid:104)1, has name, Amy Tan(cid:105) (cid:104)2, has name, Desmond(cid:105) (cid:104)3, has name, C L(cid:105) (cid:104)4, has name, Joey Lim(cid:105) (cid:104)5, has name, Nicole Tan(cid:105) (cid:104)1, follows, 2(cid:105) (cid:104)2, follows, 1(cid:105) (cid:104)1, follows, 3(cid:105) (cid:104)3, follows, 1(cid:105) (cid:104)3, follows, 2(cid:105) (cid:104)4, follows, 3(cid:105) (cid:104)5, follows, 3(cid:105) Facebook (cid:104)6, has name, Amy Tan(cid:105) (cid:104)7, has name, Desmond Ng(cid:105) (cid:104)8, has name, Cindy Lim(cid:105) (cid:104)9, has name, Joey L(cid:105) (cid:104)6, follows, 7(cid:105) (cid:104)7, follows, 6(cid:105) (cid:104)6, follows, 8(cid:105) (cid:104)8, follows, 6(cid:105) (cid:104)7, follows, 8(cid:105) (cid:104)8, follows, 7(cid:105) (cid:104)8, follows, 9(cid:105) (cid:104)9, follows, 8(cid:105) A. Factoid Generation To integrate the heterogeneous user attribute/content objects and their user-user link information in Gs and Gt, we first combine and represent the information in an unified network. In this unified network, every user identity ui (from source or target network) is represented as a new user node with a unique ID and every data object is represented as a data node (as illustrated in the step 1 in Figure 1). We then represent a user-object association and a user-user link as an user- object factoid and an user-user factoid respectively. A user- object factoid (cid:104)ui, pred, o(cid:105) has pred denoting the associated attribute predicate, and o denoting a data object. Each user- object factoid provides us a description about ui. For example in Figure 1, factoid (cid:104)1, has name, Amy Tan(cid:105) conveys the information that the u1 has name "Amy Tan". Next, we use another set of predicates to represent user-user links. For example, for Twitter, an user identity may "follows" another user identity. As such, we represent f ollows as a predicate and let (cid:104)ui, f ollows, uj(cid:105) denote a user-user factoid with the predicate "follows". For instance, factoid (cid:104)1, follows, 3(cid:105) tells us u1 follows u3. Table I presents all the factoids generated from the two OSNs in Figure 1. In the following, we shall elaborate the embeddings of objects followed by that of user- object and user-user factoids. 2 359User Embedding Space123456789Amy TanDesmond NgDesmondC LJoey LimJoey LNicole TanCindy LimName Embedding SpaceUnified NetworkAmy TanAmy TanDesmond NgDesmond NgDesmondC LJoey LimNicole TanJoey LCindy LimTwitterFacebookStep 1: Factoid GenerationStep 2: ObjectEmbeddingStep 3: FactoidEmbedding176482 B. Object Embedding Although the factoids generated in the previous step is able to represent the different information types in a unified net- work, it still has to address the issue of comparing data objects of attributes used for linking user identities. For example, the factoids in row 2 of Table I do not explicitly tell us that "Desmond" and "Desmond Ng" are similar names. Instead, it only tell us that they are non-identical. Therefore, in this step we embed these heterogeneous objects taking advantage of similarity knowledge about the objects. For example, suppose two user identities sharing similar attribute objects are more likely to belong to the same person. We will then embed the objects such that similar objects are closer in the object embedding space (see step two in Figure 1, where similar names are closer in the name embedding space). We first let Opred denote all the data objects for certain predicate pred, i.e. Opred = {o ∈ Fpred}. For instance in Figure 1, Ohas name = {"Amy Tan", "Desmond", "C L", "Joey Lim", "Nicole Tan", "Desmond Ng", "Cindy Lim", "Joey L"}. For each user-object predicate pred, we construct a i,j ∈ [−1, 1] similarity matrix Spred in which each element Spred measures the similarity between two objects oi, oj ∈ Opred. i,j = 1 when oi and oj are identical , and = −1 when Spred oi and oj are completely different. There are a few ways to measure similarities between objects. For example, Jaro- Winkler distance [2] has been used to measure the similarity between two names, and deep learning techniques can help us measure how similar two profile images are. In the experiment section, we will elaborate the similarities between different types of data objects in more details. For each data object o, we define vo to be the embedding vector of o. To learn object embeddings, we define the objective function in Equation 1. This function aims to keep the embedding vectors of similar data objects to be close to each other in the object embedding space. (cid:88) i,j oi i,i = 1, v(cid:62) voi = voi2 where {vo}o∈Opred are the object embedding vectors, and Spred is the given similarity matrix. We learn {vo}o∈Opred by minimizing errorpred. Ideally, {vo}o∈Opred would preserve all the information in the similarity matrix Spred leading to errorpred = 0. More importantly, because Spred 2 will be close to 1, i.e. all the embedding vectors {vo} are near to the surface of a unit hypersphere. It means cos(voi, voj ) ≈ v(cid:62) . Therefore, if oi and oj are similar, voi oi and voi will be close to each other in the embedding space. Figure 1 illustrates how the names are embedded in the name embedding space. We can see that "Desmond Ng" is close to "Desmond", but far from "C L" in the embedding space. In practice, the similarity matrix Spred may be huge, i.e. O((U s + U t)2). In order to speed up learning, we can just focus on the similar object pairs. By employing block- ing techniques such as inverted index and Locality-Sensitive voj ≈ Spred i,j 3 errorpred = (v(cid:62) oi voj − Spred i,j )2 (1) f (Fpred) = Hashing (LSH) we can build a sparse similarity matrix Spred. Afterwards, stochastic gradient descent is applied to minimize errorpred. C. Factoid Embedding In this step, we learn user identities' latent representations by embedding the generated user-object and user-user factoids. We let U a denote the set of all user identities in the unified network (i.e. U a = U s ∪ U t) and Fpred denote the set of factoids with a predicate pred, e.g. Ff ollows = {(cid:104)ui, f ollows, uj(cid:105)}, Fhas name = {(cid:104)ui, has name, o(cid:105)}. i.e. Suppose we have d types of user-object predicates, {pred1, ..., predd}. For each user-object factoid in Fpred, we define its proba- bility as follows. prob(ui, pred, o) = (cid:80) exp(v(cid:62) u(cid:48)∈U a exp(v(cid:62) · φpred(vo)) u(cid:48) · φpred(vo)) ui (2) where vui is the embedding vector of user identity ui, vo is the embedding vector of data object o, and φpred is a projection function which maps vo to the user embedding space. Note that we have learned vo in the object embedding step. Particularly, we impose such a constraint on φpred that it is a Lipschitz continuous function, i.e. there is a a constant C such that φpred(x)− φpred(y) < C ·x− y for any x and y in the space. In other words, if two objects are similar i.e. voi ≈ voj then their projections will be close to each other i.e. φpred(voi) ≈ φpred(voj ). In this work, we set φpred(vo) as a linear function, i.e. φpred(vo) = Wpred · vo + bpred, where Wpred and bpred are unknown parameters, and Wpred's norm Wpred is limited. We leave other non-linear choices of φpred(vo) for future work. Given all the user-object factoids in Fpred, i.e. {(cid:104)ui, pred, o(cid:105)}, we define the following objective function. log(prob(ui, pred, o)) (3) (cid:104)ui,pred,o(cid:105)∈Fpred Similarly, for each user-user factoid in Ff ollows, we define its probability as follows. ui prob(ui, f ollows, uj) = exp(v(cid:62) u(cid:48)∈U a exp(v(cid:62) · φf ollows(vuj )) u(cid:48) · φf ollows(vuj )) (4) We set φf ollows(vu) = Wf ollows · vu + bf ollows, where Wf ollows's norm Wpred is limited. Given all the user- user factoids in Ff ollows, i.e. {(cid:104)ui, f ollows, uj(cid:105)},we define the following objective function. (cid:88) (cid:80) (cid:88) f (Ff ollows) = log(prob(ui, f ollows, uj)) (cid:104)ui,f ollows,uj(cid:105)∈Ff ollows (5) We learn user embedding vectors {vu}u∈U a by solving the following multi-objective optimization problem. 2 repeat 3 4 for pred ∈ {pred1, . . . , predd} do sample a batch of user-object factoids FB Fpred; for (cid:104)ui, pred, o(cid:105) ∈ FB pred do sample K "fake" factoids {(cid:104)uk, pred, o(cid:105)}K update vu according to ∂f (ui,pred,o) ; pred from k=1; end update Wpred and bpred (once for a certain # of iterations); ∂vu end sample a batch of user-user factoids FB Ff ollows; for (cid:104)ui, f ollows, uj(cid:105) ∈ FB sample K "fake" factoids {(cid:104)uk, f ollows, uj(cid:105)}K k=1; update vu according to ∂f (ui,f ollows,uj ) f ollows do ; ∂vu f ollows from end update Wf ollows and bf ollows (once for a certain # of iterations); 17 until convergence or reach maximum # of iterations; 18 return {vu}u∈U a. 5 6 7 8 9 10 11 12 13 14 15 16 max{vu}(f (Ff ollows), f (Fpred1), ..., f (Fpredd )) (6) Once we learned {vu}u∈U a, we link user identities from different OSNs by simply comparing the distance between their embedding vectors. For example, in the user embedding space in Figure 1, as user ID 1's nearest neighbor is user ID 6, we link them as the same person. D. Optimization optimize f (Ff ollows), f (Fpred1), . . . , f (Fpredd ) in turn. To solve the multi-objective optimization in Equation 6, we As optimizing each objective function f (F) is computation- ally expensive, we adopt the approach of negative sampling proposed in [3]. Particularly, for each factoid (cid:104)ui,·,·(cid:105), K "fake" factoids are introduced, i.e. {(cid:104)uk,·,·(cid:105)}, where uk are sampled from some noise distribution P (u). More specifically, for a user-user factoid (cid:104)ui, f ollows, uj(cid:105) ∈ Ff ollows, we specifies the following objective function for it: · φf ollows(vuj ))+ f (ui, f ollows, uj) = log σ(v(cid:62) ui K(cid:88) k=1 Euk∼P1(u)[log σ(−v(cid:62) uk · φf ollows(vuj ))] (7) 1 1+exp(−x) is the sigmoid function. The first where σ(x) = term models the observed factoid, and second term models the "fake" factoids and K is the number of "fake" factoids. We set P1(u) ∝ d3/4 as proposed in [3], where d is the out- degree of u in the unified network. For a user-object factoid (cid:104)ui, pred, o(cid:105) ∈ Fpred, its objective function is as follows. f (ui, pred, o) = log σ(v(cid:62) u K(cid:88) ui · φpred(vo))+ Euk∼P2(u)[log σ(−v(cid:62) uk · φpred(vo))] (8) k=1 And we set P2(u) as a uniform distribution over U a. Then stochastic gradient descent is used to optimize Equa- tions 7 and 8. Algorithm 1 gives an overview of Factoid Embedding. Suppose object embeddings and user embed- dings have the same dimension m. The time complexity for each update operation in Algorithm 1 is O(K · m2). So the time complexity for Algorithm 1 goes through all the user-object factoids and all the user-user factoids once are O((U s + U t) · d · K · m2) and O((E s + E t) · K · m2) respectively. When we optimize f (ui, pred, o), we actually push vui in the direction of φpred(vo). It means that, user identities who share similar objects will be pushed towards each other. (There is also a similar effect for f (ui, f ollows, uj).) This explains why Factoid Embedding is able to push similar user identities close to each other in the user embedding space. 4 ALGORITHM 1: Factoid Embedding Input: Ff ollows,Fpred1, . . . ,Fpredd: the factoids with Input: {vo}o∈Opred1 , . . . ,{vo}o∈Opredd different predicates. : the object embeddings for user-object predicates: pred1, . . . , predd. Output: {vu}u∈U a. 1 Initialize {vu}u∈U a, Wf ollows, bf ollows, {Wpredi}d {bpredi}d i=1; i=1, III. EXPERIMENT A. Data Collection We evaluate our proposed Factoid Embedding using data sets from three popular OSNs, namely, Twitter, Facebook and Foursquare. We first gathered a set of Singapore-based Twitter users who declared Singapore as location in their user profiles. From the Singapore-based Twitter users, we retrieve a subset of Twitter users who declared their Facebook or Foursquare accounts in their short bio description as the ground truth. Table II summarizes the statistics of our dataset. B. Factoid Generation & Object Embedding The user-user and user-object factoids as described in Sec- tion II-A are generated using the user information from the OSNs used in our experiment. We then calculate the similarity matrices for the data objects. We use Jaro-Winkler distance [2] to measure username and screen name similarity. To measure the similarities between two profile images, we first use the deep learning model VGG16 with weights pre-trained on ImageNet2 to 2https://keras.io/applications/#vgg16 Dataset Network # Users # Links Available Information # Ground truth matching pairs TABLE II: Datasets. Facebook-Twitter Foursquare-Twitter Facebook 17,359 224,762 Twitter 20,024 165,406 Foursquare 21,668 312,740 Twitter 25,772 405,590 username,screen name, profile image, network screen name, profile image, network 1,998 3,602 extract a feature vector for each profile image. The cosine similarity between the two profile image feature vectors is then computed. Finally, we embed the data objects {vo}o∈Opred for each pred (e.g. username) by using stochastic gradient descent to minimize errorpred in Equation 1. C. Evaluation Baselines and Metrics 1) Supervised Methods. • ULink [4] (S1): a supervised method which models the map from the observed data on the varied social platforms to the latent user space. The node representations learned by Deepwalk3, concatenated with other object embedding vectors are used as user identity features. The code provided by the author is used for UIL. • Logistic Regression (LR) (S2): The following fea- tures are used: username similarity, screen name similarity, profile image similarity and the social status in network as defined in [5]. 2) Semi-Supervised Methods. • COSNET [5] (SS1): an energy-based model which considers both local and global consistency among multiple networks. The candidate matching graph is generated based on profile-based features: user- name, screen name and profile image. The public code is used for UIL4. • IONE [6] (SS2): a network embedding based ap- proach. Ground truth matching user identity pairs are needed to transfer the context of network struc- ture from the source network to the target net- work. The original version of IONE uses network information only for UIL. For a fair comparison, we introduce more anchor links by linking user identities which share the same username, screen name or profile image. • Factoid Embedding* (FE*) (SS3): Our proposed Factoid Embedding with labeled matching user identity pairs. Specifically, we adapt our solution to a semi-supervised version by merging the matching user identities into one node in the unified network. The merged user identities therefore share the same embedding vectors. 3) Unsupervised Methods. • Name (U1): an unsupervised approach based on name similarity, which is reported as the most 3https://github.com/phanein/deepwalk 4https://aminer.org/cosnet 5 discriminative feature for UIL [7]. Here it can refer to username or screen name. We present whichever has the better performance. • CNL [8] (U2): An unsupervised method which links users across different social networks by incorporat- ing heterogeneous attributes and social features in a collective manner. The code provided by the author is used for UIL. • Factoid Embedding (FE) (U3): Our proposed Fac- toid Embedding without any labeled matching user identity pairs. For each ground truth matching pairs (us∗, ut∗), we rank all the target users, i.e. ut ∈ Gt according to cos(vus∗ , vut). To quantitatively evaluate this ranking, we employ the following two metrics: • HitRate@K (HR@K) in which a ranking is considered as correct if the matching user identity ut∗ is within the top K candidates, i.e. rank(ut∗) ≤ K. • Mean Reciprocal Rank (MRR) is defined as follows. (cid:88) M RR = 1 n 1 rank(ut∗) (us∗,ut∗) where (us∗, ut∗) is a ground truth pair, and n is the number of all the ground truth pairs. D. Experimental Results Prediction Performance. We randomly partition the ground truth matching user identity pairs into five groups and conduct five-fold cross-validation. Table III presents the overall perfor- mance of the comparison methods on the Facebook-Twitter data set. It shows that, our proposed Factoid Embedding (SS3/U3) yields the best MRR result. Although ULink per- forms best on HR@1, Factoid Embedding outperforms it on both HR@K and MRR. The reason may be that, as a super- vised approach ULink may link precisely the user identity pairs which can be represented by the training dataset. However, for the user identity pairs outside the labeled matching pairs, ULink may lose the ability to match them correctly. In contrast, by embedding factoids, Factoid Embedding is able to link such user identity pairs in an unsupervised manner. It explains why ULink has highest HR@1 but relatively low HR@30. It is a common problem for the supervised solutions for UIL because, as we mentioned in the introduction, the labeled dataset is quite small compared to the whole population. We also can observe that the Factoid Embedding outperforms the existing network embedding approach IONE(SS2), which makes use of the network information only. Interestingly, it TABLE III: Performance on Facebook-Twitter Dataset S/N Method S1 ULink LR S2 COSNET SS1 IONE SS2 FE* SS3 U1 Name CNL U2 U3 FE HR@1 0.7071 0.5965 0.6586 0.5605 0.6851 0.5825 0.5930 0.6781 HR@2 0.7285 0.6551 0.7242 0.5695 0.7322 0.6226 0.6225 0.7292 HR@3 0.7414 0.6906 0.7337 0.5725 0.7567 0.6406 0.6387 0.7542 HR@4 0.7471 0.7117 0.7367 0.5730 0.7747 0.6521 0.6451 0.7732 HR@5 0.7557 0.7262 0.7382 0.5750 0.7822 0.6626 0.6506 0.7827 HR@10 0.7757 0.7837 0.7417 0.5805 0.8098 0.6886 0.6701 0.8103 TABLE IV: Performance on Foursquare-Twitter Dataset S/N Method ULink S1 LR S2 SS1 COSNET IONE SS2 FE* SS3 Name U1 CNL U2 U3 FE HR@1 0.5464 0.5285 0.5421 0.4081 0.5541 0.5227 0.5283 0.5433 HR@2 0.5843 0.5913 0.5905 0.4158 0.6021 0.5730 0.5786 0.5957 HR@3 0.6032 0.6171 0.6116 0.4225 0.6293 0.5980 0.6050 0.6210 HR@4 0.6232 0.6388 0.6238 0.4269 0.6440 0.6154 0.6172 0.6374 HR@5 0.6399 0.6473 0.6340 0.4297 0.6546 0.6332 0.6408 0.6482 HR@10 0.6766 0.6862 0.6585 0.4408 0.6979 0.6768 0.6877 0.6937 HR@30 0.8042 0.8098 0.7452 0.6031 0.8508 0.7232 0.7327 0.8493 HR@30 0.7397 0.7384 0.6693 0.4733 0.7456 0.7293 0.7388 0.7423 MRR 0.7102 0.6592 0.6964 0.5698 0.7297 0.6201 0.6284 0.7254 MRR 0.5915 0.5882 0.5826 0.4212 0.6029 0.5741 0.5853 0.5944 can be seen that the performance of our unsupervised Factoid Embedding (U3) is very close to the semi-supervised version (SS3). One possible explanation is that SS3 just merges the matching pairs into one node, but does not learn from the labeled matching pairs like other supervised solutions e.g. ULink. Realizing that the performance of name similarity (U1) is relatively good, we think, by "pushing" similar user identities close to each other, U3 is able to "merge" these matching pairs in the user embedding space by itself. Thus the performances of U3 and SS3 are not significantly different. Table IV shows the results on the Foursquare-Twitter Dataset, which are consistent to that in Table III. We can therefore conclude that our proposed Factoid Embedding performs best in both the unsupervised and supervised settings. Parameter Analysis. We investigate the performance w.r.t. the embedding dimension and the number of iterations on the Facebook-Twitter dataset. Figure 2(c) shows that the MRR per- formance of Factoid Embedding improves as the dimension increases. Figure 2 (d) shows the MRR performances over dif- ferent numbers of iterations. We can see that the performance improves more significantly in the early iterations. (a) (b) Fig. 2: (a) Performance over Dimensions of User Embedding. (b) Performance over Iterations. 6 IV. CONCLUSION In this paper, we proposed a novel framework Factoid Embedding, which adopts an unsupervised approach to cope with heterogeneity in user information and link users identities across multiple OSNs. We evaluated Factoid Embedding using real-world datasets from three OSNs and benchmarked against the state-of-the-art UIL solutions. Our experimental results show that Factoid Embedding outperforms the state- of-the-art UIL solutions even in situations where the names of the user identities are dissimilar. ACKNOWLEDGMENT This research is supported by the National Research Foun- dation, Prime Minister's Office, Singapore under its Interna- tional Research Centres in Singapore Funding Initiative. REFERENCES [1] K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, "User identity linkage across online social networks: A review," SIGKDD Explorations, vol. 18, no. 2, 2016. [2] W. W. Cohen, P. Ravikumar, and S. E. Fienberg, "A comparison of string distance metrics for name-matching tasks," in IJCAI, 2003. [3] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Dis- tributed representations of words and phrases and their compositionality," in NIPS, 2013. [4] X. Mu, F. Zhu, E. Lim, J. Xiao, J. Wang, and Z. Zhou, "User identity linkage by latent user space modelling," in SIGKDD, 2016. [5] Y. Zhang, J. Tang, Z. Yang, J. Pei, and P. S. Yu, "COSNET: connecting heterogeneous social networks with local and global consistency," in SIGKDD, 2015. [6] L. Liu, W. K. Cheung, X. Li, and L. Liao, "Aligning users across social networks using network embedding," in IJCAI, 2016. [7] A. Malhotra, L. C. Totti, W. M. Jr., P. Kumaraguru, and V. A. F. Almeida, "Studying user footprints in different online social networks," in ASONAM, 2012. [8] M. Gao, E. Lim, D. Lo, F. Zhu, P. K. Prasetyo, and A. Zhou, "CNL: collective network linkage across heterogeneous social platforms," in ICDM, 2015.
1706.08184
2
1706
2017-06-27T01:00:24
A preference elicitation interface for collecting dense recommender datasets with rich user information
[ "cs.SI", "cs.IR" ]
We present an interface that can be leveraged to quickly and effortlessly elicit people's preferences for visual stimuli, such as photographs, visual art and screensavers, along with rich side-information about its users. We plan to employ the new interface to collect dense recommender datasets that will complement existing sparse industry-scale datasets. The new interface and the collected datasets are intended to foster integration of research in recommender systems with research in social and behavioral sciences. For instance, we will use the datasets to assess the diversity of human preferences in different domains of visual experience. Further, using the datasets we will be able to measure crucial psychological effects, such as preference consistency, scale acuity and anchoring biases. Last, we the datasets will facilitate evaluation in counterfactual learning experiments.
cs.SI
cs
A preference elicitation interface for collecting dense recommender datasets with rich user information Pantelis P. Analytis Cornell University [email protected] Demo Tobias Schnabel Cornell University [email protected] Stefan Herzog MPI for Human Development [email protected] Daniel Barkoczi MPI for Human Development [email protected] Thorsten Joachims Cornell University [email protected] ABSTRACT We present an interface that can be leveraged to quickly and ef- fortlessly elicit people's preferences for visual stimuli, such as photographs, visual art and screensavers, along with rich side- information about its users. We plan to employ the new interface to collect dense recommender datasets that will complement existing sparse industry-scale datasets. The new interface and the collected datasets are intended to foster integration of research in recom- mender systems with research in social and behavioral sciences. For instance, we will use the datasets to assess the diversity of human preferences in different domains of visual experience. Further, using the datasets we will be able to measure crucial psychological effects, such as preference consistency, scale acuity and anchoring biases. Last, we the datasets will facilitate evaluation in counterfactual learning experiments. CCS CONCEPTS • Human-centered computing → Collaborative filtering; So- cial media; Collaborative and social computing devices; KEYWORDS preference elicitation, recommender system datasets, visual art 1 INTRODUCTION Over the last three decades the recommender systems community has made immense progress in the way we represent, understand and learn people's preferences as a function of previously collected explicit or implicit evaluations. Research in recommender systems has by all means increased the quality of the curated and recom- mended content in the online world. Several large datasets have been a crucial component of this success, as they have commonly functioned as test-beds on which new theories and algorithms have been compared (Movielens, LastFM and Netflix to name just a few). Most of these datasets, however, are very sparse. They contain thousands items and even the most popular among the items have been evaluated only by a small subset of their users. Given the large fraction of missing ratings, it is challenging to accurately estimate even simple quantities like the average quality of an item, especially since the patterns of missing data are subject to strong selection Recsys'17, August 2017, Como, Italy 2018. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn biases [6]. This presents fundamental challenges when evaluating recommendation algorithms on sparse datasets. Further, it becomes an obstacle for scholars in the social and behavioral sciences as workarounds have to be developed for dealing with missing values. To the best of our knowledge, the only dense collaborative filter- ing dataset was the outcome of the Jester Interface [3]. The interface curated 100 jokes of various styles and topics. People utilized a slider to evaluate 5 jokes that were presented to them sequentially. The first evaluations were used to estimate people's preferences and to recommend them the remaining jokes. The users continued to read and evaluate jokes until the pool of 100 items was exhausted. In total, more than 70.000 people have evaluated at least some of the jokes, and more than 14.000 have evaluated all the jokes, resulting to a fully evaluated subset of the dataset. Figure 1: The design of the preference elicitation interface. We replicate the design of the Jester interface, using a contin- uous bar that people can use to express how much they liked or disliked an item. Participants have to wait for at least 5 seconds before they can proceed to the next item. 2 THE INTERFACE AND DATA COLLECTION We plan to collect new datasets in different domains of people's vi- sual experience, ranging from photographs and paintings to designs for screensavers. Our interface replicates the design of the Jester interface, adding new elements that can counteract its limitations. At the outset, people are provided with instructions about how to use the interface. Then, before the presentation of the stimuli we collect demographic information about the users. To reduce possi- ble order effects, the visual stimuli are presented in random order. As in Jester, users are asked to evaluate items using a slider bar; they can move the marker of the slide bar to the left to indicate that they did not like the item, or to the right to indicate that they liked it. We implement a continuous scale, which allows a fine-grained evaluation of the presented items. Finally, to limit anchoring bias, the slide bar is initially semi-transparent and the colors become vivid only when the user has clicked on it.1 Once all the items have been evaluated, we collect further psy- chologically relevant information about the users. Numerous stud- ies have shown that side information can substantially improve estimates of people's preference and it complements first hand eval- uations [5]. In the first experiments we will deploy the visual-art expertise questionnaire developed by Chatterjee et al. [2] to gauge people's familiarity with the visual arts and a succinct version of the big-five questionnaire to quickly assess the people's personalities [7] (see Figure 2). It takes about 20 minutes to complete the current version of the interface, including the instructions, questionnaires and evaluation phase. We intend to conduct the first experiments at Amazon's Mechani- cal Turk labor market. Several studies have shown that for effortless tasks the results produced on mTurk are comparable to laboratory studies [4]. The visual stimuli used in this interface evoke imme- diate aesthetic judgments, and thus can quickly be transformed to evaluations. Eventually, we intend to develop a data visualiza- tion tool that will reward people who complete the study with information about their preference profiles and how they relate to those of other individuals. Thus, we intend to create an inherently motivating interface using as a reward the informational value gen- erated by the collected data. In this way, we will reduce the cost of data collection, but also introduce basic ideas behind collaborative filtering and recommender systems to the wider public. 3 POTENTIAL APPLICATIONS We envisage several new applications for the developed datasets. Here we foreshadow a few of these potential uses, keeping in mind that the community that will have access to the produced datasets will certainly come up with more. First, they will facilitate cross- fertilization with the cognitive and behavioral sciences. For instance, social and cognitive psychologists have extensively studied simple strategies for inference and estimation where different features are used to predict an objective truth. The new datasets will open the way to study strategies for social preference learning in domains where no objective truth exists [1]. Also, we can manipulate the design of the interface to study relevant behavioral effects, such as to study the consistency of evaluations or to investigate the effect 1The interface can be accessed at http://abc-webstudy.mpib-berlin.mpg.de/recstrgs/ study_simulator.php. Both the code for the interface and the collected data will be publicly available. 2 Figure 2: At the end of the evaluation phase we collect addi- tional information about the users. We invited the users to complete a questionnaire about their expertist in the visual arts and a 10-question version of the big-five questionnaire. of the granularity of the evaluation scale on the predictions. To sum up, the datasets will allow us to better understand preference diversity and its implications for different recommender systems algorithms as well as for psychological social learning strategies. Moreover, we believe that the new datasets can fuel existing streams of research in recommender systems and machine learning. For instance, dealing with selection-biases and with data missing not at random is a growing research stream in recommender sys- tems and machine learning [9]. To evaluate algorithms tuned to deal with such problems, we can impose selection biases ex-ante and remove data from the dense dataset accordingly. This set-up could complement existing sparse datasets for learning, with the difference that selection biases can be controlled and varied in order to test robustness. Moving on to the broader class of counterfactual simulations, dense datasets greatly simplify evaluation since they can serve as ground-truth when conducting simulations [8]. REFERENCES [1] Pantelis P Analytis, Daniel Barkoczi, and Stefan M Herzog. You're special, but it doesn't matter if you're a greenhorn: Social recommender strategies for mere mortals. In Cognitive Science Society, pages 1799 -- 1804. Cognitive Science Society, 2015. [2] Anjan Chatterjee, Page Widick, Rebecca Sternschein, William B Smith, and Bianca Bromberger. The assessment of art attributes. Empirical Studies of the Arts, 28(2):207 -- 222, 2010. [3] Ken Goldberg, Theresa Roeder, Dhruv Gupta, and Chris Perkins. Eigentaste: A constant time collaborative filtering algorithm. Information Retrieval, 4(2):133 -- 151, 2001. [4] Gabriele Paolacci, Jesse Chandler, and Panagiotis G Ipeirotis. Running experiments on Amazon Mechanical Turk. Judgment and Decision Making, 5(5), 2010. [5] Seung-Taek Park and Wei Chu. Pairwise preference regression for cold-start recommendation. In Proceedings of the third ACM conference on Recommender systems, pages 21 -- 28. ACM, 2009. [6] B. Pradel, N. Usunier, and P. Gallinari. Ranking with non-random missing ratings: influence of popularity and positivity on evaluation metrics. In RecSys, pages 147 -- 154, 2012. [7] Beatrice Rammstedt and Oliver P John. Measuring personality in one minute or less: A 10-item short version of the big five inventory in english and german. Journal of Research in Personality, 41(1):203 -- 212, 2007. [8] Matthew J Salganik, Peter Sheridan Dodds, and Duncan J Watts. Experimental study of inequality and unpredictability in an artificial cultural market. Science, 311(5762):854 -- 856, 2006. [9] Tobias Schnabel, Adith Swaminathan, Peter I Frazier, and Thorsten Joachims. Unbiased comparative evaluation of ranking functions. In ICTIR, pages 109 -- 118, 2016.
1904.05331
2
1904
2019-08-21T20:36:12
Flavour Enhanced Food Recommendation
[ "cs.SI", "cs.HC", "cs.IR" ]
We propose a mechanism to use the features of flavour to enhance the quality of food recommendations. An empirical method to determine the flavour of food is incorporated into a recommendation engine based on major gustatory nerves. Such a system has advantages of suggesting food items that the user is more likely to enjoy based upon matching with their flavour profile through use of the taste biological domain knowledge. This preliminary intends to spark more robust mechanisms by which flavour of food is taken into consideration as a major feature set into food recommendation systems. Our long term vision is to integrate this with health factors to recommend healthy and tasty food to users to enhance quality of life.
cs.SI
cs
Flavour Enhanced Food Recommendation Bangalore, Karnataka, India 560085 Bangalore, Karnataka, India 560085 Nitish Nag [email protected] University of California, Irvine Irvine, California, United States of America 92697 Kushal Samir Mehta [email protected] PES University 100 Feet Ring Road Aditya Narendra Rao [email protected] PES University 100 Feet Ring Road Nishant Bha(cid:138)acharya [email protected] PES University 100 Feet Ring Road Akash Kulhalli [email protected] PES University 100 Feet Ring Road Pratul Ramkumar [email protected] PES University 100 Feet Ring Road 9 1 0 2 g u A 1 2 ] I S . s c [ 2 v 1 3 3 5 0 . 4 0 9 1 : v i X r a Bangalore, Karnataka, India 560085 Bangalore, Karnataka, India 560085 Bangalore, Karnataka, India 560085 Aditya Bharadwaj [email protected] PES University 100 Feet Ring Road Bangalore, Karnataka, India 560085 Dinkar Sitaram [email protected] PES University 100 Feet Ring Road Bangalore, Karnataka, India 560085 Ramesh Jain [email protected] University of California, Irvine Irvine, California, United States of America 92697 ABSTRACT We propose a mechanism to use the features of (cid:131)avour to enhance the quality of food recommendations. An empirical method to de- termine the (cid:131)avour of food is incorporated into a recommendation engine based on major gustatory nerves. Such a system has ad- vantages of suggesting food items that the user is more likely to enjoy based upon matching with their (cid:131)avour pro(cid:128)le through use of the taste biological domain knowledge. (cid:140)is preliminary intends to spark more robust mechanisms by which (cid:131)avour of food is taken into consideration as a major feature set into food recommenda- tion systems. Our long term vision is to integrate this with health factors to recommend healthy and tasty food to users to enhance quality of life. CCS CONCEPTS •Information systems → Collaborative (cid:128)ltering; Personaliza- tion; Collaborative (cid:128)ltering; Recommender systems; Person- alization; KEYWORDS food computing, personal health navigation, recommendation sys- tems, (cid:131)avor, (cid:131)avour, taste, gustatory media ACM Reference format: Nitish Nag, Aditya Narendra Rao, Akash Kulhalli, Kushal Samir Mehta, Nis- hant Bha(cid:138)acharya, Pratul Ramkumar, Aditya Bharadwaj, Dinkar Sitaram, and Ramesh Jain. 2019. Flavour Enhanced Food Recommendation. In Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected]. MADiMa '19, Nice, France © 2019 ACM. 978-1-4503-6916-9/19/10...$15.00 DOI: 10.1145/3347448.3357169 Figure 1: Mammalian taste receptors are the basic unit of biological taste. Understanding the features which impact these receptors is the fundamental start to pro(cid:128)ling users and food in their culinary preferences. As biological discov- eries in protein structure and function of taste are uncov- ered, the knowledge must be incorporated into the recom- mendation systems and health navigation paradigms [16]. Proceedings of 5th International Workshop on Multimedia Assisted Dietary Management, Nice, France, October 21, 2019 (MADiMa '19), 6 pages. DOI: 10.1145/3347448.3357169 1 INTRODUCTION Food is essential for human life. Beyond sustaining health by pro- viding nourishment, it is also an integral part of human culture and quality of life. Modern information about nutrition and food fosters development of food computing methods [9]. (cid:140)e notion of food computing involves obtaining food data and identifying areas where it can be applied e(cid:130)ectively, such as health, food sciences, culinary art, and human behaviour. Food computing collects data from multiple sources and involves tasks such as perception, recog- nition, retrieval, recommendation, prediction and monitoring of Figure 2: Platform Architecture food intake. One of the key outcomes of food computing is under- standing the relationship between dietary choices and health state [10, 12]. A healthy diet promotes overall well-being and lowers the risk of chronic diseases. To aid in building a healthy diet, algorithms can potentially compute health scores for food items based on the users health status [10, 12], the item nutritional features, along with context and other environmental factors [11]. However, healthy food su(cid:130)ers from the adoption problem, since healthy food can be in con(cid:131)ict with taste preferences [5]. (cid:140)is perception results in people consuming food without full regard for the e(cid:130)ects on their overall health. In this work, we describe a preliminary recommendation system that incorporates taste preferences. We determine to what extent the characteristics of dishes, namely (cid:131)avour and cuisine, and user inclination a(cid:130)ects the quality of food recommendations. In combination, we hope this concept is used to help individuals make health-aware dietary choices that are enjoyable. 2 RELATED WORK Modern recommendation systems proactively identify and provide a user with ranked search results that are context-aware. Earlier food recommendation engines use TF-IDF to generate vectors from food items while taking into account food database information [2]. An input to these systems is generally a question similar to "what's for lunch". Evaluation of these early systems used tradi- tional metrics such as accuracy, precision, and recall. Unfortunately these metrics fail to capture the quality of recommendations in relationship to real world implementation for enjoyment or health. E(cid:130)ectively extending the food recommendation to incorporate the individual health state criteria and culinary (cid:131)avour and user pref- erences will be the next evolution of more personalized food rec- ommendation [4, 6, 7, 10, 12]. (cid:139)alitative analysis based on user feedback will also be essential to improving quality of recommen- dations. Approaches where users are clustered into distinct groups unfortunately may reduce the personal level recommendation [14]. Other approaches involve various levels of personalizing outputs for a user with a unique focus. For instance some evaluations are more focused on usability and appeal of the recommendations, user Table 1: Database Statistics User Database, Users with greater than 5 reviews User Database, Total reviews User Database, Unique Users Food Database, Total Dishes Food Database, Indian Dishes 30,193 22,625 466 1381 1051 previously speci(cid:128)ed interests, or based on a certain demographics [1, 3, 8]. Furthermore, perceptions of what is healthy or tasty vary greatly among people [13]. Many of these research e(cid:130)orts have primarily focused on meeting dietary and nutritional constraints. (cid:140)is is why we see value in building the research body on (cid:131)avour characteristics. 3 OVERVIEW Like most other recommendation systems, ours uses two database components of items and users to form the input. Food items were curated containing their ingredient list, nutritional values and their cuisines were obtained from public food websites. We target food items that re(cid:131)ect the diet of the South Asian audience. Additionally, to account for the regional variety, food items were crowd-sourced by sending out surveys to 200 users. (cid:140)is resulted in a food database containing 1381 items. To ac- count for missing values, we used a nutrition facts database (MyFit- nessPal) to (cid:128)ll in the gaps for nutritional values, while the cuisines were manually tagged. (cid:140)e second component of user pro(cid:128)les was constructed by obtaining user reviews for the food items that were previously scraped from public domain websites and crowd-sourced ratings for the most recent items consumed. User reviews were then used to build a user preferences pro(cid:128)le. For each food item in the curated database, we estimate the intensity of the (cid:128)ve basic (cid:131)avours of sweet, salty, richness, umami and bi(cid:138)er on a scale of 1 to 10, 10 indicating highest intensity. (cid:140)is is done by identifying and quantifying the most in(cid:131)uential chemicals for each (cid:131)avour from the dish. We did not address the basic taste of sour in this work due to challenges in empirically pro(cid:128)ling the (cid:131)avour from the data we gathered. Once the (cid:131)avour scores for all food items have been generated, we consider it as an additional feature for the recommendation engine. (cid:140)is means that each food item will have the (cid:128)ve (cid:131)avour scores as (cid:128)ve extra dimensions. We then apply a similarity score to predict how much a user will rate another food item based on previous ratings. 4 IMPLEMENTATION 4.1 Flavour Computing An objective (cid:131)avour metric is a scale that looks purely at the content of the food item without considering any external factors such as user/cooking preferences. A prime example of this is the Scoville scale, which measures the heat of spiciness of chilli peppers based on the amount of capsaicin present in it. However, no such metric exists for other (cid:131)avours. A(cid:138)empts have been made to establish a relationship between nutrients and taste [15]. We follow a similar approach and a(cid:138)empt to identify the elements that in(cid:131)uence each (cid:131)avour the most based on biological receptor functioning as shown in Figure 1. In all the calculations mentioned below, the total weight considered is the Total Active Nutrient Weight (in grams) (TANW) of the dish. (1) Salt: (cid:140)e quantity of sodium indicates the saltiness of a dish. To highlight the prominence of sodium in the dish relative to its weight, we identify the ratio between the total sodium present in the dish and the total nutritional weight. (cid:140)is value is then normalized for soduium chloride, by using the molar masses of 22.99 and 35.45 g/mol respectively, 100 g of NaCl contains 39.34 g Na and 60.66 g Cl. 100 38.758 · Sodium content(❕) T ANW (1) Salt Score = (2) Sweet: (cid:140)e carbohydrate content in foods consists of monosac- charides, disaccharides and polysaccharides. Monosaccha- rides (glucose, fructose) and disaccharides (sucrose) con- tribute positively towards the sweetness of a dish, while indeigestable polysaccharides (dietary (cid:128)bres) negate their e(cid:130)ects. We do a weighted addition of the two components to compute the sweetness score. su❕ar(❕) − f ibre(❕) Sweet(A) = Sweet(B) = carbohydrates(❕) Final sweet score = x · A + y · B T ANW su❕ar(❕) where x and y are 0.85 and 0.1, respectively. (2) y · k(cid:48) 0 'too bi(cid:138)er'. (cid:140)e rank of each ingredient for each group is added and a weighted addition is performed, taking into account the iron content. Bitter score = x · k 0 (bitter value) + (3) (too bitter value) + z · iron content(❕) where x, y, and z are weights with the values 0.8, 2.4 and 1.3, while k and k(cid:48) are the number of ingredients tagged as bi(cid:138)er and too bi(cid:138)er respectively. (cid:140)e values for bitter are assigned to ingredients based on a relative intensity of bi(cid:138)erness, normalized to 1. (4) Umami: (cid:140)e umami taste is biologically sensed by the amino acid glutamate receptor, which is prominent in protein- rich dishes. (cid:140)e ingredients were divided into groups like meats, vegetables, umami enhancers (MSG), and protein supplements (whey), sorted in order of their glutamate and protein content. A multiplier was assigned to each ingredi- ent group, which was then totalled to obtain the (cid:128)nal group score. (cid:140)e fractional protein content and group score were again subjected to a weighted addition, obtaining the (cid:128)nal umami score. Umami(B) = {❕roup multiplier ∗ ❕roup score} Protein(❕) T ANW Umami(A) = Umami score = A + B (4) where ❕roup multiplier is the weight of each of the fol- lowing groups - Protein supplements, vegetables, meat and savoury phrases, with their respective multipliers being 0.8, 7, 3 and 9.45. (5) Richness: (cid:140)e richness score is computed by considering saturated fats, cholesterol and total fats. (cid:140)e saturated fat content is used as a fraction of the total fat content present in the food item. (cid:140)e ratio of the total fat content to the total active nutritional weight and the amount of cholesterol in the dish relative to its weight is also taken into account while calculating the richness score. (cid:140)e (cid:128)nal score is a linear combination of the aforementioned factors. Al- though richness is not considered a standard taste receptor at the moment, culinary arts have long used it as a factor in designing and cooking dishes. (3) Bi(cid:138)er: Bi(cid:138)erness is indicated by the calcium and iron content in the dish. Although this is a crude metric since bi(cid:138)erness is quite complex, we feel this is an adequate start to pro(cid:128)l- ing bi(cid:138)erness given data availability. To combat the lack of data available for these in Indian dishes, we maintained a list of ingredients that were manually tagged as 'bi(cid:138)er'or A = saturated f at(❕) f at(❕) f at(❕) T ANW B = cholesterol(m❕) T ANW C = · 1000 Table 2: Score Samples Table 3: Obtained Error Values Dish Curried bean salad Aloo phujia Palak paneer Channa masala Cilantro pesto Bi(cid:138)er Rich 0.961 0.7 2.3 2.149 2.25 1.436 2.79 2.012 0.604 4.45 Salt 2.63 3.116 1.184 3.41 0.904 Sweet Umami 2.47 2.534 9.271 0.27 8.064 1.12 9.538 0.88 0.57 2.198 Taste Bi(cid:138)er Rich Salt Sweet Umami Error 1.25 -0.45 -0.38 0.02 8.64 D = ( x · A) + (y · B) + (z · C) Richness score = D 0.992 · 10 (5) (cid:140)e weights x, y and z are 0.5, 0.7, 50 respectively, and were arrived at via matching with user descriptions of richness. Sample scores are shown in Table 2. For each of the (cid:128)ve food items, (cid:131)avour scores are indicated on a scale of 1 to 10. To validate this system, we conducted a survey of 150 users. We built a website where the users were required to assign (cid:131)avour scores for randomly sampled dishes. (cid:140)e survey entries were used as an input to the validation system, along with the (cid:131)avour scores generated by the system. It then computes the error which indicates the di(cid:130)erence between the system-generated and the user-provided scores. Note that error is 0 if abs(variance) ¡ ACTION THRESHOLD. error = Q3 · ln(variance) Final taste score = Generated taste score − error (6) Here, Q3 is the upper quartile of the list of results obtained from the survey. ACTION THRESHOLD is a tuned value above which the error correction is activated per taste. (cid:140)is is done to account for minor user-to-user variations. (cid:140)is process is repeated per taste to obtain scores adjusted for user feedback. Here, the variance is computed di(cid:130)erently than the conventional procedure - it is computed on the data list obtained by computing the di(cid:130)erence between the generated and the surveyed taste scores. (cid:140)is, therefore, provides the actual variation between the generated scores and what the surveyed users expect. Including the upper quartile ensures the majority (75%) of user responses are accounted for, while avoiding the outliers, such as responses that may go against the general consensus. An example of such a response is a user whose taste preference is signi(cid:128)cantly skewed towards a particular (cid:131)avour. (cid:140)e error in Table 3 has been computed over the food data set for all users. (cid:140)e values as indicated in the table above shows the sweet, salty, bi(cid:138)er and rich (cid:131)avour scores generated by our system are in line with the general consensus of the surveyed users. However, there is a signi(cid:128)cant deviation from the user-rated scores and the system-generated scores in the case of umami. A possible explanation for this anomaly could be due to the fact that a good understanding of the umami (cid:131)avour is lacking among the general Table 4: Sample vector (Truncated) Dish\Tags Aloo Paratha Palak Paneer Potato 0.877 0 Spinach 0 0.819 Flour 0.685 0 Paneer … … 0.841 … 0 Table 5: Same as Table 4, including taste scores (Truncated) Dish\Tags Aloo Paratha Palak Paneer Potato 0.877 0 Spinach … Bi(cid:138)er … 2.29 … 3.72 0.819 0 Salt … 3.83 … 3.02 … populace of our study. If this data is looked at on a per-user basis, it behaves as a sensitivity factor for each (cid:131)avour. (cid:140)is way, a pro(cid:128)le of the (cid:131)avour sensitivity can be developed, that can be used to personalize the recommendation of food items even further. 4.2 Recommendation Engine In our work we explore two types of recommendation systems - Collaborative Filtering and Content Based Filtering. With an aim to incorporate food (cid:131)avours to improve the quality of recommen- dations, we compare and contrast the e(cid:130)ects of including (cid:131)avour when making food recommendations. (1) Collaborative Filtering: (cid:140)e Collaborative Filtering approach for recommenda- tion looks to make predictions regarding a user's preference by collecting preferences from multiple similar users. (cid:140)e assumption in Collaborative Filtering is that people who view and evaluate items in a similar fashion are likely to assess other food dishes in a similar manner. Matrix Factorization is a Collaborative Filtering algo- rithm that takes as input a User-Item Rating Matrix. (cid:140)is matrix is sparse since it is not likely that a user has rated all dishes in the food database. (cid:140)e approach aims to break down the User-Item matrix into two matrices of latent user and item representation. (cid:140)e intent of this approach is to reform the original User-Item matrix while (cid:128)lling in the missing ratings. Figure 3 depicts a User-Item Matrix and latent matrices, which when multiplied, yield predicted scores for items a user has not rated while trying to gener- ate scores as close to the original score for items the user has rated. When making recommendations for a particular user, the Collaborative Filtering Algorithm only considers other Figure 3: User-Item and latent matrices Table 6: Dishes reviewed by the user Dish Name Chole Bhature Paneer Tikka Masala Veg Biryani Bisi Bele Bath Aloo Paratha Vegetarian Korma Veg Momos Veg Fried Rice Rajma Naan Dal Makhani Masala Dosa Palak Paneer Khakhra Malai Ko(cid:137)a Rating 4 5 4 2 3 2 4 4 3 4 5 5 3 2 3 Table 7: Results on training data Method TF-IDF Matrix Factorisation TF-IDF with (cid:131)avour RMSE 1.030 1.040 1.041 Table 8: Results of online A/B testing Method TF-IDF Matrix Factorisation TF-IDF with (cid:131)avour RMSE 2.93 2.11 1.94 similar users. It does not take into account the content or features of an item, hence, food (cid:131)avour cannot be incorpo- rated when using this method to make recommendations. (2) Content Based Filtering: Content Based Filtering algorithm takes into consid- eration the content or properties of an item. Items are described with a set of descriptor terms or tags whichform the basis for item-based comparison. Term Frequency Inverse Document Frequency (TF-IDF) has its roots in Information Retrieval but (cid:128)nds its appli- cation in Content Based Recommendation Systems. We describe food dishes using their ingredients, the cuisine and whether the dish is vegetarian or non-vegetarian. A few examples of tags associated with some dishes are: • 'Aloo Paratha '- [vegetarian, cumin, (cid:131)our, ginger, lemon, masala, oil, paratha, potato, salt, wheat, north indian, punjab] • 'Palak Paneer '- [vegetarian, clove, coriander, cumin, curry, garlic, ginger, masala, paneer, salt, spinach, tomato, turmeric, north Indian, Punjab] We associated the 1381 dishes in our database with 397 unique tags as described above. Next, for each tag associated with a dish, the TF-IDF scores for the tag was calculated using the standard TF-IDF formula. Wx,y = t f x,y · log( N d fx ) (7) Where, • x is the set of tags and y is the set of dishes • t fx,y = 1 if dish y has tag x else 0 • d fx = number of dishes containing tag • N = total number of dishes For each dish, the TF-IDF calculation results in the for- mation of a vector of length 397. A slice of such a vector is shown in Table 4. For a given user, equation (8) is used to calculate the preference score for an unrated dish i, using the scores for all dishes j that the user has rated, by calculating the similarity between dish i and j, and weighing the cosine similarity with the dish score j. Similarly, as Table 5 depicts, user preference for dishes is also calculated a(cid:137)er including 5 dish (cid:131)avours and performing a weighted average of the cosine similarity between the dish's ingredient descriptors Ultimately, the body of food computing research in understand- ing how item taste needs to be explored in much greater detail. (cid:140)is may be through a combination of more detailed databases including chemical pro(cid:128)les and quantitative metrics to understand (cid:131)avours. In parallel, understanding the taste preferences at an individual level needs to be captured. Accurate personal food logging is a notable challenge in this area that will help fuel be(cid:138)er user under- standing. We hope the above preliminary research e(cid:130)orts aid in the momentum towards be(cid:138)er quality of life through healthy and enjoyable culinary experiences. REFERENCES [1] [6] [7] [4] David Elsweiler, Morgan Harvey, Bernd Ludwig, and Alan Said. 2015. Bringing Johan Aberg. 2006. Dealing with Malnutrition: A Meal Planning System for Elderly.. In AAAI spring symposium: argumentation for consumers of healthcare. 1 -- 7. [2] MA El-Dosuky, MZ Rashad, TT Hamza, and AH El-Bassiouny. 2012. Food recommendation using ontology and heuristics. In International conference on advanced machine learning technologies and applications. Springer, 423 -- 429. [3] Mehdi Elahi, Mouzhi Ge, Francesco Ricci, Ignacio Fern´andez-Tob´ıas, Shlomo Berkovsky, and Massimo David. 2015. Interaction design in a mobile food recommender system. In CEUR Workshop Proceedings. CEUR-WS. the" healthy" into Food Recommenders.. In DMRS. 33 -- 36. [5] Suzanna E Forwood, Alexander D Walker, Gareth J Hollands, and (cid:140)eresa M Marteau. 2013. Choosing between an apple and a chocolate bar: the impact of health and taste labels. PloS one 8, 10 (2013), e77500. Jill Freyne and Shlomo Berkovsky. 2010. Intelligent food planning: personalized recipe recommendation. In Proceedings of the 15th international conference on Intelligent user interfaces. ACM, 321 -- 324. Jill Freyne, Shlomo Berkovsky, and Gregory Smith. 2011. Recipe recommendation: accuracy and reasoning. In International conference on user modeling, adaptation, and personalization. Springer, 99 -- 110. [8] Fang-Fei Kuo, Cheng-Te Li, Man-Kwan Shan, and Suh-Yin Lee. 2012. Intelligent menu planning: Recommending set of recipes by ingredients. In Proceedings of the ACM multimedia 2012 workshop on Multimedia for cooking and eating activities. ACM, 1 -- 6. [9] Weiqing Min, Shuqiang Jiang, Linhu Liu, Yong Rui, and Ramesh Jain. 2018. A Survey on Food Computing. arXiv preprint arXiv:1808.07202 (2018). able Guidance for Improved (cid:139)ality of Life. Computer 52, 4 (2019), 12 -- 20. [11] Nitish Nag, Vaibhav Pandey, and Ramesh Jain. 2017. Live Personalized Nutrition Recommendation Engine. In Proceedings of the 2nd International Workshop on Multimedia for Personal Health and Health Care. ACM, 61 -- 68. [12] Nitish Nag, Vaibhav Pandey, Preston J Putzel, Hari Bhimaraju, Srikanth Krishnan, and Ramesh Jain. 2018. Cross-modal health state estimation. In Proceedings of the… ACM International Conference on Multimedia, with co-located Symposium & Workshops. ACM International Conference on Multimedia, Vol. 2018. NIH Public Access, 1993. [13] Ferda O(cid:131)i, Yusuf Aytar, Ingmar Weber, Raggi Al Hammouri, and Antonio Tor- ralba. 2017. Is Saki #delicious? (cid:140)e food perception gap on instagram and its relation to health. In 26th International World Wide Web Conference, WWW 2017. 509 -- 518. h(cid:138)ps://doi.org/10.1145/3038912.3052663 arXiv:1702.06318 [14] Martin Svensson, Jarmo Laaksolahti, Kristina Hook, and Annika Waern. 2000. A recipe based on-line food store. In Proceedings of the 5th international conference on Intelligent user interfaces. ACM, 260 -- 263. [15] Mirre Viskaal van Dongen, Marjolijn C van den Berg, Nicole Vink, Frans J Kok, and Cees de Graaf. 2012. Taste -- nutrient relationships in commonly consumed foods. British Journal of Nutrition 108, 1 (2012), 140 -- 147. [16] David A Yarmolinsky, Charles S Zuker, and Nicholas J P Ryba. 2009. Common Sense about Taste: From Mammals to Insects. (oct 2009), 234 -- 244 pages. h(cid:138)ps: //doi.org/10.1016/j.cell.2009.10.001 [10] Nitish Nag and Ramesh Jain. 2019. A Navigational Approach to Health: Action- and (cid:131)avour descriptors. Assume α such that α ∈ dishes rated by the user and β to be CosineSimilarity(i,j). (cid:140)en the user preference score will be:   α β ∀i ∈ All dishes in the database α ·β · U serScore(i) (8) 5 RESULTS We consider three recommendation systems, the (cid:128)rst one being an implementation of collaborative (cid:128)ltering (Matrix Factorization) and the second and third being implementations of content based (cid:128)ltering (TF-IDF), with and without (cid:131)avour incorporated respec- tively. (cid:140)e users previous ratings as seen in Table 6 revolve around a lot of rice based dishes as well as rich dishes. Matrix factorization predicts dishes based on the pa(cid:138)erns of other users. (cid:140)is however fails to consider the health aspect. TF-IDF improves upon this and suggests much healthier alternatives but erroneously predicts what a user may like. TF-IDF with (cid:131)avour is the best of both worlds where it predicts healthy food items while maintaining an accept- able level of user taste preferences. (cid:139)antitatively Table 7 shows the Root Mean Squared Error on the training data which fails to decisively showcase which method is the best. However, the RMSE for our online A/B testing between three various recommendation approaches, as shown in Table 8 yields much be(cid:138)er results as rea- soned in the qualitative analysis and therefore, we conclude that using TF-IDF with (cid:131)avour improves recommendation. We developed a rudimentary cuisine classi(cid:128)er using Naive-Bayes to assign cuisines to dishes based on their ingredients. However, the set of dishes we were working with had a heavy bias towards North Indian dishes, and thus had a insigni(cid:128)cant impact on the quality of recommendations. 6 FUTURE WORK (cid:140)e quality of recommendations could be signi(cid:128)cantly improved with the incorporation of a cuisine element. However, this will re- quire our data set to expand to a multitude of cuisines. (cid:140)e prepara- tion techniques will also need to be considered during classi(cid:128)cation, as it varies from cuisine to cuisine. Contextual factors such as seasonal sensitivity could be incorpo- rated into the system, that adds an element of personalizing based on more context. For example, people enjoy hot drinks in cold weather, or cold drinks in hot weather. Another example - a nov- elty function could be incorporated which considers the seasonal trend of a users preferences which can then be used to (cid:128)ne-tune the (cid:131)avour scores. Signi(cid:128)cant improvements can be made to the (cid:131)avour pro(cid:128)ling, with the availability of complete and accurate nutritional data for store-bought foods. Existing regulations do not mandate all sup- pliers to report such data in detail. However, other (cid:131)avour scores could be re(cid:128)ned if the data is present. Our database of foods can grow considerably larger as a result of this. We initially were inspired by encouraging people to eat healthier through be(cid:138)er recommendations. (cid:140)e limited scope of this work is on food (cid:131)avour pro(cid:128)ling, and we hope to bolster the work and accelerate the research (cid:128)eld by more thorough integration of health factors into food recommendation at large.
1904.02846
1
1904
2019-04-05T01:57:29
A Bayesian-Based Approach for Public Sentiment Modeling
[ "cs.SI", "stat.AP" ]
Public sentiment is a direct public-centric indicator for the success of effective action planning. Despite its importance, systematic modeling of public sentiment remains untapped in previous studies. This research aims to develop a Bayesian-based approach for quantitative public sentiment modeling, which is capable of incorporating uncertainty and guiding the selection of public sentiment measures. This study comprises three steps: (1) quantifying prior sentiment information and new sentiment observations with Dirichlet distribution and multinomial distribution respectively; (2) deriving the posterior distribution of sentiment probabilities through incorporating the Dirichlet distribution and multinomial distribution via Bayesian inference; and (3) measuring public sentiment through aggregating sampled sets of sentiment probabilities with an application-based measure. A case study on Hurricane Harvey is provided to demonstrate the feasibility and applicability of the proposed approach. The developed approach also has the potential to be generalized to model various types of probability-based measures.
cs.SI
cs
Proceedings of the 2019 Winter Simulation Conference N. Mustafee, K.-H.G. Bae, S. Lazarova-Molnar, M. Rabe, C. Szabo, P. Haas, and Y-J. Son, eds. A BAYESIAN-BASED APPROACH FOR PUBLIC SENTIMENT MODELING Yudi Chen Wenying Ji Qi Wang Department of Civil, Environmental and Department of Civil and Environment Infrastructure Engineering George Mason University Fairfax, VA 22030, USA Engineering Northeastern University Boston, MA 02115, USA ABSTRACT Public sentiment is a direct public-centric indicator for the success of effective action planning. Despite its importance, systematic modeling of public sentiment remains untapped in previous studies. This research aims to develop a Bayesian-based approach for quantitative public sentiment modeling, which is capable of incorporating uncertainty and guiding the selection of public sentiment measures. This study comprises three steps: (1) quantifying prior sentiment information and new sentiment observations with Dirichlet distribution and multinomial distribution respectively; (2) deriving the posterior distribution of sentiment probabilities through incorporating the Dirichlet distribution and multinomial distribution via Bayesian inference; and (3) measuring public sentiment through aggregating sampled sets of sentiment probabilities with an application-based measure. A case study on Hurricane Harvey is provided to demonstrate the feasibility and applicability of the proposed approach. The developed approach also has the potential to be generalized to model various types of probability-based measures. 1 INTRODUCTION "Public sentiment is everything," as Abraham Lincoln once said. Government agencies and enterprises have been noticing the importance of public sentiment, and, in turn, employed public sentiment measurement in various applications, such as public opinion mining (O'Connor et al. 2010), customer relationship management (Ang 2011), and enterprise marketing services (Duan et al. 2013), to achieve effective and efficient policy-making and service or product quality improvement. Generally, public sentiment is learned through a sample survey in which a set of people sampled from the interest population are interviewed for their opinions on the issues being considered (Brooker et al. 2003). Although being simple and straightforward, this approach typically solely covers a limited sample size due to labor-intensive and time- consuming interviews (Carter et al. 2001). Recently, the rapid growth and utilization of social media platforms (e.g., Facebook, Twitter, and Instagram), on which people share opinions and sentiments, provide a valuable opportunity for collecting large-scale datasets. However, these large-scale datasets are in fact collections of small datasets with various specific conditions (Ghahramani 2015). For example, in social media-based disaster management, there might be a large amount of disaster-related data over a state, but there is still a relatively small amount of data in each county or city for analyzing local public sentiment and planning relief actions (Ragini et al. 2018). In addition to that, the process of collecting interview- or social media-based sentiments is a random sampling process from the interest population. The smaller the sampled dataset is, the larger uncertainty it includes, and vice versa. Therefore, it becomes necessary to incorporate this inherent uncertainty for accurate and reliable modeling of public sentiment, especially when the sampled dataset is small. Public sentiment is an aggregation of individuals' sentiments, each of which is typically labeled as negative, neutral, or positive (Beigi et al. 2016). Naturally, sentiment probabilities, which represent ratios Chen, Wang, and Ji for the three sentiments in the interest population, are basic predictors for estimating public sentiment (Yu and Kak 2012). Uncertainty of public sentiment is from the uncertainty of sentiment probabilities that is caused by the statistical variation of the randomly sampled dataset. Recently, researchers have successfully modeled the statistical variation using Beta distribution and binomial distribution to measure binary data uncertainty in the domain of quality control (Ji and Abourizk 2017). This research has inspired us to utilize Dirichlet distribution and multinomial distribution, which are the generalized version of Beta and binomial distributions, to model the uncertainty of sentiment probabilities. Also, the method of aggregating individuals' sentiments heavily depends on applications and requires a systematic review for guiding the selection of an appropriate aggregation method. Therefore, a systematic approach, which is capable of incorporating the inherent uncertainty of the sampled dataset and guiding the selection of the aggregation method, is needed for public sentiment modeling. The present study aims to develop a Bayesian-based approach to quantitatively model public sentiment in an accurate and reliable manner. Explicitly, the proposed approach (1) incorporates prior sentiment information and sentiment observations via Bayesian inference for enhancing the estimation of public sentiment; (2) guides the selection of an aggregation method for estimating public sentiment from an application-based perspective; and (3) models public sentiment in a systematic and reliable manner through the proposed Bayesian-based approach. The content of this paper is organized as follows. In Section 2, details of the proposed approach are introduced through the steps of sentiment modeling, sentiment integration, and public sentiment measurement. In Section 3, a case study on Hurricane Harvey is presented to demonstrate the feasibility and applicability of the proposed approach. In Section 4, research contributions and limitations are thoroughly discussed. 2 METHODOLOGY As depicted in Figure 1, the proposed approach consists of sentiment modeling, sentiment integration, and public sentiment measurement. First, prior knowledge on sentiment probabilities and evidence from new sentiment observations are modeled through a Dirichlet distribution and a multinomial distribution respectively. Then, the prior knowledge and the new evidence are integrated via Bayesian inference for deriving a posterior distribution on sentiment probabilities. Meanwhile, the posterior distribution is used to update the prior knowledge. Finally, public sentiment is estimated through aggregating sentiment probabilities that are sampled from the posterior distribution. Figure 1: Bayesian-based approach for modeling the public sentiment. 2.1 Sentiment Modeling The modeling of sentiment probabilities, which summarizes and quantifies the sentiment information, is a core step to measure public sentiment. Here, sentiment probabilities are modeled through the integration of prior knowledge and new sentiment observations. In this section, prior knowledge and sentiment observations are modeled with a Dirichlet distribution and a multinomial distribution respectively for deriving the posterior distribution of sentiment probabilities. Bayesian inferencePosterior sentiment informationRandom samplingNet sentimentScaled net sentimentPositive to polarity ratio Prior knowledge modelingSentiment observations modeling 2.1.1 Prior Knowledge Modeling Chen, Wang, and Ji In Bayesian inference, a prior distribution of an uncertain variable expresses one's belief on this variable before new evidence is taken into account. In this research, variables in interest are sentiment probabilities for which a Dirichlet distribution is chosen as the prior due to following reasons: (1) sentiment probabilities are bounded within the range of [0, 1] which matches the natural boundaries of a Dirichlet distribution; (2) the property that the Dirichlet distribution is a conjugate prior to the likelihood function of new sentiment observations provides conveniences for deriving an analytical posterior distribution; and (3) parameters of the Dirichlet distribution are intuitively and physically meaningful and easy to estimate from sentiment observations. Hereafter, we use exact numbers {1, 2, 3} to represent the sentiments {negative, neutral, positive} for making following formulas concise and descent. Therefore, prior knowledge on sentiment probabilities 𝜃1, 𝜃2, 𝜃3 is modeled as 𝑝(𝜽) = 𝑝(𝜃1, 𝜃2, 𝜃3) = 𝐷𝑖𝑟(𝛼1, 𝛼2, 𝛼3) = 1 𝐵(𝛼1, 𝛼2, 𝛼3) 3 ∏ 𝜃𝑖 𝑖=1 𝛼𝑖−1 . where 𝐵 is a multivariate Beta function for normalization, 𝛼1, 𝛼2, 𝛼3 are three shape parameters that control the shape of a Dirichlet distribution. Figure 2 depicts four Dirichlet distributions with various combinations of shape parameters. Color blue represents low probability density, while color red represents high probability density. All sets of sentiment probabilities are constrained over a simplex in ℝ3. Ideally, a prior distribution is constructed to match an expert's belief on the variables. However, such belief is a mental condition and heavily depends on the expert's knowledge to a specific condition(Tokdar 2013). The determination of a prior distribution, especially for small datasets, is beyond the scope of this paper in spite of the importance. In this research, a uniform (i.e., non-informative) prior distribution, Dir(1, 1, 1), is used for demonstrating the approach. Figure 2: Probability density plots for Dirichlet distributions with various sets of parameters. 2.1.2 Sentiment Observations Modeling In Bayesian inference, new evidence or observed data is generally modeled as a likelihood function for updating prior information. Here, the likelihood function is a multinomial distribution since sentiment is a categorical variable with three identified polarities (i.e., negative, neutral, and positive). Suppose that there are 𝑛 sentiment observations in the sampled dataset where each observation produces exactly one of the sentiments. Out of 𝑛 sentiment observations, 𝑥1 observations are with negative sentiment, 𝑥2 observations are with neutral sentiment, and 𝑥3 observations are with positive sentiment. Therefore, the likelihood function is expressed as Dir(1,1,1)Dir(5,5,5)Dir(6,6,3)Dir(10,3,2) Chen, Wang, and Ji 𝐿(𝑿𝜽) = 𝐿(𝑥1, 𝑥2, 𝑥3𝜃1, 𝜃2, 𝜃3) = where Γ is a Gamma function. 2.2 Sentiment Integration Via Bayesian Inference 𝑖 Γ(∑ 𝑥𝑖 + 1 ) ∏ Γ(𝑥𝑖 + 1) 𝑖 𝑥𝑖 ∏ 𝜃𝑖 𝑖 . Bayesian inference is a method of statistical inference in which Bayes' theorem is used to update the probability for parameters or variables as more evidence or information becomes available (Gelman et al. 2013). Bayesian inference derives the posterior distribution through the integration of two antecedents, the prior 𝑝(𝜽) and the likelihood function 𝐿(𝑿𝜽), which represent the prior knowledge and new sentiment observations respectively. As described in Section 2.1, the prior knowledge is modeled with a Dirichlet distribution that is a conjugate prior to the likelihood function. Therefore, the posterior distribution is another Dirichlet distribution and is expressed as 𝑝(𝜽𝑿) = 𝐿(𝑿𝜽)𝑝(𝜽) 𝑝(𝑿) = 𝐷𝑖𝑟(𝛼1 + 𝑥1, 𝛼2 + 𝑥2, 𝛼3 + 𝑥3). Notice that, the three shape parameters 𝛼1 + 𝑥1 , 𝛼2 + 𝑥2 , and 𝛼3 + 𝑥3 of the posterior are simple summations of the corresponding shape parameters 𝛼1, 𝛼2, 𝛼3 in the prior distribution and the numbers of observations 𝑥1, 𝑥2, 𝑥3 for the three types of sentiments in the sampled dataset. This intuitive property provides an easy and efficient way for deriving the posterior distribution to update beliefs of sentiment probabilities. It also makes the shape parameters of the posterior distribution physically meaningful. 2.3 Public Sentiment Measurement Practically, public sentiment is measured through the aggregation of sentiment probabilities that summarize the sentiment information in the interest population (Yu and Kak 2012). A public sentiment measure -- the way of aggregating sentiment probabilities -- is determined by the presented sentiment information associated with a specific application. For example, in a movie sales prediction, positive to negative ratio is used as the public sentiment measure to track sentiment variations in different stages (i.e., before and after the movie release) (Zhang and Skiena 2009). Table 1 lists the most commonly used public sentiment measures and gives a brief summary for each of them, including their formulas, boundaries, and applications. Other than these listed measures, public sentiment measure can also be designed to accommodate the specific sentiment information according to the application. Table 1: Summary of the commonly used public sentiment measures. Measure Formula Boundary Net sentiment (Makrehchi 2013) 𝜃3 − 𝜃1 [−1, 1] + 0.5) [0, 100] Scaled net sentiment (Lică and Tută 2011) 100 × ( Positive sentiment probability (Zhang and Skiena 2009) Negative sentiment probability (Zhang and Skiena 2009) 𝜃3 − 𝜃1 2 𝜃3 𝜃1 Presented sentiment information Sentiment differences for obtaining an overall score Sentiment differences in a more interpretable range [0, 1] Positive sentiments [0, 1] Negative sentiments Chen, Wang, and Ji Positive to polarity ratio (Nguyen et al. 2012) Positive to negative ratio (Asur and Huberman 2010) 𝜃3 / (𝜃1 + 𝜃3) [0, 1] Sentiment change instead of absolute sentiment values 𝜃3/𝜃1 [0, ∞] Sentiment change with a larger variance To have an intuitive understanding of the listed public sentiment measures, histograms of public sentiment based on these measures are shown in Figure 3 with a given posterior distribution on sentiment probabilities, Dir(4, 15, 3). This posterior distribution is consistent with most real applications where data with neutral sentiment occupies a large portion in the dataset (Nakov et al. 2016). For the net sentiment and scaled net sentiment, the distribution shapes are almost same and tend to be normal but with different sentiment ranges. Both the positive sentiment probability and negative sentiment probability are right- skewed, and they are actually Beta distributions since the remaining two probabilities (neutral+negative or neutral+positive) can be taken as one probability, non-positive or non-negative. Compared with the positive to polarity ratio, the positive to negative ratio has no upper limit and is possible to have extreme values. In the following case study, the negative sentiment probability (NSP) measure will be used for estimating public sentiment for enhanced disaster management due to its representativeness to public demands (Ragini et al. 2018). Figure 3: Histograms of public sentiment based on various measures. 3 CASE STUDY In the era of information age, social media platforms are playing an increasingly central role in measuring public sentiments (O'Connor et al. 2010). Twitter, with its social and informational characteristics, is well suited for a fast-paced emergency environment in collecting nearly real-time public sentiment information (Kryvasheyeu et al. 2016). In this section, Tweets, which are posted in Houston during Hurricane Harvey, tied with Hurricane Katrina as the costliest tropical cyclone on record (National Hurricane Center 2018), are collected to model public sentiment through the proposed Bayesian-based approach. 3.1 Data Description Chen, Wang, and Ji The Twitter streaming API was used for collecting geotagged tweets (Wang and Taylor 2016). The collected geotagged tweets were filtered to ensure that the modeled public sentiment is related to Hurricane Harvey and localized in Houston, TX. First, we re-extracted Harvey-related tweets posted during Hurricane Harvey (i.e., Aug. 24, 2017 to Sep. 21, 2017) which contain one of the Harvey-specific keywords (i.e., Hurricane, Harvey, and HurricaneHarvey). Then, the Google map API was used to assign the location information (e.g., country, state, and city) to the Harvey-related tweets, and tweets posted in Houston, TX were further extracted. Totally, 2,963 tweets were used for modeling Harvey-related public sentiment. Hurricane Harvey brought catastrophic rainfall-triggered flooding in the Houston metropolitan area (Blake and Zelinsky 2018). Figure 4 depicts the daily number of tweets (represented by color blue) and the precipitation in Houston (represented in color red) obtained from the National Oceanic and Atmospheric Administration (NOAA). Similar trends are observed in numbers of daily tweets and precipitation. The numbers of daily tweets first increased dramatically during Aug. 24, 2017 to Aug. 27, 2017 due to the extensive rainfall and reached the peak on Aug. 28, 2017. Unlike the sharp decline in precipitation, the numbers of daily tweets gradually fall off due to the slower process of flood receding and post-disaster recovery. Figure 4: Number of daily tweets and precipitation in Houston during Hurricane Harvey. 3.2 Sentiment Prediction In this section, sentiment for each extracted tweet is predicted as negative, neutral, or positive using SentiStrength, a lexicon-based approach (Thelwall 2017). The core of SentiStrength is a lexicon of 2310 sentiment words and word stems obtained from the Linguistic Inquiry and Word Count (LIWC) program (Pennebaker et al. 2003), the General Inquirer list of sentiment terms (Stone et al. 1966) and ad-hoc additions made during testing. In addition to the lexicon, SentiStrength includes a list of emoticons and a list of idioms together with human-assigned sentiment scores for making accurate sentiment predictions, especially in social media data where emoticons and idioms are extensively used. In most tested social media cases, SentiStrength works consistently well and approaches human-level accuracy (Thelwall 2017). We, therefore, applied the Java-version SentiStrength in this case study. For illustration purposes, Figure 5 shows three sample tweets with negative, neutral and positive sentiments respectively. As depicted in Figure 4, most tweets and precipitation are observed in the first two weeks (Aug. 24, 2017 to Sep. 6, 2017). Therefore, for illustration purpose, only tweets posted in the first two weeks are analyzed for public sentiment modeling. Figure 6 is a summary of the numbers of daily observations for each sentiment, color blue represents negative, color gray represents neutral, and color red represents positive. These results indicate that tweets with neutral sentiment dominate the data set mainly due to that a large portion of the extracted tweets is for information sharing purposes (e.g., disaster situation report and relief resources sharing) instead of public opinion expression. Chen, Wang, and Ji (a) Negative sentiment (b) Neutral sentiment (c) Positive sentiment Figure 5: Sample tweets with negative, neutral and positive sentiment respectively. Figure 6: Numbers of daily tweets for each sentiment polarity. 3.3 Public Sentiment Modeling As described in previous sections, public sentiment is measured through aggregating sentiment probabilities, which summarize the sentiment information in the interest population, with a public sentiment measure. Here, negative sentiment probability (NSP) is employed to measure public sentiment since negative sentiment generally represents public demands (Ragini et al. 2018). The sentiment probabilities are sampled from the posterior distribution which is derived by integrating the sentiment information in prior knowledge and daily tweets via Bayesian inference. Table 2 lists the utilized sentiment information, including the prior, numbers of daily tweets for each sentiment, and the posterior distribution of sentiment probabilities. To estimate the daily NSP, the following steps are conducted. First, 1,000 sets of sentiment probabilities (𝜃1, 𝜃2, 𝜃3) are randomly sampled from the corresponding daily posterior distribution. And then, the NSP 𝜃1 in each set is saved for constructing the distribution of daily NSP. To visually represent and compare the daily NSP, a side-by-side plot in terms of the mean and 95% credible interval is generated, as shown in Figure 7. The red square is the mean value of daily NSP, and the blue bars are the lower and upper limit of the credible interval. The credible interval is inversely proportional to the uncertainty of daily NSP and a smaller credible interval indicates that the daily NSP is measured with a larger daily tweet dataset. The NSP ranges from nearly 0 to 0.12 and this is because tweets with neutral sentiment dominate in daily tweets. The mean value of the daily NSP first increases rapidly and reaches the peak at Aug. 28, then gradually declines. In addition, the uncertainties during Aug. 27 to Aug. 29 are much smaller than other dates due to the large size of available daily tweets. These observed patterns are intuitively understandable. In the beginning phase of Hurricane Harvey (Aug. 24, 2017 to Aug. 28, 2017), negative sentiment surges due to extensive inconveniences and severe damages caused by the extreme rainfall brought by Hurricane Harvey, and then Twitter user 1Twitter user 2Twitter user 3 progressively declines due to the ongoing relief actions in the following recovery phase. These consistencies between the observed patterns and intuitive understanding of human reactions to disasters verify the applicability and feasibility of the proposed modeling approach. Chen, Wang, and Ji Table 2: Summary of the sentiment information. Date (Year 2017) Prior Distribution Numbers of daily tweets for each sentiment (𝑥1, 𝑥2, 𝑥3) Posterior Distribution Aug. 24 Aug. 25 Aug. 26 Aug. 27 Aug. 28 Aug. 29 Aug. 30 Aug. 31 Sep. 01 Sep. 02 Sep. 03 Sep. 04 Sep. 05 Sep. 06 Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) Dir(1, 1, 1) (2, 41, 6) (7, 185, 18) (15, 177, 17) (31, 339, 41) (38, 347, 38) (30, 326, 28) (21, 230, 32) (11, 122, 14) (7, 122, 9) (6, 87, 7) (4, 63, 5) (3, 51, 8) (3, 45, 8) (1, 38, 10) Dir(3, 42, 7) Dir(8, 186, 19) Dir(16, 178, 18) Dir(32, 340, 42) Dir(39, 348, 39) Dir(31, 327, 29) Dir(22, 231, 33) Dir(12, 123, 15) Dir(8, 123, 10) Dir(7, 88, 8) Dir(5, 64, 6) Dir(4, 52, 9) Dir(4, 46, 9) Dir(2, 39, 11) Figure 7: Daily negative sentiment probability for the first two weeks. 4 CONCLUSION Public sentiment is a critical yet often uncertain factor that is highly correlated with the success of action planning in various applications. In this research, a novel Bayesian-based approach is inventively proposed to model public sentiment to integrate the sentiment information from the prior knowledge and sentiment observations in a systematic and reliable manner. In addition, a systematic guidance for the selection of a public sentiment measure is further discussed. A real case of modeling Hurricane Harvey-related public Chen, Wang, and Ji sentiment in Houston, TX is used as an example to demonstrate the feasibility and applicability of the proposed approach. This research contributes to the academia by (1) developing a Bayesian-based analytical model to incorporate both the prior sentiment information and newly collected sentiment observations; (2) reviewing various public sentiment measures in terms of their formulas, boundaries, and applications; and (3) deriving a systematic approach to include uncertainty of public sentiment reliably. For practitioners, this proposed approach is capable of (1) selecting a public sentiment measure based on the corresponding application; and (2) ranking public sentiment in a more reliable way by including uncertainty for planning actions. Although this research proposes an approach for incorporating uncertainty of public sentiment caused by the statistical variation of the sampled dataset, the uncertainty caused by the disagreements among multiple sentiment classifiers is not included. In the future, the authors will incorporate such uncertainty with the statistical variation for a more advanced public sentiment modeling. ACKNOWLEDGMENTS This study is supported by the Thomas F. and Kate Miller Jeffress Memorial Trust and the National Science Foundation (Grant No. 1761950). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the Thomas F. and Kate Miller Jeffress Memorial Trust and the National Science Foundation. The authors also gratefully acknowledge the support of internal grants from the Global Resilience Institute, Northeastern University. REFERENCES Ang, L. 2011. "Community Relationship Management and Social Media". Database Marketing & Customer Strategy Management 18(1): 31 -- 38. Asur, S., and Huberman, B. A. 2010. "Predicting the Future With Social Media". In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Volume, August 31th -- September 3th, Toronto, Canada, 492 -- 499. Beigi, G., Hu, X., Maciejewski, R., and Liu, H. 2016. "An Overview of Sentiment Analysis in Social Media and Its Applications in Disaster Relief". In Sentiment Analysis and Ontology Engineering, edited by W. Pedrycz, and S. Chen, 313 -- 340. Cham: Springer International Publishing. Blake, E. S., and Zelinsky, D. A. 2018. "Tropical Cyclone Report - Hurricane Harvey". National Hurricane Center. Brooker, R. G., College, A., 2003. Methods Schaefer, T. of Measuring Public Opinion. and http://www.uky.edu/AS/PoliSci/Peffley/pdf/473Measuring%20Public%20Opinion.pdf, assessed 15th March 2019. Carter, J. C., Aime, A. A., and Mills, J. S. 2001. "Assessment of Bulimia Nervosa : A Comparison of Interview and Self-Report Questionnaire Methods". International Journal of Eating Disorders 30(2): 187 -- 192. Duan, W., Cao, Q., Yu, Y., and Levy, S. 2013. "Mining Online User-Generated Content : Using Sentiment Analysis Technique to Study Hotel Service Quality". In 2013 46th Hawaii International Conference on System Sciences, January 7th -- 10th, Hawaii, USA, 3119 -- 3128. Gelman, B. A., Carlin, J. B., Stern, H. S., David, B., Vehtari, A., and Rubin, D. B. 2013. Bayesian Data Analysis. New York: Chapman and Hall/CRC. Ghahramani, Z. 2015. "Probabilistic Machine Learning and Artificial Intelligence". Nature 521: 452 -- 521. Ji, W., and Abourizk, S. M. 2017. "Credible interval estimation for fraction nonconforming: Analytical and numerical solutions". Automation in Construction 83: 56-67. Kryvasheyeu, Y., Chen, H., Obradovich, N., Moro, E., Hentenryck, P. Van, Fowler, J., and Cebrian, M. 2016. "Rapid Assessment of Disaster Damage Using Social Media Activity". Science advances 2: e1500779. Lică, L., and Tută, M. 2011. "Predicting Product Performance with Social Media". Informatica Economica 15(2): 46 -- 56. Makrehchi, M. 2013. "Stock Prediction Using Event-based Sentiment Analysis". In 2013 IEEE/WIC/ACM International Conferences on Web Intelligence (WI) and Intelligent Agent Technology (IAT), November 17th-20th, Atalnta, USA, 337 -- 342. Nakov, P., Ritter, A., Rosenthal, S., Sebastiani, F., and Stoyanov, V. 2016. "SemEval-2016 Task 4 : Sentiment Analysis in Twitter". In Proceedings of SemEval-2016, June 16th-17th, San Diego, USA, 1 -- 18. National U.S. Cyclones Tables Updated. Hurricane Tropical https://www.nhc.noaa.gov/news/UpdatedCostliest.pdf, assessed 15th March 2019. Costiliest Center. 2018. Nguyen, L. T., Wu, P., Chan, W., Peng, W., and Zhang, Y. 2012. "Predicting Collective Sentiment Dynamics from Time-series Social Media". In WISDOM '12 Proceedings of the First International Workshop on Issues of Sentiment Discovery and Chen, Wang, and Ji Opinion Mining, August 12th, Beijing, China, Article No. 6. O'Connor, B., Balasubramanyan, R., Routledge, B. R., and Smith, N. A. 2010. "From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series". In Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, May 23th-26th, Washington, D.C., USA, 122 -- 129. Pennebaker, J. W., Mehl, M. R., and Niederhoffer, K. G. 2003. "Psychological Aspects of Natural Language Use: Our Words , Our Selves". Annual review of psychology 54(1): 547 -- 577. Ragini, J. R., Anand, P. M. R., and Bhaskar, V. 2018. "Big Data Analytics for Disaster Response and Recovery through Sentiment Analysis". International Journal of Information Management 42: 13 -- 24. Stone, P. J., Dunphy, D. C., and Smith., M. S. 1966. The General Inquirer : A Computer Approach to Content Analysis. Cambridge : The MIT Press. Thelwall, M. 2017. "The Heart and Soul of the Web ? Sentiment Strength Detection in the Social Web with SentiStrength". In Cyberemotions, edited by A. H. Janusz, 119 -- 134, Cham: Springer International Publishing. Tokdar, S. 2013. Choosing a Prior Distribution. https://www2.stat.duke.edu/courses/Spring13/sta732.01/priors.pdf, assessed 15th March 2019. Wang, Q., and Taylor, J. E. 2016. "Process Map for Urban-Human Mobility and Civil Infrastructure Data Collection Using Geosocial Networking Platforms". Journal of Computing in Civil Engineering 30(2): 04015004. Yu, S., and Kak, S. 2012. "A Survey of Prediction Using Social Media". arXiv preprint, arXiv:1203-1647. Zhang, W., and Skiena, S. 2009. "Improving Movie Gross Prediction Through News Analysis". In 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, September 15th-18th, Milano, Italy, 301 -- 304. AUTHOR BIOGRAPHIES YUDI CHEN is a PhD student in the Department of Civil, Environmental & Infrastructure Engineering, George Mason University. His research focuses on the integration of data mining and complex system simulation to enhance infrastructure and social resilience. His email address is [email protected]. WENYING JI is an Assistant Professor in the Department of Civil, Environmental & Infrastructure Engineering, George Mason University. He received his PhD in Construction Engineering and Management from the University of Alberta. He is an interdisciplinary scholar focused on the integration of advanced data analytics, complex system simulation, and construction management to enhance the overall performance of infrastructure systems. His e-mail address is [email protected]. QI WANG is an Assistant Professor in the Department of Civil and Environmental Engineering, Northeastern University. He received a PhD from the Department of Civil and Environmental Engineering at Virginia Tech. His research focuses on the interplay between urban information and mobility, infrastructure and social resilience. His email address is [email protected].
1705.02801
4
1705
2017-12-22T20:42:06
Graph Embedding Techniques, Applications, and Performance: A Survey
[ "cs.SI", "cs.LG", "physics.data-an" ]
Graphs, such as social networks, word co-occurrence networks, and communication networks, occur naturally in various real-world applications. Analyzing them yields insight into the structure of society, language, and different patterns of communication. Many approaches have been proposed to perform the analysis. Recently, methods which use the representation of graph nodes in vector space have gained traction from the research community. In this survey, we provide a comprehensive and structured analysis of various graph embedding techniques proposed in the literature. We first introduce the embedding task and its challenges such as scalability, choice of dimensionality, and features to be preserved, and their possible solutions. We then present three categories of approaches based on factorization methods, random walks, and deep learning, with examples of representative algorithms in each category and analysis of their performance on various tasks. We evaluate these state-of-the-art methods on a few common datasets and compare their performance against one another. Our analysis concludes by suggesting some potential applications and future directions. We finally present the open-source Python library we developed, named GEM (Graph Embedding Methods, available at https://github.com/palash1992/GEM), which provides all presented algorithms within a unified interface to foster and facilitate research on the topic.
cs.SI
cs
Graph Embedding Techniques, Applications, and Performance: A Survey Palash Goyal and Emilio Ferrara University of Southern California, Information Sciences Institute 4676 Admiralty Way, Suite 1001. Marina del Rey, CA. 90292, USA 7 1 0 2 c e D 2 2 ] I S . s c [ 4 v 1 0 8 2 0 . 5 0 7 1 : v i X r a Abstract Graphs, such as social networks, word co-occurrence networks, and communication networks, occur naturally in various real-world applications. Analyzing them yields insight into the structure of society, language, and different patterns of communication. Many approaches have been proposed to perform the analysis. Recently, methods which use the representation of graph nodes in vector space have gained traction from the research community. In this survey, we provide a comprehensive and structured analysis of various graph embedding techniques proposed in the literature. We first introduce the embedding task and its challenges such as scalability, choice of dimensionality, and features to be preserved, and their possible solutions. We then present three categories of approaches based on factorization methods, random walks, and deep learning, with examples of representative algorithms in each category and analysis of their performance on various tasks. We evaluate these state-of-the-art methods on a few common datasets and compare their performance against one another. Our analysis concludes by suggesting some potential applications and future directions. We finally present the open-source Python library we developed, named GEM (Graph Embedding Methods, available at https://github.com/palash1992/GEM), which provides all presented algorithms within a unified interface to foster and facilitate research on the topic. Keywords: Graph embedding techniques, Graph embedding applications, Python Graph Embedding Methods GEM Library 1. Introduction Graph analysis has been attracting increasing attention in the recent years due the ubiquity of networks in the real world. Graphs (a.k.a. networks) have been used to denote information in various areas including biology (Protein-Protein interaction networks)[1], social sciences (friendship networks)[2] and lin- guistics (word co-occurrence networks)[3]. Modeling the in- teractions between entities as graphs has enabled researchers to understand the various network systems in a systematic manner[4]. For example, social networks have been used for applications like friendship or content recommendation, as well as for ad- vertisement [5]. Graph analytic tasks can be broadly abstracted into the following four categories: (a) node classification[6], (b) link prediction[5], (c) clustering[7], and (d) visualization[8]. Node classification aims at determining the label of nodes (a.k.a. vertices) based on other labeled nodes and the topology of the network. Link prediction refers to the task of predicting missing links or links that are likely to occur in the future. Clustering is used to find subsets of similar nodes and group them together; finally, visualization helps in providing insights into the struc- ture of the network. In the past few decades, many methods have been proposed for the tasks defined above. For node classification, there are broadly two categories of approaches - methods which use random walks to propagate the labels[9, 10], and methods which extract features from nodes and apply classifiers on them[11, 12]. Approaches for link prediction include similarity based methods[13, 14], maximum likelihood models[15, 16], and prob- abilistic models[17, 18]. Clustering methods include attribute based models[19] and methods which directly maximize (resp., minimize) the inter-cluster (resp., intra-cluster) distances[7, 20]. This survey will provide a taxonomy that captures these appli- cation domains and the existing strategies. Typically, a model defined to solve graph-based problems either operates on the original graph adjacency matrix or on a derived vector space. Recently, the methods based on represent- ing networks in vector space, while preserving their properties, have become widely popular[21, 22, 23]. Obtaining such an embedding is useful in the tasks defined above.1 The embed- dings are input as features to a model and the parameters are learned based on the training data. This obviates the need for complex classification models which are applied directly on the graph. 1.1. Challenges Obtaining a vector representation of each node of a graph is inherently difficult and poses several challenges which have been driving research in this field: (i) Choice of property: A "good" vector representation of nodes should preserve the structure of the graph and the connec- tion between individual nodes. The first challenge is choosing 1The term graph embedding has been used in the literature in two ways: to represent an entire graph in vector space, or to represent each individual node in vector space. In this paper, we use the latter definition since such representa- tions can be used for tasks like node classification, differently from the former representation. Preprint submitted to Knowledge Based Systems December 27, 2017 the property of the graph which the embedding should preserve. Given the plethora of distance metrics and properties defined for graphs, this choice can be difficult and the performance may depend on the application. (ii) Scalability: Most real networks are large and contain millions of nodes and edges - embedding methods should be scalable and able to process large graphs. Defining a scalable model can be challenging especially when the model is aimed to preserve global properties of the network. (iii) Dimensionality of the embedding: Finding the opti- mal dimensions of the representation can be hard. For example, higher number of dimensions may increase the reconstruction precision but will have high time and space complexity. The choice can also be application-specific depending on the ap- proach: E.g., lower number of dimensions may result in better link prediction accuracy if the chosen model only captures local connections between nodes. 1.2. Our contribution This survey provides a three-pronged contribution: (1) We propose a taxonomy of approaches to graph embed- ding, and explain their differences. We define four different tasks, i.e., application domains of graph embedding techniques. We illustrate the evolution of the topic, the challenges it faces, and future possible research directions. (2) We provide a detailed and systematic analysis of vari- ous graph embedding models and discuss their performance on the various tasks. For each method, we analyze the properties preserved and its accuracy, through comprehensive comparative evaluation on a few common data sets and application scenar- ios. Furthermore, we perform hyperparameter sensitivity analy- sis on the methods evaluated to test their robustness and provide an understanding of the dependence of optimal hyperparameter on the task performed. (3) To foster further research in this topic, we finally present GEM, the open-source Python library we developed that pro- vides, under a unified interface, implementations of all graph embedding methods discussed in this survey. To the best of our knowledge, this is the first paper to survey graph embedding techniques and their applications. 1.3. Organization of the survey The survey is organized as follows. In Section 2, we provide the definitions required to understand the problem and mod- els discussed next. Section 3 proposes a taxonomy of graph embedding approaches and provides a description of represen- tative algorithms in each category. The list of applications for which researchers have used the representation learning approach for graphs is provided in Section 4. We then describe our ex- perimental setup (Section 5) and evaluate the different models (Section 6). Section 7 introduces our Python library for graph embedding methods. Finally, in Section 8 we draw our con- clusions and discuss potential applications and future research direction. 2. Definitions and Preliminaries We represent the set {1,··· , n} by [n] in the rest of the paper. We start by formally defining several preliminaries which have been defined similar to Wang et al. [23]. Definition 1. (Graph) A graph G(V, E) is a collection of V = {v1,··· , vn} vertices (a.k.a. nodes) and E = {ei j}n i, j=1 edges. The adjacency matrix S of graph G contains non-negative weights associated with each edge: si j ≥ 0. If vi and v j are not con- nected to each other, then si j = 0. For undirected weighted graphs, si j = s ji ∀i, j ∈ [n]. The edge weight si j is generally treated as a measure of similarity between the nodes vi and v j. The higher the edge weight, the more similar the two nodes are expected to be. Definition 2. (First-order proximity) Edge weights si j are also called first-order proximities between nodes vi and v j, since they are the first and foremost measures of similarity between two nodes. We can similarly define higher-order proximities between nodes. For instance, Definition 3. (Second-order proximity) The second-order prox- imity between a pair of nodes describes the proximity of the pair's neighborhood structure. Let si = [si1,··· , sin] denote the first-order proximity between vi and other nodes. Then, second- order proximity between vi and v j is determined by the similar- ity of si and s j. Second-order proximity compares the neighborhood of two nodes and treats them as similar if they have a similar neigh- borhood. It is possible to define higher-order proximities using other metrics, e.g. Katz Index, Rooted PageRank, Common Neighbors, Adamic Adar, etc. (for detailed definitions, omitted here in the interest of space, see Ou et al. [24]). Next, we define a graph embedding: Definition 4. (Graph embedding) Given a graph G = (V, E), : vi → yi ∈ Rd ∀i ∈ [n] a graph embedding is a mapping f such that d (cid:28) V and the function f preserves some proximity measure defined on graph G. An embedding therefore maps each node to a low-dimensional order proximity might be obtained by minimizing(cid:80) feature vector and tries to preserve the connection strengths be- tween vertices. For instance, an embedding preserving first- i, j si j(cid:107)yi − y j(cid:107)2 2. Let two node pairs (vi, v j) and (vi, vk) be associated with connections strengths such that si j > sik. In this case, vi and v j will be mapped to points in the embedding space that will be closer each other than the mapping of vi and vk. 3. Algorithmic Approaches: A Taxonomy In the past decade, there has been a lot of research in the field of graph embedding, with a focus on designing new em- bedding algorithms. More recently, researchers pushed for- ward scalable embedding algorithms that can be applied on 2 graphs with millions of nodes and edges. In the following, we provide historical context about the research progress in this domain (§3.1), then propose a taxonomy of graph embedding techniques (§3.2) covering (i) factorization methods (§3.3), (ii) random walk techniques (§3.4), (iii) deep learning (§3.5), and (iv) other miscellaneous strategies (§3.6). 3.1. Graph Embedding Research Context and Evolution In the early 2000s, researchers developed graph embedding algorithms as part of dimensionality reduction techniques. They would construct a similarity graph for a set of n D-dimensional points based on neighborhood and then embed the nodes of the graph in a d-dimensional vector space, where d (cid:28) D. The idea for embedding was to keep connected nodes closer to each other in the vector space. Laplacian Eigenmaps [25] and Locally Lin- ear Embedding (LLE) [26] are examples of algorithms based on this rationale. However, scalability is a major issue in this ap- proach, whose time complexity is O(V2). Since 2010, research on graph embedding has shifted to ob- taining scalable graph embedding techniques which leverage the sparsity of real-world networks. For example, Graph Fac- torization [21] uses an approximate factorization of the adja- cency matrix as the embedding. LINE [22] extends this ap- proach and attempts to preserve both first order and second proximities. HOPE [24] extends LINE to attempt preserve high- order proximity by decomposing the similarity matrix rather than adjacency matrix using a generalized Singular Value De- composition (SVD). SDNE [23] uses autoencoders to embed graph nodes and capture highly non-linear dependencies. The new scalable approaches have a time complexity of O(E). 3.2. A Taxonomy of Graph Embedding Methods We propose a taxonomy of embedding approaches. We cat- egorize the embedding methods into three broad categories: (1) Factorization based, (2) Random Walk based, and (3) Deep Learning based. Below we explain the characteristics of each of these categories and provide a summary of a few representative approaches for each category (cf. Table 1), using the notation presented in Table 2. 3.3. Factorization based Methods Factorization based algorithms represent the connections be- tween nodes in the form of a matrix and factorize this matrix to obtain the embedding. The matrices used to represent the connections include node adjacency matrix, Laplacian matrix, node transition probability matrix, and Katz similarity matrix, among others. Approaches to factorize the representative ma- trix vary based on the matrix properties. If the obtained matrix is positive semidefinite, e.g. the Laplacian matrix, one can use eigenvalue decomposition. For unstructured matrices, one can use gradient descent methods to obtain the embedding in linear time. 3 3.3.1. Locally Linear Embedding (LLE) LLE [26] assumes that every node is a linear combination of its neighbors in the embedding space. If we assume that the adjacency matrix element Wi j of graph G represents the weight of node j in the representation of node i, we define Yi ≈(cid:88) (cid:88) j φ(Y) = Wi jY j ∀i ∈ V. Yi −(cid:88) Wi jY j2, Hence, we can obtain the embedding Y N×d by minimizing i j invariance, the embedding is centered around zero: (cid:80) To remove degenerate solutions, the variance of the embedding is constrained as 1 N YT Y = I. To further remove translational i Yi = 0. The above constrained optimization problem can be reduced to an eigenvalue problem, whose solution is to take the bottom d + 1 eigenvectors of the sparse matrix (I − W)T (I − W) and discarding the eigenvector corresponding to the smallest eigen- value. 3.3.2. Laplacian Eigenmaps Laplacian Eigenmaps [25] aims to keep the embedding of two nodes close when the weight Wi j is high. Specifically, they minimize the following objective function Yi − Y j2Wi j (cid:88) φ(Y) = 1 2 i, j = tr(YT LY), where L is the Laplacian of graph G. The objective function is subjected to the constraint YT DY = I to eliminate trivial solution. The solution to this can be obtained by taking the eigenvectors corresponding to the d smallest eigenvalues of the normalized Laplacian, Lnorm = D−1/2LD−1/2. 3.3.3. Cauchy Graph Embedding Laplacian Eigenmaps uses a quadratic penalty function on the distance between embeddings. The objective function thus emphasizes preservation of dissimilarity between nodes more than their similarity. This may yield embeddings which do not preserve local topology, which can be defined as the equality between relative order of edge weights (Wi j) and inverse order of distances in the embedded space (Yi − Y j2). Cauchy Graph Embedding [32] tackles this problem by replacing the quadratic Yi−Y j2 function Yi − Y j2 with Yi−Y j2+σ2 . Upon rearrangement, the ob- jective function to be maximized becomes (cid:88) with constraints YT Y = I and(cid:80) φ(Y) = i, j Wi j Yi − Y j2 + σ2 , i Yi = 0 for each i. The new objective is an inverse function of distance and thus puts em- phasis on similar nodes rather than dissimilar nodes. The au- thors propose several variants including Gaussian, Exponential and Linear embeddings with varying relative emphasis on the distance between nodes. Category Factorization Random Walk Published Year Science[26] 2000 2001 NIPS[25] 2013 WWW[21] CIKM[27] 2015 KDD[24] 2016 2014 KDD[28] KDD[29] 2016 Deep Learning Miscellaneous KDD[23] 2016 AAAI[30] 2016 2017 ICLR[31] 2015 WWW[22] Method LLE Laplacian Eigenmaps Graph Factorization GraRep HOPE DeepWalk node2vec SDNE DNGR GCN LINE Time Complexity O(Ed2) O(Ed2) O(Ed) O(V3) O(Ed2) O(Vd) O(Vd) O(VE) O(V2) O(Ed2) O(Ed) Properties preserved 1st order proximity 1 − kth order proximities 1 − kth order proximities, structural equivalence 1st and 2nd order proximities 1 − kth order proximities 1 − kth order proximities 1st and 2nd order proximities Table 1: List of graph embedding approaches G V E d Y Yi Ys Yt W D L < Yi, Y j > S Graphical representation of the data Set of vertices in the graph Set of edges in the graph Number of dimensions Embedding of the graph, V × d Embedding of node vi, 1 × d (also ith row of Y) Source embedding of a directed graph, V × d Target embedding of a directed graph, V × d Adjacency matrix of the graph, V × V Diagonal matrix of the degree of each vertex, V × V Graph Laplacian (L = D − W), V × V Inner product of Yi and Y j i.e. YiYT j Similarity matrix of the graph, V × V Table 2: Summary of notation 3.3.4. Structure Preserving Embedding (SPE) Structure Preserving Embedding ([33]) is another approach which extends Laplacian Eigenmaps. SPE aims to reconstruct the input graph exactly. The embedding is stored as a posi- tive semidefinite kernel matrix K and a connectivity algorithm G is defined which reconstructs the graph from K. The ker- nel K is chosen such that it maximizes tr(KW) which attempts to recover rank-1 spectral embedding. Choice of the connec- tivity algorithm G induces constraints on this objective func- tion. For e.g., if the connectivity scheme is to connect each node to neighbors which lie within a ball of radius , the con- straint (Kii + K j j − 2Ki j)(Wi j − 1/2) ≤ (Wi j − 1/2) produces a kernel which can perfectly reconstruct the original graph. To handle noise in the graph, a slack variable is added. For ξ- connectivity, the optimization thus becomes max tr(KA) − Cξ s.t. (Kii + K j j − 2Ki j)(Wi j − 1/2) ≤ (Wi j − 1/2) − ξ, where ξ is the slack variable and C controls slackness. 3.3.5. Graph Factorization (GF) To the best of our knowledge, Graph Factorization [21] was the first method to obtain a graph embedding in O(E) time. To obtain the embedding, GF factorizes the adjacency matrix of the graph, minimizing the following loss function φ(Y, λ) = 1 2 (Wi j− < Yi, Y j >)2 + λ 2 (cid:107)Yi(cid:107)2, (cid:88) (i, j)∈E (cid:88) i where λ is a regularization coefficient. Note that the summation is over the observed edges as opposed to all possible edges. This is an approximation in the interest of scalability, and as such it may introduce noise in the solution. Note that as the ad- jacency matrix is often not positive semidefinite, the minimum of the loss function is greater than 0 even if the dimensionality of embedding is V. 3.3.6. GraRep GraRep [27] defines the node transition probability as T = D−1W and preserves k-order proximity by minimizing (cid:107)Xk − t (cid:107)2 F where Xk is derived from T k (refer to [27] for a de- Yk s YkT s for all k to form tailed derivation). Ys. Note that this is similar to HOPE [24] which minimizes t (cid:107)2 (cid:107)S − YsYT F where S is an appropriate similarity matrix. The drawback of GraRep is scalability, since T k can have O(V2) non-zero entries. It then concatenates Yk 3.3.7. HOPE HOPE [24] preserves higher order proximity by minimiz- ing (cid:107)S − YsYT t (cid:107)2 F, where S is the similarity matrix. The au- thors experimented with different similarity measures, includ- ing Katz Index, Rooted Page Rank, Common Neighbors, and Adamic-Adar score. They represented each similarity measure as S = M−1 g Ml, where both Mg and Ml are sparse. This enables HOPE to use generalized Singular Value Decomposition (SVD) [34] to obtain the embedding efficiently. 4 3.3.8. Additional Variants 3.4.3. Hierarchical Representation Learning for Networks (HARP) For the purpose of dimensionality reduction of high dimen- sional data, there are several other methods developed capa- ble of performing graph embedding. Yan et al. [35] survey a list of such methods including Principal Component Analysis (PCA) [36], Linear Discrimant Analysis (LDA) [37], ISOMAP [38], Multidimesional Scaling (MDS) [39], Locality Preserving Prop- erties (LPP) [40] and Kernel Eigenmaps [41]. Matrinex et al. [42]) proposed a general framework, non-negative graph em- bedding, which yields non-negative embeddings for these algo- rithms. A number of recent techniques have focused on jointly learn- ing network structure and additional node attribute informa- tion available for the network., Augmented Relation Embed- ding (ARE) [43] augments network with content based features for images and modifies the graph-Laplacian to capture such in- formation. Text-associated DeepWalk (TADW) [44] performs matrix factorization on node similarity matrix disentangling the representation using text feature matrix. Heterogeneous Net- work Embedding (HNE) [45] learns representation for each modal- ity of the network and then unifies them into a common space using linear transformations. Other works ([46, 47, 48]) per- form similar transformations between various node attributes and learn joint embedding. 3.4. Random Walk based Methods Random walks have been used to approximate many prop- erties in the graph including node centrality[49] and similarity[50]. They are especially useful when one can either only partially observe the graph, or the graph is too large to measure in its entirety. Embedding techniques using random walks on graphs to obtain node representations have been proposed: DeepWalk and node2vec are two examples. 3.4.1. DeepWalk DeepWalk [28] preserves higher-order proximity between nodes by maximizing the probability of observing the last k nodes and the next k nodes in the random walk centered at vi, i.e. maximizing log Pr(vi−k, . . . , vi−1, vi+1, . . . , vi+kYi), where 2k + 1 is the length of the random walk. The model generates multiple random walks each of length 2k + 1 and performs the optimization over sum of log-likelihoods for each random walk. A dot-product based decoder is used to reconstruct the edges from the node embeddings. 3.4.2. node2vec Similar to DeepWalk [28], node2vec [29] preserves higher- order proximity between nodes by maximizing the probabil- ity of occurrence of subsequent nodes in fixed length random walks. The crucial difference from DeepWalk is that node2vec employs biased-random walks that provide a trade-off between breadth-first (BFS) and depth-first (DFS) graph searches, and hence produces higher-quality and more informative embed- dings than DeepWalk. Choosing the right balance enables node2vec to preserve community structure as well as structural equiva- lence between nodes. DeepWalk and node2vec initialize the node embeddings ran- domly for training the models. As their objective function is non-convex, such initializations can be stuck in local optima. HARP [51] introduces a strategy to improve the solution and avoid local optima by better weight initialization. To this pur- pose, HARP creates hierarchy of nodes by aggregating nodes in the previous layer of hierarchy using graph coarsening. It then generates embedding of the coarsest graph and initializes the node embeddings of the refined graph (one up in the hierarchy) with the learned embedding. It propagates such embeddings through the hierarchy to obtain the embeddings of the origi- nal graph. Thus HARP can be used in conjunction with random walk based methods like DeepWalk and node2vec to obtain bet- ter solutions to the optimization function. 3.4.4. Walklets DeepWalk and node2vec implicitly preserve higher order proximity between nodes by generating multiple random walks which connect nodes at various distances due to its stochastic nature. On the other hand, factorization based approches like GF and HOPE explicitly preserve distances between nodes by modeling it in their objective function. Walklets [52] combine this idea of explicit modeling with random walks. The model modifies the random walk strategy used in DeepWalk by skip- ping over some nodes in the graph. This is performed for mul- tiple skip lengths, analogous to factorizing Ak in GraRep, and the resulting set of random walks are used for training the model similar to DeepWalk. 3.4.5. Additional Variants There have been several variations of the above methods proposed recently. Similar to augmenting graph structure with node attributes for factorization based methods, GenVector [53], Discriminative Deep Random Walk (DDRW) [54], Tri-party Deep Network Representation (TriDNR) [55] and [56] extend random walks to jointly learn network structure and node at- tributes. 3.5. Deep Learning based Methods The growing research on deep learning has led to a deluge of deep neural networks based methods applied to graphs[23, 30, 57]. Deep autoencoders have been used for dimensionality reduction[58] due to their ability to model non-linear structure in the data. Recently, SDNE [23], DNGR [30] utilized this abil- ity of deep autoencoder to generate an embedding model that can capture non-linearity in graphs. 3.5.1. Structural Deep Network Embedding (SDNE) Wang et al. [23] proposed to use deep autoencoders to preserve the first and second order network proximities. They achieve this by jointly optimizing the two proximities. The ap- proach uses highly non-linear functions to obtain the embed- ding. The model consists of two parts: unsupervised and super- vised. The former consists of an autoencoder aiming at finding 5 an embedding for a node which can reconstruct its neighbor- hood. The latter is based on Laplacian Eigenmaps[25] which apply a penalty when similar vertices are mapped far from each other in the embedding space. 3.5.2. Deep Neural Networks for Learning Graph Representa- tions (DNGR) DNGR combines random surfing with deep autoencoder. The model consists of 3 components: random surfing, positive pointwise mutual information (PPMI) calculation and stacked denoising autoencoders. Random surfing model is used on the input graph to generate a probabilistic co-occurence matrix, analogous to similarity matrix in HOPE. The matrix is trans- formed to a PPMI matrix and input into a stacked denoising autoencoder to obtain the embedding. Inputting PPMI matrix ensures that the autoencoder model can capture higher order proximity. Furthermore, using stacked denoising autoencoders aids robustness of the model in presence of noise in the graph as well as in capturing underlying structure required for tasks such as link prediction and node classification. 3.5.3. Graph Convolutional Networks (GCN) Deep neural network based methods discussed above, namely SDNE and DNGR, take as input the global neighborhood of each node (a row of PPMI for DNGR and adjacency matrix for SDNE). This can be computationally expensive and inop- timal for large sparse graphs. Graph Convolutional Networks (GCNs) [31] tackle this problem by defining a convolution op- erator on graph. The model iteratively aggregates the embed- dings of neighbors for a node and uses a function of the ob- tained embedding and its embedding at previous iteration to obtain the new embedding. Aggregating embedding of only local neighborhood makes it scalable and multiple iterations al- lows the learned embedding of a node to characterize global neighborhood. Several recent papers ([59, 60, 61, 62, 63, 64]) have pro- posed methods using convolution on graphs to obtain semi- supervised embedding, which can be used to obtain unsuper- vised embedding by defining unique labels for each node. The approaches vary in the construction of convolutional filters which can broadly be categorized into spatial and spectral filters. Spa- tial filters operate directly on the original graph and adjacency matrix whereas spectral filters operate on the spectrum of graph- Laplacian. 3.5.4. Variational Graph Auto-Encoders (VGAE) Kipf et al. [65] evaluate the performance of variational au- toencoders [66] on the task of graph embedding. The model uses a graph convolutional network (GCN) encoder and an in- ner product decoder. The input is adjacency matrix and they rely on GCN to learn the higher order dependencies between nodes. They empirically show that using variational autoen- coders can improve performance compared to non-probabilistic autoencoders. 3.6. Other Methods 3.6.1. LINE LINE [22] explicitly defines two functions, one each for first- and second-order proximities, and minimizes the com- bination of the two. The function for first-order proximity is similar to that of Graph Factorization (GF) [21] in that they both aim to keep the adjacency matrix and dot product of em- beddings close. The difference is that GF does this by directly minimizing the difference of the two. Instead, LINE defines two joint probability distributions for each pair of vertices, one using adjancency matrix and the other using the embedding. Then, LINE minimizes the Kullback-Leibler (KL) divergence of these two distributions. The two distributions and the objec- tive function are as follows 1 1 + exp(− < Yi, Y j >) (cid:80) Wi j (i, j)∈E Wi j Wi j log p1(vi, v j). p1(vi, v j) = p1(vi, v j) = O1 = − (cid:88) O1 = KL( p1, p1) (i, j)∈E The authors similarly define probability distributions and objective function for the second-order proximity. 3.7. Discussion We can interpret embeddings as representations which de- scribe graph data. Thus, embeddings can yield insights into the properties of a network. We illustrate this in Figure 1. Consider a complete bipartite graph G. An embedding algorithm which attempts to keep two connected nodes close (i.e., preserve the community structure), would fail to capture the structure of the graph - as shown in 1(b). However, an algorithm which embeds structurally-equivalent nodes together learns an inter- pretable embedding - as shown in 1(c). Similarly, in 1(d) we consider a graph with two star components connected through a hub. Nodes 1 and 3 are structurally equivalent (they link to the same nodes) and are clustered together in 1(f), whereas in 1(e) they are far apart. The classes of algorithms above can be described in terms of their ability to explain the properties of graphs. Factorization-based methods are not capable of learning an arbitrary function, e.g., to explain network connectivity. Thus, unless explicitly included in their objective function, they can- not learn structural equivalence. In random walk based meth- ods, the mixture of equivalences can be controlled to a certain extent by varying the random walk parameters. Deep learning methods can model a wide range of functions following the uni- versal approximation theorem [67]: given enough parameters, they can learn the mix of community and structural equivalence, to embed the nodes such that the reconstruction error is mini- mized. We can interpret the weights of the autoencoder as a representation of the structure of the graph. For example, 1(c) plots the embedding learned by SDNE for the complete bipar- tite graph G1. The autoencoder stored the bipartite structure in 6 (a) Graph G1 (b) CPE for G1 (c) SPE for G1 (d) Graph G2 (e) CPE for G2 (f) SPE for G2 Figure 1: Examples illustrating the effect of type of similarity preserved. Here, CPE and SPE stand for Community Preserving Embedding and Structural-equivalence Preserving Embedding, respectively. weights and achieved perfect reconstruction. Given the vari- ety of properties of real-world graphs, using general non-linear models that span a large class of functions is a promising direc- tion that warrants further exploration. the original graph from the embedding and evaluating the re- construction error. They show that a low dimensional represen- tation for each node (in the order of 100s) suffices to reconstruct the graph with high precision. 4. Applications As graph representations, embeddings can be used in a va- riety of tasks. These applications can be broadly classified as: network compression (§4.1), visualization (§4.2), clustering (§4.3), link prediction (§4.4), and node classification (§4.5). 4.1. Network Compression Feder et al.[68] introduced the concept of network compres- sion (a.k.a. graph simplification). For a graph G, they defined a compression G∗ which has smaller number of edges. The goal was to store the network more efficiently and run graph analy- sis algorithms faster. They obtained the compression graph by partitioning the original graph into bipartite cliques and replac- ing them by trees, thus reducing the number of edges. Over the years, many researchers have used aggregation based meth- ods [69, 70, 71] to compress graphs. The main idea in this line of work is to exploit the link structure of the graph to group nodes and edges. Navlakha et al.[72] used Minimum Descrip- tion Length (MDL) [73] from information theory to summarize a graph into a graph summary and edge correction. Similar to these representations, graph embedding can also be interpreted as a summarization of graph. Wang et al.[23] and Ou et al.[24] tested this hypothesis explicitly by reconstructing 4.2. Visualization Application of visualizing graphs can be dated back to 1736 when Euler used it to solve "Konigsberger Bruckenproblem" [74]. In the recent years, graph visualization has found appli- cations in software engineering [75], electrical circuits [76], bi- ology [1] and sociology [2]. Battista et al.[76] and Eades et al.[77] survey a range of methods used to draw graphs and de- fine aesthetic criteria for this purpose. Herman et al.[78] gen- eralize this and view it from an information visualization per- spective. They study and compare various traditional layouts used to draw graphs including tree-, 3D- and hyperbolic-based layouts. As embedding represents a graph in a vector space, dimen- sionality reduction techniques like Principal Component Anal- ysis (PCA) [79] and t-distributed stochastic neighbor embed- ding (t-SNE) [8] can be applied on it to visualize the graph. The authors of DeepWalk [28] illustrated the goodness of their embedding approach by visualizing the Zachary's Karate Club network. The authors of LINE [22] visualized the DBLP co- authorship network, and showed that LINE is able to cluster together authors in the same field. The authors of SDNE [23] applied it on 20-Newsgroup document similarity network to ob- tain clusters of documents based on topics. 7 12356748                                                   4.3. Clustering Graph clustering (a.k.a., network partitioning) can be of two types: (a) structure based, and (b) attribute based clus- tering. The former can be further divided into two categories, namely community based, and structurally equivalent cluster- ing. Structure-based methods [7, 20, 80], aim to find dense sub- graphs with high number of intra-cluster edges, and low number of inter-cluster edges. Structural equivalence clustering [81], on the contrary, is designed to identify nodes with similar roles (like bridges and outliers). Attribute based methods [19] utilize node labels, in addition to observed links, to cluster nodes. White et al.[82] used k-means on the embedding to cluster the nodes and visualize the clusters obtained on Wordnet and NCAA data sets verifying that the clusters obtained have in- tuitive interpretation. Recent methods on embedding haven't explicitly evaluated their models on this task and thus it is a promising field of research in the graph embedding community. 4.4. Link Prediction Networks are constructed from the observed interactions between entities, which may be incomplete or inaccurate. The challenge often lies in identifying spurious interactions and pre- dicting missing information. Link prediction refers to the task of predicting either missing interactions or links that may ap- pear in the future in an evolving network. Link prediction is pervasive in biological network analysis, where verifying the existence of links between nodes requires costly experimental tests. Limiting the experiments to links ordered by presence likelihood has been shown to be very cost effective. In social networks, link prediction is used to predict probable friend- ships, which can be used for recommendation and lead to a more satisfactory user experience. Liben-Nowell et al.[5], Lu et al.[83] and Hasan et al.[84] survey the recent progress in this field and categorize the algorithms into (a) similarity based (local and global) [13, 14, 85], (b) maximum likelihood based [15, 16] and (c) probabilistic methods [17, 18, 86]. Embeddings capture inherent dynamics of the network ei- ther explicitly or implicitly thus enabling application to link prediction. Wang et al.[23] and Ou et al.[24] predict links from the learned node representations on publicly available collabo- ration and social networks. In addition, Grover et al.[29] apply it to biology networks. They show that on these data sets links predicted using embeddings are more accurate than traditional similarity based link prediction methods described above. 4.5. Node Classification Often in networks, a fraction of nodes are labeled. In social networks, labels may indicate interests, beliefs, or demograph- ics. In language networks, a document may be labeled with topics or keywords, whereas the labels of entities in biology networks may be based on functionality. Due to various fac- tors, labels may be unknown for large fractions of nodes. For example, in social networks many users do not provide their de- mographic information due to privacy concerns. Missing labels can be inferred using the labeled nodes and the links in the net- work. The task of predicting these missing labels is also known 8 as node classification. Bhagat et al.[6] survey the methods used in the literature for this task. They classify the approaches into two categories, i.e., feature extraction based and random walk based. Feature-based models [11, 12, 87] generate features for nodes based on their neighborhood and local network statistics and then apply a classifier like Logistic Regression [88] and Naive Bayes [89] to predict the labels. Random walk based models [9, 10] propagate the labels with random walks. Embeddings can be interpreted as automatically extracted node features based on network structure and thus falls into the first category. Recent work[28, 22, 24, 23, 29] has evalu- ated the predictive power of embedding on various information networks including language, social, biology and collaboration graphs. They show that embeddings can predict missing labels with high precision. 5. Experimental Setup Our experiments evaluate the feature representations ob- tained using the methods reviewed before on the previous four application domains. Next, we specify the datasets and evalu- ation metrics we used. The experiments were performed on a Ubuntu 14.04.4 LTS system with 32 cores, 128 GB RAM and a clock speed of 2.6 GHz. The GPU used for deep network based models was Nvidia Tesla K40C. 5.1. Datasets We evaluate the embedding approaches on a synthetic and 6 real datasets. The datasets are summarized in Table 3. SYN-SBM: We generate synthetic graph using Stochastic Block Model [90] with 1024 nodes and 3 communities. We set the in-block and cross-block probabilities as 0.1 and 0.01 re- spectively. As we know the community structure in this graph, we use it to visualize the embeddings learnt by various ap- proaches. KARATE [91]: Zachary's karate network is a well-known social network of a university karate club. It has been widely studied in social network analysis. The network has 34 nodes, 78 edges and 2 communities. BLOGCATALOG [92]: This is a network of social re- lationships of the bloggers listed on the BlogCatalog website. The labels represent blogger interests inferred through the meta- data provided by the bloggers. The network has 10,312 nodes, 333,983 edges and 39 different labels. YOUTUBE [93]: This is a social network of Youtube users. This is a large network containing 1,157,827 nodes and 4,945,382 edges. The labels represent groups of users who enjoy common video genres. HEP-TH [94]: The original dataset contains abstracts of papers in High Energy Physics Theory for the period from Jan- uary 1993 to April 2003. We create a collaboration network for the papers published in this period. The network has 7,980 nodes and 21,036 edges. ASTRO-PH [95]: This is a collaboration network of au- thors of papers submitted to e-print arXiv during the period from January 1993 to April 2003. The network has 18,772 nodes and 396,160 edges. Name V E Avg. degree No. of labels Synthetic SYN-SBM KARATE Social Network BLOGCATALOG 1024 29,833 58.27 3 34 78 4.59 4 10,312 333,983 64.78 39 YOUTUBE 1,157,827 4,945,382 8.54 47 Collaboration Network ASTRO-PH HEP-TH 7,980 21,036 5.27 - 18,772 396,160 31.55 - Biology Network PPI 3,890 38,739 19.91 50 Table 3: Dataset Statistics PROTEIN-PROTEIN INTERACTIONS (PPI) [96]: This is a network of biological interactions between proteins in hu- mans. This network has 3,890 nodes and 38,739 edges. 5.2. Evaluation Metrics To evaluate the performance of embedding methods on graph reconstruction and link prediction, we use Precision at k (Pr@k) and MeanAveragePrecision(MAP) as our metrics. For node classification, we use micro-F1 and macro-F1. These metrics are defined as follows: Pr@k is the fraction of correct predictions in top k predic- tions. It is defined as Pr@k = Epred(1:k)∩Eobs , where Epred(1 : k) are the top k predictions and Eobs are the observed edges. For the task of graph reconstruction, Eobs = E and for link predic- tion, Eobs is the set of hidden edges. MAP estimates precision for every node and computes the k average over all nodes, as follows: MAP = i AP(i) V k Pr@k(i)·I{Epredi (k)∈Eobsi} (cid:80) , Epredi (1:k)∩Eobsi where AP(i) = , and Epredi and Eobsi are the predicted and observed edges for node i respectively. {k:Epredi (k)∈Eobsi} , Pr@k(i) = macro-F1, in a multi-label classification task, is defined as k the average F1 of all the labels, i.e., (cid:80) (cid:80) macro − F1 = l∈L F1(l) L where F1(l) is the F1-score for label l. , micro − F1 = micro-F1 calculates F1 globally by counting the total true positives, false negatives and false positives, giving equal weight to each instance. It is defined as follows: 2 ∗ P ∗ R P + R , (cid:80) (cid:80) where P = l∈L(T P(l)+FN(l)), are preci- sion (P) and recall (R) respectively, and T P(l), FP(l) and FN(l) denote the number of true positives, false positives and false negatives respectively among the instances which are associ- ated with the label l either in the ground truth or the predictions. (cid:80) (cid:80) l∈L(T P(l)+FP(l)), and R = l∈L T P(l) l∈L T P(l) 6. Experiments and Analysis In this section, we evaluate and compare embedding meth- ods on the for tasks presented above. For each task, we show 9 the effect of number of embedding dimensions on the perfor- mance and compare hyper parameter sensitivity of the meth- ods. Furthermore, we correlate the performance of embedding techniques on various tasks varying hyper parameters to test the notion of an "all-good" embedding which can perform well on all tasks. 6.1. Graph Reconstruction Embeddings as a low-dimensional representation of the graph are expected to accurately reconstruct the graph. Note that re- construction differs for different embedding techniques (refer to Section 3). For each method, we reconstruct the proximity of nodes and rank pair of nodes according to their proximity. Then we calculate the ratio of real links in top k predictions as the reconstruction precision. As the number of possible node pairs (N(N − 1)) can be very large for networks with a large number of nodes, we randomly sample 1024 nodes for evalua- tion. We obtain 5 such samples for each dataset and calculate the mean and standard deviation of precision and MAP values for subgraph reconstruction. To obtain optimal hyperparame- ters for each embedding method, we compare the mean MAP values for each hyperparameter. We then re-run the experiments with the optimal hyperparameter on 5 random samples of 1024 nodes and report the results. Figure 2 illustrates the reconstruction precision obtained by 128-dimensional embeddings. We observe that although per- formance of methods is dataset dependent, embedding approaches which preserve higher order proximities in general outperform others. Exceptional performance of Laplacian Eigenmaps on SBM can be attributed to the lack of higher order structure in the data set. We also observe that SDNE consistently performs well on all data sets. This can be attributed to its capability of learning complex structure from the network. Embeddings learned by node2vec have low reconstruction precision. This may be due to the highly non-linear dimensionality reduction yielding a non-linear manifold. However, HOPE, which learns linear embeddings but preserves higher order proximity recon- structs the graph well without any additional parameters. Effect of dimension. Figure 3 illustrates the effect of di- mension on the reconstruction error. With a couple of excep- tions, as the number of dimensions increase, the MAP value in- creases. This is intuitive as higher number of dimensions are ca- pable of storing more information. We also observe that SDNE is able to embed the graphs in 16-dimensional vector space with high precision although decoder parameters are required to ob- tain such precision. Figure 2: Precision@k of graph reconstruction for different data sets (dimension of embedding is 128). 6.2. Visualization Since embedding is a low-dimensional vector representa- tion of nodes in the graph, it allows us to visualize the nodes to understand the network topology. As different embedding methods preserve different structures in the network, their abil- ity and interpretation of node visualization differ. For instance, embeddings learned by node2vec with parameters set to prefer BFS random walk would cluster structurally equivalent nodes together. On the other hand, methods which directly preserve k-hop distances between nodes (GF, LE and LLE with k = 1 and HOPE and SDNE with k > 1) cluster neighboring nodes together. We compare the ability of different methods to visu- alize nodes on SBM and Karate graph. For SBM, following [23], we learn a 128-dimensional embedding for each method and input it to t-SNE [8] to reduce the dimensionality to 2 and visualize nodes in a 2-dimensional space. Visualization of SBM is show in Figure 4. As we know the underlying community structure, we use the community label to color the nodes. We observe that embeddings generated by HOPE and SDNE which preserve higher order proximities well separate the communities although as the data is well structured LE, GF and LLE are able to capture community structure to some extent. We visualize Karate graph (see Figure 5) to illustrate the properties preserved by embedding methods. LLE and LE ((a) and (f)) attempt to preserve the community structure of the graph and cluster nodes with high intra-cluster edges together. GF ((b)) embeds communities very closely and keeps leaf nodes far away from other nodes. In (d), we observe that HOPE em- beds nodes 16 and 21, whose Katz similarity in the original graph is very low (0.0006), farthest apart (considering dot prod- uct similarity). node2vec and SDNE ((c) and (e)) preserve a mix of community structure and structural property of the nodes. Nodes 32 and 33, which are both high degree hubs and central in their communities, are embedded together and away from low degree nodes. Also, they are closer to nodes which be- long to their communities. SDNE embeds node 0, which acts a bridge between communities, far away from other nodes. Note that, unlike for other methods, it does not imply that node 0 is disconnected from the rest of the nodes. The implication here is that SDNE identifies node 0 as a separate type of node and encodes its connection to other nodes in encoder and decoder. The ability of deep autoencoders to identify important nodes in the network has not been studied but given this observation we believe this direction can be promising. 6.3. Link Prediction Another important application of graph embedding is pre- dicting unobserved links in the graph. A good network rep- resentation should be able to capture the inherent structure of graph well enough to predict the likely but unobserved links. To test the performance of different embedding methods on this 10 2324252627280.00.20.40.60.81.0precision@kSBM2324252627280.00.20.40.60.81.0PPI2324252627280.20.40.60.81.0AstroPh232425262728k0.00.20.40.6precision@kBlogCatalog232425262728k0.20.40.60.81.0Hep-th232425262728k0.00.20.40.60.81.0Youtubenode2vecGFSDNEHOPELE Figure 3: MAP of graph reconstruction for different data sets with varying dimensions. (a) LLE (b) GF (c) node2vec (d) HOPE (e) SDNE (f) LE Figure 4: Visualization of SBM using t-SNE (original dimension of embedding is 128). Each point corresponds to a node in the graph. Color of a node denotes its community. 11 212325270.20.40.60.81.0MAPSBM212325270.00.10.20.30.40.50.60.7PPI212325270.00.10.20.30.40.5AstroPh21232527d0.00.10.20.30.4MAPBlogCatalog21232527d0.00.10.20.30.40.50.6Hep-th21232527d0.00.10.20.30.40.5Youtubenode2vecGFSDNEHOPELE1510505101515105051015151050510152520151050201510505101520151050510151050510152025201001020201510505101520151050510151510505101515105051015 (a) LLE (b) GF (c) node2vec (d) HOPE (e) SDNE (f) LE Figure 5: Visualization of Karate club graph. Each point corresponds to a node in the graph. Figure 6: Precision@k of link prediction for different data sets (dimension of embedding is 128). Figure 7: MAP of link prediction for different data sets with varying dimensions. 12 0.20.10.00.10.20.30.40.30.20.10.00.10.20.30.401234567891011121314151617181920212223242526272829303132330.020.010.000.010.020.030.030.020.010.000.010.020.030.0401234567891011121314151617181920212223242526272829303132331.21.00.80.60.40.20.08.07.57.06.56.05.55.001234567891011121314151617181920212223242526272829303132330.1000.0750.0500.0250.0000.0250.0500.0750.1000.020.000.020.040.060.080.100.1201234567891011121314151617181920212223242526272829303132330.00.51.01.52.02.5012345601234567891011121314151617181920212223242526272829303132330.30.20.10.00.10.20.30.40.30.20.10.00.10.20.30123456789101112131415161718192021222324252627282930313233232425262728k0.000.020.040.060.080.10precision@kPPI232425262728k0.000.050.100.150.20AstroPh232425262728k0.000.050.100.150.200.25BlogCatalog232425262728k0.000.050.100.150.20Hep-thnode2vecGFSDNEHOPELE21232527d0.020.040.060.08MAPPPI21232527d0.000.050.100.150.200.25AstroPh21232527d0.000.050.100.150.20BlogCatalog21232527d0.000.050.100.150.20Hep-thnode2vecGFSDNEHOPELE task, for each data set we randomly hide 20% of the network edges. We learn the embedding using the rest of the 80% edges and predict the most likely edges which are not observed in the training data from the learned embedding. As with graph re- construction, we generate 5 random subgraphs with 1024 nodes and test the predicted links against the held-out links in the sub- graphs. We perform this experiment for each hyperparameter and re-run it for optimal hyperparameters on a new random 80- 20 link split. Figure 6 and 7 show the precision@k results for link predic- tion with 128-dimensional embeddings and MAP for each di- mension respectively. Here we can see that the performance of methods is highly data set dependent. node2vec achieves good performance on BlogCatalog but performs poorly on other data sets. HOPE achieves good performance on all data sets which implies that preserving higher order proximities is conducive to predicting unobserved links. Similarly, SDNE outperforms other methods with the exception on PPI for which the perfor- mance degrades drastically as embedding dimension increases above 8. Effect of dimension. Figure 7 illustrates the effect of em- bedding dimension on link prediction. We make two observa- tions. Firstly, in PPI and BlogCatalog, unlike graph reconstruc- tion performance does not improve as the number of dimen- sions increase. This may be because with more parameters the models overfit on the observed links and are unable to predict unobserved links. Secondly, even on the same data set, relative performance of methods depends on the embedding dimension. In PPI, HOPE outperforms other methods for higher dimen- sions,whereas embedding generated by SDNE achieves higher link prediction MAP for low dimensions. 6.4. Node Classification Predicting node labels using network topology is widely popular in network analysis and has variety of applications, in- cluding document classification and interest prediction. A good network embedding should capture the network structure and hence be useful for node classification. We compare the effec- tiveness of embedding methods on this task by using the gen- erated embedding as node features to classify the nodes. The node features are input to a one-vs-rest logistic regression us- ing the LIBLINEAR library. For each data set, we randomly sample 10% to 90% of nodes as training data and evaluate the performance on the remaining nodes. We perform this split 5 times and report the mean with confidence interval. For data sets with multiple labels per node, we assume that we know how many labels to predict. Figure 8 shows the results of our experiments. We can see that node2vec outperforms other methods on the task of node classification. As mentioned earlier (§3), node2vec preserves homophily as well as structural equivalence between nodes. Results suggest this can be useful in node classification: e.g., in BlogCatalog users may have similar interests, yet connect to others based on social ties rather than interests overlap. Simi- larly, proteins in PPI may be related in functionality and inter- act with similar proteins but may not assist each other. How- ever, in SBM, other methods outperform node2vec as labels re- 13 flect communities yet there is no structural equivalence between nodes. Effect of dimension. Figure 9 illustrates the effect of em- bedding dimensions on node classification. As with link pre- diction, we observe that performance often saturates or dete- riorates after certain number of dimensions. This may sug- gest overfitting on the training data. As SBM exhibits very structured communities, an 8-dimensional embedding suffices to predict the communities. node2vec achieves best perfor- mance on PPI and BlogCat with 128 dimensions. 6.5. Hyperparameter Sensitivity In this section we plan to address the following questions: • How robust are the embedding methods with respect to hyperparameters? • Do optimal hyperparameters depend on the downstream tasks the embeddings are used for? • What insights does performance variance with hyperpa- rameter provide about a data set? We answer these questions by analyzing performance of the embedding methods with various hyperparameters. We present results on SBM, PPI and Hep-th. Of the methods we evaluated in this survey, Laplacian Eigenmaps has no hyperparameters, thus is not included in the following analysis. Graph Factorization (GF). The objective function of GF contains a weight regularization term with a coefficient. Intu- itively, this coefficient controls the generalizability of the em- bedding. A low regularization coefficient facilitates better re- construction but may overfit to the observed graph leading to poor prediction performance. On the other side, a high regular- ization may underrepresent the data and hence perform poorly on all tasks. We observe this effect in Figure 10. We see that performance on prediction tasks, namely link prediction (Fig. 10b) and node classification (Fig. 10c), improves as we increase the regularization coefficient, reaches a peak and then starts deteriorating. However, graph reconstruction performance (Fig. 10a) may deteriorate with increasing regularization. We also note that the performance change is considerable and thus the coefficient should be carefully tuned to the given data set. HOPE. As HOPE factorizes a similarity matrix between nodes to obtain the embedding, the hyperparameters depend on the method used to obtain the similarity matrix. Since in our experiments we used Katz index for this purpose, we evalu- ate the effect of the attenuation factor (β), which can be in- terpreted as the higher order proximity coefficient on perfor- mance. Graph structure affects the optimal value of this param- eter. For well-structured graphs with tightly knit communities, high values of beta would erroneously assign dissimilar nodes closer in the embedding space. On the contrary, for graphs with weak community structure it is important to capture higher or- der distances and thus high values of beta may yield better em- beddings. We validate our hypothesis in Figure 11. As our synthetic data SBM consists of tight communities, increasing β does not improve the performance on any task. However, gain Figure 8: Micro-F1 and Macro-F1 of node classification for different data sets varying the train-test split ratio (dimension of embedding is 128). in performance with increasing beta can be observed in PPI and HEP-TH. This is expected as collaboration and protein net- works tend to evolve via higher order connections. We observe that the optimal beta for these data sets is lowest for the task of graph reconstruction (Fig. 11(a)) and highest for link prediction (Fig. 11b), 2−6 and 2−4 respectively. This also follows intuition as higher order information is not necessary for reconstructing observed edges but is useful for prediction tasks. Nodes farther from each other are more likely to have common labels than links between them. For example, in a collaboration network, authors in a field will form a weak community but many of them need not be connected to each other (in other words, most researchers of a same community won't be co-authors of one another). Thus, if we were to predict field for an author, hav- ing information about other authors inside the weak community can help improve the accuracy of our model. SDNE. SDNE uses a coupled deep autoencoder to embed graphs. It leverages a parameter to control the weight of ob- served and unobserved link reconstruction in the objective func- tion. A high parameter value would focus on reconstructing ob- served links disregarding the absence of unobserved links. This parameter can be crucial as a low value could hinder predict- ing hidden links. Figure 12 illustrates the results of our analy- sis. We observe that performance on link prediction (Fig. 12b) greatly varies depending on the weight, with a more than 3-fold increase in MAP for Hep-th with the optimal parameter value, and about 2-fold increase for PPI. The performance on node classification (Fig. 12c), on the other hand, is less affected by the parameter. Overall, we see that the maximum performance is achieved for an intermediate value of the weight above which the performance drops. node2vec. node2vec performs biased random walks on the graph and embeds nodes commonly appearing together in them close in the embedding space. Of the various hyperparame- ters of the method (which include walk length, context size and bias weights), we analyze the effect of bias weights on performance and adopt commonly-used values for the remain- ing hyperparameter [29], namely, context size of 10 and walk length of 80. node2vec has two bias weights: (a) inout pa- rameter (q), which controls the likelihood of random walk to go further away from the incoming node (higher values favor closer nodes), and (b) return parameter (p), which weighs the return probability (lower values favor return). Lower values of q would help capture longer distances between nodes and aims towards preserving structural equivalence. Figure 13 illustrates the effect on PPI and HEPTH. In node classification (Fig. 13c) we observe that low q values help achieve higher accuracy sug- gesting that capturing structural equivalence is required to ac- curately embed the structure of the graph. On the contrary, high q values favor link prediction (Fig. 13b) following intuition that capturing community structure is crucial for the task. We make similar observations for SBM in Figure 14 for the task of link 14 0.20.40.60.80.40.50.60.70.80.91.0Micro-F1scoreSBM0.20.40.60.80.0750.1000.1250.1500.1750.2000.225PPI0.20.40.60.80.200.250.300.350.40BlogCatalog0.20.40.60.8Trainratio0.40.60.81.0Macro-F1scoreSBM0.20.40.60.8Trainratio0.050.100.150.20PPI0.20.40.60.8Trainratio0.050.100.150.200.25BlogCatalognode2vecGFSDNEHOPELE Figure 9: Micro-F1 and Macro-F1 of node classification for different data sets varying the number of dimensions. The train-test split is 50%. (a) Graph Reconstruction (b) Link Prediction (c) Node Classification Figure 10: Effect of regularization coefficient (α) in Graph Factorization on various tasks. prediction. MAP increases with increasing q until it reaches an optimal. We also note that the optimal values of q in SBM are much higher as the graph has strong community structure. 7. A Python Library for Graph Embedding We released an open-source Python library, GEM (Graph Embedding Methods, https://github.com/palash1992/GEM), which provides a unified interface to the implementations of all the methods presented here, and their evaluation metrics. The library supports both weighted and unweighted graphs. GEM's hierarchical design and modular implementation should help the users to test the implemented methods on new datasets as well as serve as a platform to develop new approaches with ease. GEM (https://github.com/palash1992/GEM) provides implementations of Locally Linear Embedding [26], Laplacian Eigenmaps [25], Graph Factorization [21], HOPE [24], SDNE [23] and node2vec [29]. For node2vec, we use the C++ im- plementation provided by the authors [95] and yield a Python interface. In addition, GEM provides an interface to evaluate the learned embedding on the four tasks presented above. The 15 212325270.40.50.60.70.80.91.0Micro-F1scoreSBM212325270.0750.1000.1250.1500.1750.2000.225PPI212325270.200.250.300.35BlogCatalog21232527d0.20.40.60.81.0Macro-F1scoreSBM21232527d0.050.100.15PPI21232527d0.050.100.150.20BlogCatalognode2vecGFSDNEHOPELE10−310−210−1100regu0.100.150.200.250.30GFhepthppisbm10−310−210−1100regu0.0250.0500.0750.1000.125GFhepthppisbm10−310−210−1100regu0.00.20.40.60.8GFppisbm (a) Graph Reconstruction (b) Link Prediction (c) Node Classification Figure 11: Effect of attenuation factor (β) in HOPE on various tasks. (a) Graph Reconstruction (b) Link Prediction (c) Node Classification Figure 12: Effect of observed link reconstruction weight in SDNE on various tasks. interface is flexible and supports multiple edge reconstruction metrics including cosine similarity, euclidean distance and de- coder based (for autoencoder-based models). For multi-labeled node classification, the library uses one-vs-rest logistic regres- sion classifiers and supports the use of other ad hoc classifiers. 8. Conclusion and Future Work This review of graph embedding techniques covered three broad categories of approaches: factorization based, random walk based and deep learning based. We studied the structure and properties preserved by various embedding approaches and characterized the challenges faced by graph embedding tech- niques in general as well as each category of approaches. We reported various applications of embedding and their respec- tive evaluation metrics. We empirically evaluated the surveyed methods on these applications using several publicly available real networks and compared their strengths and weaknesses. Finally, we presented an open-source Python library, named GEM, we developed with implementation of the embedding methods surveyed and evaluation tasks including graph recon- struction, link prediction, node classification and visualization. We believe there are three promising research directions in the field of graph embedding: (1) exploring non-linear models, (2) studying evolution of networks, and (3) generate synthetic networks with real-world characteristics. As shown in the sur- vey, general non-linear models (e.g. deep learning based) have shown great promise in capturing the inherent dynamics of the graph. They have the ability to approximate an arbitrary func- tion which best explains the network edges and this can result in highly compressed representations of the network. One draw- back of such approaches is the limited interpretability. Fur- ther research focusing on interpreting the embedding learned by these models can be very fruitful. Utilizing embedding to study graph evolution is a new research area which needs fur- ther exploration. Recent work by [97], [98] and [99] pursued this line of thought and illustrate how embeddings can be used for dynamic graphs. Generating synthetic networks with real- world characteristics has been a popular field of research[100] primarily for ease of simulations. Low dimensional vector rep- resentation of real graphs can help understand their structure and thus be useful to generate synthetic graphs with real world characteristics. Learning embedding with a generative model can help us in this regard. References References [1] A. Theocharidis, S. Van Dongen, A. Enright, T. Freeman, Network visu- alization and analysis of gene expression data using biolayout express3d, Nature protocols 4 (2009) 1535–1550. 16 2−82−62−42−2beta0.00.20.40.6HOPEhepthppisbm2−82−62−42−2beta0.000.050.100.15HOPEhepthppisbm2−82−62−42−2beta0.00.20.40.60.81.0HOPEppisbm21222324beta0.20.40.60.81.0SDNEhepthppisbm21222324beta0.050.100.15SDNEhepthppisbm21222324beta0.20.40.60.81.0SDNEppisbm (a) (b) (c) (d) Graph Reconstruction (e) Link Prediction (f) Node Classification Figure 13: Effect of random walk bias weights in node2vec on various tasks. [8] L. v. d. Maaten, G. Hinton, Visualizing data using t-sne, Journal of Ma- chine Learning Research 9 (2008) 2579–2605. [9] A. Azran, The rendezvous algorithm: Multiclass semi-supervised learn- ing with markov random walks, in: Proceedings of the 24th international conference on Machine learning, 2007, pp. 49–56. [10] S. Baluja, R. Seth, D. Sivakumar, Y. Jing, J. Yagnik, S. Kumar, D. Ravichandran, M. Aly, Video suggestion and discovery for youtube: taking random walks through the view graph, in: Proc. 17th int. confer- ence on World Wide Web, 2008, pp. 895–904. [11] S. Bhagat, I. Rozenbaum, G. Cormode, Applying link-based classifi- cation to label blogs, in: Proceedings of WebKDD: workshop on Web mining and social network analysis, ACM, 2007, pp. 92–101. [12] Q. Lu, L. Getoor, Link-based classification, in: ICML, Vol. 3, 2003, pp. 496–503. [13] P. Jaccard, Etude comparative de la distribution florale dans une portion des Alpes et du Jura, Impr. Corbaz, 1901. [14] L. A. Adamic, E. Adar, Friends and neighbors on the web, Social net- works 25 (3) (2003) 211–230. [15] A. Clauset, C. Moore, M. E. Newman, Hierarchical structure and the prediction of missing links in networks, Nature 453 (7191) (2008) 98– 101. [16] H. C. White, S. A. Boorman, R. L. Breiger, Social structure from mul- tiple networks. i. blockmodels of roles and positions, American journal of sociology 81 (4) (1976) 730–780. [17] N. Friedman, L. Getoor, D. Koller, A. Pfeffer, Learning probabilistic relational models, in: IJCAI, 1999, pp. 1300–1309. [18] D. Heckerman, C. Meek, D. Koller, Probabilistic entity-relationship models, prms, and plate models, Introduction to statistical relational learning (2007) 201–238. [19] Y. Zhou, H. Cheng, J. X. Yu, Graph clustering based on structural/at- tribute similarities, Proceedings of the VLDB Endowment 2 (1) (2009) 718–729. [20] J. Shi, J. Malik, Normalized cuts and image segmentation, IEEE Trans- actions on pattern analysis and machine intelligence 22 (8) (2000) 888– 905. [21] A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josifovski, A. J. (a) Figure 14: Effect of random walk bias weights in node2vec on SBM. [2] L. C. Freeman, Visualizing social networks, Journal of social structure 1 (1) (2000) 4. [3] R. F. i Cancho, R. V. Sol´e, The small world of human language, Proceed- ings of the Royal Society of London B: Biological Sciences 268 (1482) (2001) 2261–2265. [4] J. Leskovec, J. Kleinberg, C. Faloutsos, Graph evolution: Densification and shrinking diameters, ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1) (2007) 2. [5] D. Liben-Nowell, J. Kleinberg, The link-prediction problem for social networks, journal of the Association for Information Science and Tech- nology 58 (7) (2007) 1019–1031. [6] S. Bhagat, G. Cormode, S. Muthukrishnan, Node classification in social networks, in: Social network data analytics, Springer, 2011, pp. 115– 148. [7] C. H. Ding, X. He, H. Zha, M. Gu, H. D. Simon, A min-max cut algo- rithm for graph partitioning and data clustering, in: International Con- ference on Data Mining, IEEE, 2001, pp. 107–114. 17 2−22−12021q0.20.30.4node2vechepthppi2−22−12021q0.010.020.030.04node2vechepthppi2−22−12021q0.2020.2040.2060.2080.2100.212node2vecppi2−22−12021p0.20.30.4node2vechepthppi2−22−12021p0.010.020.030.04node2vechepthppi2−22−12021p0.20250.20500.20750.21000.2125node2vecppi4041424344q0.0750.1000.1250.1500.1750.200node2vecsbm Smola, Distributed large-scale natural graph factorization, in: Proceed- ings of the 22nd international conference on World Wide Web, ACM, 2013, pp. 37–48. [22] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, Q. Mei, Line: Large- scale information network embedding, in: Proceedings 24th Interna- tional Conference on World Wide Web, 2015, pp. 1067–1077. [23] D. Wang, P. Cui, W. Zhu, Structural deep network embedding, in: Pro- ceedings of the 22nd International Conference on Knowledge Discovery and Data Mining, ACM, 2016, pp. 1225–1234. [24] M. Ou, P. Cui, J. Pei, Z. Zhang, W. Zhu, Asymmetric transitivity pre- serving graph embedding, in: Proc. of ACM SIGKDD, 2016, pp. 1105– 1114. [25] M. Belkin, P. Niyogi, Laplacian eigenmaps and spectral techniques for embedding and clustering, in: NIPS, Vol. 14, 2001, pp. 585–591. [26] S. T. Roweis, L. K. Saul, Nonlinear dimensionality reduction by locally linear embedding, Science 290 (5500) (2000) 2323–2326. [27] S. Cao, W. Lu, Q. Xu, Grarep: Learning graph representations with global structural information, in: Proceedings of the 24th ACM Inter- national on Conference on Information and Knowledge Management, ACM, 2015, pp. 891–900. [28] B. Perozzi, R. Al-Rfou, S. Skiena, Deepwalk: Online learning of so- cial representations, in: Proceedings 20th international conference on Knowledge discovery and data mining, 2014, pp. 701–710. [29] A. Grover, J. Leskovec, node2vec: Scalable feature learning for net- works, in: Proceedings of the 22nd International Conference on Knowl- edge Discovery and Data Mining, ACM, 2016, pp. 855–864. [30] S. Cao, W. Lu, Q. Xu, Deep neural networks for learning graph represen- tations, in: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, AAAI Press, 2016, pp. 1145–1152. [31] T. N. Kipf, M. Welling, Semi-supervised classification with graph con- volutional networks, arXiv preprint arXiv:1609.02907. [32] D. Luo, F. Nie, H. Huang, C. H. Ding, Cauchy graph embedding, in: Proceedings of the 28th International Conference on Machine Learning (ICML-11), 2011, pp. 553–560. [33] B. Shaw, T. Jebara, Structure preserving embedding, in: Proceedings of the 26th Annual International Conference on Machine Learning, ACM, 2009, pp. 937–944. [34] C. F. Van Loan, Generalizing the singular value decomposition, SIAM Journal on Numerical Analysis 13 (1) (1976) 76–83. [35] S. Yan, D. Xu, B. Zhang, H.-J. Zhang, Q. Yang, S. Lin, Graph embed- ding and extensions: A general framework for dimensionality reduction, IEEE transactions on pattern analysis and machine intelligence 29 (1) (2007) 40–51. [36] I. T. Jolliffe, Principal component analysis and factor analysis, in: Prin- cipal component analysis, Springer, 1986, pp. 115–128. analysis and machine intelligence 23 (2) (2001) 228–233. [38] J. B. Tenenbaum, V. De Silva, J. C. Langford, A global geometric frame- work for nonlinear dimensionality reduction, science 290 (5500) (2000) 2319–2323. [39] J. B. Kruskal, M. Wish, Multidimensional scaling, Vol. 11, Sage, 1978. [40] X. He, P. Niyogi, Locality preserving projections, in: Advances in neural information processing systems, 2004, pp. 153–160. [41] M. Brand, Continuous nonlinear dimensionality reduction by kernel eigenmaps, in: IJCAI, 2003, pp. 547–554. [42] A. M. Mart´ınez, A. C. Kak, Non-negative graph embedding, IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR) 23 (2) (2008) 1–8. [43] Y.-Y. Lin, T.-L. Liu, H.-T. Chen, Semantic manifold learning for image retrieval, in: Proceedings of the 13th annual ACM international confer- ence on Multimedia, ACM, 2005, pp. 249–258. [44] C. Yang, Z. Liu, D. Zhao, M. Sun, E. Y. Chang, Network representation learning with rich text information., in: IJCAI, 2015, pp. 2111–2117. [45] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, T. S. Huang, Het- erogeneous network embedding via deep architectures, in: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Dis- covery and Data Mining, ACM, 2015, pp. 119–128. [46] C. Tu, W. Zhang, Z. Liu, M. Sun, Max-margin deepwalk: Discriminative learning of network representation., in: IJCAI, 2016, pp. 3889–3895. [47] D. Zhang, J. Yin, X. Zhu, C. Zhang, Homophily, structure, and content augmented network representation learning, in: Data Mining (ICDM), 2016 IEEE 16th International Conference on, IEEE, 2016, pp. 609–618. 18 [37] A. M. Mart´ınez, A. C. Kak, Pca versus lda, IEEE transactions on pattern [66] D. P. Kingma, M. Welling, Auto-encoding variational bayes, arXiv [48] X. Huang, J. Li, X. Hu, Label informed attributed network embedding, in: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, ACM, 2017, pp. 731–739. [49] M. E. Newman, A measure of betweenness centrality based on random walks, Social networks 27 (1) (2005) 39–54. [50] F. Fouss, A. Pirotte, J.-M. Renders, M. Saerens, Random-walk compu- tation of similarities between nodes of a graph with application to col- laborative recommendation, IEEE Transactions on knowledge and data engineering 19 (3). [51] H. Chen, B. Perozzi, Y. Hu, S. Skiena, Harp: Hierarchical representation learning for networks, arXiv preprint arXiv:1706.07845. [52] B. Perozzi, V. Kulkarni, S. Skiena, Walklets: Multiscale graph embeddings for interpretable network classification, arXiv preprint arXiv:1605.02115. [53] Z. Yang, J. Tang, W. W. Cohen, Multi-modal bayesian embeddings for learning social knowledge graphs., in: IJCAI, 2016, pp. 2287–2293. [54] J. Li, J. Zhu, B. Zhang, Discriminative deep random walk for network classification., in: ACL (1), 2016. [55] S. Pan, J. Wu, X. Zhu, C. Zhang, Y. Wang, Tri-party deep network rep- resentation, Network 11 (9) (2016) 12. [56] Z. Yang, W. W. Cohen, R. Salakhutdinov, Revisiting semi-supervised learning with graph embeddings, arXiv preprint arXiv:1603.08861. [57] M. Niepert, M. Ahmed, K. Kutzkov, Learning convolutional neural net- works for graphs, in: Proceedings of the 33rd annual international con- ference on machine learning. ACM, 2016. [58] Y. Bengio, A. Courville, P. Vincent, Representation learning: A review and new perspectives, IEEE transactions on pattern analysis and ma- chine intelligence 35 (8) (2013) 1798–1828. [59] J. Bruna, W. Zaremba, A. Szlam, Y. LeCun, Spectral networks and lo- cally connected networks on graphs, arXiv preprint arXiv:1312.6203. [60] M. Henaff, J. Bruna, Y. LeCun, Deep convolutional networks on graph- structured data, arXiv preprint arXiv:1506.05163. [61] D. K. Duvenaud, D. Maclaurin, J. Iparraguirre, R. Bombarell, T. Hirzel, A. Aspuru-Guzik, R. P. Adams, Convolutional networks on graphs for learning molecular fingerprints, in: Advances in neural information pro- cessing systems, 2015, pp. 2224–2232. [62] Y. Li, D. Tarlow, M. Brockschmidt, R. Zemel, Gated graph sequence neural networks, arXiv preprint arXiv:1511.05493. [63] M. Defferrard, X. Bresson, P. Vandergheynst, Convolutional neural net- works on graphs with fast localized spectral filtering, in: Advances in Neural Information Processing Systems, 2016, pp. 3844–3852. [64] W. L. Hamilton, R. Ying, J. Leskovec, Inductive representation learning on large graphs, arXiv preprint arXiv:1706.02216. [65] T. N. Kipf, M. Welling, Variational graph auto-encoders, arXiv preprint arXiv:1611.07308. preprint arXiv:1312.6114. [67] K. Hornik, M. Stinchcombe, H. White, Universal approximation of an unknown mapping and its derivatives using multilayer feedforward net- works, Neural networks 3 (1990) 551–560. [68] T. Feder, R. Motwani, Clique partitions, graph compression and speeding-up algorithms, in: Proceedings of the twenty-third annual ACM symposium on Theory of computing, 1991, pp. 123–133. [69] P. M. Pardalos, J. Xue, The maximum clique problem, Journal of global Optimization 4 (3) (1994) 301–328. [70] Y. Tian, R. A. Hankins, J. M. Patel, Efficient aggregation for graph sum- marization, in: Proceedings of the SIGMOD international conference on Management of data, ACM, 2008, pp. 567–580. [71] H. Toivonen, F. Zhou, A. Hartikainen, A. Hinkka, Compression of weighted graphs, in: Proc. 17th international conference on Knowledge discovery and data mining, 2011, pp. 965–973. [72] S. Navlakha, R. Rastogi, N. Shrivastava, Graph summarization with bounded error, in: Proceedings of the international conference on Man- agement of data, ACM, 2008, pp. 419–432. [73] J. Rissanen, Modeling by shortest data description, Automatica 14 (5) [74] D. Jungnickel, T. Schade, Graphs, networks and algorithms, Springer, (1978) 465–471. 2005. [75] E. R. Gansner, S. C. North, An open graph visualization system and its applications to software engineering, Software Practice and Experience 30 (11) (2000) 1203–1233. [76] G. Di Battista, P. Eades, R. Tamassia, I. G. Tollis, Algorithms for draw- ing graphs: an annotated bibliography, Computational Geometry 4 (5) (1994) 235–282. [77] P. Eades, L. Xuemin, How to draw a directed graph, in: Visual Lan- guages, 1989., IEEE Workshop on, IEEE, 1989, pp. 13–17. [78] I. Herman, G. Melanc¸on, M. S. Marshall, Graph visualization and navi- gation in information visualization: A survey, IEEE Trans on visualiza- tion and computer graphics 6 (1) (2000) 24–43. [79] K. Pearson, Liii. on lines and planes of closest fit to systems of points in space, The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 2 (11) (1901) 559–572. [80] M. E. Newman, M. Girvan, Finding and evaluating community structure in networks, Physical review E 69 (2) (2004) 026113. [81] X. Xu, N. Yuruk, Z. Feng, T. A. Schweiger, Scan: a structural clustering algorithm for networks, in: Proceedings 13th international conference on Knowledge discovery and data mining, 2007, pp. 824–833. [82] S. White, P. Smyth, A spectral clustering approach to finding communi- ties in graphs, in: Proceedings of the 2005 SIAM international confer- ence on data mining, SIAM, 2005, pp. 274–285. [83] L. Lu, T. Zhou, Link prediction in complex networks: A survey, Physica A: Statistical Mechanics and its Applications 390 (6) (2011) 1150–1170. [84] M. Al Hasan, M. J. Zaki, A survey of link prediction in social networks, in: Social network data analytics, 2011, pp. 243–275. [85] L. Katz, A new status index derived from sociometric analysis, Psy- chometrika 18 (1) (1953) 39–43. [86] K. Yu, W. Chu, S. Yu, V. Tresp, Z. Xu, Stochastic relational models for discriminative link prediction, in: NIPS, 2006, pp. 1553–1560. [87] J. Neville, D. Jensen, Iterative classification in relational data, in: Proc. Workshop on Learning Statistical Models from Relational Data, 2000, pp. 13–20. [88] D. W. Hosmer Jr, S. Lemeshow, R. X. Sturdivant, Applied logistic re- gression, Vol. 398, John Wiley & Sons, 2013. [89] A. McCallum, K. Nigam, et al., A comparison of event models for naive bayes text classification, in: AAAI-98 workshop on learning for text categorization, Vol. 752, Citeseer, 1998, pp. 41–48. [90] Y. J. Wang, G. Y. Wong, Stochastic blockmodels for directed graphs, Journal of the American Statistical Association 82 (397) (1987) 8–19. [91] W. W. Zachary, An information flow model for conflict and fission in small groups, Journal of anthropological research 33 (4) (1977) 452– 473. [92] L. Tang, H. Liu, Relational learning via latent social dimensions, in: Pro- ceedings of the 15th international conference on Knowledge discovery and data mining, ACM, 2009, pp. 817–826. [93] L. Tang, H. Liu, Scalable learning of collective behavior based on sparse social dimensions, in: Proceedings of the 18th ACM conference on In- formation and knowledge management, ACM, 2009, pp. 1107–1116. [94] J. Gehrke, P. Ginsparg, J. Kleinberg, Overview of the 2003 kdd cup, ACM SIGKDD Explorations 5 (2). [95] J. Leskovec, A. Krevl, SNAP Datasets: Stanford large network dataset collection, http://snap.stanford.edu/data (2014). [96] B.-J. Breitkreutz, C. Stark, T. Reguly, L. Boucher, A. Breitkreutz, M. Livstone, R. Oughtred, D. H. Lackner, J. Bahler, V. Wood, et al., The biogrid interaction database: 2008 update, Nucleic acids research 36 (suppl 1) (2008) D637–D640. [97] H. Dai, Y. Wang, R. Trivedi, L. Song, Deep coevolutionary network: Embedding user and item features for recommendation. [98] P. Goyal, N. Kamra, X. He, Y. Liu, Dyngem: Deep embedding method for dynamic graphs. [99] L. Zhu, D. Guo, J. Yin, G. Ver Steeg, A. Galstyan, Scalable temporal latent space inference for link prediction in dynamic social networks, IEEE Transactions on Knowledge and Data Engineering 28 (10) (2016) 2765–2777. [100] P. W. Holland, K. B. Laskey, S. Leinhardt, Stochastic blockmodels: First steps, Social networks 5 (2) (1983) 109–137. 19
1703.10545
1
1703
2017-03-30T16:02:25
FairJudge: Trustworthy User Prediction in Rating Platforms
[ "cs.SI", "cs.AI", "stat.ML" ]
Rating platforms enable large-scale collection of user opinion about items (products, other users, etc.). However, many untrustworthy users give fraudulent ratings for excessive monetary gains. In the paper, we present FairJudge, a system to identify such fraudulent users. We propose three metrics: (i) the fairness of a user that quantifies how trustworthy the user is in rating the products, (ii) the reliability of a rating that measures how reliable the rating is, and (iii) the goodness of a product that measures the quality of the product. Intuitively, a user is fair if it provides reliable ratings that are close to the goodness of the product. We formulate a mutually recursive definition of these metrics, and further address cold start problems and incorporate behavioral properties of users and products in the formulation. We propose an iterative algorithm, FairJudge, to predict the values of the three metrics. We prove that FairJudge is guaranteed to converge in a bounded number of iterations, with linear time complexity. By conducting five different experiments on five rating platforms, we show that FairJudge significantly outperforms nine existing algorithms in predicting fair and unfair users. We reported the 100 most unfair users in the Flipkart network to their review fraud investigators, and 80 users were correctly identified (80% accuracy). The FairJudge algorithm is already being deployed at Flipkart.
cs.SI
cs
FairJudge: Trustworthy User Prediction in Rating Platforms Srijan Kumar University of Maryland [email protected] Mohit Kumar Flipkart, India [email protected] Bryan Hooi Carnegie Mellon University [email protected] Christos Faloutsos Carnegie Mellon University [email protected] Disha Makhija Flipkart, India [email protected] V.S. Subrahmanian University of Maryland [email protected] 7 1 0 2 r a M 0 3 ] I S . s c [ 1 v 5 4 5 0 1 . 3 0 7 1 : v i X r a ABSTRACT Rating platforms enable large-scale collection of user opin- ion about items (products, other users, etc.). However, many untrustworthy users give fraudulent ratings for exces- sive monetary gains. In the paper, we present FairJudge, a system to identify such fraudulent users. We propose three metrics: (i) the fairness of a user that quantifies how trust- worthy the user is in rating the products, (ii) the reliability of a rating that measures how reliable the rating is, and (iii) the goodness of a product that measures the quality of the product. Intuitively, a user is fair if it provides reliable ratings that are close to the goodness of the product. We formulate a mutually recursive definition of these metrics, and further address cold start problems and incorporate be- havioral properties of users and products in the formulation. We propose an iterative algorithm, FairJudge, to predict the values of the three metrics. We prove that FairJudge is guaranteed to converge in a bounded number of iterations, with linear time complexity. By conducting five different experiments on five rating platforms, we show that Fair- Judge significantly outperforms nine existing algorithms in predicting fair and unfair users. We reported the 100 most unfair users in the Flipkart network to their review fraud investigators, and 80 users were correctly identified (80% accuracy). The FairJudge algorithm is already being de- ployed at Flipkart. 1. INTRODUCTION Consumer generated ratings are now an essential part of several platforms. For instance, users on Yelp and TripAd- visor rate restaurants, hotels, attractions, and various types of service offerings. Every major online marketplace (eBay, Amazon, Flipkart) uses online ratings as a way of recog- nizing good products and rewarding honest/good behavior by vendors. Because buyers frequently look at reviews be- fore buying a product or using a vendor, there is a huge Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. incentive for unethical entities to give fraudulent ratings to compromise the integrity of these consumer generated rating systems [14, 12, 30, 9]. The goal of this paper is to identify such unfair users. In this paper, we present three novel metrics to quantify the trustworthiness of users and reviews, and the quality of products, building on our prior work [13]. We model user- to-item ratings with timestamps as a bipartite graph. For instance, on an online marketplace such as Amazon, a user u rates a product p with a rating (u, p). Each user has an intrinsic level of fairness F (u), each product p has an intrin- sic goodness G(p) (measuring its quality), and each rating (u, p) has an intrinsic reliability R(u, p). Intuitively, a fair user should give ratings that are close to the goodness of the product, and good products should get highly positive reli- able ratings. Clearly, these F (u), G(p), R(u, p) metrics are all inter-related, and we propose three mutually-recursive equations to model them. However, it is not possible to predict the true trustwor- thiness of users that have only given a few ratings. For ex- ample, users with only a few ratings, all of which are highly accurate, can be a fraudulent shill account building initial reputation [9] or it can be a genuine user. Similarly, the true quality of products that have received only a few ratings is also uncertain [17, 20]. We propose a Bayesian solution to to address these cold start problems in our formulation by in- corporating priors to users' fairness and products' goodness scores. Additionally, the rating behavior is often very indicative of their nature. For instance, unusually rapid or regular behav- ior has been associated with fraudulent entities, such as fake accounts, sybils and bots [27, 15, 8, 28]. Similarly, unusu- ally bursty ratings received by a product may be indicative of fake reviews [31]. Therefore, we propose a Bayesian tech- nique to incorporate users' and products' rating behavior in the formulation, by penalizing unusual behavior [8]. Combining the network, cold start treatment and behav- ioral properties together, we present the FairJudge formu- lation and an iterative algorithm to find the fairness, good- ness and reliability scores of all entities together. We prove that FairJudge has linear time complexity and it is guar- anteed to converge in a bounded number of iterations. How well does FairJudge work? We conduct extensive experiments using 5 real-world data sets – two Bitcoin user trust networks, Epinions, Amazon and Flipkart, India's biggest online marketplace. With the help of five experiments, we ] 8 [ T S E N D R I B   ] 9 2 [ s s e n i t s u r T  ] 2 [ e l g a E d u a r F  ] 4 2 [ e l g a E p S   ] 1 2 [ D A B    ] 7 1 , 2 2 , 3 2 [ s r e h t O   e g d u J r i a F     Uses network information Uses behavior properties Prior free Theoretical Guarantees Table 1: Proposed algorithm FairJudge satisfies all desirable properties. user and product. FraudEagle [2] is a belief propagation model to rank users, which assumes fraudsters rate good products poorly and bad products positively, and vice-versa for honest users. Random-walk based algorithms have been developed to detect trolls [32] and link farming from col- lusion on Twitter [7]. [10, 34, 16] identify group of fraud- sters based on local neighborhood of the users. A survey on network-based fraud detection can be found in [3]. Behavioral fraud detection algorithms are often feature- based. Consensus based features have been proposed in [23, 17] – our proposed goodness metric is also inspired by con- sensus or 'wisdom of crowds'. Commonly used features are derived from timestamps [33, 31, 20] and review text [26, 6, 25]. SpEagle [24] extends FraudEagle [2] to incorporate be- havior features. BIRDNEST [8] creates a Bayesian model to estimate the belief of each user's deviation in rating behavior from global expected behavior. [10, 4, 28] study coordinated spam behavior of multiple users. A survey on behavior based algorithms can be found in [11]. Our proposed FairJudge algorithm combines both net- work and behavior based algorithms, along with Bayesian solution to cold start problems. Since review text is not always available, for e.g. in a subset of our datasets, we only focus on ratings and timestamps. FairJudge provides theoretical guarantees and does not require any user inputs. Table 1 compares FairJudge to the closest existing algo- rithms, which do not always satisfy all the desirable proper- ties. 3. FAIRJUDGE FORMULATION In this section, we present the FairJudge algorithm that jointly models the rating network and behavioral properties. We first present our three novel metrics - Fairness, Reli- ability and Goodness - which measure intrinsic properties of users, ratings and products, respectively, building on our prior work [13]. We show how to incorporate Bayesian priors to address user and product cold start problems, and how to incorporate behavioral features of the users and products. We then prove that our algorithm have several desirable the- oretical guarantees. Prerequisites. We model the rating network as a bipartite network where user u gives a rating (u, p) to product p. Let the rating score be represented as score(u,p). Let U,R and P represent the set of all users, ratings and products, respectively, in a given bipartite network. We assume that all rating scores are scaled to be between -1 and +1, i.e. score(u,p) ∈ [−1, 1]∀(u, p) ∈ R. Let, Out(u) be the set of ratings given by user u and In(p) be the set of ratings (a) (b) Figure 1: (a) The proposed algorithm, FairJudge, con- sistently performs the best, by having the highest AUC, in predicting fair and unfair users with varying percent- age of training labels. (b) FairJudge discovered a bot-net of 40 confirmed shills of one user, rating each other pos- itively. show that FairJudge outperforms several existing meth- ods [2, 8, 21, 24, 29, 23, 22, 17] in predicting fraudulent users. Specifically, in an unsupervised setting, FairJudge has the best or second best average precision in nine out of ten cases. Across two supervised settings, FairJudge has the highest AUC ≥ 0.85 across all five datasets. It consis- tently performs the best as the percentage of training data is varied between 10 and 90, as shown for the Alpha network in Figure 1(a). Further, we experimentally show that both the cold start treatment and behavior properties improve the performance of FairJudge algorithm, and incorporat- ing both together performs even better. FairJudge is practically very useful. We reported the 100 most unfair users as predicted by FairJudge in the Flipkart online marketplace. Review fraud investigators at Flipkart studied our recommendations and confirmed 80 of them were unfair, presenting a validation of the utility of FairJudge in identifying real-world review fraud. In fact, FairJudge is already being deployed at Flipkart. On the Bitcoin Al- pha network, using FairJudge, we discovered a botnet-like structure of 40 unfair users that rate each other positively (Figure 1(b)), which are confirmed shills of a single account. Overall, the paper makes the following contributions: • Algorithm: We propose three novel metrics called fair- ness, goodness and reliability to rank users, products and ratings, respectively. We propose Bayesian approaches to address cold start problems and incorporate behavioral prop- erties. We propose the FairJudge algorithm to iteratively compute these metrics. • Theoretical guarantees: We prove that FairJudge al- gorithm is guaranteed to converge in a bounded number of iterations, and it has linear time complexity. • Effectiveness: We show that FairJudge outperforms nine existing algorithms in identifying fair and unfair users, conducted via five experiments on five rating networks. 2. RELATED WORK Existing works in rating fraud detection can be catego- rized into network-based and behavior-based algorithms: Network-based fraud detection algorithms are based on iterative learning, belief propagation, and node ranking tech- niques. Similar to our proposed FairJudge algorithm, [29, 21, 16] develop iterative algorithms that jointly assign scores in the rating networks based on consensus of ratings - [29] scores each user, review and product, and [21] scores each 102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCFairJudgeExistingAlgorithmsAlphaNetworksupa2supa3xdragonflyxcaptain-n00dlevragnarodasupa4supa5thebutterzonebabblertetrisxlemonfoodst4mpakhan08kingkatarisol56synopsrgsammeycaptainddlcodawdanielpbarronsupadupajenkinsrawrmageawesomeotdiggsprophexystalersdecaturbawsepopart64jamesam42pirateat40stamitb-t-c-buyeraetheroyotagadasupabtcmixers Figure 2: While most ratings of fair users have high reliability, some ratings also have low reliabil- ity (green arrow). Conversely, unfair users also give some highly reliability ratings (red arrow), but most of their ratings have low reliability. received by product p. So, Out(u) and In(p) represents their respective counts. 3.1 Fairness, Goodness and Reliability Users, ratings and products have the following character- istics: • Users vary in fairness. Fair users rate products without bias, i.e. they give high scores to high quality products, and low scores to bad products. On the other hand, users who frequently deviate from the above behavior are 'unfair'. For example, fraudulent users often create multiple accounts to boost ratings of unpopular products and bad-mouth good products of their competitors [28, 9]. Hence, these fraud- sters should have low fairness scores. The fairness F (u) of a user u lies in the [0, 1] interval ∀u ∈ U . 0 denotes a 100% un- trustworthy user, while 1 denotes a 100% trustworthy user. • Products vary in terms of their quality, which we mea- sure by a metric called goodness. The quality of a product determines how it would be rated by a fair user. Intuitively, a good product would get several high positive ratings from fair users, and a bad product would receive high negative ratings from fair users. The goodness G(p) of a product p ranges from −1 (a very low quality product) to +1 (a very high quality product) ∀p ∈ P. • Finally, ratings vary in terms of reliability. This mea- sure reflects how trustworthy the specific rating is. The reliability R(u, p) of a rating (u, p) ranges from 0 (an un- trustworthy rating) to 1 (a trustworthy rating) ∀(u,p) ∈ R The reader may wonder: isn't the rating reliability, iden- tical to the user's fairness? The answer is 'no'. Consider Figure 2, where we show the rating reliability distribution of the top 1000 fair and top 1000 unfair users in the Flip- kart network, as identified by our FairJudge algorithm (ex- plained later). Notice that, while most ratings by fair users have high reliability, some of their ratings have low relia- bility, indicating personal opinions that disagree with ma- jority (see green arrow). Conversely, unfair users give some high reliability ratings (red arrow), probably to camouflage themselves as fair users. Thus, having reliability as a rating- specific metric allows us to more accurately characterize this distribution. Given a bipartite user-product graph, we do not know the values of these three metrics for any user, product or rating. Clearly, these scores are mutually interdependent. Let us look at an example. Figure 3: Toy example showing products (P1, P2, P3), users (UA, UB, UC , UD, UE and UF ), and rating scores provided by the users to the products. User UF always disagrees with the consensus, so UF is unfair. Example 1 (Running Example). Figure 3 shows a sim- ple example in which there are 3 products, P1 to P3, and 6 users, UA to UF . Each review is denoted as an edge from a user to a product, with rating score between −1 and +1. Note that this is a rescaled version of the traditional 5-star rating scale where a 1, 2, 3, 4 and 5 star corresponds to −1,−0.5, 0, +0.5 and +1 respectively. One can immediately see that UF 's ratings are inconsistent with those of the UA, UB, UC , UD and UE. UF gives poor ratings to P1 and P2 which the others all agree are very good by consensus. UF also gives a high rating for P3 which the others all agree is very bad. We will use this example to motivate our formal definitions below. (cid:80) (cid:80) Fairness of users. Intuitively, fair users are those who give reliable ratings, and unfair users mostly give unreliable ratings. So we simply define a user's fairness score to be the average reliability score of its ratings: (u,p)∈Out(u) R(u, p) F (u) = Out(u) (4) Other definitions such as temporally weighted average can be developed, but we use the above for simplicity. Goodness of products. When a product receives rat- ing scores via ratings with different reliability, clearly, more importance should be given to ratings that have higher reli- ability. Hence, to estimate a product's goodness, we weight the ratings by their reliability scores, giving higher weight to reliable ratings and little importance to low reliability ratings: (u,p)∈In(p) G(p) = R(u, p) · score(u,p) In(p) (5) Returning to our running example, the ratings given by users UA, UB, UC , UD, UE and UF to product P1 are +1, +1, +1, +1, +1 and −1, respectively. So we have: G(P1) = 1 6 (R(UA, P1) + R(UB, P1) + R(UC , P1)+ R(UD, P1) + R(UE, P1) − R(UF , P1)) +0.5+0.5−1−1−1−1+0.5+0.5+1+1+1+1−1+0.5+1−1−1+1Unfair userUCUBP1P3P2UFUEUDUA Fairness of user u, F (u) = Reliability of rating (u, p), R(u, p) = Goodness of product p, G(p) = 0.5 · α1 + α2 · IBIRDN ESTIRT DU (u) +(cid:80) β2 · IBIRDN ESTIRT DP (p) +(cid:80) (F (u) + (1 − score(u,p) − G(p) α1 + α2 + Out(u) )) 2 1 2 β1 + β2 + In(p) (u,p)∈Out(u) R(u, p) (u,p)∈In(p) R(u, p) · score(u,p) (1) (2) (3) Figure 4: This is the set of mutually recursive definitions of fairness, reliability and goodness for the pro- posed FairJudge algorithm. The yellow shaded part addresses the cold start problems and gray shaded part incorporates the behavioral properties. Reliability of ratings. A rating (u, p) should be consid- ered reliable if (i) it is given by a generally fair user u, and (ii) its score is close to the goodness score of product p. The first condition makes sure that ratings by fair users are trusted more, in lieu of the user's established reputation. The sec- ond condition leverages 'wisdom of crowds', by making sure that ratings that deviate from p's goodness have low reliabil- ity. This deviation is measured as the normalized absolute difference, score(u,p) − G(p)/2. Together: R(u, p) = 1 2 (F (u) + (1 − score(u,p) − G(p) 2 )) (6) In our running example, for the rating by user UF to P1: R(UF , P1) = 1 2 F (UF ) + (1 − − 1 − G(P1) 2 ) (cid:18) (cid:19) Similar equations can be associated with every edge (rat- ing) in the graph of Figure 3. 3.2 Addressing Cold Start Problems If a user u has given only a few ratings, we have very little information about his true behavior. Say all of u's ratings are very accurate – it is hard to tell whether it is a fraudster that is camouflaging and building reputation by giving gen- uine ratings [9], or it is actually a benign user. Conversely, if all of u's ratings are very deviant, it is hard to tell whether the user is a fraudulent shill account [23, 17], or simply a normal user whose rating behavior is unusual at first but stabilizes in the long run [8]. Due to the lack of sufficient information about the ratings given by the user, little can be said about his fairness. Similarly, for products that have only been rated a few times, it is hard to accurately deter- mine their true quality, as they may be targets of fraud [17, 20]. This uncertainty due to insufficient information of less active users and products is the cold start problem. We solve this issue by assigning Bayesian priors to each user's fairness score as follows: 0.5 · α +(cid:80) F (u) = (u,p)∈Out(u) R(u, p) α + Out(u) (7) Here, α is a non-negative integer constant, which is the relative importance of the prior compared to the rating re- liability – the lower (higher) the value of α, the more (less, resp.) the fairness score depends on the reliability of the ratings. The 0.5 score is the default global prior belief of all users' fairness, which is the midpoint of the fairness range [0, 1]. If a user gives only a few ratings, then the fairness score of the user is close to the default score 0.5. The more number of ratings the user gives, the more the fairness score moves towards the user's rating reliabilities. This way shills with few ratings have little effect on product scores. Similarly, the Bayesian prior in product's goodness score is incorporated as: (cid:80) G(p) = (u,p)∈In(p) R(u, p) · score(u,p) (8) β + In(p) Again, β is a non-negative integer constant. The prior belief of product's goodness is set to 0 which is the midpoint of the goodness range [−1, 1], and so 0 · β = 0 does not appear in the numerator. We will explain how the values of α and β are set in Section 4. 3.3 Incorporating Behavioral Properties Rating scores alone are not sufficient to efficiently estimate the fairness, goodness and reliability values. The behavior of the users and products is also an important aspect to be considered. As an example, fraudsters have been known to give several ratings in a very short timespan, or regularly at fixed intervals which indicates bot-like behavior [15, 8, 28]. Even though the ratings themselves may be very accurate, the unusually rapid behavior of the user is suspicious. Be- nign users, on the other hand, have a more spread out rating behavior as they lack regularity [15]. In addition, products that receive an unusually high number of ratings for a very short time period may have bought fake ratings [31, 20]. Therefore, behavioral properties of the ratings that a user gives or a product receives are indicative of their true nature. Here, we show a Bayesian technique to incorporate the rating behavioral properties of users and products. We focus on temporal rating behavior as the behavioral property for the rest of the paper, but our method can be used with any additional set of properties. A user u's temporal rating be- havior is represented as the time difference between its con- secutive ratings, inter-rating time distribution IRT DU (u). To model the behavior, we use a recent algorithm called BIRDNEST [8], which calculates a Bayesian estimate of how much user u's IRT DU (u) deviates from the global popula- ∈ U. This esti- tion of all users' behavior, IRT DU (u mate is the BIRDNEST score of user u, BIRDN ESTIRT DU (u) ∈ [0, 1]. We use IBIRDN ESTIRT DU (u) = 1−BIRDN ESTIRT DU (u), as user u's behavioral normality score. When IBIRDN ESTIRT DU (u) = 1, it means the user's behavior is absolutely normal, and 0 means totally abnormal. Similarly, for products, IBIRDN ESTIRT DP (p) is calculated from the )∀u (cid:48) (cid:48) (cid:48) (cid:48) )∀p consecutive ratings' time differences IRT DP (p) that prod- ∈ P. uct p gets, with respect to the global IRT DP (p As in the case of cold start, we adopt a Bayesian approach to incorporate the behavioral properties in the fairness and goodness equations 7 and 8. The IBIRDN ESTIRT DU (u) score is treated as user u's behavioral Bayesian prior. As opposed to global priors (0.5 and 0) in the cold start case, this prior is user-dependent and may be different for differ- ent users. The resulting equation is given in Equation 1. Note that now there are two non-negative integer constants, α1 and α2, indicating the relative importance of the cold start and behavioral components, respectively, to the net- work component. The Bayesian prior for products is in- corporated similarly to give the final goodness equation in Equation 3. Overall, the FairJudge formulation represented in Fig- ure 4 is the set of three equations that define the fairness, goodness and reliability scores in terms of each other. It combines the network, cold start treatment and behavioral properties together. 4. THE FAIRJUDGE ALGORITHM Having formulated the fairness, goodness and reliability metrics in Section 3, we present the FairJudge algorithm in Algorithm 1 to calculate their values for all users, products and ratings. The algorithm is iterative, so let F t, Gt and Rt denote the fairness, goodness and reliability score at the end of iteration t. Given the rating network and non-negative integers α1, α2, β1 and β2, we first initialize all scores to the highest value 1 (see line 3).1 Then we iteratively update the scores using Equations (3), (2) and (1) until convergence (see lines 6-12). Convergence occurs when all scores change minimally (see line 12).  is the acceptable error bound, which is set to a very small value, say 10 −6. But how do we set the values of α1, α2, β1 and β2? In an unsupervised scenario, it is not possible to find the best combination of these values apriori. Therefore, the algo- rithm is run for several combinations of α1, α2, β1 and β2 as inputs, and the final scores of a user across all these runs are averaged to get the final FairJudge score of the user. Formally, let C be the set of all parameter combina- tions {α1, α2, β1, β2}, and F (uα1, α2, β1, β2) be the fairness score of user u after running Algorithm 1 with α1, α2, β1 and β2 as input. So the final fairness score of user u is F (u) = (cid:80) (α1,α2 ,β1,β2)∈C F (uα1,α2,β1,β2) (cid:80) (α1,α2 ,β1 ,β2)∈C G(pα1,α2,β1,β2) (cid:80) and (α1,α2,β1 ,β2)∈C R((u,p)α1,α2,β1,β2) R(u, p) = . In our exper- iments, we varied all (integer) parameters from 0 to 5, i.e. 0 ≤ α1, α2, β1, β2 ≤ 5, giving 6x6x6x6 = 1296 combinations. So, altogether, scores from 1296 different runs were averaged to get the final unsupervised FairJudge scores. This final score is used for ranking the users. . Similarly, G(p) = C C C In a supervised scenario, it is indeed possible to learn the relative importance of parameters. We represent each user u as a feature vector of its fairness scores across several runs, i.e. F (uα1, α2, β1, β2),∀(α1, α2, β1, β2) ∈ C are the features for user u. Given a set of fraudulent and benign user labels, a random forest classifier is trained that learns the appropriate weights to be given to each score. The higher the weight, 1Random initialization gives similar results. Algorithm 1 FairJudge Algorithm 1: Input: Rating network (U , R, P), α1, α2, β1, β2 2: Output: Fairness, Reliability and Goodness scores, given 3: Initialize F 0(u) = 1, R0(u, p) = 1 and G0(p) = 1, ∀u ∈ α1, α2, β1 and β2 U , (u, p) ∈ R, p ∈ P. IBIRDN ESTIRT DP (p) ∀p ∈ P. IBIRDN ESTIRT DU (u) 4: Calculate ∀u ∈ U and 5: t = 0 6: do 7: 8: Update goodness of products using Equation 3: ∀p ∈ P, t = t + 1 Gt(p) = β2·IBIRDN ESTIRT DP (u,p)∈In(p) Rt−1(u,p).score(u,p) . 9: Update reliability of ratings using Equation 2 ∀(u, p) ∈ R, )). 10: Update fairness of users using Equation 1 ∀u ∈ U , (F t−1(u) + (1 − score(u,p)−Gt(p) (u)+(cid:80) 0.5·α1+α2·IBIRDN ESTIRT DU Rt(u, p) = 1 2 F t(u) = error = max(maxu∈U F t(u) − F t−1(u), max(u,p)∈R Rt(u, p) − Rt−1(u, p), maxp∈P Gt(p) − Gt−1(p)) α1+α2+Out(u) 11: 2 12: while error >  13: Return F t+1(u), Rt+1(u, p), Gt+1(p), ∀u ∈ U , (u, p) ∈ (u,p)∈Out(u) Rt(u,p) R, p ∈ P (p)+(cid:80) β1+β2+In(p) the more important the particular combination of parameter values is. The learned classifier's prediction labels are then used as the supervised FairJudge output. Example 2 (Running Example). Let us revisit our run- ning example. Let, α1 = α2 = β1 = β2 = 0. We initialize all fairness, goodness and reliability scores to 1 (line 3 in Algorithm 1. Consider the first iteration of the loop (i.e. when t is set to 1 in line 7). In line 8, we must update the goodness of all products. Let us start with product P1. Its goodness G0(P1) was 1, but this gets updated to G1(P1) = −1(1) + 1(1) + 1(1) + 1(1) + 1(1) + 1(1) = 0.67. 6 We see that the goodness of P1 has dropped because of UA's poor rating. The following table shows how the fairness and goodness values change over iterations (we omit reliability for brevity): Node Property P1 P2 P3 G(P1) G(P2) G(P3) UA - UE F (UA) - F (UE ) UF F (UF ) Fairness/Goodness in iterations 1 0.67 0.25 -0.67 0.92 0.62 2 0.67 0.28 -0.67 0.89 0.43 5 0.67 0.31 -0.67 0.86 0.24 9 (final) 0.68 0.32 -0.68 0.86 0.22 0 1 1 1 1 1 By symmetry, nodes UA to UE have the same fairness values throughout. After convergence, UF has low fairness score, while UA to UE have close to perfect scores. Confirm- ing our intuition, the algorithm quickly learns that UF is an unfair user as all of its ratings disagree with the rest of the users. Hence, the algorithm then downweighs UF 's ratings in its estimation of the products' goodness, raising the score of P1 and P2 as they deserve. 4.1 Theoretical Guarantees of FairJudge ∞ Here we present the theoretical properties of FairJudge. (u, p) be the final scores after Let, F convergence, for some input α1, α2, β1, β2. (p) and R (u), G ∞ ∞ Lemma 1 (Lemma 1). The difference between a prod- uct p's final goodness score and its score after the first it- ∞ (p) − G1(p) ≤ 1. Similarly, eration is at most 1, i.e. G R (u, p) − R1(u, p) ≤ 3/4 and F (u) − F t(u) ≤ 3/4. ∞ ∞ The proof is shown in the appendix [1]. Theorem 1 ∞ (u, p)− Rt(u, p) ≤ ( 3 (Convergence Theorem). The difference 4 )t, during iterations is bounded as R ∀(u, p) ∈ R. As t increases, the difference decreases and Rt(u, p) converges to R (u)−F t(u) ≤ ∞ 4 )t,∀u ∈ U and G ( 3 We prove this theorem formally in the appendix [1]. As the algorithm converges for all α1, α2, β1, β2, the entire al- gorithm is guaranteed to converge. ∞ (p) − Gt(p) ≤ ( 3 4 )(t−1),∀p ∈ P. (u, p). Similarly, F ∞ Corollary 1 (Iterations till Convergence). The num- ber of iterations needed to reach convergence is at most 2 + (cid:100) log(/2) log(3/4)(cid:101). In other words, treating  as constant, the num- ber of iterations needed to reach convergence is bounded by a constant. Again, the proof is shown in the appendix [1]. Linear algorithmic time complexity. In each itera- tion, the algorithm updates goodness, reliability and fairness scores of each product, rating and user, respectively. Each of these updates takes constant time. So, the complexity of each iteration is O(E + V ) = O(E). By Corollary 1, the algorithm converges in a constant number of iterations. Hence the time complexity is O(kE), which is linear in the number of edges, and k is a constant equal to the product of the number of iterations till convergence and the number of runs of the algorithm. 5. EXPERIMENTAL EVALUATION In this section, we present the results of the proposed FairJudge algorithm to identify fair and unfair users. We conduct extensive experiments on five different rating net- works and show five major results: (i) We compare FairJudge algorithm with five recent algo- rithms to predict benign and malicious users in an unsuper- vised setting. We show that FairJudge performs the best or second best in nine out of ten cases. (ii) We show that FairJudge outperforms nine algorithms across all datasets, when training data is available. (iii) We show that FairJudge is robust to the percentage of training data available, and consistently performs the best. (iv) We show that both cold start treatment and behav- ior properties improve the performance of FairJudge algo- rithm, and incorporating both of them together perform the best. (v) We show the linear running time of FairJudge. The FairJudge algorithm is already being deployed at Flipkart. 5.1 Datasets: Rating Networks We use the following five datasets. Table 2 has their prop- erties. All ratings are rescaled between -1 and +1. • Flipkart is India's biggest online marketplace where users rate products. The ground truth labels are generated by re- view fraud investigators in Flipkart, who look at various properties of the user, rating and the product being rated. • Epinions network has two components – user-to-post rat- ing network and user-to-user trust network [18]. Algorithms are run on the rating network and ground truth is defined using the trust network – a user is defined as trustworthy if its total trust rating is ≥ +10, and unfair if ≤ −10. Table 2: Five rating networks used for evaluation. Network # Users (% unfair, fair) # Products # Edges OTC Alpha Amazon Flipkart Epinions 4,814 (3.7%, 2.8%) 3,286 (3.1%, 4.2%) 256,059 (0.09%, 0.92%) 1,100,000 (-, -) 120,486 (0.84%, 7.7%) 5,858 3,754 74,258 550,000 132,585 35,592 24,186 560,804 3,300,000 4,835,208 • Amazon is a user-to-product rating network [19]. The ground truth is defined using helpfulness votes, which is in- dicative of malicious behavior [6] – users with at least 50 votes are trustworthy (helpful) if the proportion of helpful- to-total votes is ≥ 0.75, and untrustworthy if ≤ 0.25. • Bitcoin OTC is a user-to-user trust network of Bitcoin users. The network is made bipartite by splitting each user into a 'rater' with all its outgoing edges and 'product' with all incoming edges. The ground truth is defined as: trust- worthy users are the platform's founder and users he rated highly positively (≥ 0.5). Untrustworthy users are the ones that these trusted users give at least three more high nega- tive ratings (≤ −0.5) than high positive ratings (≥ 0.5). • Bitcoin Alpha is another Bitcoin trust network and its ground truth is created similar to OTC, starting from the founder of this platform. 5.2 Baselines We compare FairJudge with nine state-of-the-art unsu- pervised and supervised algorithms. The unsupervised al- gorithms are: • Bias and Deserve (BAD) [21] assigns a bias score bias(u) to each user u, which measures user's tendency to give high or low ratings. 1−bias(u) is the prediction made by BAD. • Trustiness [29] algorithm assigns a trustiness, honesty and reliability score to each user, product and rating, respec- tively. We use the trustiness score as its prediction. • FraudEagle [2] is a belief propagation based algorithm. Users are ranked according to their fraud score. • SpEagle [24] incorporates behavior features into FraudEa- gle, and the final spam scores of users are used for ranking. • BIRDNEST [8] ranks users by creating a Bayesian model with users' timestamp and rating distributions. We also compare with supervised algorithms, when train- ing labels are available: • SpEagle+ [24] is a supervised extension of SpEagle that leverages known training labels in the ranking. • SpamBehavior [17]: This technique uses user's average rat- ing deviations as feature. • Spamicity [22] is creates each user's features as its review burstiness and maximum reviews per day. • ICWSM'13 [23] uses user's fraction of positive reviews, maximum reviews in a day and average rating deviation as features for prediction. 5.3 Experiment 1: Unsupervised Prediction In this experiment, the task is to rank the users based on their suspiciousness. We compare unsupervised Fair- Judge with the suite of five unsupervised algorithms in terms of their Average Precision scores, which measures the relative ordering the algorithm give to the known fair and unfair users. This score corresponds to the area under the precision-recall curve. We calculate two average precision scores – one for fair users and another for unfair users. Ta- Table 3: Unsupervised Predictions: The table shows the Average Precision values of all algorithms in unsu- pervised prediction of unfair and fair users across five datasets. The best algorithm in each column is colored blue and second best is gray. Overall, FairJudge performs the best or second best in 9 of the 10 cases. nc indicates 'no convergence'. Unfair user prediction Fair user prediction FraudEagle BAD SpEagle BIRDNEST Trustiness FairJudge OTC Alpha Amazon Epinions Flipkart OTC Alpha Amazon Epinions Flipkart 93.67 79.75 74.40 61.89 74.11 86.03 47.21 55.92 12.16 19.09 40.05 56.18 86.08 63.29 68.42 53.46 49.40 76.43 96.88 97.19 93.42 93.32 97.33 97.35 86.94 77.41 80.91 46.11 84.09 90.80 71.99 68.31 82.23 77.18 78.19 86.16 nc nc nc nc nc nc 79.96 nc nc nc 58.31 85.71 nc 57.14 97.09 62.47 nc 39.27 38.07 98.53 nc 99.35 37.08 63.43 ble 3 shows the resulting average precision score on the five datasets. We see that FairJudge performs the best in identifying fair users in 4 out of 5 networks, and second best in the Flipkart network. In identifying unfair users, our algorithm performs the best in two networks and second best in the two Bitcoin networks. The BIRDNEST algorithm is ob- served to perform quite well in case of Flipkart network, but has much weaker performance on other datasets. Note that FraudEagle, SpEagle and Trustiness are not scalable and do not converge for the two largest networks, Epinions and Flipkart, as opposed to FairJudge which is guaranteed to converge. We discuss scalability in Section 5.7. Overall, in unsupervised prediction, FairJudge performs the best or second best in 9 out of 10 cases. 5.4 Experiment 2: Supervised Prediction In this experiment, the task is to predict the malicious and benign users, given some labels from both categories. The performance is measured using area under the ROC curve (AUC) which is a standard measures when data is imbal- anced, as is our case. For each algorithm, a feature vector is created for each user and a binary classifier is trained. As a reminder from Section 4, for each user u, supervised Fair- Judge creates a 1296 dimentional feature vector of its fair- ness scores F (uα1, α2, β1, β2), one for each of the 1296 com- binations of α1, α2, β1, β2 ∈ [0, 5]. For baselines FraudEagle, BAD, SpEagle, SpEagle+, BIRDNEST and Trustiness, the feature vector for user u is the score the baseline gives to u and u's outdegree. For baselines SpamBehavior, Spam- icity and ICWSM'13, the feature vector for user u is their respective features given in Section 5.2. We perform stratified 10-fold cross-validation using ran- dom forest classifier. The resulting AUCs are reported in Table 4. We see that FairJudge outperforms all exist- ing algorithms across all datasets and consistently has AUC ≥ 0.85. Interestingly, supervised FairJudge performs extremely well on the Flipkart dataset, while it did not perform as well on this dataset in the unsupervised experiment. This is be- cause by using the training data, the classifier learns the im- portance of features F (uα1, α2, β1, β2) ∀{α1, α2, β1, β2} ∈ C. We reported the 100 most unfair users predicted by FairJudge to review fraud investigators in Flipkart, and they found 80 users to be fraudulent (80% accuracy). 5.5 Experiment 3: Robustness of FairJudge In this experiment, we evaluate the performance of the algorithms as the percentage of training data changes. We Table 4: Supervised Predictions: 10-fold cross val- idation with individual predictions as features in a Random Forest classifier. Values reported are AUC. FairJudge performs the best across all datasets. nc means 'no convergence'. FraudEagle BAD SpEagle BIRDNEST Trustiness SpEagle+ SpamBehavior Spamicity ICWSM'13 FairJudge OTC Alpha Amazon Epinions Flipkart 0.89 0.79 0.69 0.71 0.82 0.55 0.77 0.88 0.75 0.91 0.81 0.80 0.63 0.56 0.72 0.67 0.80 0.60 0.84 0.86 0.76 0.68 0.57 0.73 0.75 0.66 0.69 0.74 0.71 0.85 nc 0.81 nc 0.84 nc nc 0.80 0.50 0.82 0.89 nc 0.64 nc 0.80 nc nc 0.60 0.82 0.82 0.85 vary the training data from 10% to 90% in steps of 10. Fig- ure 5 shows the average AUC on test sets by using 50 random samples of training data. We make two observations. First, FairJudge is robust to the amount of training data. Its performance is relatively stable (AUC ≥ 0.80 in almost all cases) as the amount of training data varies. Second, Fair- Judge outperforms other algorithms consistently across all datasets for almost all training percentages. Together, these two show the efficiency of supervised FairJudge algorithm even when small amount of training data is available. 5.6 Experiment 4: Importance of Network, Cold Start and Behavior In this experiment, we show the importance of the dif- ferent components in the FairJudge algorithm – network (given by Equations 4, 5 and 6; shown as N), cold start treatment (C), and behavioral properties (B). Figure 6(a) shows the average precision in unsupervised case for the Al- pha dataset, when network property is combined with the other two components, and Figure 6(b) shows the average AUC in the supervised case. In both cases, network prop- erties alone has the lowest performance. Adding either the cold start treatment component or the behavioral property component increases this performance. To combine network properties with behavioral property component only, the cold start property is removed by setting α1 = β1 = 0 in the FairJudge algorithm. Likewise, α2 and β2 are set to 0 to combine with cold start treatment alone. Further, com- bining all three together gives the best performance. Sim- ilar observations hold for the other datasets as well. This Figure 5: Variation of AUC with percentage of training data available for supervision. FairJudge consistently performs the best across all settings, and its performance is robust to the training percentage. (a) Unsupervised (b) Supervised Figure 6: Change in performance of FairJudge on Alpha network in (a) unsupervised and (b) supervised experi- ments when different components are used: network (N), cold start treatment (C) and behavioral (B). (a) (b) Figure 7: time increases linearly with the number of edges. Unfair users give highly negative ratings. (a) FairJudge scales linearly - the running (b) shows that all three components are important for predict- ing fraudulent users. 5.7 Experiment 5: Linear scalability We have theoretically proved in Section 4.1 that Fair- Judge is linear in running time in the number of edges. To show this experimentally as well, we create random net- works of increasing number of nodes and edges and compute the running time of the algorithm till convergence. Figure 7 shows that the running time increases linearly with the num- ber of edges in the network, which shows that FairJudge algorithm is indeed scalable to large size networks for prac- tical use. 5.8 Discoveries Here we look at some insights and discoveries about ma- licious behavior found by FairJudge. As seen previously in Figure 2, most ratings given by un- fair users have low reliability, while some have high reliabil- ity, indicating camouflage to masquerade as fair users. At the same time, most ratings of fair users have high reliabil- (a) (b) Figure 8: Identified unfair users by FairJudge are (a) faster in rating , and give extreme ratings. ity, but some ratings have low reliability, indicating personal opinion about products that disagrees with 'consensus'. We see in Figure 7(b) that in the Amazon network, un- fair users detected by FairJudge (F (u) ≤ 0.5) give highly negative rating on average (mean out-rating weight of -0.88), while fair users give positive ratings (mean out-weight 0.62). Unfair users also give almost half as many ratings as fair users (7.85 vs 15.92). This means on average, fraudsters aggressively bad-mouth target products. We also observe in Figure 8 that unfair users in OTC network: (a) give ratings in quick succession of less than a few minutes, and (b) exhibit bimodal rating pattern – either they give all -1.0 ratings (possibly, bad-mouthing a competi- tor) or all +1.0 ratings (possibly, over-selling their product- s/friends). As an example, the most unfair user found by FairJudge had 3500 ratings, all with +0.5 score, and al- most all given 15 seconds apart (apparently, a script). On the other hand, fair users have a day to a month between consecutive ratings, and they give mildly positive ratings (between 0.1 and 0.5). These observations are coherent with existing research [15, 5]. Figure 1(d) shows a set of 40 unfair users, as identified by FairJudge on the Alpha network, that collude to positively rate each other and form sets of tightly knit clusters – they are confirmed to be shills of a single user. In summary, unfair users detected by FairJudge exhibit strange characteristics with respect to their behavior: • They have bimodal rating pattern - they give too low (bad- mouthing) or too high (over-selling) ratings. • They are less active, have no daily periodicity, and post quickly, often less than a few minutes apart. • They tend to form near-cliques, colluding to boost their own or their product's ratings. • They camouflage their behavior to masquerade as benign users. 102030405060708090Percentageoftrainingdata0.650.750.850.95AverageAUCOTCNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCAlphaNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCAmazonNetwork102030405060708090Percentageoftrainingdata0.50.60.70.80.9AverageAUCFraudEagleSpEagleTrustinessEpinionsNetwork102030405060708090Percentageoftrainingdata0.60.650.70.750.80.85AverageAUCFraudEagleSpEagleTrustinessFlipkartNetworkFraudEagleBADSpEagleBIRDNESTTrustinessSpEagle+SpamBehaviorSpamicityICWSM'13FairJudge020406080100AveragePrecisionN64N+B71.9N+C74.9N+C+B76.50.00.20.40.60.81.0AverageAUCN0.71N+B0.84N+C0.81N+C+B0.85103104105106107Numberofedgesinnetwork100101102103104Runtime(seconds)Slope=100.51.0FairnessRange−1.0−0.50.00.51.0AverageOut-weight−0.880.62SecondMinuteHourDayMonthUserInter-RatingTimeProfile0.000.010.020.030.040.050.060.07Fractionofratings−1.0−0.50.00.51.0MeanUserRating0.000.050.100.150.200.25FractionofUsersUnfairusersFairusers 6. CONCLUSIONS We presented the FairJudge algorithm to address the problem of identifying fraudulent users in rating networks. This paper has the following contributions: • Algorithm: We proposed three mutually-recursive met- rics - fairness of users, goodness of products and reliability of ratings. We extended the metrics to incorporate Bayesian solutions to cold start problem and behavioral properties. We proposed the FairJudge algorithm to iteratively com- pute these metrics. • Theoretical guarantees: We proved that FairJudge algorithm has linear time complexity and is guaranteed to converge in a bounded number of iterations. • Effectiveness: By conducting five experiments, we showed that FairJudge outperforms nine existing algorithms to predict fair and unfair users. FairJudge is practically use- ful, and already under deployment at Flipkart. 7. REFERENCES [1] Additional material. http://cs.umd.edu/~srijan/fairjudge/, 2017. [2] L. Akoglu, R. Chandy, and C. Faloutsos. Opinion fraud detection in online reviews by network effects. In ICWSM, 2013. [3] L. Akoglu, H. Tong, and D. Koutra. Graph based anomaly detection and description: a survey. TKDD, 29(3):626–688, 2015. [4] C. Chen, K. Wu, V. Srinivasan, and X. Zhang. Battling the internet water army: Detection of hidden paid posters. In ASONAM, 2013. [5] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. Antisocial behavior in online discussion communities. In ICWSM, 2015. [6] A. Fayazi, K. Lee, J. Caverlee, and A. Squicciarini. Uncovering crowdsourced manipulation of online reviews. In SIGIR, 2015. [7] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In WWW, 2012. [8] B. Hooi, N. Shah, A. Beutel, S. Gunneman, L. Akoglu, M. Kumar, D. Makhija, and C. Faloutsos. Birdnest: Bayesian inference for ratings-fraud detection. In SDM, 2016. [9] B. Hooi, H. A. Song, A. Beutel, N. Shah, K. Shin, and C. Faloutsos. Fraudar: Bounding graph fraud in the face of camouflage. In KDD, 2016. [10] M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang. Catchsync: catching synchronized behavior in large directed graphs. In KDD, 2014. [11] M. Jiang, P. Cui, and C. Faloutsos. Suspicious behavior detection: current trends and future directions. IEEE Intelligent Systems, 2016. [12] N. Jindal and B. Liu. Opinion spam and analysis. In WSDM, 2008. [13] S. Kumar, F. Spezzano, V. Subrahmanian, and C. Faloutsos. Edge weight prediction in weighted signed networks. In ICDM, 2016. [14] T. Lappas, G. Sabnis, and G. Valkanas. The impact of fake reviews on online visibility: A vulnerability assessment of the hotel industry. INFORMS, 27(4), 2016. [15] H. Li, G. Fei, S. Wang, B. Liu, W. Shao, A. Mukherjee, and J. Shao. Bimodal distribution and co-bursting in review spam detection. In WWW, 2017. [16] R.-H. Li, J. Xu Yu, X. Huang, and H. Cheng. Robust reputation-based ranking on bipartite rating networks. In SDM, 2012. [17] E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In CIKM, 2010. [18] P. Massa and P. Avesani. Trust-aware recommender systems. In RecSys, 2007. [19] J. J. McAuley and J. Leskovec. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In WWW, 2013. [20] A. J. Minnich, N. Chavoshi, A. Mueen, S. Luan, and M. Faloutsos. Trueview: Harnessing the power of multiple review sites. In WWW, 2015. [21] A. Mishra and A. Bhattacharya. Finding the bias and prestige of nodes in networks based on trust scores. In WWW, 2011. [22] A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In KDD, 2013. [23] A. Mukherjee, V. Venkataraman, B. Liu, and N. S. Glance. What yelp fake review filter might be doing? In ICWSM, 2013. [24] S. Rayana and L. Akoglu. Collective opinion spam detection: Bridging review networks and metadata. In KDD, 2015. [25] V. Sandulescu and M. Ester. Detecting singleton review spammers using semantic similarity. In WWW, 2015. [26] H. Sun, A. Morales, and X. Yan. Synthetic review spamming and defense. In KDD, 2013. [27] B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security, 2014. [28] B. Viswanath, M. A. Bashir, M. B. Zafar, S. Bouget, S. Guha, K. P. Gummadi, A. Kate, and A. Mislove. Strength in numbers: Robust tamper detection in crowd computations. In COSN, 2015. [29] G. Wang, S. Xie, B. Liu, and S. Y. Philip. Review graph based online store review spammer detection. In ICDM, 2011. [30] J. Wang, A. Ghose, and P. Ipeirotis. Bonus, disclosure, and choice: what motivates the creation of high-quality paid reviews? In ICIS, 2012. [31] G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious reviews. In RecSys, 2010. [32] Z. Wu, C. C. Aggarwal, and J. Sun. The troll-trust model for ranking in signed networks. In WSDM, 2016. [33] S. Xie, G. Wang, S. Lin, and P. S. Yu. Review spam detection via temporal pattern discovery. In KDD, 2012. [34] J. Ye and L. Akoglu. Discovering opinion spammer groups by network footprints. In ECML-PKDD, 2015.
1201.3745
1
1201
2012-01-18T10:30:21
Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites
[ "cs.SI" ]
The increasing participation of people in online activities in recent years like content publishing, and having different kinds of relationships and interactions, along with the emergence of online social networks and people's extensive tendency toward them, have resulted in generation and availability of a huge amount of valuable information that has never been available before, and have introduced some new, attractive, varied, and useful research areas to researchers. In this paper we try to review some of the accomplished research on information of SNSs (Social Network Sites), and introduce some of the attractive applications that analyzing this information has. This will lead to the introduction of some new research areas to researchers. By reviewing the research in this area we will present a categorization of research topics about online social networks. This categorization includes seventeen research subtopics or subareas that will be introduced along with some of the accomplished research in these subareas. According to the consequences (slight, significant, and sometimes catastrophic) that revelation of personal and private information has, a research area that researchers have vastly investigated is privacy in online social networks. After an overview on different research subareas of SNSs, we will get more focused on the subarea of privacy protection in social networks, and introduce different aspects of it along with a categorization of these aspects.
cs.SI
cs
Social Networks Research Aspects : A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites Mohammad Soryani Mazandaran University of Science and Technology Mazandaran, Iran Abstract— The increasing participation of people in online activities in recent years like content publishing, and having different kinds of relationships and interactions, along with the emergence of online social networks and people’s extensive tendency toward them, have resulted in generation and availability of a huge amount of valuable information that has never been available before, and have introduced some new, attractive, varied, and useful research areas to researchers. In this paper we try to review some of the accomplished research on information of SNSs (Social Network Sites), and introduce some of the attractive applications that analyzing this information has. This will lead to the introduction of some new research areas to researchers. By reviewing the research in this area we will present a categorization of research topics about online social networks. This categorization includes seventeen research subtopics or subareas that will be introduced along with some of the accomplished research in these subareas. According to the consequences (slight, significant, and sometimes catastrophic) that revelation of personal and private information has, a research area that researchers have vastly investigated is privacy in online social networks. After an overview on different research subareas of SNSs, we will get more focused on the subarea of privacy protection in social networks, and introduce different aspects of it along with a categorization of these aspects. Keywords- Social Networks; Privacy; Privacy in Social Networks; SNS; Survey; Taxonomy; INTRODUCTION I. In recent years several attractive and user-friendly facilities have been introduced to online society and we see an extensive and increasing participation of people in various online activities like several kinds of content publishing (blogging, writing reviews etc.) and having different kinds of relationships and interactions. The huge amount of information that is generated in this way by people has never been available before and is highly valuable from different points of views. An outstanding phenomenon that has had a significant influence on this extensive participation and includes a large part of generated information is SNSs (Social Network Sites). Maybe in past, to study about the relationships, behaviors, interactions, and properties of specific groups of people it Behrooz Minaei Iran University of Science & Technology Tehran, Iran was necessary to make a lot of effort to gain some not very detailed information about them, but in the new situation and with the emergence of online social networks, and the huge amount of various activities that are logged by their users, the desired information is accessed much more simple and with than before by incomparably more details researchers. This has led to different kinds of research with different goals which we will have an overview on in this paper. The benefits and stakeholders that may benefit from having this information or having the results of analyzing it are several but some of them are: commercial companies for advertising and promoting their products, sociologists to analyze the behavior and features of different societies, intelligence organizations to prevent and detect criminal activities, educational and cultural activists for promoting their goals, employers for acquiring information about job seekers, and generally any kind of information with any application that you may think of, related to people and human societies, may be obtained by having access to the information available on SNSs or the results of analyzing these information. In this paper we try to review some of the accomplished research on the available information of SNSs and present a categorization of research topics and subareas related to online social networks’ information. As a lot of peoples’ published information is private and on the other side as we will see, having access to them has a lot of applications and benefits for different parties, letting them to be available with unlimited access has consequences that sometimes may be catastrophic. We will pay more attention to this issue in this paper. In the following sections of this paper we will first introduce sixteen research subareas about online social networks while mentioning a few of accomplished studies related with them. After that we will have a more focused review on another important research subarea namely privacy protection in social networks, and will present a categorization of its different aspects. We will conclude at the end. To have a look at the whole picture of the categorization from above, Fig.1 shows several research sub-topics about SNSs and Fig.2 extends the topic of privacy and presents a categorization of several aspects of privacy in social networks. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org363 may be desirable to find special persons with high skill in a special field or in influential persons to find most propagating some special kind of content. In [3] a social Uhttp://vark.comU T) is search engine named Aardvark ( 1 presented that needs to find the best person for answering a specific question, and one of its information resources is people’s profiles on facebook. In [4] some work is done towards forming a team of experts from members of a social network. In [5] to specify influential persons within Twitter, ranking people based on their followers, PageRank and number of retweets is investigated. In [6] some definitions are defined for different people whose actions impacts on making the same actions by others and such people are called leaders. In this paper some algorithms are presented for detecting these people by the use of a social graph and a table which contains users’ actions. In [14] some references are cited in which some methods for extracting most important (central) members are presented. It has mentioned strengths and weaknesses of some metrics. In [21] Content Power Users (CPUs) in blog networks are defined as users whose published content has a lot of impact on other users’ actions. In this paper a method for identifying these users is presented and some other research works about detecting highly influential people in social networks are cited. 2) Commerce and Marketing: Advertisement in SNSs can be targeted [11] [31] [6]. Targeting users whose activity influences others could be beneficial for companies [6]. As is mentioned in [11] a manufacturer can select a number of users and give them its product with some discount or even free, and hope that their influence on other users promotes their product. In the case of discounting the amount of discount is exposed to discussion. In [31] using users’ profile information and the information about their activities towards targeted advertisement is mentioned. 3) Monitoring and Analyzing Users’ Activities: In [12] users’ behavior in a social network is analyzed to identify the patterns of closeness between colleagues. Paper [24] notes the importance of awareness about users’ participation patterns in knowledge-sharing social networks for researchers and social network industry; and analyses users’ activities in three social networks. Some results that are different from common assumptions are reported. 4) Crawling: To analyze the information of SNSs first we must acquire it. One of the most important ways to do this is using crawlers. Crawlers generally should have some specifications like being up to date and having mechanisms to prevent fetching the same page more than once. According to special characteristics of social networks like the huge size, and the auto crawling prevention mechanisms that SNSs use it seems that we need special kind of Figure 1. A categorization of research topics in social networks area. II. BA CATEGORIZATION OF RESEARCH TOPICS IN SOCIAL NETWORKS AREA 1) Detecting Special Individuals: Some people with special characteristics may be attractive some for companies, manufacturers, organizations, etc. for example it IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org3641 T 1 crawlers. In [10] noting the large size of data, and the different way of data presentation in social networks a parallel crawler is proposed for crawling social networks. In [39] [7] facebook is crawled and the problem of facing with CAPTCHAs is noted. In [38] the ethicality of web crawlers is discussed. 5) Content Mining: One kind of information that is made by users is the content that they put in the sites in different ways. In [8] according to the real-time nature of twitter, an algorithm for monitoring and analyzing the tweets is proposed towards detecting a specific event. In this work a system is implemented to detect earthquakes in Japan and is able to do so with high accuracy. In [9] new type of texts that are published on SNSs and are usually short with an informal form of writing (called social snippets) are investigated and some applications of analyzing such texts are mentioned. Their focus is on keyword extraction from this kind of texts. In [36] mentioning the applications of identifying the quality of users’ reviews about different issues, using social networks information to improve reviews quality identification is discussed. In [22] the necessity of applying automated language analysis techniques towards security in digital communities including social networks is mentioned and an approach is proposed for detecting a special kind of malicious activity. 6) Social Network Extraction: There are a lot of data in various forms on the web that apparently do not have the structure of a social network but with some mining activities on them like extracting the identity of data owners and the relations between them it is possible to extract the social network that relies beneath these data. Examples of such studies are [1] and [2]. In [1] the information of a message board is used and in [2] a system named ArnetMiner [http://www.arnetminer.org] is presented that extracts a social network of researchers. In [21] extraction of social network using a blog is mentioned. 7) Group Detection: In [4] identifying a group of skillful people to accomplish a specific job with a minimum communication cost in a social network is discussed. In [25] an efficient algorithm for large social networks named ComTector is presented for detecting communities. In [33] grouping in a social network is done towards detecting the backbone of a social network. 8) Link and Relationship Mining: In [12] relationship closeness is investigated based on the behavior of users in a social network inside a company. It is mentioned that Some behaviors are a sign of professional closeness and some are a sign of personal closeness. In [13] an approach is presented for estimation of relationship strength, and is evaluated with facebook and linkedin data. In [34] an approach for inferring the links that exist but are not observed is presented and a good survey about link mining in social networks is cited. 9) Criminal Activity Detection: Some specifications of SNSs like presence of great number of various people and new ways of communication has attracted criminals to use them for their malicious activities, so to prevent and detect such activities some special research is necessary to be done. In [22] some challenges about law enforcement and the necessity of using automated language analysis techniques for active policing in digital communities is mentioned. It notes some applications of using these techniques like identifying the child predators who pretend to be a child. In [29] a system is proposed for identifying suspects with the help of social network analysis (SNA). In [16] the application of SNA in criminal investigation and yet protecting privacy at the same time is discussed. In [32] the importance of clustering web opinions from intelligence and security informatics point of view along with some criminal activities that could be done in this space are mentioned and a clustering algorithm for detecting the context of the discussions available at social networks is presented. 10) Search: Search engines, both general purpose and special purpose ones use different information as parameters for ranking their search results. SNSs may be a valuable source of information to improve the ranking. For example special characteristics of people acquired from social networks, may be considered for ranking search results tailored to each individual’s characteristics resulting in personalized search. In [19] using the structure of a social network toward improved result ranking in profile search is studied and using the social graph for improving ranking in other types of online search is mentioned as a future research. In [3] a search engine is introduced that instead of looking for appropriate documents related with the given query, it looks for suitable persons for answering the given question. To do that it gathers information about people from different resources including SNSs. In [37] towards leveraging the information about searchers in social IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org365 networks for document ranking, a framework named SNDocRank is presented. Also a study about personalizing search results using users’ information is cited. 11) Information and Activity Diffusion and Propagation: The way that information and activities propagate through a social network is another area that is worth to investigate and studying about it can have various benefits. For example commercial companies may be interested in the results of such studies to improve the spread of information about their products, or educational and cultural activists may benefit from it for promoting their goals. In [20] information propagation in blogs is studied and some applications for such a study are mentioned. In [6] the spread and prevalence of users’ actions is investigated over time, to identify users whose actions have influence on other users’ actions. 12) Recommendation and Suggestion: According to [27] the goal of a recommender system is to recommend a set of items to a user whose favorite items are similar to them. In this work some algorithms have been designed and implemented for such systems in social networks. In [28] some techniques are presented for link prediction and the application of such techniques in friend recommendation in social networks is mentioned. In [23] some important aspects of research related with social recommendation that could be done are mentioned. 13) Influence Maximization: The problem here is to find a number of persons whose scope of influence is maximum; for example a company that has developed an application for a social network and wants to market it on that social network and can afford to invest on limited number of users (for example for giving gifts to them) would like to choose these users so that the extent of final influenced users is maximum [35]. In [26] assigning roles to users and application of being aware of these roles in influence maximization is mentioned. In [35] in addition to improving another algorithm called greedy, some heuristics are presented that run much faster. 14) Prediction: By studying the information of SNSs it is possible to predict some events that may happen in future. For example some research has been done recently to predict future links in social networks [34]. In [28] some techniques for predicting the links that may be established in future are presented. 15) Data Management: Managing the huge volume of SNSs’ data has several aspects and due to special features of this kind of data, needs specific research. For example the structure of storing data is very important and can affect the amount of needed storage. In [30] a study is done about compressing social networks and a new method for compressing social networks is presented. Some of the similarities and differences between this problem and the problem of compressing web graph are found. Their results show vast difference between compressibility characteristics of social networks and web graph. 16) Geolocation: Detecting the location of the user can have several applications including personalization. Among the studies in which SNSs are used to detect the location of users is [18]. In this work researchers of facebook have mentioned some applications of knowing the location of users like news personalization, and with pointing to inconsistency of results when using ip address for geolocation they have presented a method for detecting the location of the user using information about the location of her friends. It is also mentioned that their algorithms could be run iteratively towards identifying the location of most users who have not provided any information about their location. 17) Privacy: As the focus of this paper is on the area of privacy in SNSs, we will present a broader overview on several aspects of this area along with introducing a taxonomy of these aspects which is shown in Fig.2. 17-1 Defence 17-1-1 Helping Users Users need to be informed about the consequences of their various information publication and their activities; need to know which part of their information is accessible and for whom; need to have some facilities to control the way that people can access their information, and need to get all of these requirements in a simple and understandable way that does not need a lot of time and effort. A user gets acquainted with the matter of privacy from the first steps of her experience on SNSs by facing with privacy policies text. Definitely you too have faced with such a text and confirm that they are not very pleasant for users and a lot of people accept and pass over them without reading. In [42] the challenge of showing users’ privacy related issues to them in an understandable way is presented with an interesting example where a possible interpretation of a privacy-related text may be different from what really happens. In a study that is done on six well-known SNSs [51], it is mentioned that privacy policies often have internal inconsistencies and also there is a lack of clear phrases about data retention. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org366 Figure 2. A categorization of privacy related aspects in Social Network Sites. Overall privacy related texts like privacy policies should be unambiguous, simply and as possible, short as understandable. This can be considered as the first step of helping users towards their privacy protection. After accepting the privacy policy agreement, there are some flexible privacy settings that could be adjusted and help the user to specify the way her information is accessible. Since it is difficult for the average user to adjust these fine grained and detailed settings [44], some research towards helping users to do that in the best way could be useful. In [44] a work has been done toward automatically adjusting these settings with the minimum effort of the user. In this study a wizard is introduced that builds a classifier based on the user’s answers to the systems requests and uses it to automatically adjust the settings. The possibility of using a limited amount of user’s input to build a machine learning model that concisely describes the privacy preferences of a user, and using this model for automatically adjusting privacy settings of a user is presented in this paper. Some other interesting points about this approach are the adoption of the system after a new friend is added by a user (it presents some information about the user’s preferences), and the possibility of viewing and modifying the obtained model by advanced users. Another helpful facility (the work IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org367 is presented by Lipford et al. and is cited in [44]) is a tool that makes the user able to view her own profile from the view point of each of her friends and consequently observing the results of her settings. It seems that some sort of this approach is adopted by facebook [44]. In [54] a method for suggesting privacy settings to newcomers is presented and the importance of these primitive settings due to the users’ tendency towards keeping them is noted. In this study to some extent, a review about how to use machine learning to prepare and suggest primitive privacy settings that are more probably useful for users is presented. Another helpful aid for users’ better privacy protection is providing some informative metrics by which users can obtain concise useful information. In [42] it is suggested to use an approach which uses data mining and potentially other AI tools to find out the amount of difficulty that accessing users’ information has, and to provide some metrics for showing that, that is a useful tool for informing users about their privacy risk. Another metric that is presented in [65] is “privacy score”. In this study some models and algorithms have been presented for calculating this metric and some mathematical models are developed to estimate the sensitivity and visibility of the information, which are influential on privacy risk. Sometimes users do not behave appropriately regarding their privacy while using SNSs. Understanding these risky behaviors, their causes, and then informing people and developing preventive mechanisms could be another way of helping users. In [47] a few of these risky behaviors are mentioned : incaution in accepting friendship requests, clicking on links received from others without enough caution, reacting to suspicious friendship requests after accepting them (not before) and therefore letting suspicious users to access information, interaction with fake profiles and overall, high implicit trust that exists in SNSs. A study is cited there in which 41% of 200 users whom a friendship request were randomly sent to, accepted it, and most of the users had not limited access to their personal profile information. In another study which is also cited in [47], publicly available information of some people has been gathered from some SNSs, and have been used in phishing emails; results show that targeted people whose received emails contains some information about them or their friends are more likely to get involved. In [46] [50] and [59] some surveys have been conducted as a way for studying users and acquiring information that leads to better helping them. In [46] interviews and surveys are used to investigate the effective factors that cause personal information exposure by students on facebook and why they do it despite the existing concerns. How to defend them against privacy threats is also studied. In [59] a survey is conducted in which the participants are highly educated and some information about users’ behaviors, viewpoints, and concerns about privacy related issues are gained. Notwithstanding all of the existing threats and risks about private information disclosure, however users extensively tend to engage in social relations and interactions in SNSs and naturally each of these relations and interactions needs some information exposure. In [40] a study is done with the goal of determining the least information that needs to be shared to accomplish a specific interaction. An interesting study towards preparing helpful tools for users to protect their privacy is [53] in which helping users to jointly manage the privacy of their shared content is studied. Sometimes people who benefit from or get harmed by publication of a specific information unit are multiple, and publishing such information may put the privacy of several people at risk. An example of this kind of information that is extensively being published over SNSs is a photo in which several people exist. Photos are sometimes tagged and/or some additional information about them is available besides them. Support for common ownership in SNSs, and the requirements of solutions namely being fair, lightweight, and practical are mentioned as some issues that exist about joint management of privacy in [53]. In [59] it’s been tried to find a way for a user to express her privacy preferences, and a method to do this with the aim of being easy to understand by other users and also being machine readable (so that it can be used by other service providers and third parties) is presented. It is mentioned that they intend to use cryptographic techniques to provide the possibility of proving privacy violation for the data owner (for example to a legal authority) which is another helpful facility towards users’ privacy protection. 17-1-2 Protecting Online Information of SNSs Let’s assume that we have given all of the helpful information to users to properly manage their information publishing and protecting their privacy. Besides that we have provided them with best tools for adjusting their privacy settings in a fast, accurate, and simple way. Is it the time to relax and feel like we have done all we could do, or there are other issues that we should take care of and study about? The problem is that some of those who are interested in having users’ information do not give up and try to exploit from any possible way (sometimes legal and sometimes illegal) to acquire their desired information. In addition to studies that have been done towards directly helping users, it is necessary to make some efforts to keep the online information out of undesired reach. In this part we will take a look at this issue. A study on five Russian SNSs [50] shows that despite more concerned users, there is a significant gap between their providers and western SNS Providers about understanding the privacy related concepts and preparing appropriate defencive mechanisms; and overall the privacy condition is reported to be catastrophic that leads to exposure of a large amount of users’ information. An important tool that is used to acquire the online information of SNSs is a bot, with which intruders are able to accomplish their actions automatically and with a large scale. Among the actions that could be done with these automatic systems are: crawling, creating fake profiles, and sending forged friendship requests. Obviously something IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org368 needs to be done to stop these systems. In fact SNS providers should somehow determine whether the requests are sent by a real person or by an automatic system. One thing that could be done is to monitor IP addresses. Another method that is common for online automatic activity detection is using CAPTCHAs [http://www.captcha.net, 47]. A CAPTCHA is a program that protects websites against bots by creating tests that human can pass but programs cannot [http://www.captcha.net]. According to [47], facebook uses an adoption of reCAPTCHA (a related reference is cited) solution which is developed at Carnegie Mellon university. Automatic systems may have mechanisms to pass CAPTCHAs. Also they can exploit the possibility of changing CAPTCHAs that some websites offer, to find a CAPTCHA which they are able to pass. To deal with this, the rate of presented CAPTCHAs could be limited. [47] In [50] it is concluded that most Russian SNSs do not prevent automatic profile crawling appropriately. Also according to [47] in some cases there is a lot of improvement possibility to make CAPTCHAs more difficult to break, and not every SNSs try enough to make automatic crawling and access more difficult. Another way of prevention and detection of suspicious activities is using behavior based anomaly detection techniques that can reduce the speed of the attack and its economical feasibility [47]. Although SNSs should try to protect the privacy of users and keep their information accessible only in the way that they have determined by their settings, however there may be some privacy breaches. In [47] an interesting example is mentioned. It is said that according to similar characteristics of SNSs, an extendable model could be built and potential breaches could be detected by formal analysis of this model. Changing the structure of services may help to increase the privacy protection level for users. For example in [67] extending link types is mentioned as a helpful action for privacy protection. It means instead of simply just being connected or not connected, people could for example specify the direction of their connection or the amount of trust which exists in the relationship. An example of its benefit is when a malicious user succeeds to fool another user and establish a connection with her. In this situation using trust degree can decrease the consequences of this connection. [67] A kind of extended link types is recently adopted by google’s SNS [http://plus.google.com]. In [59] and [60] using cryptographic techniques is proposed to prove privacy violations, that can prevent unauthorized access, and if happened compensate or decrease the damage. 17-1-3 Protecting while Publishing 17-1-3-1 Anonymization So far we have discussed privacy protection by means of limiting access to users’ personal information. In this section we are going to take a look at a kind of protection that aims to protect the privacy and publish information at the same time. As we mentioned, there is a high interest and desire with various motivations to have access to SNSs data. A method that is used to publish this data and protect users’ privacy at the same time is called anonymization. An informal definition of anonymization in the context of privacy protection its that information replacing is revelation may damage users’ privacy (email, address etc.) with other harmless data. In [36] and [52] the tradeoff between privacy and utility of anonymized data is discussed. A good survey about anonymizing social network information is [17]. In this study anonymization methods have been categorized and according to it, the state-of-the- art methods for social network information anonymization are clustering based approaches and graph modification approaches. Clustering based approaches include four subcategories of vertex clustering, edge clustering, vertex and edge clustering, and vertex-attribute mapping clustering. Graph modification approaches include three subcategories graph randomized optimization, of modification, and greedy graph modification. In [43] a weakness of past studies about anonymization is mentioned, which is their focus on methods that consider a single instance of a network, while SNSs evolutionally change and the information that does not reflect these changes is not enough for every analysis. In this paper some studies that has been done about the evolution of social networks are mentioned and also it is noted that anonymization of different instances taken in different times is not sufficient and comparing them leads to information revelation. Researchers of this paper have cited a report of their own in which they have proposed an approach for this problem. As we will see in the attacks section the beneficiaries still try to acquire their desired information and try to extract it even from anonymized data, so some studies towards improving anonymization techniques and overcoming their weaknesses like [69] have been and will be done. Researchers in [48] believe that in the area of users’ privacy, mathematical rigor is needed towards having clear definitions about the meaning of comprising privacy and the information that the adversary has access to. 17-1-3-2 Smart Publishing An application of Social Network Analysis (SNA) is criminal investigation [16] but it seems to somehow have contradiction with the matter of users’ privacy. An interesting approach is presented in [16] with which without direct access to the SNS information and even their anonymized form, only some results of SNA (in form of two centrality metrics) is given to investigators and gives them the opportunity to send queries without privacy violation. 17-1-4 Protecting Against SNS Providers Another privacy related concern is about inappropriate or undesired use of users’ information by SNS providers IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org369 [67] [59] [63]. Towards solving this problem a key management scheme is presented in [15]. In the proposed method, information is encrypted and SNS providers are unaware of the keys. It is claimed that it does not have a weakness of some other related works and does not require the user and her information viewer to be present at the same time. In [55] a client-server based arichitecture is proposed for protecting users’ information from SNS providers’ access in which information is transferred as encrypted blocks. In [67] peer to peer (P2P) architecture for SNSs and this for designing tendency researchers architecture for next generation of SNSs is mentioned. Some of the advantages of client-server architecture over P2P architecture (like more efficient data mining in a central repository), and shortcomings of using client-server architecture with encryption (like some relations of users being detectable by other data like IP addresses) are also noted. A combination of P2P architecture and a good encryption scheme is noted as a better solution for privacy protection in SNSs. 17-2 Attack As it was mentioned there are interested applicants that do not give up after we put some barriers on their way and try to make unauthorized information out of their reach. They still try to attack and pass the barriers and reach their desired information. In this part we take a look at these attacks from two points of view, attacks on anonymized data and attacks on access limited information. 17-2-1 Attacking anonymized Information Despite the efforts towards protecting users’ private information when publishing SNSs information using anonymization, this information is still exposed to a special kind of attacks that aim at discovering information in anonymized information. Adversaries may use some background information to accomplish this kind of attacks. [17] [52] [48] For example the attacker may have some specific information about her target (the person who the attacker intends to get access to her information), and be able to recognize her target among the anonymized information [17]. In [48] three types of attacks are presented as active attacks, passive attacks, and semi-passive attacks : Passive attacks are described as those in which attackers begin their work to detect the identity of nodes after anonymized information is published; at the other side in active attacks the adversary tries to create some accounts in the SNS and establish some links in the network so that these links will be present in the anonymized version of the information; in semi-passive attacks there is no new account creation but some links are established with the target user before the information is anonymized. Having background information (both the information that the attackers themselves has injected to the network and the information that they have acquired in other ways) is an important tool in the hand of anonymized information attackers. In [17] some examples of background information are mentioned like attributes of vertices, vertex degree, and neighborhoods. In [69] using neighborhood information is presented as an example of a type of attacks called neighborhood attacks. In [52] vertex degree is said to be the most vastly used parameter. In [48] some studies about using interesting information like user prepared text for attacking anonymized data are cited (although in different contexts from the SN context of that paper). In [39] good information is presented about anonymization and deanonymization. In this paper a passive method is proposed for identity detection in anonymized information, and using it along with the information of two well known SNSs (twitter, flickr) notable results are obtained regarding identity detection of some members of these SNSs in the anonymized graph of twitter. In this work the information inside flickr is used as background information. An important point mentioned in [43] is that in the area of social networks anonymization, the main focus so far has been on a single instance of the network’s information in a specific time, and this is inconsistent with the very dynamic nature of these networks. It is noted there that having several copies of anonymized data of a social network, which are taken in different times may lead to information revelation by comparing these copies. 17-2-2 Attacking Access Limited Information Using the facilities which users are given, to adjust how their information could be accessed, they can make their information not to be accessible by everyone, and specify different limitations for different parts of their information, for example a person may set her pictures to only be viewable by her close friends. Attackers certainly would try to cross these borders. In [67] “social link forging attacks” and “node identity forging attacks” are mentioned. The former means deceiving a user and convincing her to establish a link (may include impersonating one of her friends by the attacker), the latter means creating several fake identities and pretending to have several personalities in a SNS. In [42] a breach is detected in linkedIn, and using the presented method the contacts of a victim are extracted. Increasing the credibility of phishers’ messages using the credibility of people who are connected with the victim is noted as a motivation for this kind of attacks. Some more complicated attacks are also cited in this paper. In [47] a type of attack called “automated identity theft” along with its two subtypes called “profile cloning” and “cross-site profile cloning” is presented. In these attacks the attacker tries to make fake profiles which appear to belong to persons who really exist and have profiles either in the target SNS or other SNSs. In this study a prototype of an attack system for performing attacks is presented which performs crawling, users’ information gathering, profile creation, message sending, and tries to break CAPTCHAs. Some experiments have been done on five social networks including facebook and linkedin. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org370 III. CONCLUSIONS Emergence of increasing social networks and participation of people in activities in these sites along with the huge amount of various information like interactions, reviews, interests and different kinds of published contents that are logged by users have attracted researchers and other parties to have access to this information or to the results of analyzing it. This information has never been available with such a huge volume, detail, and ease and speed of access before. A few number of those who are interested in having this information or the results of analyzing it alongside their motivations are: commercial companies for advertising and promoting their products, sociologists for analyzing the behavior and features of different societies, intelligence organizations for preventing and detecting criminal activities, educational and cultural activists for promoting their goals, and employers for acquiring information about job seekers. In this paper along with introducing some of the studies in this area, a categorization of research subareas was presented and a base has been provided for researchers to briefly get acquainted with some new, attractive and useful research areas. A categorization of reviewed research subtopics is illustrated in Fig.1. People always have some private information that do not want to be exposed to public access, and if accessed by some adversaries, may have some (sometimes catastrophic) consequences. So in this survey we focused on the issue of protecting users’ privacy and presented a categorization of different aspects of this area. This categorization is illustrated in Fig.2. [2] REFERENCES [1] Naohiro Matsumura, David E. Goldberg, and Xavier Llor\&\#224;. 2005. Mining directed social network from message board. In Special interest tracks and posters of the 14th international conference on World Wide Web (WWW '05). ACM, New York, NY, USA, 1092- 1093. Jie Tang, Jing Zhang, Limin Yao, and Juanzi Li. 2008. Extraction and mining of an academic social network. In Proceeding of the 17th international conference on World Wide Web (WWW '08). ACM, New York, NY, USA, 1193-1194. [3] Damon Horowitz and Sepandar D. Kamvar. 2010. The anatomy of a large-scale social search engine. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 431-440. [4] Theodoros Lappas, Kun Liu, and Evimaria Terzi. 2009. Finding a team of experts in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). ACM, New York, NY, USA, 467-476. [5] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 591-600. [6] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2008. Discovering leaders from community actionsf. In Proceeding of the 17th ACM conference on Information and knowledge management (CIKM '08). ACM, New York, NY, USA, 499-508. [7] Alice Leung, Roven Lin, and Jesse Ng, Philip Szeto. 2009. Implementation of a Focused Social Networking Crawler. doi=http://courses.ece.ubc.ca/412/term_project/reports/2009/focused_ social_net_crawler.pdf [8] Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 851-860. [9] Zhenhui Li, Ding Zhou, Yun-Fang Juan, and Jiawei Han. 2010. Keyword extraction for social snippets. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1143-1144. [10] Duen Horng Chau, Shashank Pandit, Samuel Wang, and Christos Faloutsos. 2007. Parallel crawling for online social networks. In Proceedings of the 16th international conference on World Wide Web (WWW '07). ACM, New York, NY, USA, 1283-1284. [11] Nicole Immorlica and Vahab S. Mirrokni. 2010. Optimal marketing and pricing over social networks. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1349-1350. [12] Anna Wu, Joan M. DiMicco, and David R. Millen. 2010. Detecting professional versus personal closeness using an enterprise social network site. In Proceedings of the 28th international conference on Human factors in computing systems (CHI '10). ACM, New York, NY, USA, 1955-1964. [13] Rongjing Xiang, Jennifer Neville, and Monica Rogati. 2010. Modeling relationship strength in online social networks. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 981-990. [14] Katarzyna Musia\&\#322;, Przemys\&\#322;aw Kazienko, and Piotr Br\&\#243;dka. 2009. User position measures in social networks. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 6 , 9 pages. [15] Keith Byron Frikken and Preethi Srinivas. 2009. Key allocation schemes for private social networks. In Proceedings of the 8th ACM workshop on Privacy in the electronic society (WPES '09). ACM, New York, NY, USA, 11-20. [16] Florian Kerschbaum and Andreas Schaad. 2008. Privacy-preserving social network analysis for criminal investigations. In Proceedings of the 7th ACM workshop on Privacy in the electronic society (WPES '08). ACM, New York, NY, USA, 9-14. [17] Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. 10, 2 (December 2008), 12- 22. [18] Lars Backstrom, Eric Sun, and Cameron Marlow. 2010. Find me if you can: improving geographical prediction with social and spatial proximity. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 61-70. [19] Jonathan Haynes and Igor Perisic. 2009. Mapping search relevance to social networks. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 2 , 7 pages. [20] Yong-Suk Kwon, Sang-Wook Kim, Sunju Park, Seung-Hwan Lim, and Jae Bum Lee. 2009. The information diffusion model in the blog world. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 4 , 9 pages. [21] Seung-Hwan Lim, Sang-Wook Kim, Sunju Park, and Joon Ho Lee. 2009. Determining content power users in a blog network. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 5 , 8 pages. [22] Danny Hughes, Paul Rayson, James Walkerdine, Kevin Lee, Phil Greenwood, Awais Rashid, Corinne May-Chahal, and Margaret Brennan. 2008. Supporting Law Enforcement in Digital Communities IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org371 through Natural Language Analysis. In Proceedings of the 2nd international workshop on Computational Forensics (IWCF '08), Sargur N. Srihari and Katrin Franke (Eds.). Springer-Verlag, Berlin, Heidelberg, 122-134. [23] Irwin King, Michael R. Lyu, and Hao Ma. 2010. Introduction to social recommendation. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1355-1356. [24] Lei Guo, Enhua Tan, Songqing Chen, Xiaodong Zhang, and Yihong (Eric) Zhao. 2009. Analyzing patterns of user content generation in online social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). ACM, New York, NY, USA, 369-378. [25] Nan Du, Bin Wu, Xin Pei, Bai Wang, and Liutong Xu. 2007. Community detection in large-scale social networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 16-25. [26] Jerry Scripps, Pang-Ning Tan, and Abdol-Hossein Esfahanian. 2007. Node roles and community structure in networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 26-35. [27] Zeinab Abbassi and Vahab S. Mirrokni. 2007. A recommender system based on local random walks and spectral methods. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 102-108. [28] Tomasz Tylenda, Ralitsa Angelova, and Srikanta Bedathur. 2009. Towards time-aware link prediction in evolving social networks. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 9 , 10 pages. [29] Li Ding, Dana Steil, Matthew Hudnall, Brandon Dixon, Randy Smith, David Brown, and Allen Parrish. 2009. PerpSearch: an integrated crime detection system. In Proceedings of the 2009 IEEE international conference on Intelligence and security informatics (ISI'09). IEEE Press, Piscataway, NJ, USA, 161-163. [30] Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, Michael Mitzenmacher, Alessandro Panconesi, and Prabhakar Raghavan. 2009. On compressing social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). ACM, New York, NY, USA, 219-228. [31] Mitra, P. & Baid, K., 2009. Targeted advertising for online social networks. 2009 First International Conference on Networked Digital Technologies, p.366-372. [32] Christopher C. Yang and Tobun D. Ng. 2009. Web opinions analysis with scalable distance-based clustering. In Proceedings of the 2009 IEEE international conference on Intelligence and security informatics (ISI'09). IEEE Press, Piscataway, NJ, USA, 65-70. [33] Nan Du, Bin Wu, and Bai Wang. 2007. Backbone Discovery in In Proceedings of the IEEE/WIC/ACM Social Networks. International Conference on Web Intelligence (WI '07). IEEE Computer Society, Washington, DC, USA, 100-103. [34] Heath Hohwald, Manuel Cebrian, Arturo Canales, Rub\&\#233;n Lara, and Nuria Oliver. 2009. Inferring Unobservable Inter- community Links in Large Social Networks. In Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04 (CSE '09), Vol. 4. IEEE Computer Society, Washington, DC, USA, 375-380. [35] Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). ACM, New York, NY, USA, 199-208. [36] Yue Lu, Panayiotis Tsaparas, Alexandros Ntoulas, and Livia Polanyi. 2010. Exploiting social context for review quality prediction. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 691-700. [37] Liang Gou, Hung-Hsuan Chen, Jung-Hyun Kim, Xiaolong (Luke) Zhang, and C. Lee Giles. 2010. SNDocRank: document ranking based on social networks. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1103-1104. [38] C. Lee Giles, Yang Sun, and Isaac G. Councill. 2010. Measuring the web crawler ethics. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1101-1102. [39] Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web (WWW '09). ACM, New York, NY, USA, 551-560. [40] Eran Toch, Norman M. Sadeh, and Jason Hong. 2010. Generating default privacy policies for online social networks. In Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems (CHI EA '10). ACM, New York, NY, USA, 4243-4248. [41] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. 2009. Privacy-enabling social networking over untrusted networks. In Proceedings of the 2nd ACM workshop on Online social networks (WOSN '09). ACM, New York, NY, USA, 1-6. [42] Jessica Staddon. 2009. Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. In Proceedings of the 2nd ACM workshop on Security and artificial intelligence (AISec '09). ACM, New York, NY, USA, 11-14. [43] Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, and Divesh Srivastava. 2010. Privacy in dynamic social networks. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 1059-1060. [44] Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 351- 360. [45] Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing Social Networks. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (SP '09). IEEE Computer Society, Washington, DC, USA, 173-187. DOI=10.1109/SP.2009.22 http://dx.doi.org/10.1109/SP.2009.22 [46] Alyson L. Young and Anabel Quan-Haase. 2009. Information revelation and internet privacy concerns on social network sites: a case study of facebook. In Proceedings of the fourth international conference on Communities and technologies (C\&\#38;T '09). ACM, New York, NY, USA, 265-274. [47] Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on World Wide Web (WWW '07). ACM, New York, NY, USA, 181-190. [48] Slava Kisilevich and Florian Mansmann. 2010. Analysis of privacy in online social networks of runet. In Proceedings of the 3rd international conference on Security of information and networks (SIN '10). ACM, New York, NY, USA, 46-55. [49] Leanne Wu, Maryam Majedi, Kambiz Ghazinour, and Ken Barker. 2010. Analysis of social networking privacy policies. In Proceedings of the 2010 EDBT/ICDT Workshops (EDBT '10). ACM, New York, NY, USA, , Article 32 , 5 pages. [50] Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing privacy in online social networks. In Proceedings of the first workshop on Online social networks (WOSN '08). ACM, New York, NY, USA, 37-42. [51] Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (WWW '09). ACM, New York, NY, USA, 521-530. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org372 [52] Xiaowei Ying, Kai Pan, Xintao Wu, and Ling Guo. 2009. Comparisons of randomization and K-degree anonymization schemes for privacy preserving social network publishing. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA- KDD '09). ACM, New York, NY, USA, , Article 10 , 10 pages. [53] Tiancheng Li and Ninghui Li. 2009. On the tradeoff between privacy and utility in data publishing. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09). ACM, New York, NY, USA, 517-526. [54] Esma Aimeur, Sebastien Gambs, and Ai Ho. 2009. UPP: User Privacy Policy for Social Networking Sites. In Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services (ICIW '09). IEEE Computer Society, Washington, DC, USA, 267-272. [55] Esma Aimeur, Sebastien Gambs, Ai Ho, "Towards a Privacy- Enhanced Social Networking Site," Availability, Reliability and Security, International Conference on, pp. 172-179, 2010 International Conference on Availability, Reliability and Security, 2010 [56] Safebook A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [57] Kun Liu and Evimaria Terzi. 2009. A Framework for Computing the Privacy Scores of Users in Online Social Networks. In Proceedings of the 2009 Ninth IEEE International Conference on Data Mining (ICDM '09). IEEE Computer Society, Washington, DC, USA, 288- 297. [58] Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, and Yuguang Fang. 2010. Privacy and security for online social networks: challenges and opportunities. Netwrk. Mag. of Global Internetwkg. 24, 4 (July 2010), 13-18. [59] B. K. Tripathy and G. K. Panda. 2010. A New Approach to Manage Security against Neighborhood Attacks in Social Networks. In Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM '10). IEEE Computer Society, Washington, DC, USA, 264-269. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3, November 2011 ISSN (Online): 1694-0814 www.IJCSI.org373
1911.12558
1
1911
2019-11-28T07:07:33
Addressing Time Bias in Bipartite Graph Ranking for Important Node Identification
[ "cs.SI", "cs.LG" ]
The goal of the ranking problem in networks is to rank nodes from best to worst, according to a chosen criterion. In this work, we focus on ranking the nodes according to their quality. The problem of ranking the nodes in bipartite networks is valuable for many real-world applications. For instance, high-quality products can be promoted on an online shop or highly reputed restaurants attract more people on venues review platforms. However, many classical ranking algorithms share a common drawback: they tend to rank older movies higher than newer movies, though some newer movies may have a high quality. This time bias originates from the fact that older nodes in a network tend to have more connections than newer ones. In the study, we develop a ranking method using a rebalance approach to diminish the time bias of the rankings in bipartite graphs.
cs.SI
cs
Addressing Time Bias in Bipartite Graph Ranking for Important Node Identification Hao Liao1, Jiao Wu1, Mingyang Zhou1, Alexandre Vidmer1 1 College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, China 9 1 0 2 v o N 8 2 ] I S . s c [ 1 v 8 5 5 2 1 . 1 1 9 1 : v i X r a Abstract The goal of the ranking problem in networks is to rank nodes from best to worst, according to a chosen criterion. In this work, we focus on ranking the nodes according to their qual- ity. The problem of ranking the nodes in bipartite networks is valuable for many real-world applications. For instance, high quality products can be promoted on an online shop or highly reputed restaurants attract more people on venues re- views platforms. However, many classical ranking algorithms share a common drawback: they tend to rank older movies higher than newer movies, though some newer movies may have a high quality. This time bias originates from the fact that older nodes in a network tend to have more connections than newer ones. In the study, we develop a ranking method using a rebalance approach to diminish the time bias of the rankings in bipartite graphs. As a result, it is indicated that the rankings produced after ap- plying the rebalancing of the scores not only reduce time bias, but also reflect the quality of the benchmark items more ac- curately. The ranking performance improvements range from 20% to 80%, the experiments were conducted on three real datasets with ground truth benchmark. Introduction In online social networks, we constantly need to select con- tent, for instance which content to read, which videos to watch, or which people to follow (Zheng et al. 2018) (Pinto, Almeida, and Gonc¸alves 2013). However, our time is lim- ited, and the amount of content available is so huge that we have no time to go through all of them (Chen et al. 2017b). Then, we rely on rankings by algorithm or people to guide us to this huge volume of data (He et al. 2018). The re- sults of these rankings influence our decision on which prod- ucts to buy, which Web pages to visit, whom to choose as a friend, and so on (Wang et al. 2018) (Szabo and Huber- man 2008) (Chen et al. 2017a). It is then pretty clear that the rankings are very important in our daily life. Producing the ranking is the first step, but then it is needed to evaluate the quality of the produced ranking. It is usually a difficult task due to the lack of real ground truth data. The traditional assessment of information quality is based on the discernment of a few selected experts. For instance, Oscars are awarded to movies by a comity of people working in the movie industry. The awarded movies can then be used to form a list constituting a kind of ground truth for our evaluation. Still, a question remains: are algorithms able to compute the intrinsic quality of movies? In this work, the network/graph representation is used. A network is composed of nodes and links, which represent objects and their interactions. A link connects two nodes if they have an interaction. For instance, in the citation net- work, nodes are scientific papers and links are citations. Bi- partite graph is a special case in which two types of nodes are present, and the link can only present the interaction be- tween two different types of nodes. For instance, in Netflix, one type of node is the user and the other one is a movie. For simplicity, we refer to one type of node as user and the other one as item in the rest of the paper. The network framework provides a great tool to represent the relation- ship between users and items. With online data, it is easy to form a bipartite graph that represents the interaction be- tween nodes (Cao, Guo, and Cheng 2011). An important goal in the bipartite graph ranking is to find the high quality nodes based on a specific definition of what is quality (Cai et al. 2017). The quality can for instance reflects the like- liness of an item to be popular in the future (Feng et al. 2017). It can also be used to perform link prediction and recommendation for the users (Liao et al. 2018). Neural net- works have recently successfully been applied to the recom- mendation problem in bipartite network (Lian et al. 2018; Wang et al. 2018). The most famous ranking algorithms mainly deal with unipartite graphs. Those algorithms including: PageR- ank (Page et al. 1999), HITS (Kleinberg 1999a), and their variants. The bias towards old nodes in networks has been studied for PageRank in the scientific citation network (Mar- iani, Medo, and Zhang 2016). Similarly in the movie net- work, there is a bias toward older items with the classical ranking algorithm. This is not in the interest of the users to have a ranking composed mainly by old movies. In this paper, we propose a solution to the time-bias prob- lem of ranking nodes in bipartite networks. We use the struc- tural property of the network and the features of the nodes, including rating, degree, and time of appearance in the net- work. The main highlights of this paper are the followings: • We develop a new method to balance the ranking results in bipartite networks according to their age, and show the impact of this balance process on the ranking. • We compare our method with state-of-art ranking meth- ods, and present a complementary evaluation with the ex- ternal ground truth. These experiments enable future ap- plications to adapt to this important balancing procedure. • We compare eight algorithms on three widely-used datasets, illustrating how our method enhances the identi- fication rate of high quality vertices, and also enhance the balance of the ranking results. • We study the influence of the parameters on the perfor- mance, proving our method does not depend on the fine- tuning of parameters. The remaining paper is organized as follows. We first intro- duce related works, graph-based ranking methods, and bi- partite graph-based ranking methods in Related Work. We describe the network approach and the general problem in Problem Statement. Then we describe our approach in Pro- posed Framework, and in Experimental Setting we describe the datasets, the metrics, and the other algorithms used in this work. The results of our method and the comparison with other methods is shown in Results and Discussion. Fi- nally, we summarize and discuss our main results in Conclu- sion and Perspective. Related Work Ranking items or people is a widespread practice. The method developed in this work aims to rank the objects in graphs. In this section, we will then review the preceding works which also used the graph approach to rank objects. One of the most famous ranking algorithms is PageR- ank (Page et al. 1999), which ranks Web pages according to their importance in the network. This algorithm was used to provide search results by Google's search engine. This ex- ample illustrates the importance of the ranking algorithms in online networks, as it became one of the most impor- tant companies in the world. The simplicity of this algo- rithm allowed it to be modified and used for various sit- uations and ranking goals. For instance, Reverse PageR- ank (Fogaras 2003) gives a high score to Web pages that are highly connected in the network. These Web pages are critical in the network and their removal would highly af- fect the network's connectivity. Topic sensitive PageRank improved the original PageRank algorithm by adding con- text into the algorithm query (Haveliwala 2002). Hub, au- thority and relevance scores algorithm (HAR) (Li, Ng, and Ye 2012), extended the concept of PageRank to graph with multi-relational data. Another famous algorithm was created in the same pe- riod: the HITS algorithm (Kleinberg 1999a), which also aimed to rank Web pages according to their importance in the network. Both the methods are iterative and are based on the fact that important Web pages have links point- ing to other important Web pages. The main difference is that HITS algorithm consists of two scores: one author- ity score, and one hub score. The fact that this algorithm uses two different scores makes it a good candidate to be used in bipartite graphs (Deng, Lyu, and King 2009; He et al. 2017). In this work, we are interested in the ranking of nodes in bipartite graphs. As said above, the HITS algorithm was extended to the bipartite graphs. The first extension is co- HITS (Deng, Lyu, and King 2009). The considered bipartite graph was the graph composed of queries and Web pages. A user submits a query to the engine, and the co-HITS al- gorithm shows the results according to their computed rele- vance. More recently, the BiRank algorithm (He et al. 2017) was developed to be used on any type of bipartite networks, for instance, queries and Web pages, or users and items. This algorithm is iterative as PageRank and HITS, but the normal- ization is performed differently. Problem Statement We use the network approach to define our problem. A graph/network G(V, E) is a set of vertices/nodes V con- nected by edges/links E. The nodes v ∈ V are the objects of the networks. It can for instance represent people, scien- tific publications, or music albums. The edges e ∈ E are the connection between the nodes. Their meanings depend on the context: for instance, if the nodes are people, an edge could indicate a friendship relation. Figure 1: Illustration of the time bias obtained with the BiHits rank- ing algorithm on Amazon dataset (see Section Proposed Frame- work). On the left the five albums with the highest score, and on the right the average ranking position on the y-axis as a function of the release year on the x-axis. In our problem, the graphs are said to be bipartite. A graph is bipartite if it can be divided into two sets of nodes such that each node is only connected to nodes in the other sets. In this work, one set of nodes are users, and the oth- ers are items (movies or music albums in this work). A link connects a user and an item if the user has rated the item. In the mathematical formulas and illustrations, we use Latin letters subscripts for users, and Greek letters subscripts for items. Our rebalance method is motivated by the time ba- sis present in classical ranking algorithms (as shown in Fig- ure 1). This bias is due to the fact that in many networks, popular nodes tend to get more attention than less popu- lar nodes, thus favoring older nodes over newer ones (Price 1976). When there is such a strong bias in the ranking pro- cess of an algorithm, it is obvious that it cannot be reliable at estimating the intrinsic quality of nodes. It is then necessary to address this problem by balancing the scores attributed to nodes For a ranking list to be useful to users, it should not only display well-known items; the more recent items should also have the opportunity to make it to the top of the BiHITS ranking'sTOP-5Abbey road (1969)Revolver (1966)We Are the World (1985) Nevermind (1991)The Dark Side of the Moon (1973)19602010 list. In order for users to really benefit from the ranking list, we not only need to find good classical well-known projects, but also let excellent works of different periods of time have the opportunity to present to users. The ranking algorithms considered here only rely on the structure of the network, without the use of metadata or external additional data: given a bipartite network G(V, E), a ranking algorithm produces a score list R, where each Rα in the list represents the qual- ity of the item obtained with the algorithm. The quality of the score list is assessed by comparing it with the opinion of experts: a good score list should assign a higher score to the items that have been praised by the experts. The problem we address in this work is the time-base of rankings: usual rank- ing algorithms give a higher score to older nodes compared to newer ones. Then, the top of the rankings obtained using such algorithms are occupied by old items 1. Proposed Framework We provide a method that assigns high scores with the same frequency to old and new nodes. For online shops, new prod- ucts are easier to be discovered and bought by customers. In the art world, it makes more recent works more likely to be noticed and appreciated. Time biased ranking algorithm We design our framework so that any ranking algorithm can be used as a baseline method to obtain the scores. Several algorithms were tested in this work, and BiRank stood out as the method of choice (He et al. 2017). The baseline per- formance of this algorithm were among the best, and its con- ception allows it to be easily extended with additional data such as query, or prior knowledge on users/items. The equa- tions read: (cid:88) (cid:88) α i Ri = Fα = wiα√ √ di dα wiα√ √ dα di Fα Ri, (1) (2) where Ri and Fα are the score for user i and item α, respec- tively, di and dα their degree, and Fwiα denote the weight between user i and item α. In this work, we use two different kinds of weights, the ratings and the time decaying weights wij = δa(t−tij ), where δ is the time decay parameter, tiα is the time at which user i reviewed item α, t is the current time, and a is a parameter to control the decay. In this works, we set the value of δ to 0.85, a to 1/1year. The fine tuning of the decay parameters does not affect the results signifi- cantly. We label them BiRankr and BiRankt, respectively. The algorithm is iterative, the users and items scores are ini- tialized from uniform random distribution between 0 and 1. The iterations stop when the difference between two consec- utive steps is smaller than a threshold: (cid:107)Ri − Ri−1(cid:107) < th and (cid:107)Fi − Fi−1(cid:107) < th. BiRank method uses the bipartite graph's structure and the user and item's previous information, distributes score to nodes iteratively, and finally converges to a stable and unique ranking result. BiRank smooths the edges' weight by the degree of two linked nodes while using symmetric nor- malization is one of the key characteristics of the method. However, the scores obtained with this method are time bi- ased. Standardization of the scores The crucial step in our method is the use of this standardization to rescale scores. There are different ways to rescale scores. For instance, one could rescale α = (Fα − the scores with min-max scaling F (cid:48) minβ(Fβ)/(maxβ(Fβ) minβ(Fβ)). However, this type of normalization is sensitive to outliers, as minimum and max- imum are only determined by one small or large value in the sample. However, in our problem the items are reviewed in different time periods, and the context is different for each time period. The user's reviews will be time dependant. Ob- viously: users in 2000 and in 2015 have different opinions and criteria. As we are interested in the comparison between different sample, we need a method which make samples comparable. The z-score is suitable for this, as it allows for a greater comparability of the data: each standardized set has a mean of zero and a standard deviation of one. Even if the mean and the standard deviation of scores vary over time, this process allows a fair comparison between all items. The z-score is defined as: z = (x − µ)/σ (3) where µ denotes the average value of the population, and σ denotes the standard deviation of the population. When the z-value is negative, it means that x is below the average value; when it is positive, it means that x is above the aver- age value. Moreover, the value of z is equal to the number of standard deviation between the value of x and the mean. In our case, the scores obtained by the ranking algorithms are standardized over time, similarly to (Mariani, Medo, and Zhang 2016). The process is the following. We first compute all items' scores F with a ranking algorithm. This base score can be computed from any ranking algorithm. Then, we sort all items according to the time at which they enter the net- work. In order to compute the score of item α, we select p close items according to the time at which the item was published/released. The rebalance score of item α is then: F (cid:48) α(pα) = Fα − u(pα) σ(pα) , (4) where u(p) is the average score in p items, σ(p) the standard deviation and pα the close set in which item α belongs to. The rebalance process removes the rewards or penalties on items' scores due to the time of period at which they ap- pear. It is important to note that the selection of the items appearing at the same time period is defined with a num- ber of items. Several different approaches on how to group items were tested. For instance, grouping the items that enter in the network on the same day, week or month did not lead to satisfactory results. Finally we decided to group the items with the closest ∆p items in time. For item i, its group is composed by the ∆p 2 items that are newer. In the case there is less than ∆p 2 items older than i, we choose the ∆p oldest items, and similarly for new items. The method is illustrated in Figure 2. 2 items that are older, and the ∆p Figure 2: Diagram of the method. The inputs of the method are the ratings of the items by the users, and the output is a list of score for each item in the network. Experimental Setting In this section, we test the balance framework coupled with five algorithms. Three real datasets are used: Amazon Mu- sic, MovieLens, and Netflix. Their basic statistics are illus- trated in Table 1. Then we show the performance of the bal- ance framework with different metrics to prove its ability to identify important nodes and to time balance the scores. Datasets Table 1: Datasets Basic Statistics, with ki the average degree of users and kα the average degree of items. Name Amazon Music MovieLens Netflix #Users #Items < ki > < kα > Sparsity 11.61 5.05 × 10−4 22959 62828 4344.26 3.14 × 10−2 2101 5892 147.26 11963.67 2.50 × 10−2 138395 478692 31.77 65.95 Amazon Music Amazon is the biggest online shopping platform in America. The Amazon Music data used in this work were gathered by Stanford University's SNAP group1 (Leskovec, Adamic, and Huberman 2007). We firstly clean the data: delete those unused content from metadata, and extract user ID, product ID, and the timestamps of the ratings. The ratings range from 1 to 5. Some albums come in different versions. In order to solve the problems that could arise from these duplicate items, we combine the reviews of users on these items. Finally, to ensure the validity of the data, we only select the users with at least 10 reviews as 1http://snap.stanford.edu/ valid users and products that received at least 10 reviews as valid products. MovieLens The MovieLens dataset was collected from a well-known movie recommendation website, which was founded by the GroupLens research team of the School of Computer Science and Engineering at the University of Min- nesota2 (Harper and Konstan 2016). We only choose the users that have reviewed at least 20 movies as valid users, and choose those movies that received more than 20 reviews as valid items. User's ratings for movies range from 1 to 5. The dataset does not provide the release date for movies. In order to obtain it, we mapped metadata with the MovieLens dataset. Netflix The company Netflix released data about its users' records and organized a data science competition, whose goal was to predict the users' ratings of movies 3. Since then, the Netflix dataset has been used for various purposes, such as recommendation, or ranking of movies in our case. The original data contains around 18'000 movies and 500'000 users. Note that for Netflix the release year of movies is available, but not the release date, which is essential in our study. After the mapping process for the release dates, we are left with 5'892 movies. Ground truths In general ranking problem, it is difficult to define whether a product has higher intrinsic quality be- cause different users will have different views and feelings about it, the quality of the product depends on many intan- 2https://grouplens.org/datasets/movielens/ 3https://netflixprize.com Rebalanced scoresThresholdreached?noIterative computeRatingsUser iUser ListRatingsItem ListItem 1Item 2Item 3Item 4Item N……--432……Item αyesItem ageAverage scoreInitial scoresSort by time……Item ageAverage scoreUser 1User 2User 3User 4User M……--32Step 1: Bipartite ranking algorithmStep 2: Z-score rebalancingStep 3: Matching with ground truthRebalance processβαγFinal item listGround-truth listmatchingμσ-Item ……SortβαγItem mean (μ), standard deviation(σ)𝒔𝒄𝒐𝒓𝒆=𝒊𝒏𝒊𝒕𝒊𝒂𝒍𝒔𝒄𝒐𝒓𝒆−𝝁𝝈…Initial score listRebalanced score list……………∆p𝟐olderitems∆p𝟐newer items gible subjective factors. We can't simply judge a product's quality according to some good reviews or low ratings. In this paper, we choose specific products that are widely rec- ognized to be of high quality to build the ground truth. Both our ground truth data can be collected on public websites. Amazon Music For the Amazon Music dataset, we collect albums that have won the Grammy Music Awards to build the list of high quality items used for the ground truth. The Grammy Awards awards music that has achieved outstand- ing results over the past year. The voting committee is com- posed of members of the entertainment industry. For the mu- sic that won this award, we consider that they are widely rec- ognized. MovieLens and Netflix For the movie datasets, we choose the movies that won the Oscar Award to be the ground truth items. In the movie industry, the Oscar is the most significant award in the world. A film, which was awarded at the Os- cars, is a work recognized by the audience around the world as well as filmmakers and is well qualified as a ground truth. Additionally to the Oscar awards, we selected the top250 ranking from IMDb. This ranking is produced by IMDb's own algorithm based on users' reviews, but it is a very fa- mous top and we use it as an additional ground truth for our algorithms. The main interest of this top is that, unlike the Oscar awards, it is not evenly distributed over the years. Metrics Imbalance We propose a metric to quantitatively analyze time balance about the ranking result. According to the assumption of (Radicchi, Fortunato, and Castellano 2008; Radicchi and Castellano 2012), with an ideal ranking algo- rithm, old nodes and new nodes should have equal opportu- nity to get high ranking. For example, divide all nodes into S groups G1, G2, G3, ..., GS according to the time that they enter the network, in which G1 is the earliest group and GS is the latest group. With a time balanced ranking algorithm, items in every group have the same probability to rank in the Top-L position (such as Top-1%), which means the number of items that rank in Top-L in every group should obey the hypergeometric distribution (Radicchi and Castellano 2012). We define m the number of items, the average number of items that enter Top-L per group is n(0) = mL/S. Then the standard deviation of the ideal ranking algorithm is: σ0(L) = (1 − 1 S )(1 − L) m m − 1 The deviation to the ideal ranking is then defined as (cid:114) mL (cid:118)(cid:117)(cid:117)(cid:116) 1 S S σ(L) = (ni − n0)2, with ni the number of items reaching at the top L rank in group i. The imbalance is then given as the ratio of the actual standard deviation over the ideal standard deviation: Imbalance = A value close to 0 that corresponds to a time balanced rank- ing, and the more it differs from 0, the more the ranking is time biased. i=1 S(cid:88) (cid:12)(cid:12)(cid:12)(cid:12) σ σ0 (cid:12)(cid:12)(cid:12)(cid:12) . − 1 (5) (6) (7) Additionally to the imbalance metric, we use the follow- ing standard metrics. Precision and Recall measure the al- gorithm's accuracy, focusing on the top of the ranking list. NDCG, the Normalized Discounted Cumulative Gain (Liu and OZSU 2009) is a popular ranking quality measure. Compared to Precision and Recall, NDCG account for the position of the item in the ranking list. AUC (Davis and Goadrich 2006) is a common statistical significance metric of information retrieval method, and is used to evaluate the whole list. Baselines In order to prove our balance framework's performance and universality, we selected three other important bipartite ranking algorithms. These algorithms are derived from the HITS algorithm (Kleinberg 1999b). Note that most of these methods propose initial values for the fitness and reputation value based on a query or additional information. We re- strict the methods to the case where there is no additional information. In this work, we use three more methods as our baseline, they are BiHITS (Deng, Lyu, and King 2009), QRep (Lu et al. 2016) and BGRM (Rui et al. 2007). Results and Discussion In this section, we compare the results of the algorithms and evaluate their ranking performance with the four metrics de- scribed previously. The code and data used in this work are available online4. Figure 3: Recall for rating BiRank before and after applying the rebalance method for (a) Amazon Music (Grammy) and (b) Netflix (IMDb) datasets. Evaluation of important node recognition Table 2 shows the results obtained by each algorithm under three evaluation metrics, Recall, Precision and AUC for the ground truth built from awards. It can be seen that for all datasets, all the Recall and Precision scores are increased of the rebalance algorithms, better than its corresponding orig- inal algorithm, while the value of AUC is maintained at a relatively stable level. The only exception with BRGM algo- rithm, for which the Recall score is anyway small. Among 4https://github.com/Joey5555/Rebalance-project 199520002005201020150.00.20.40.60.81.019401950196019701980199020000.00.20.40.60.81.0RecallYear BiRankr RB-BiRankrRecallYear BiRankr RB-BiRankr(a) Amazon Music (b) Netflix Table 2: Performance of the algorithms on the Awards for the three datasets. The Groud truth of Amazon Music is Grammy, and for MovieLens and Netflix are Oscar and IMDb Top 250, respectively. The ranking lists are composed of the top-1% items for each algorithm. Here Rec. stands for Recall and Pre. stands for Precision. Method Amazon Music MovieLens(Oscar) Netflix(Oscar) MovieLens(IMDb) Netflix(IMDb) Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC Rec. Pre. AUC BiHITS .326 BiRankr .72 .932 .318 .333 RB-BiHITS .478 .105 .928 .455 .476 .406 .089 .947 .364 .381 RB-BiRankr .500 .110 .941 .500 .524 .420 .092 .952 .318 .333 .522 .115 .948 .409 .426 .326 .072 .943 .272 .286 RB-QRep .514 .113 .943 .409 .426 BRGM .007 .002 .678 .091 .095 RB-BRGM .014 .003 .537 .091 .095 RB-BiRankt BiRankt QRep .977 .979 .958 .963 .956 .961 .975 .920 .770 .591 .62 .271 .738 .219 .762 .101 .441 .824 .247 .857 .062 .271 .755 .205 .714 .113 .492 .827 .247 .857 .047 .203 .744 .192 .667 .105 .458 .824 .205 .714 .043 .186 .736 .164 .571 .097 .424 .828 .205 .714 − .581 .014 .048 − .501 .095 .651 − − .834 .845 .770 .951 .762 .944 .828 .856 .650 .027 .170 .305 .892 .292 .525 .937 .170 .305 .910 .311 .559 .949 .123 .220 .901 .283 .508 .947 .113 .203 .898 .274 .492 .943 − .703 − .534 − − them, the RB-BiRankt algorithm has the best Recall value and Precision value for Amazon Music. The RB-BiRankr algorithm performs best on Precision and Recall for Movie- Lens and Netflix. Figure 3 shows the value of Recall for rebalance process effectively rebalance the score across the years, not favoring early or later years. Figure 5: Influence of the value of the number of groups p on the imbalance value of the top-1% items on (a) Amazon Music (Grammy) and (b) Netflix (IMDb) datasets. The Relative imbal- ance is the value of the imbalance after the rebalance process over the original imbalance value. In Figure 3(a), it can be seen that after 2001, all the Re- call value of RB-Birankr are better than Birankr's, and af- ter 2010, each year's recall value of Birankr is very small, even zero, while the RB-Birankr keeps a relatively stable level. And in Figure 3(b), it is interesting that RB-Birankr performs both better for older items than its no-rebalance counterpart while being outperformed for newer items. This shows that this modification not only deals for the bias to- wards the older item, but can also benefit to recent ones. The trends are similar to other algorithms, hence we only show Birankr and RB-Birankr. We also evaluate the impact of the length of the results list L on Recall and NDGC. The results are shown on Figure 4. For the Amazon Music dataset, we see that the rebalance method improves the performance of most algorithms, inde- pendently of the length of the results list. The only exception to this is the algorithm BiRankt evaluated with the NDCG metric. Similar observations can be made for the Netflix dataset for BiRankr. These results show that the rebalance Figure 4: NDGC and Recall values as a function of the length of the results list L for (a) Amazon Music (Grammy) and (b) Netflix (IMDb) datasets. The dashed line represents the performance of the algorithms before the rebalance process, and the solid lines after the rebalance process. Birankr and its rebalance counterpart, RB-Birankr for Ama- zon Music and Netflix. In order to compute the Recall for each year, we use the data up to the limit date of the Awards. For instance, to be nominated for the Oscar of year T , a movie needs to open at the latest on the 31st of December of year T − 1. Then, the ground truth list is composed of the movies awarded at year T . For Amazon Music, the benefit is clear for the recent years, while a bit outperformed by the original method in the early years. For Netflix on the other hand, the improvement of the Recall metric compared to the original method is in the early years. This shows that this 1020304050024681010203040500.000.040.080.1210203040500246810203040500.000.050.100.150.200.25NDCGL(a) Amazon MusicRecallLNDCGL QRep RB-QRepBiHITS RB-BiHITS BiRankr RB-BiRankrBiRankt RB-BiRanktRecallL(b) Netflix12510205010020050010002000-0.20.00.20.40.60.81.01.212510205010020050010002000-0.20.00.20.40.60.81.01.2Relative Imbalance p RB-BiRanktRelative Imbalance p RB-BiRankr (a) Amazon Music(b) Netflix method improves the results for the top of the ranking list, but also consistently when going further into the list. Table 4: Top-10 albums in the ranking lists of RB-BiRankr and BiRank algorithms. Evaluation of time balance In order to compare the time balance of the rankings for the 10 algorithms, we first divide all the items into 40 groups according to their time. The first group is composed of the oldest items, and the 40th group is the newest items. Then, we take the list of 1% top rated items for each algorithm, and we count how many of these items belong to each group. Table 3 shows the imbalance value of all algorithms. The comparison of imbalance be- fore and after the rebalance process is very clear. The rebal- ance algorithm can significantly reduce the time imbalance of every algorithm considered in this work. The RB-BiHITS algorithm has the best performance, as its imbalance value is the closest to zero on both Amazon Music and MovieLens data sets. This means that in the result of RB-BiHITS, each groups' number distribution of top item is the closest to hy- pergeometric distribution. Table 3: The imbalance value of the rankings obtained with algo- rithms. Method BiHITS RB-BiHITS BiRankr RB-BiRankr BiRankt RB-BiRankt QRep RB-QRep BRGM RB-BRGM Amazon Music MovieLens Netflix 7.06 0.14 5.57 0.10 5.10 0.18 5.24 0.15 2.21 1.45 0.02 0.04 0.01 0.11 0.04 0.06 0.26 0.10 0.01 0.06 0.30 0.03 0.44 0.03 0.60 0.03 0.48 0.18 0.09 0.30 The influence of p on imbalance In order to study the in- fluence of the number of group p on imbalance value, we compute the value of the imbalance for different values of p, ranging from 1 to 2000. We show the results in Figure 5 for the rebalanced BiRank algorithms. The y-axis on the fig- ure represents the relative imbalance: the imbalance before over the imbalance after applying the rebalance method. It can be seen that on Figure 5(a) that for Amazon Music, the imbalance stabilizes and remain small after p = 10. For Net- flix in Figure 5(b), the algorithm is able to keep a low relative imbalance after 20. This result is important as it shows that the value of imbalance stays quite small at p, and so does not need to be finely tuned. Case study In Table 4, we illustrate the effect of the re- balance process on the top of the list. To this end, we run the algorithm on the amazon dataset, and we list the top-10 albums ranked by the original and the rebalanced version of BiRankr. The effect of the rebalance is clear: there are more recent albums than with the original algorithm. More- over, the diversity is higher with the rebalanced version, as the original algorithm has only five different musicians in the top-10 list, while the rebalanced list has eight different musicians. Musician Album Name The Dark Side of the Moon The Beatles Abbey Road Sgt. Pepper's Lonely Hearts Club Band 1 Master of Puppets BiRankr Musician Pink Floyd(1973) The Beatles(1968) The Beatles(1969) The Beatles(1967) The Beatles(2000) Metallica(1986) RB-BiRankr Album Name Death Magnetic Metallica(2008) 1 Lateralus Fallen The Beatles(2000) Tool(2001) Evanescence(2003) Kid A Radiohead(2000) Confessions on a Dance Floor Madonna(2005) Come Away with Me The Emancipation of Mimi St. Anger Music Metallica(2003) Madonna(2000) Norah Jones(2002) OK Computer Radiohead(1997) Mariah Carey(2005) Nevermind Nirvana(1991) Revolver Wish You Were Here The Beatles(1966) Pink Floyd(1975) Conclusion and Perspective Due to the huge amount of content available online, it is dif- ficult for an individual to find high quality content. The on- line companies might favor the popular contents for adver- tisement purpose, despite the quality of the content. Then, people may spend a tremendous amount of time searching for the contents of good quality. This is where ranking al- gorithms such as the one developed in this work can prove useful. In this work, we proposed a novel and general balance framework to balance the ranking results without losing the accuracy but obtain rankings that include items from all time periods. We showed that this method can be easily applied to all ranking algorithms, and that it constantly improved the accuracy of the algorithms. Moreover, it does not only push relevant items at the top of the rankings, but we showed that the quality of the rankings is also improved if we look fur- ther down the list. We could not single out one algorithm which performed constantly better than the others, some al- gorithms have better performance on specific datasets. Our work combined a general method and the evaluation of the outcomes with quantitative metrics based on ground truth established by the experts of the domain. In the future study, the balance framework could be applied to the more general domain such as economic systems and those sys- tems without ground truth. The proposed method also could be a good tool to evaluate the time bias of new ranking algo- rithms. References [Cai et al. 2017] Cai, Y.; Liu, S.; Hu, J.; Bai, G.; and Dong, S. 2017. A hybrid bipartite graph based recommendation algorithm for mobile games. In Big Data (Big Data), 2017 IEEE International Conference on, 3575 -- 3582. IEEE. [Cao, Guo, and Cheng 2011] Cao, L.; Guo, J.; and Cheng, X. 2011. Bipartite graph based entity ranking for related en- tity finding. In Proceedings of the 2011 IEEE/WIC/ACM In- ternational Conferences on Web Intelligence and Intelligent Agent Technology-Volume 01, 130 -- 137. IEEE Computer So- ciety. [Chen et al. 2017a] Chen, J.; Zhang, H.; He, X.; Nie, L.; Liu, W.; and Chua, T.-S. 2017a. Attentive collaborative filtering: Multimedia recommendation with item- and component- In Proceedings of the 40th International level attention. ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '17, 335 -- 344. New York, NY, USA: ACM. [Chen et al. 2017b] Chen, X.; Zhang, Y.; Ai, Q.; Xu, H.; Yan, J.; and Qin, Z. 2017b. Personalized key frame recommenda- tion. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '17, 315 -- 324. New York, NY, USA: ACM. [Davis and Goadrich 2006] Davis, J., and Goadrich, M. 2006. The relationship between precision-recall and roc curves. In Proceedings of the 23rd International Conference on Machine Learning, 233 -- 240. ACM. [Deng, Lyu, and King 2009] Deng, H.; Lyu, M. R.; and King, I. 2009. A generalized co-hits algorithm and its appli- cation to bipartite graphs. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 239 -- 248. ACM. [Feng et al. 2017] Feng, F.; Nie, L.; Wang, X.; Hong, R.; and Chua, T.-S. 2017. Computational social indicators: a case study of chinese university ranking. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 455 -- 464. ACM. [Fogaras 2003] Fogaras, D. 2003. Where to start browsing the web? In International Workshop on Innovative Internet Community Systems, 65 -- 79. Springer. [Harper and Konstan 2016] Harper, F. M., and Konstan, J. A. 2016. The movielens datasets: History and context. ACM Transactions on Interactive Intelligent Systems (tiis) 5(4):19. [Haveliwala 2002] Haveliwala, T. H. 2002. Topic-sensitive pagerank. In Proceedings of the 11th international confer- ence on World Wide Web, 517 -- 526. ACM. [He et al. 2017] He, X.; Gao, M.; Kan, M.-Y.; and Wang, D. 2017. Birank: Towards ranking on bipartite graphs. IEEE Transactions on Knowledge and Data Engineering 29(1):57 -- 71. [He et al. 2018] He, X.; He, Z.; Song, J.; Liu, Z.; Jiang, Y.- G.; and Chua, T.-S. 2018. Nais: Neural attentive item sim- IEEE Transactions on ilarity model for recommendation. Knowledge and Data Engineering. [Kleinberg 1999a] Kleinberg, J. M. 1999a. Authoritative sources in a hyperlinked environment. J. ACM 46(5):604 -- 632. [Kleinberg 1999b] Kleinberg, J. M. 1999b. Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM) 46(5):604 -- 632. [Leskovec, Adamic, and Huberman 2007] Leskovec, J.; Adamic, L. A.; and Huberman, B. A. 2007. The dynamics of viral marketing. ACM Transactions on the Web (TWEB) 1(1):5. [Li, Ng, and Ye 2012] Li, X.; Ng, M. K.; and Ye, Y. 2012. Har: hub, authority and relevance scores in multi-relational In Proceedings of the 2012 SIAM data for query search. International Conference on Data Mining, 141 -- 152. SIAM. [Lian et al. 2018] Lian, J.; Zhang, F.; Xie, X.; and Sun, G. 2018. Towards better representation learning for personal- ized news recommendation: a multi-channel deep fusion ap- proach. In IJCAI, 3805 -- 3811. [Liao et al. 2018] Liao, L.; He, X.; Zhang, H.; and Chua, T.- S. 2018. Attributed social network embedding. IEEE Trans- actions on Knowledge and Data Engineering 30(12):2257 -- 2270. [Liu and OZSU 2009] Liu, L., and OZSU, M. T. 2009. Nor- malized Discounted Cumulated Gain (nDCG). Springer US. 1920 -- 1920. [Lu et al. 2016] Lu, L.; Chen, D.; Ren, X. L.; Zhang, Q. M.; Zhang, Y. C.; and Zhou, T. 2016. Vital nodes identification in complex networks. Physics Reports 650:1 -- 63. [Mariani, Medo, and Zhang 2016] Mariani, M. S.; Medo, M.; and Zhang, Y.-C. 2016. Identification of milestone pa- pers through time-balanced network centrality. Journal of Informetrics 10(4):1207 -- 1223. [Page et al. 1999] Page, L.; Brin, S.; Motwani, R.; and Wino- grad, T. 1999. The pagerank citation ranking: Bringing order to the web. Technical Report 1999-66, Stanford InfoLab. [Pinto, Almeida, and Gonc¸alves 2013] Pinto, H.; Almeida, J. M.; and Gonc¸alves, M. A. 2013. Using early view patterns to predict the popularity of youtube videos. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, 365 -- 374. ACM. [Price 1976] Price, D. d. S. 1976. A general theory of biblio- metric and other cumulative advantage processes. Journal of the American Society for Information Science 27(5):292 -- 306. [Radicchi and Castellano 2012] Radicchi, F., and Castellano, C. 2012. Testing the fairness of citation indicators for com- parison across scientific domains: The case of fractional ci- tation counts. Journal of Informetrics 6(1):121 -- 130. F.; [Radicchi, Fortunato, and Castellano 2008] Radicchi, Fortunato, S.; and Castellano, C. 2008. Universality of citation distributions: Toward an objective measure of scientific impact. Proceedings of the National Academy of Sciences 105(45):17268 -- 17272. [Rui et al. 2007] Rui, X.; Li, M.; Li, Z.; Ma, W.-Y.; and Yu, N. 2007. Bipartite graph reinforcement model for web im- In Proceedings of the 15th ACM Interna- age annotation. tional Conference on Multimedia, 585 -- 594. ACM. [Szabo and Huberman 2008] Szabo, G., and Huberman, B. A. 2008. Predicting the popularity of online content. Available at SSRN 1295610. [Wang et al. 2018] Wang, X.; Chen, Y.; Yang, J.; Wu, L.; Wu, Z.; and Xie, X. 2018. A reinforcement learning frame- In 2018 IEEE In- work for explainable recommendation. ternational Conference on Data Mining (ICDM), 587 -- 596. IEEE. [Zheng et al. 2018] Zheng, G.; Zhang, F.; Zheng, Z.; Xiang, Y.; Yuan, N. J.; Xie, X.; and Li, Z. 2018. Drn: A deep re- inforcement learning framework for news recommendation. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, 167 -- 176. International World Wide Web Conferences Steering Committee.
1312.0649
1
1312
2013-12-02T22:40:40
Dynamics of Trends and Attention in Chinese Social Media
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
There has been a tremendous rise in the growth of online social networks all over the world in recent years. It has facilitated users to generate a large amount of real-time content at an incessant rate, all competing with each other to attract enough attention and become popular trends. While Western online social networks such as Twitter have been well studied, the popular Chinese microblogging network Sina Weibo has had relatively lower exposure. In this paper, we analyze in detail the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations in Twitter. We find that there is a vast difference in the content shared in China when compared to a global social network such as Twitter. In China, the trends are created almost entirely due to the retweets of media content such as jokes, images and videos, unlike Twitter where it has been shown that the trends tend to have more to do with current global events and news stories. We take a detailed look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. One of our key findings is that retweets are much more common in Sina Weibo and contribute a lot to creating trends. When we look closer, we observe that most trends in Sina Weibo are due to the continuous retweets of a small percentage of fraudulent accounts. These fake accounts are set up to artificially inflate certain posts, causing them to shoot up into Sina Weibo's trending list, which are in turn displayed as the most popular topics to users.
cs.SI
cs
1 Dynamics of Trends and Attention in Chinese Social Media Louis Lei Yu Sitaram Asur Bernardo A. Huberman ! Abstract—There has been a tremendous rise in the growth of online social networks all over the world in recent years. It has facilitated users to generate a large amount of real-time content at an incessant rate, all competing with each other to attract enough attention and become popular trends. While Western online social networks such as Twitter have been well studied, the popular Chinese microblogging network Sina Weibo has had relatively lower exposure. In this paper, we analyze in detail the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations in Twitter. We find that there is a vast difference in the content shared in China when compared to a global social network such as Twitter. In China, the trends are created almost entirely due to the retweets of media content such as jokes, images and videos, unlike Twitter where it has been shown that the trends tend to have more to do with current global events and news stories. We take a detailed look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. One of our key findings is that retweets are much more common in Sina Weibo and contribute a lot to creating trends. When we look closer, we observe that most trends in Sina Weibo are due to the continuous retweets of a small percentage of fraudulent accounts. These fake accounts are set up to ar tificially inflate cer tain posts, causing them to shoot up into Sina Weibo’s trending list, which are in turn displayed as the most popular topics to users. Index Terms—social network; web structure analysis; temporal analysis; China; social computing Louis Lei Yu, Department of Mathematics and Computer Sci- ence, Gustavus Adolphus College, 800 W College Ave, St Peter, MN 56082, phone: (415)374-9197, FAX: (507) 933-7041, e-mail: [email protected] Sitaram Asur, Social Computing Lab, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304, phone: (650) 857-1501, fax: (650) 852- 8156, email: [email protected] Bernardo A. Huberman, Social Computing Lab, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304, phone: (650) 857-1501, fax: (650) 852-8156, email: [email protected] 1 IN TRODUC T ION In the past few years, social media services as well as the users who subscribe to them, have grown at a phenomenal rate. This im- mense growth has been witnessed all over the world with millions of people of different back- grounds using these services on a daily basis. This widespread generation and consumption of content has created an extremely complex and competitive online environment where dif- ferent types of content compete with each other for the attention of users. It is very interesting to study how certain types of content such as a viral video, a news article, or an illustrative picture, manage to attract more attention than others, thus bubbling to the top in terms of popularity. Through their visibility, these popu- lar topics contribute to the collective awareness reflecting what is considered important. It can also be powerful enough to affect the public agenda of the community. There have been prior studies on the charac- teristics of trends and trend-setters in Western online social media ( [1], [2]). In this paper, we examine in detail a significantly less-studied but equally fascinating online environment: Chinese social media, in particular, Sina Weibo: China’s biggest microblogging network. Over the years there have been news reports on various Internet phenomena in China, from the surfacing of certain viral videos to the spreading of rumors ( [3]) to the so called “hu- man flesh search engines”: a primarily Chinese Internet phenomenon of massive search using online media such as blogs and forums ( [4]). These stories seem to suggest that many events happening in Chinese online social networks are unique products of China’s culture and social environment. Due to the vast global connectivity provided by social media, netizens all over the world are now connected to each other like never before; they can now share and exchange ideas with ease. It could be argued that the manner in which the sharing occurs should be similar across countries. However, China’s unique cul- tural and social environment suggests that the way individuals share ideas might be different than that in Western societies [5]. For example, the age of Internet users in China is a lot younger. So it is likely that they may respond to different types of content than Internet users in Western societies. The number of Internet users in China is larger than that in the U.S, and the majority of users live in large urban cities. One would expect that the way these users share information can be even more chaotic. An important question to ask is to what extent would topics have to compete with each other in order to capture users’ attention in this dynamic environment. Furthermore, as docu- mented by [6], it is known that the information shared between individuals in Chinese social media is monitored. Hence another interesting question to ask is what types of content would netizens respond to and what kind of popular topics would emerge u nder such constant surveillance. Given the above questions, we present an analysis on the evolution of trends in Sina Weibo. We monitored the evolution of the top trending keywords in Sina Weibo for 30 days. First, we analyzed the model of growth in these trends and examined the persistance of these topics over time. In this regard, we investigated if topics initially ranked higher tend to stay in the list of top 50 trending topics longer. Subsequently, by analyzing the timestamps of tweets, we looked at the propagation and de- caying process of the trends in Sina Weibo and compare it to earlier observations of Twitter [1]. Our findings are as follows: • We discovered that the majority of trends 2 in Sina Weibo are arising from frivolous content, such as jokes and funny images and photos unlike Twitter where the trends are mainly news-driven. • We established that retweets play a greater role in Sina Weibo than in Twitter, con- tributing more to the generation and per- sistence of trends. • Upon examining the tweets in detail, we made an important discovery. We ob- served that many trending keywords in Sina Weibo are heavily manipulated and controlled by certain fraudulent accounts. The irregular activities by these accounts made certain tweets more visible to users in general. • We found significant evidence suggesting that a large percentage of the trends in Sina Weibo are due to artificial inflation by fraudulent accounts. The users we identi- fied as fraudulent were 1.08% of the total users sampled, but they were responsible for 49% of the total retweets (32% of the total tweets). • We evaluated some methods to identify fraudulent accounts. After we removed the tweets associated with fraudulent ac- counts, the evolution of the tweets con- taining trending keywords follow the same persistent and decaying process as the one in Twitter. The rest of the paper is organized as fol- lows. In Section 2 we provide background in- formation on the development of Internet in China and on the Sina Weibo social network. In Section 3 we survey some related work on trends and spam in social media. In Section 4, we perform a detailed analysis of trending topics in Sina Weibo. In Section 5, we provide a discussion of our findings. 2 BACKGROUND In this Section, we provide some background information on the Internet in China, the devel- opment of Chinese social media services, and Sina Weibo, the most popular microblog service in China 2.1 The Internet in China The development of the Internet industry in China over the past decade has been impres- sive. According to a survey from the China In- ternet Network Information Center (CNNIC), by July 2008, the number of Internet users in China has reached 253 million, surpassing the U.S. as the world’s largest Internet market [7]. Furthermore, the number of Internet users in China as of 2010 was reported to be 420 million. Despite this, the fractional Internet penetra- tion rate in China is still low. The 2010 survey by CNNIC on the Internet development in China [8] reports that the Internet penetration rate in the rural areas of China is on average 5.1%. In contrast, the Internet penetration rate in the urban cities of China is on average 21.6%. In metropolitan cities such as Beijing and Shanghai, the Internet penetration rate has reached over 45%, with Beijing being 46.4% and Shanghai being 45.8% [8]. According to the survey by CNNIC in 2010 [7], China’s cyberspace is dominated by urban students between the age of 18–30 (see Figure 1 and Figure 2, taken from [7]). Fig. 1. Age Distribution of Internet Users in China The Government plays an important role in fostering the advance of the Internet industry in China. Tai [6] points out four major stages of Internet development in China, “with each period reflecting a substantial change not only in technological progress and application, but also in the Government’s approach to and ap- parent perception of the Internet.” 3 Fig. 2. The Occupation Distribution of Internet Users in China According to The Internet in China 1 released by the Information Office of the State Council of China: The Chinese government attaches great importance to protecting the safe flow of Internet information, actively guides people to manage websites in accordance with the law and use the Internet in a wholesome and correct way. 2.2 Chinese Online Social Networks Online social networks are a major part of the Chinese Internet culture [3]. Netizens2 in China organize themselves using forums, dis- cussion groups, blogs, and social networking platforms to engage in activities such as ex- changing viewpoints and sharing information [3]. According to The Internet in China: Vigorous online ideas exchange is a major characteristic of China’s Inter- net development, and the huge quan- tity of BBS posts and blog articles is 1. “The Internet in China” by the Information Office of the State Council of the People’s Republic of China is available at http://www.scio.gov.cn/zxbd/wz/201006/t667385.htm 2. A netizen is a person actively involved in online commu- nities [9]. far beyond that of any other country. China’s websites attach great impor- tance to providing netizens with opin- ion expression services, with over 80% of them providing electronic bulletin service. In China, there are over a million BBSs and some 220 million bloggers. According to a sample sur- vey, each day people post over three million messages via BBS, news com- mentary sites, blogs, etc., and over 66% of Chinese netizens frequently place postings to discuss various top- ics, and to fully express their opinions and represent their interests. The new applications and services on the In- ternet have provided a broader scope for people to express their opinions. The newly emerging online services, including blog, microblog, video shar- ing and social networking websites are developing rapidly in China and provide greater convenience for Chi nese citizens to communicate online. Actively participating in online in- formation communication and con- tent creation, netizens have greatly en- riched Internet information and con- tent. 2.3 Sina Weibo Sina Weibo was launched by the Sina corpo- ration, China’s biggest web portal, in August 2009. It has been reported by the Sina corpo- ration that Sina Weibo now has 250 million registered accounts and generates 90 million posts per day. Similar to Twitter, a user profile in Sina Weibo displays the user ’s name, a brief description of the user, the number of followers and followees the user has. There are three types of user accounts in Sina Weibo, regular user accounts, verified user accounts, and the expert (star) user account. A verified user ac- count typically represents a well known public figure or organization in China. Twitter users can address tweets to other users and can mention others in their tweets. A common practice in Twitter is “retweeting”, or rebroadcasting someone else’s messages to 4 one’s followers. The equivalent of a retweet in Sina Weibo is instead shown as two amalga- mated entries: the original entry and the cur- rent user ’s actual entry which is a commentary on the original entry. Sina Weibo has another functionality absent from Twitter: the comment. When a Sina Weibo user makes a comment, it is not rebroadcasted to the user ’s followers. Instead, it can only be accessed under the original message. 3 RE LATED WORK In this Section, we provide a survey of papers in two related areas: spam detection and the study of trends in social networks. In each area, we present work on both Western social networks and Chinese social networks. 3.1 Spam Detection in Twitter Spam and bot detection in social networks is a relatively recent area of research, motivated by the vast popularity of social websites such as Twitter and Facebook. It draws on research from several areas of computer science such as computer security, machine learning, and network analysis. In the 2010 work by Benevenuto et al [10], the authors examine spam detection in Twitter by first collecting a large dataset of more than 54 million users, 1.9 billion links, and 1.8 billion tweets. After exploring content and behavoir attributes, they developed an SVM classifier and was able to detect spammers with 70% pre- cision and non-spammers with 96% precision. As an insightful follow up, the authors used χ2 statistics to evaluate the importance of the attributes they used in their model. The second paper with direct application to spam detection in Twitter was by Wang [11]. Wang motivated his research with the statistic that an estimated 3% of messages in Twitter are spam. The dataset used in in this study was relatively smaller, gathering information from 25,847 users, 500 thousand tweets, and 49 million follower/friend relationships. Wang used decision trees, neural network, SVM, and naive Bayesian models. Finally, Lee et al. [12] described a differ- ent approach to detect spammers. They cre- ated honeypot user accounts in Twitter and recorded the features of users who interact with these accounts. They then used these features to develop a classifier with high precision. 3.2 Spam Detection in General Online So- cial Networks In social bookmarking websites, Markines et al. [13] used just 6 features - tag spam, tag blur, document structure, number of ads, plagiarism, and valid links, to develop a classifier with 98% accuracy. On facebook, Boshmaf et al. successfully launched a network of social bots [14]. Despite Facebook’s bot detection system, the authors were able to achieve an 80% infiltration rate over 8 weeks. In online ad exchanges, advertisers pay web- sites for each user that clicks through an ad to their website. The way fraud occurs in this domain is for bots to click through ads on a website owned by the botnet owners. The money at stake in this case has made the bots employed very sophisticated. The botnet own- ers use increasingly stealthy, distributed traffic to avoid detection. Stone et al. examined vari- ous attacks and prevention techniques in cost per click ad exchanges [15]. Yu et al. [16] gave a sophisticated approach to detect low-rate bot traffic by developing a model that examines query logs to detect coordination across bots within a botnet. 3.3 Spam Detection in Chinese Online So- cial Networks Some studies had been done on spam and bot detection in Chinese online social networks [17], [18]. Xu et al. [19] observed the spammers in Sina Weibo and found that the spammers can be classified into two categories: promoters and robot accounts. Lin et al. [20] presented an analysis of spam- ming behaviors in Sina Weibo. Using methods such as proactive honeypots, keyword based search and buying spammer samples directly from online merchants. they were able to col- lect a large set of spammer samples. Through 5 their analysis they found three representative spamming behaviors: aggressive advertising, repeated duplicate reposting, and aggressive following. spammer identification system. Through tests with real data it is demonstrated that the system can effectively detect the spamming be- haviors and identify spammers in Sina Weibo. 3.4 Battling the “Internet Water Army” in Chinese Online Social Networks One relevant area of research is the study of the “Online Water Army” 3 . It represents full- time or part-time paid posters hired by PR companies to help in raising the popularity of a specific company or person by posting articles, replies, and comments in online social net- works. According to CCTV 4 , these paid posters in China help their customers using one of the following three tactics: 1. promoting a specific product, company or person; 2. smear/slander competitors; 3. help deleting negative posts or comments. st in BBS systems, and online social net- works. In the work by Chen et al. [21], the authors examined comments in the Chinese news web- sites such as Sina.com and Sohu.com and used reply, activity, and semantic features to de- velop an SVM classifier via the LIBSVM Python library with 95% accuracy at detecting paid posters. Interesting information discussed in the paper includes the organizational structure of PR firms which hire the paid posters and the choice of features: percentage of replies, average interval time of posts, active days, and number of reports commented on. 3.5 Measuring Influences in Online Social Networks For many years the structural properties of var- ious Western social networks have been well studied by sociologists and computer scientists [22] [23] [24] [25]. In social network analysis, social influence refers to the concept of people modifying their 3. e.g., http://shuijunwang.com or http://www.51shuijun.net 4. see report in Chinese http://news.cntv.cn/china/20101107/102619.shtml at behavior to bring them closer to the behavior of their friends. In a social-affiliation network con- sists of nodes representing individuals, links representing friendships, and nodes represent- ing foci: “social, psychological, legal, or phys- ical entities around which joint activities are organized (e.g., workplace, social groups) [26]”, if A and B are friends, and F is a focus that A participates in. Over time, B can participate in the same focus due to A’s involvement, this is called a membership closure [26]. Agarwal et al. [27] examined methods to identify influential bloggers in the blogosphere. They discovered that the most influential blog- gers are not necessarily the most active. Back- strom et al. [28] studied the characteristics of membership closure in LiveJournal. Crandall et al. [29] studied the adaptation of influences between editors of Wikipedia articles. Romero et al. [30] measured retweets in Twitter and found that passivity was a major factor when it comes to message forwarding. Based on this result, they presented a measure of social influences that takes into account the passivity of the audience in social networks. 3.6 The Study of Trends in Twitter There are various studies on trends in Twitter [2] [31] [32] [33]. One of the most extensive investigations into trending topics in Twitter was by Asur et al. [34]. The authors examined the growth and persistence of trending topics in Twitter and observed that it follows a log-normal distri- bution of popularity. Accordingly, most topics faded from popularity relatively quickly, while a few topics lasted for long periods of time. They estimated the average duration of topics to be around 20-40 minutes. When they exam- ined the content of the trends, they observed that traditional notions of influence such as the frequency of posting and the number of follow- ers were not the main drivers of popularity in trends. Rather it was the resonating nature of the content that was important. An interesting finding was that news topics from traditional media sources such as CNN, New York Times and ESPN was shown to be some of the most popular and long lasting trending topics in 6 Twitter, suggesting that Twitter amplifies some of the broader trends occurring in society. Cha et al. [35] explored user influences on Twitter trends and discovered some interesting results. First, users with many followers were found to not be very effective in generating mentions or retweets. Second, the most influ- ential users tend to influence more than one topic. Third, influences were found to not arise spontaneously, but instead as the result of fo- cused efforts, often concentrating on one topic. 3.7 Social Influences and the Propagation of Information in Chinese Social Networks Researchers have analyzed the structure of var- ious Chinese offline social networks [36] [37] [38] [39] [40]. There have been only a few studies on social influences in Chinese online social networks. Jin [3] studied the structure and interface of Chinese online Bulletin Board Systems (BBS) and the behavioral patterns of its users. Xin [41] conducted a survey of BBS’s influence on University students in China. Yu et al. [42] looked at the adaptation of books, movies, mu- sic, events and discussion groups on Douban, the largest online media database and one of the largest online communities in China. In a similar area, there are some studies on the structural properties and the characteristics of information propagation in Chinese online social networks [43] [44], [45], [46], [47]. Yang et al. [48] noted that various information services (e.g., eBay, Orkut, and Yahoo!) encountered serious challenges when entering China. They presented an empirical study of social interac- tions among Chinese netizens based on over 4 years of comprehensive data collected from Mitbbs (www.mitbbs.com), the most frequently used online forum for Chinese nationals who are studying or working abroad. Lin et al. [49] presented a comparison of the interaction patterns between two of the largest online social networks in China: Renren and Sina Weibo. Niu et al. [50] gave an empirical analysis of Renren, it follows an exponentially truncated power law in-degree distribution, and has a short average node distance. King et al. [5] studied the concept of guanxi, a unique dyadic social construct, as applied to the interaction between web sites in China. Chang et al. [51] studied a special case of the propagation of information in Chinese online social networks: the sending and receiving of messages containing wishes and moral sup- port. They provided analysis on the data from Linkwish, a micro social network for wish sharing with users mainly from Taiwan, Hong Kong, and Macao. Fan et al. [52] looked at the propagation of emotion in Sina Weibo. They found that the correlation of anger among users is signifi- cantly higher than that of joy, which indicates that angry emotion could spread more quickly and broadly in the network. And, there is a stronger sentiment correlation between a pair of users if they share more interactions. Finally, users with larger number of friends possess more significant sentiment influence to their neighborhoods. 4 ANALYS IS O F TRENDS AND TREND - SE TTERS IN S INA WE IBO 4.1 The Trending Keywords Sina Weibo offers a list of 50 keywords that appear most frequently in users’ tweets. They are ranked according to the frequency of ap- pearances in the last hour. This is similar to Twitter, which also presents a constantly up- dated list of trending topics: keywords that are most frequently used in tweets over a period of time. We extracted these keywords over a period of 30 days (from June 18th, 2011 to July 18th, 2011) and retrieved all the corresponding tweets containing these keywords from Sina Weibo. We first monitored the hourly evolution of the top 50 keywords in the trending list for 30 days. We observed that the average time spent by each keyword in the hourly trending list is 6 hours. And the distribution for the number of hours each topic remains on the top 50 trending list follows the power law (as shown in Figure 3 a). The distribution suggests that only a few topics exhibit long-term popularity. Another interesting observation is that a lot of the key words tend to disappear from the top 50 trending list after a certain amount of time and then later reappear. We examined the 7 distribution for the number of times keywords reappear in the top 50 trending list (Figure 3 b). We observe that this distribution follows the power law as well. Both the above observations are very similar to the earlier study of trending topics in Twitter by [1]. However, one important difference with Twitter is that the average trending time is significantly higher in Sina Weibo (in Twitter it was 20-40 minutes). This suggests that Weibo may not have as many topics competing for attention as Twitter. Following our observation that some key- words stay in the top 50 trending list longer than others, we wanted to investigate if topics that are ranked higher initially tend to stay in the top 50 trending list longer. We separated the top 50 trending keywords into two ranked sets of 25 each: the top 25 and the bottom 25. Figure 4 illustrates the plot for the percentage of topics that placed in the bottom 25 relating to the number of hours these topics stayed in the top 50 trending list. We can observe that topics that do not last are usually the ones that are in the bottom 25. On the other hand, the long- trending topics spend most of their time in the top 25, which suggests that items that become very popular are more likely to stay longer in the top 50. This intuitively means that items that attract phenomenal attention initially are not likely to dissipate quickly from people’s interests. Fig. 4. Distribution of trending times for topics in the bottom 25 of the top 50 trend list 8 Fig. 3. Distributions of trending time and the number of times topics reappeared 4.2 The Evolution of Tweets Next, we investigate the process of persis- tence and decay for the trending topics in Sina Weibo. In particular, we want to measure the distribution for the time intervals between tweets containing the trending keywords. We continuously monitored the keywords in the top 50 trending list and for each trending topic we retrieved all the tweets containing the key- word from the time the topic first appeared in the top 50 trending list until the time it dis- appeared. Accordingly, we collected complete data for 811 topics over the course of 30 days (from June 20th, 2011 to July 20nd, 2011). In total we collected 574,382 tweets from 463,231 users. Among the 574,382 Tweets, 35% of the tweets (202,267 tweets) are original tweets, and 65% of the tweets (372,115 tweets) are retweets. 40.3% of the total users (187130 users) retweeted at least once in our sample. We measured the number of tweets that each topic gets in 10 minute intervals, from the time the topic starts trending until the time it stops. From this we can sum up the tweet counts over time to obtain the cumulative number of tweets Nq (ti ) of topic q for any time frame ti , This is given as : i(cid:88) τ =1 Nq (ti) = nq (tτ ) (1) where nq (t) is the number of tweets on topic q in time interval t. We then calculate the ratios Cq (ti , tj ) = Nq (ti )/Nq (tj ) for topic q for time frames ti and tj . Figure 5 shows the distribution of Cq (ti , tj )’s over all topics for two arbitrarily chosen pairs of time frames: (10, 2) and (8, 3) (nevertheless such that ti > tj , and ti is relatively large, and tj is small). These figures suggest that the ratios Cq (ti , tj ) are distributed according to the log-normal distributions. We tested and confirmed that the distributions indeed follow the log-normal distributions. This finding agrees with the result from a similar experiment in Twitter trends. Asur and others [1] argued that the log-normal distribu- tion occurs due to the multiplicative process involved in the growth of trends which incor- porates the decay of novelty as well as the rate of propagation. The intuitive explanation is that at each time step the number of new tweets (original tweets or retweets) on a topic is mul- tiplied over the tweets that we already have. The number of past tweets, in turn, is a proxy for the number of users that are aware of the topic up to that point. These users discuss the topic on different forums, including Twitter, es- sentially creating an effective network through which the topic spreads. As more users talk 9 Fig. 5. The distribution of Cq (ti , tj )’s over all topics for two arbitrarily chosen pairs of time frames: (10, 2) and (8, 3) about a particular topic, many others are likely to learn about it, thus giving the multiplicative nature of the spreading. On the other hand, the monotically decreasing decaying process characterizes the decay in timeliness and nove lty of the topic as it slowly becomes obsolete. However, while only 35% of the tweets in Twitter are retweets, there is a much larger percentage of tweets that are retweets in Sina Weibo. From our sample we observed that a high 65% of the tweets are retweets. This implies that the topics are trending mainly be- cause of some content that has been retweeted many times. Thus, Sina Weibo users are more likely to learn about a particular topic through retweets. 4.3 Trend-setters in Sina Weibo For every new trending keyword we retrieved the most retweeted tweets in the past hour and compiled a list of most retweeted users. Table 1 illustrates the top 20 most retweeted authors appearing in at least 10 trending topics each. The influential authors are ranked according to the ratio between the number of times the authors’ tweets are retweeted and the number of trending topics these tweets appeared in. From Table 1 we observed that only 4 out of the top 20 influential authors were verified accounts. The 4 verified accounts represent an urban fashion magazine, a fashion brand, an online travel magazine, and a Chinese celebrity. The other 16 influential authors are unverified accounts. They all seem to have a strong fo- cus on collecting user-contributed jokes, movie trivia, quizzes, stories and so on. This is in sharp contrast to the topics that are popular in Twitter as reported by [1]. When we looked at a longer list of authors we observed the same trend. The most popular items were all related to frivolous content and media, unlike Twitter which had a strong affinity towards news and current events. The “# of Times Tweeted” column in Ta- ble 1 gives the unique tweets that have been retweeted. We can observe that the rate at which they have been retweeted is phenom- enal. For example, the top retweeted user posted 37 tweets which in total were retweeted 1194999 times. 4.4 The Evolution of Retweets and Original Tweets In the next experiemnt, we separate the tweets in Sina Weibo into original tweets and retweets and calculate the densities of ratios between cu- mulative retweets/original tweets counts mea- sured in different time frames. Figure 6 shows 10 TABLE 1 Top 20 Retweeted Users in At Least 10 Trending Topics Account Descriptions Verified Yes Fashion Magazine Yes Fashion Brand Travel Magazine Yes No Gourmet Factory No Horoscopes No Silly Jokes No Good Movies Wonderful Quotes No No Global Music No Funny Jokes No Creative Ideas Chinese singer Yes No Good Music No Movie Factory No Strange Stories No Beautiful Pictures Global Music No No Female Fashion No Useful Tips Funny Quizzes No # of Times Retweeted 1194999 849404 127737 553586 1545955 3210130 1497968 602528 697308 3667566 742178 284600 323022 1509003 1668910 435312 432444 809440 735070 589477 # of Tweets 37 21 123 86 101 258 140 39 116 438 111 25 52 230 250 33 65 87 153 77 # of Topics 12 13 21 12 38 81 38 17 22 121 25 10 12 59 66 18 18 34 31 25 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 the distributions of original tweets/retweets ratios over all topics for two arbitrarily chosen pairs of time frames: (10, 2) and (8, 3). We find (as the last two sub-figures in Figure 6 show) that the distributions of ratios for orig- inal tweets follow the log-normal distribution. However, we observe (as the first two sub- figures in Figure 6 show) that for retweets, the distributions do not satisfy all the properties of the log-normal distribution. This is indicated by the large amount of low retweet ratios in the distribution. Furthermore, there are high spikes in the lower ratios area of the distribution. Identifying Spam Activity in Sina 4.5 Weibo From Figure 6 in the previous Section we ob- served that there is a high percentage of low ratios in the distribution of retweet ratios. This suggests that for a lot of the topics, there is an initial flurry of retweets. We hypothesize that this is due to the activities of certain users in Sina Weibo. As these accounts post a tweet, they tend to set up many other fake accounts to continuously retweet this tweet, expecting that the high retweet numbers would propel the tweet to place in the Sina Weibo hourly trending list. This would then cause other users to notice the tweet more after it has emerged as the top hourly, daily, or weekly trend setter. We attempt to verify the above hypothesis empirically. We define a spamming account as one that is set up for the purpose of repeat- edly retweeting certain messages, thus giving these messages artificially inflated popularity. According to our hypothesis, the users who retweet abnormally high amounts are more likely to be spam accounts. Figure 7 a) illustrates the distribution for the number of users and their corresponding number of retweets (over all topics). Figure 7 b) illustrates the distribution for the number of users and the numbers of topics that they caused to trend by their retweets. We observe that both distributions in Figure 7 follow the power law. This implies that there are certain users who retweet a lot, and a small number of users are responsible for a large number of topics. Next, we investigate who these users are. We manually checked the top 40 accounts who retweeted the most. To our surprise, 37 of these 40 accounts could no longer be accessed. That is, when we queried the accounts’ IDs, we retrieved a message from Sina Weibo stating that the account has been removed and can no longer be accessed (see Figure 8). According to Sina Weibo’s frequently asked question page, if a user sends a tweet contain- 11 Fig. 6. The densities of ratios between cumulative original tweets/retweets counts measured in two arbitrary time frames: (10, 2) and (8, 3) ing illegal or sensitive information, such tweet will be immediately deleted by Sina Weibo’s administrators, however, the users’ accounts will still be active. For the above reason we assume that if an account was active one month ago and can no longer be reached, it indicates that this account has very likely performed malicious activities such as spamming and has hence been deleted. Next, we inspect the user accounts with the most retweets in our sample and the number of accounts they retweeted. We see that although these accounts retweeted a lot, they mostly only retweet messages from a few users. We re- organize the users who retweeted by the ratio between the number of times he/she retweeted and the number of users he/she retweeted. We refer to this as the user-retweet ratio. Table 2 illustrates the top 10 users with the highest user-retweet ratios. We note that for all these users, they each retweet posts from only one account. We observe that this is true for the top 30 accounts with the highest user-retweet ratios. Next, we conduct the following experiment: starting from the users with the highest user- retweet ratios, we used a crawler to automati- cally visit and retrieve each user ’s Sina Weibo account. Thus we measured the percentage of user accounts that can still be accessed (as opposed to be directed to the error page) or- ganized by user-retweet ratios (Table 3). We 12 Fig. 7. The distribution for the number of users’ retweets and the number of topics users’ retweets trend in TABLE 2 The top 10 accounts with the highest user-retweet ratios (u-r ratio) User ID 1840241580 2241506824 1840263604 1840237192 1840251632 2208320854 2208320990 2208329370 2218142513 1843422117 Number of Retweets Number of Users Retweeted U-R Ratio 134 1 134 125 1 125 68 1 68 64 1 64 64 1 64 55 1 55 51 1 51 48 1 48 47 1 47 44 1 44 observe that only 12% of the accounts with user-retweet ratios of above 30 are active. And, as user-retweet ratios decrease, the percentages of active accounts slowly increase. We consider this to be strong evidence for the hypothesis that user accounts with high user-retweet ratios are likely to be spam accounts. We observe that in some cases, accounts with lower user-retweet ratios can still be a spam account. For example, an account could retweet a number of posts from other spam accounts, thus minimizing the suspicion of being de- tected as a spam account itself. 4.6 Removing Spammers in Sina Weibo From our sample, after automatically checking each account, we identified 4985 accounts that were deleted by the Sina Weibo administra- tor. We called these 4985 accounts “suspected spam accounts”. There were 463,231 users in our sample, and 187,130 of them retweeted at least once. Thus we identified 1.08% of the total users (2.66% of users that retweeted) as suspected spam accounts. Next, in order to measure the effect of spam on the Weibo network, we removed all retweets from our sample disseminated by suspected spam accounts as well as posts published by them (and then later retweeted by others). We hypothesize that by removing these retweets, TABLE 3 The percentage of accounts whose profiles can still be accessed, organized by user-retweet ratio 13 Ratio ≥30 20 – 29 11 – 19 10 9 8 7 6 5 4 3 2 1 Percentage of Active Accounts 12% 38% 16% 22% 12% 16% 15% 21% 30% 58% 80% 96% 92% Percentage of Inactive Accounts 88% 63% 84% 78% 88% 84% 85% 79% 70% 42% 20% 4% 8% moved, we re-calculated the distribution of user-retweet ratios again for arbitrarily chosen pairs of time frames. Figure 9 illustrates the dis- tribution for time frames (10, 2). We observed that the distribution is now much smoother and seem to follow the log-normal distribution. We performed the log-normal test and verified that this is indeed the case. Fig. 8. An Example of an Error Page we can eliminate the influences caused by the suspected spam accounts. We observed that after these posts were removed, we were left with only 189,686 retweets in our sample (51% of the original total retweets). In other words, by removing retweets associated wth suspected spam accounts, we successfully re- moved 182,429 retweets, which is 49% of the total retweets and 32% of total tweets (both retweets and original tweets) from our sample. This result is very interesting because it shows that a large amount of retweets in our sample are associated with suspected spam ac- counts. The spam accounts are therefore artifi- cially inflating the popularity of topics, causing them to trend. To see the difference after the posts associ- ated with suspected spam accounts were re- Fig. 9. The distribution of retweet ratios for time frame (10, 2) after the removal of tweets associ- ated with suspected spam accounts 4.7 Spammers and Trend-setters We found 6824 users in our sample whose tweets were retweeted. However, the total number of users who retweeted at least one person’s tweet was 187130, which is very skewed. Figure 10 illustrates the distribution for the number of times users were retweeted. This distribution follows the power law. 14 celebrities by repeatedly retweeting their posts, which can also be construed as spam; however, we exclude those from our list of suspected spam accounts. Figure 11 illustrates two ex- amples of the activities from suspected spam accounts. Fig. 10. The distribution for the frequency of retweets of user posts the number of users We discovered that whose tweets were retweeted by the suspected spam accounts was 4665, which is a surprising 68% of the users who were retweeted in our sample. This shows that the suspected spam accounts affect a majority of the trend-setters in our sample, helping them raise the retweet number of their posts and thereby making their posts appear on the trending list. The overall effect of the spammers is very significant. We also observed that a high 98% of the total trend- ing keywords can be found in posts retweeted by suspected spam accounts. Thus it can also be argued that many of the trends themselves are artificially generated, which is a very im- portant result. 4.8 Examples of Spam Accounts Next, we investigate the activities of typical spam accounts in Sina Weibo. We have shown that accounts with high retweet ratios are likely to be spam accounts. Although the majority of the accounts had already been deleted by the administrator, we manually inspected 100 currently existing accounts with high retweet ratios and found that 95 clearly participate in spamming activities. The other 5 were regu- lar users supporting their favorite singers and Fig. 11. Example of a spam account First, we observe that the suspected spam ac- counts we inspected tend to repeatedly retweet the same post with the goal of increasing the retweet number of said post. Next, the interval time of these repeated retweets tend to be very close to each other with long breaks between each set. Finally, we observe that the replies left from spam accounts often do not make any sense (see the comments circled in Figure 11). [21] had similar findings, and explained that this was because the paid posters are mainly interested in finishing the job as quickly as possible, thus they tend to retweet multiple times in short bursts and leave gibberish as replies. We observe that the replies in 11 a) and b) are not proper sentences. For the 4665 users whose tweets were retweeted by at least one suspected spam ac- count, we calculate the percentage of retweets from spam accounts and the percentage of suspected spam accounts involved. We selected only accounts whose tweets were retweeted by at least 50% of the accounts that are suspected spam accounts. From our manual inspection we found mainly three types of accounts: 1) Verified accounts from celebrities and re- ality show contestants: We hypothesize that they employ spam accounts to boast the popularity of their posts, making it seem like the posts were retweeted by many fans; 2) Verified accounts from companies: We hypothesize that they employ spam ac- counts to boast the perceived popularity of their products; 3) Unverified accounts with posts consist of ads for products: We hypothesize that these accounts employ spam accounts to distribute the ads and to boast the per- ceived popularity of their products, hop- ing other users will notice and distribute (see Figure 12 for an example). Fig. 12. Example of an account using spam 5 D ISCUSS ION AND FU TURE WORK We have examined the tweets relating to the trending topics in Sina Weibo. First we ana- lyzed the growth and persistence of trends. When we looked at the distribution of tweets 15 over time, we observed that there was a sig- nificant difference when contrasted with Twit- ter. The effect of retweets in Sina Weibo was significantly higher than in Twitter. We also found that many of the accounts that contribute to trends tend to operate as user contributed online magazines, sharing amusing pictures, jokes, stories and antidotes. Such posts tend to recieve a large amount of responses from users and thus retweets. Yang et al. [48] have shown similar results about Mitbbs users for- warding amusing messages and “virtual gifts” to online friends. The effect of this is similar to that of sending “a cyber greeting card”. This phenomenon can also be observed from text messages sent from cell phones between individuals in China [53]. This is interesting in the context of there being strong censorship in chinese social media. It can be hypothesized that under such circumstances, it is these kind of “safe” topics that can emerge. When we examined the retweets in more detail, we made an important discovery. We found that 49% of the retweets in Sina Weibo containing trending keywords were actually associated with fraudulent accounts. We ob- served that these accounts comprised of a small amount (1.08% of the total users) of users but were responsible for a large percentage of the total retweets for the trending keywords. These fake accounts are responsible for artificially inflating certain posts, thus creating fake trends in Sina Weibo. We relate our finding to the questions we raised in the introduction. There is a strong competition among content in online social me- dia to become popular and trend and this gives motivation to users to artificially inflate topics to gain a competitive edge. We hypothesize that certain accounts in Sina Weibo employ fake accounts to repeatedly repeat their tweets in order to propel them to the top trending list, thus gaining prominence as top trend setters (and more visible to other users). We found evidence suggesting that the accounts that do so tend to be verified accounts with commercial purposes. It is clear that the owners of these user con- tributed online magazines see this as a business opportunity to gain audience for their content. They can start by generating and propagating popular content and subsequently begin insert- ing advertisements amongst the jokes in their their Sina Weibo accounts. The artificial infla- tion makes it an even more effective campaign. We have found that we can effectively detect suspected spam accounts using retweet ratios. This can lead to future work such as using machine learning to identify other spamming techniques. In the future, we would like to ex- amine the behavior of these fake accounts that contribute to artificial inflation in Sina Weibo to learn how successful they are in influencing trends. RE FERENCES [1] S. Asur, B. A. Huberman, G. Szabo, and C. Wang, “Trends in social media - persistence and decay,” in 5th Interna- tional AAAI Conference on Weblogs and Social Media, 2011. [2] B. A. Huberman, D. M. Romero, and F. Wu, “Social networks that matter: Twitter under the microscope,” Computing Research Repository, 2008. [3] L. Jin, “Chinese outline BBS sphere: what BBS has brought to China,” Master ’s thesis, Massachusetts Institute of Technology, April 2009. [4] B. Wang, B. Hou, Y. Yao, and L. Yan, “Human flesh search model incorporating network expansion and gossip with feedback,” in Proceedings of the 2009 13th IEEE/ACM Inter- national Symposium on Distributed Simulation and Real Time Applications. IEEE Computer Society, 2009, pp. 82–88. [5] V. King, L. Yu, and Y. Zhuang, “Guanxi in the chinese web,” in Proceedings of the 2009 IEEE International Confer- ence on Computational Science and Engineering, vol. 4. IEEE Computer Society, 2009, pp. 9–17. [6] T. Z. Xue, The Internet in China : Cyberspace and Civil Society. Routledge, 2006. [7] CNNIC. (2010) The 21st statistics report on the internet development in china (in chinese). [Online]. Available: http://www.cnnic.cn/index/0E/00/11/index.htm [8] ——. (2010) Survey report on internet development in rural china (in chinese). [Online]. Available: http://www. cnnic.cn/en/index/00/02/index.htm F. Y. Wang, “Beyond x 2.0: where should we go?” IEEE Intelligent Systems, vol. 24, no. 3, pp. 2–4, 2009. [10] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammers on twitter,” in Collaboration, Elec- tronic messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6. National Academy Press, 2010. [11] A. Wang, “Detecting spam bots in online social net- working sites: a machine learning approach,” Data and Applications Security and Privacy XXIV, pp. 335–342, 2010. [12] K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: social honeypots+ machine learning,” in Pro- ceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval. ACM, 2010, pp. 435–442. [9] 16 [13] B. Markines, C. Cattuto, and F. Menczer, “Social spam detection,” in Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web. ACM, 2009, pp. 41–48. [14] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “The socialbot network: when bots socialize for fame and money,” in Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 2011, pp. 93–102. [15] B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, and G. Vigna, “Understanding fraudulent activities in online ad exchanges,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011, pp. 279–294. [16] F. Yu, Y. Xie, and Q. Ke, “Sbotminer: large scale search bot detection,” in Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010, pp. 421–430. [17] L. Liu and K. Jia, “Detecting spam in chinese microblogs - a study on sina weibo,” in Computational Intelligence and Security (CIS), 2012 Eighth International Conference on, 2012, pp. 578–581. [18] Y. Zhou, K. Chen, L. Song, X. Yang, and J. He, “Feature analysis of spammers in social networks with active honeypots: A case study of chinese microblogging net- works,” in Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, 2012, pp. 728–729. [19] X. Yong, Z. Yi, and C. Kai, “Observation on spammers in sina weibo,” in Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013). Atlantis Press, 2013. [20] C. Lin, J. He, Y. Zhou, X. Yang, K. Chen, and L. Song, “Analysis and identification of spamming behaviors in sina weibo microblog,” in Proceedings of the 7th Workshop on Social Network Mining and Analysis, ser. SNAKDD ’13, 2013, pp. 5:1–5:9. [21] C. Chen, K. Wu, V. Srinivasan, and X. Zhang, “Battling the internet water army: Detection of hidden paid posters,” CoRR, vol. abs/1111.4297, 2011. [22] M. Jamali and H. Abolhassani, “Different aspects of social network analysis,” in Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelli- gence, 2006, pp. 66–72. [23] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,” in Proceedings of the 7th SIGCOMM Conference on Internet Measurement. ACM, 2007, pp. 29– 42. [24] M. Buchanan, Nexus: Small Worlds and the Groundbreaking Theory of Networks. W. W. Norton & Company, May 2003. [25] R. Kumar, J. Novak, and A. Tomkins, “Structure and evolution of online social networks,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2006, pp. 611–617. [26] M. McPherson, L. Smith-Lovin, and J. M. Cook, “Birds of a feather: homophily in social networks,” Annual Review of Sociology, vol. 27, no. 1, pp. 415–444, 2001. [27] N. Agarwal, H. Liu, L. Tang, and P. S. Yu, “Identifying the Influential Bloggers in a Community,” WSDM’08, 2008. [28] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan, “Group formation in large social networks: membership, growth, and evolution,” in Proceedings of the 12th Interna- tional Conference on Knowledge Discovery and Data Mining. ACM, 2006, pp. 44–54. 17 [48] [50] [49] [46] H. Chen and E. Haley, “The lived meanings of product placement in social network sites (snss) among urban chinese white-collar professional users: A story of happy network,” Journal of Interactive Advertising, vol. 11, no. 1, pp. 11–16, 2010. [47] S.-C. Chu and S. M. Choi, “Electronic word-of-mouth in social networking sites: A cross-cultural study of the united states and china,” Journal of Global Marketing, vol. 24, no. 3, pp. 263–281, 2011. J. Yang, M. S. Ackerman, and L. A. Adamic, “Virtual gifts and guanxi: Supporting social exchange in a chinese on- line community,” in Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, ser. CSCW ’11, 2011, pp. 45–54. J. Lin, Z. Li, D. Wang, K. Salamatian, and G. Xie, “Analysis and comparison of interaction patterns in online social network and social media,” in Computer Communications and Networks (ICCCN), 2012 21st International Conference on, 2012, pp. 1–7. J. Niu, J. Peng, L. Shu, C. Tong, and W. Liao, “An em- pirical study of a chinese online social network–renren,” Computer, vol. 46, no. 9, pp. 78–84, 2013. [51] G. Chang, H.-S. Huang, and J. Y. jen Hsu, “Detecting chinese wish messages in social media: An empirical study,” in ICWSM, 2013. [52] R. Fan, J. Zhao, Y. Chen, and K. Xu, “Anger is more in- fluential than joy: Sentiment correlation in weibo,” CoRR, vol. abs/1309.2402, 2013. [53] Y. Xia, “Chinese use of mobile texting for social interac- tions: Cultural implications in the use of communication technology,” Intercultural Communication Studies, vol. 21, no. 2, p. 131, 2012. [29] D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri, “Feedback effects between similarity and social influence in online communities,” in Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2008, pp. 160–168. [30] D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman, “Influence and passivity in social media,” in 20th Interna- tional World Wide Web Conference (WWW’11), 2011. [31] H. Kwak, C. Lee, H. Park, and S. Moon, “What is twitter, a social network or a news media?” in Proceedings of the 19th international conference on World wide web, ser. WWW ’10, 2010, pp. 591–600. [32] M. Mathioudakis and N. Koudas, “Twittermonitor: trend detection over the twitter stream,” in Proceedings of the 2010 international conference on Management of data, ser. SIGMOD ’10, 2010, pp. 1155–1158. [33] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts, “Who says what to whom on twitter,” in Proceedings of the 20th international conference on World wide web, ser. WWW ’11, 2011, pp. 705–714. [34] S. Asur, B. A. Huberman, G. Szabo, and C. Wang, “Trends in social media: Persistence and decay,” in 5th International AAAI Conference on Weblogs and Social Media. AAAI, 2011, pp. 434–437. [35] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, “Measuring user influence in twitter: The million follower fallacy,” in 4th International AAAI Conference on Weblogs and Social Media (ICWSM). AAAI, 2010. [36] Y. Bian, “Bringing strong ties back in: indirect ties, net- work bridges, and job searches in china,” American Socio- logical Review, vol. 62, no. 3, pp. 366–385, 1997. [37] D. Ruan, “Interpersonal networks and workplace controls in urban china,” The Australian Journal of Chinese Affairs, vol. 29, pp. 89–105, 1993. J.-L. Farh, A. S. Tsui, K. Xin, and B.-S. Cheng, “The influ- ence of relational demography and guanxi: the Chinese case,” Organization Science, vol. 9, no. 4, pp. 471–488, 1998. [39] Y. Bian, R. Breiger, D. Davis, and J. Galaskiewicz, “Occu- pation, class, and social networks in urban china,” Social Forces, vol. 83, no. 4, pp. 1443–1468, 2005. [40] P. J. Carrington, J. Scott, and S. Wasserman, Eds., Models and Methods in Social Network Analysis. Cambrige Uni- versity Press, 2005. [41] M. Xin, “Chinese bulletin board system’s influence upon university students and ways to cope with it (in chinese),” Journal of Nanjing University of Technology (Social Science Edition), vol. 4, pp. 100 –104, 2003. [42] L. Yu and V. King, “The evolution of friendships in chinese online social networks,” in Proceedings of the 2010 IEEE Second International Conference on Social Computing, ser. SOCIALCOM ’10, 2010, pp. 81–87. [43] Z.-J. Zhong, “Social networking services (sns) in china,” International Journal of e-Business Management, vol. 4, no. 1, pp. 66–69, 2010. [44] B. Zhang, X. Guan, M. J. Khan, and Y. Zhou, “A time- varying propagation model of hot topic on {BBS} sites and blog networks,” Information Sciences, vol. 187, no. 0, pp. 15 – 32, 2012. [45] M. Chan, X. Wu, Y. Hao, R. Xi, and T. Jin, “Microblogging, online expression, and political efficacy among young chinese citizens: The moderating role of information and entertainment needs in the use of weibo,” Cyberpsy., Be- havior, and Soc. Networking, vol. 15, no. 7, pp. 345–349, 2012. [38]
1806.05637
1
1806
2018-06-14T16:34:02
Immunization of networks with non-overlapping community structure
[ "cs.SI", "physics.soc-ph" ]
Although community structure is ubiquitous in complex networks, few works exploit this topological property to control epidemics. In this work, devoted to networks with non-overlapping community structure (i.e, a node belongs to a single community), we propose and investigate three deterministic immunization strategies. In order to characterize the influence of a node, various pieces of information are used such as the number of communities that the node can reach in one hop, the nature of the links (intra community links, inter community links), the size of the communities, and the interconnection density between communities. Numerical simulations with the Susceptible-Infected-Removed (SIR) epidemiological model are conducted on both real-world and synthetic networks. Experimental results show that the proposed strategies are more effective than classical deterministic alternatives that are agnostic of the community structure. Additionally, they outperform stochastic and deterministic strategies designed for modular networks.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Immunization of networks with non-overlapping community structure Zakariya Ghalmane · Mohammed El Hassouni · Hocine Cherifi Received: date / Accepted: date Abstract Although community structure is ubiquitous in complex networks, few works exploit this topological property to control epidemics. In this work, devoted to networks with non-overlapping community structure (i.e, a node belongs to a single community), we propose and investigate three deterministic immuniza- tion strategies. In order to characterize the influence of a node, various pieces of information are used such as the number of communities that the node can reach in one hop, the nature of the links (intra community links, inter commu- nity links), the size of the communities, and the interconnection density between communities. Numerical simulations with the Susceptible-Infected-Removed (SIR) epidemiological model are conducted on both real-world and synthetic networks. Experimental results show that the proposed strategies are more effective than classical deterministic alternatives that are agnostic of the community structure. Additionally, they outperform stochastic and deterministic strategies designed for modular networks. Keywords Community structure · Immunization strategy · Epidemic spreading · Influence · Centrality · SIR model Zakariya Ghalmane LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat, Morocco E-mail: [email protected] Mohammed El Hassouni LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat, Morocco E-mail: [email protected] Hocine Cherifi LE2I UMR 6306 CNRS, University of Burgundy, Dijon, France E-mail: [email protected] 8 1 0 2 n u J 4 1 ] I S . s c [ 1 v 7 3 6 5 0 . 6 0 8 1 : v i X r a 2 1 Introduction Zakariya Ghalmane et al. The structure of networks is crucial in explaining epidemiological patterns. In the past few years, many immunization strategies have been developed using various topological properties of the network in order to mitigate and control the epidemic outbreaks. Despite the fact that there is clear evidence that many social networks show marked patterns of strong community structure [1–4], this property has gen- erally been ignored. A network with a strong community structure consists on cohesive subgroups of vertices that share many connections with members of their group and few connections with vertices outside their group. Bridge nodes are the ones that link different communities. They create a pathway of spreading dis- ease outside of their community. Their influence on epidemic spreading has been particularly investigated in previous works [5–7]. Indeed, immunization of these nodes allows confining the disease into the community where it starts. However, one must not neglect the importance of the highly connected nodes embedded into their community on the epidemic spreading. Motivated by the reasons referred to above, we propose to make a better use of the information about the community structure in order to develop new im- munization strategies. In this work, we restrict our attention to networks where each node belongs to a single community. We use a global deterministic approach. In other words, for each node of the network, an influence measure is computed and the nodes are ranked and immunized according to this measure. The first proposed method targets nodes having a big inter-community influence. It is mea- sured by the number of neighboring communities linked to the node. The second immunization method targets nodes which could have at the same time a high influence inside and outside their communities. Greater importance is given to those belonging to large communities since they could affect more nodes. This strategy is based on a weighted combination of the number of intra-community and inter-community links of each node in the network. The third method has the same objectives than the previous one. It is designed in order to take also into account the density variation of the communities. Experiments on real-world networks as well as synthetic networks have been conducted in order to evaluate the efficiency of the methods as compared to both deterministic and stochastic alternatives. Results of the investigations on the SIR epidemiological model show that the proposed strategies are in most cases, more efficient than their competitors. Extensive tests show that none of the proposed strategies outperform the two others in every situations. Indeed, controlled vari- ations of the community structure in synthetic networks show that performances are greatly influenced by the strength of the community structure. The proposed strategies are thus clearly complementary. Indeed, their efficiency is at the best for networks belonging to a different range of community structure strength. The remainder of this paper is organized as follows. In Section 2, related works and immunization strategies are introduced. In Section 3, the proposed community-based strategies are defined. Section 4 introduces the experimental setting used in this work. In Section 5, the experimental results are presented. Finally, section 6 serves as a conclusion to the paper. Immunization of networks with non-overlapping community structure 3 2 Related work Immunization strategies aim to immunize a few key nodes to achieve effectively the goal of reducing or stopping the spread of infectious diseases. They can be classified as stochastic or deterministic strategies. In stochastic strategies, local information about randomly selected nodes is used in order to identify target nodes. As they do not need any information about the full network structure, they can be used in situations where it is unavailable. In deterministic strategies, for each node of the network, one compute a measure of influence using local or global information. Nodes are then ranked and immunized according to their influence value. Recently, researchers have begun to pay more attention to the community structure in terms of epidemic dynamics [8,9]. Stochastic and deterministic strate- gies based on the community structure characteristics have been proposed. They can be categorized into two groups. The first group is based on topological prop- erties of non-overlapping community structure, while the second group uses the overlapping community structure features (i.e, a node could belong to multiple communities). We give a brief overview covering both types of strategies in order to highlight how communities can be advantageously used. However, experimental investigations are restricted to strategies designed for non-overlapping community structure which represents the focus of this study. 2.1 Stochastic immunization strategies. These strategies target the most influential nodes using local information around randomly selected nodes. Their main advantage is that they require only a lim- ited amount of information about the network topology. We present two stochastic methods based on non overlapping community structure and one strategy designed for overlapping communities. - Community Bridge Finder (CBF): Proposed by Salathe et al. [10], it is a random walk based algorithm designed to search for bridge nodes. The basic idea is that real-world networks exhibit a strong community structure with few links between the communities. Therefore, when a walker reaches a node in another community, he is no longer linked to previously visited sites. The CBF algorithm works as follows: Step 1: Select a random node vi=0 and follow a random path. Step 2: vi−1(i(cid:23)2) is considered as a potential target if there is not more than one connection from vi to any of the previous visited nodes. Step 3: Two random neighboring nodes of vi are picked (other than vi−1), if there is no connections back to the previously visited nodes vj≺i then, the poten- tial target is marked as a bridge and it is immunized. Otherwise, a random walk at vi−1 is taken back. Comparisons have been performed with the Acquaintance strategy (A node is selected at random and one of its randomly selected neighbors is immunized). Extensive tests conducted on real-world and synthetic networks using the SIR epidemic model show that CBF performs mostly better, often equally well, and rarely worse than the Acquaintance strategy [11]. It performs particularly well on networks with strong community structure. 4 Zakariya Ghalmane et al. - Bridge-Hub Detector (BHD): The Bridge-Hub Detector [12] is another vari- ant of CBF strategy. It targets bridge hub nodes for immunization by exploring friendship circles of visited nodes. The procedure of the BHD algorithm can be specified as follows: Step 1: Select a random node vi=0 and follow a random path. Step 2: Let vi be the node selected after i walks, and fi be the set of all neighbors of the node vi. The node vi is targeted for immunization if there is at least a node in fi that is not a member in the set Fi−1 and that is not connected to the nodes in Fi−1 where Fi−1 ≡ f0 be targeted for immunization and Fi will be updated to Fi ≡ Fi−1 (cid:83) ...(cid:83) ft−1. Otherwise, vi will not (cid:83) fi. (cid:83) f1 (cid:83) f2 Step 3: One node vH is randomly selected for immunization among the nodes in fi that do not belong and could not be linked back to Fi−1. Therefore, a pair of nodes, a bridge node and a bridge hub, are targeted for im- munization via a random walk. BHD was applied on simulated and empirical data constructed from social network of five US universities. Experimental results demonstrate that it compares favorably with Acquaintance and CBF strategies. Indeed, it results in reduced epidemic size, lower peak prevalence and fewer nodes need to be visited before finding the target nodes. - Random-Walk Overlap Selection (RWOS ): This random walk based strat- egy [13] targets the high degree overlapping nodes. It starts with defining the list of overlapping nodes obtained from known or extracted communities. Then, a ran- dom walk is followed starting from a random node of the network. At each step, the visited node is nominated as a target for immunization if it belongs to the list of overlapping nodes, otherwise, the random-walk proceeds. Simulation results on synthetic and real-wold networks with the SIR epidemic model show that the proposed method outperforms CBF and BHD strategies. In some cases it has a smaller epidemic size compared to the membership strategy where overlapping nodes are ranked according to the number of communities they belong to. In par- ticular, its performance improves in networks with strong community structures and with greater overlap membership values. To summarize, results show that stochastic methods designed for networks with community structure are more efficient that classical stochastic strategies. One of the very important contribution of these works is to demonstrate that it is important to better take into account the modular organization of real-world networks in order to develop efficient immunization strategies. Note, however, that stochastic methods are not as efficient as deterministic ones. Their main advantage is that they do not require a full knowledge of the global structure of the network. 2.2 Deterministic immunization strategies Nodes are immunized according to a rank computed using a specific influence (centrality) measure. Nodes with high centrality are targeted for immunization as they are more likely to infect many other nodes. The majority of known methods make use of the structural information either at the microscopic or at the macro- scopic level to characterize the node importance. These strategies such as Degree and Betweenness measures are very effective but they require the knowledge of the topology of the entire network. Refer to [14] for a comprehensive survey on the subject. Based on the fact that the influence of a node is closely linked to Immunization of networks with non-overlapping community structure 5 the network topological structure, and that a vast majority of real-world networks exhibit a modular organization, some deterministic methods have been developed lately for such networks. - Comm strategy: N. Gupta et al [15] proposed a strategy called the Comm measure of a node. It combines the number of its intra-community links (links with nodes inside its community) and the number of its inter-community links (links with nodes outside its community) to rank nodes that are both hubs in their community and bridges between communities. In this measure, the num- ber of inter-community links is raised up to power two while the number of the intra-community links is not raised to give more importance to bridges. Results on synthetic and real-world networks show that the Comm based strategy can be more effective as degree and betweenness strategies. However, it gives signifi- cant importance to the bridges compared to the community hubs. Yet, the hubs are commonly believed to be also influential nodes as they can infect their many neighbors. In some cases, they may play a very major role in the epidemic spread- ing. - Membership strategy: L. Hbert-Dufresne et al. [16] proposed an immuniza- tion strategy based on the overlapping community structure of networks. Nodes are targeted according to their membership number, which indicates the num- ber of communities to which they belong. Experiments with real-world networks of diverse nature (social, technological, communication networks, etc.) and two epidemiological models show that this strategy is more efficient as compared to degree, coreness and betweenness strategies. Furthermore, its best performances are obtained for high infection rates and dense communities. - OverlapNeighborhood strategy (ON ): M. Kumar et al [17] proposed a strategy based on overlapping nodes. It targets immediate neighbors of overlap- ping nodes for immunization. This strategy is based on the idea that high degree nodes are neighbors of overlapping nodes. Using a limited amount of information at the community structure level (the overlapping nodes), this strategy allows to immunize high degree nodes in their respective communities. Experiments con- ducted on four real-world networks show that this immunization method is more efficient than stochastic methods such as CBF [18, 19], BHD and RWOS methods. It also performs almost as well as degree and betweenness strategies while using less information about the overall network structure. Globally, experimental results demonstrate that the cited deterministic strate- gies allows to reach the efficiency of classical strategies that are agnostic about the community structure with less information. However, there is still room for improvement. 3 Proposed measures In order to quantify the influence of a node in the diffusion process on community structured networks, we propose three measures that integrate various levels of information. 6 Zakariya Ghalmane et al. 3.1 Number of Neighboring Communities Measure The main idea of this measure is to rank nodes according to the number of com- munities they reach directly (through one link). The reason for targeting these nodes is that they are more likely to contribute to the epidemic outbreak towards multiple communities. Note that all the nodes that do not have inter-community links share the same null value for this measure. 3.1.1 Definition: For a given node i belonging to a community Ck ⊂ C, the Number of Neighboring Communities βc1 (i) is given by: βc1 (i) = aij (1) (cid:88) (cid:95) Cl⊂C\{Ck} j∈Cl Where aij is equal to 1 when a link between nodes i and j exists, and zero other- wise.(cid:87) represents the logical operator of disjunction, i.e,(cid:87) j∈Cl the node i is connected to at least one of the nodes j ∈ Cl. aij is equal to 1 when 3.1.2 Algorithm: Algorithm 1: Computation of the Number of Neighboring Community Mea- sure Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the number of communities Output: A map M (node, measure value) 1 Create and initialize an empty map M (node, value) 2 for each community Ck,k∈{1,2,...,m} in the set C do 3 for each i in the community Ck do βC1 ← 0 for each C' in C \ {Ck} do if ∃j ∈ C(cid:48) : eij = 1 (a link exist between i and j) then 4 5 6 7 8 9 βC1 ← βC1 + 1 end end 10 M.add(i, βC1) end 11 12 end 3.1.3 Toy example: In order to illustrate the behavior of this measure a toy example is given in Fig- ure 1. Nodes are ranked according to the Number of Neighboring Communities Immunization of networks with non-overlapping community structure 7 Fig. 1 Rank of nodes according to (a) Number of Neighboring Communities measure βc1 (b) Degree measure (c) Betweenness measure. Nodes are ranked from the most influential (nodes having the highest measure value) to the less influential node (nodes having the lowest measure value) in the network. measure in Figure 1 (a). This measure could distinguish between the different community bridges within the network where it targets the most influential ones for immunization. To clarify this idea, let's take the example of nodes n5 and n10 which are both community bridges and which have the same number of either in- ternal and external links. According to Degree centrality measure in Figure 1 (b), both nodes have the same rank since it depends only on their number of neigh- bors. However, they have different ranks according to the Number of Neighboring Communities measure. The proposed measure gives more importance to node n5 which is linked to three external communities, so ever if it is contaminated, it can transmit the epidemic disease first to its own community C1 and also towards the neighboring communities C2, C3 and C4. While the epidemic disease could be transmitted to nodes belonging to the communities C1 and C2 in the case of node n10 contamination. Therefore, n5 represents a threat for 20 nodes which is the majority of nodes of the network, while n10 represents a threat to only 12 nodes. On the other hand, Betweenness centrality measure tries to immunize network bridges having a high fraction of geodesics passing through them. Yet, these nodes do not always represent the community bridges which are very important and must be immunized in priority in this type of network. As it is shown in Figure 1 (c) according to Betweenness measure, the nodes n15 and n12 are ranked among the less influential nodes, although, both are community bridges that are likely to contribute to the epidemic outbreak to external communities. Therefore, the Number of Neighboring Communities measure targets the most influential bridges which can spread the epidemics to multiple communities. 3.2 Community Hub-Bridge Measure Each node of the network share its links with nodes inside its community (intra- community links) and nodes outside its community (inter-community links). De- pending of the distribution of these links, it can propagates the epidemic more or less in its community or to its neighboring communities. Therefore, it can be con- sidered as a hub in its community and a bridge with its neighboring communities. That is the reason why we call this measure the Community Hub-Bridge measure. 123βc1(a)n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21223133232333323332233C4n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)101011121213131414141414 8 Zakariya Ghalmane et al. Furthermore, the hub influence depends on the size of the community, while the bridge influence depends on the number of its neighboring communities. 3.2.1 Definition: For a given node i belonging to a community Ck ⊂ C , the Community Hub-Bridge measure βc2 (i) is given by: Where: βc2 (i)i∈Ck = hi(Ck) + bi(Ck) hi(Ck) = Card(Ck) ∗ kintra i (Ck) bi(Ck) = βc1(i) ∗ kinter i (Ck) (2) (3) (4) i kintra i (Ck) and kinter (Ck) are respectively the intra-community degree and the inter-community degree of node i. Card(Ck) is the size of its community. βc1(i) represents the number of its neighboring communities. hi(Ck) tend to immunize preferentially hubs inside large communities. Indeed, they can infect more nodes than those belonging to small communities. bi(Ck) allows to target nodes that have more links with various communities. Such nodes have a big inter-community influence. 3.2.2 Algorithm: Algorithm 2: Computation of the Community Hub-Bridge measure Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the number of communities Output: A map M (node, measure value) 1 Create and initialize an empty map M (node, value) 2 for each community Ck,k∈{1,2,...,m} in the set C do 3 Calculate the size of the community Ck for each i in the community Ck do 4 5 6 7 8 9 end 10 11 end Calculate βC1 the number of neighboring communities of i described in Algorithm 1 Calculate kintra Calculate kinter (Ck) the intra-community links of the node i (Ck) the inter-community links of the node i i i Calculate βC2 the Community Hub-Bridge measure of the node i according to Equation (2) M.add(i, βC2) Immunization of networks with non-overlapping community structure 9 Fig. 2 Rank of nodes according to (a) Community Hub-Bridge measure βc2 (b) Degree measure (c) Betweenness measure. Nodes are ranked from the most influential to the less influential node in the network. 3.2.3 Toy example: Figure 2 (a) shows the rank of nodes according to the Community Hub-Bridge measure. This measure targets nodes having a good balance of inner and outer connections inside the community. However, it takes into consideration the size of the community for quantifying the influence of the community hubs and the number of neighboring communities for the bridges. Thus, even-though, both n6 and n16 have four inner links inside their own communities n6 is considered more influential because it is located in community C1 which is the largest community of the network. Therefore, it could be a threat to several nodes inside the network if ever it is infected. Unlike degree measure in Figure 2 (b) that classifies the nodes n6 and n16 in the same rank based on their number of connections without considering their location within the network. It is also noticed from the previous example given in Figure 1 (a) that many nodes have the same rank because they have the same number of neighboring communities. So, if we consider the nodes n10 and n12, they are both connected to only one neighboring community (respectively C1 and C3 ), consequently they have the same rank. However, n10 has a bigger connectivity to C1 in term of the number of outer links. The reason why we introduced the quantity of outer links as a new parameter in the second term of the Community Hub-Bridge measure to distinguish between bridges having big connectivity and those having lower connectivity with external communities. Based on Community Hub-Bridge measure n10 is more influential than node n12 as it can be seen in Figure 2 (a) since it has three outer connections towards community C1 while node n12 has only one connection towards C3. Therefore, the influence of nodes according to this measure is linked to two factors; the importance of nodes inside their communities by giving the priority to those located in large communities, and the connectivity of the nodes towards various communities. n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)101011121213131414141414(a)n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n2144215535755969813C4βc21713101111121313 10 Zakariya Ghalmane et al. 3.3 Weighted Community Hub-Bridge Measure The Community Hub-Bridge measure targets in priority the hubs in large com- munities and the bridges linked to multiple communities. However, no importance is given to the community structure strength. When the community structure is well-defined, more importance should be given to the bridges. Indeed, in this case breaking the network in multiple communities allows to contain the epidemic spreading where it started. On the contrary, when the community structure is very loose, it is of prime interest to immunize the hubs in large communities. Weighting each component of the community Hub-Bridge allows therefore to give more or less importance to bridges or hubs according to the community structure strength. 3.3.1 Definition: For a given node i belonging to a community Ck ⊂ C, the Weighted Community Hub-Bridge Measure βc3 (i) is given by: βc3 (i)i∈Ck = ρCk ∗ hi(Ck) + (1 − ρCk ) ∗ bi(Ck) (5) Where ρCk represents the interconnection density between the community Ck and the other communities of the network. It is given by: (cid:80) i∈Ck ρCk = kinter i /(kinter i + kintra i ) Card(Ck) (6) If the communities are very cohesive, then more importance is given to the bridges in order to isolate the communities. Otherwise, more importance is given to the hubs inside large communities. Immunization of networks with non-overlapping community structure 11 3.3.2 Algorithm: Algorithm 3: Computation of the Weighted Community Hub-Bridge mea- sure Input : Graph G(V,E), Community set: C = {C1, ..., Cm} where m is the number of communities Output: A map M (node, measure value) 1 Create and initialize an empty map M (node, value) 2 for each community Ck,k∈{1,2,...,m} in the set C do 3 Calculate the size of the community Ck Calculate ρCk the the interconnection density between the community Ck and the other communities of the network according to Equation (6) for each i in the community Ck do 4 5 6 7 8 9 Calculate βC1 the number of neighboring communities of i described in Algorithm 1 Calculate kintra Calculate kinter (Ck) the intra-community links of the node i (Ck) the inter-community links of the node i i i Calculate βC3 the Weighted Community Hub-Bridge measure of the node i according to Equation (5) 10 M.add(i, βC3) end 11 12 end 3.3.3 Toy example: This measure is very similar to the Community Hub-Bridge measure. However, it is designed in order to be able to adapt to the community structure strength. As it can be noticed from Figure 3 (a) the network given in this example has a well-defined community structure. Thus, the interconnection density ρCk has a small value for all the communities of the network. As we can clearly see, if we take the example of the community C1, the density of inter-community links is equal to ρC1 ≈ 0.15. Consequently, 15% of importance is given to the hub term hi(C1) and 85% of importance is given to the bridge term bi(C1). This explains why all the community bridges (n5, n2 and n4 ) are immunized before the other nodes of the community C1. It helps to isolate this community and prevent the epidemic diffusion to move from C1 to the other communities of the network. Thus, the Weighted Community Hub-Bridge measure has the ability to adapt to the strenght of the community structure. It gives more weight to the bridges when the network has a well-defined community structure in order to isolate the communities, while it gives more weight to hubs in the case of networks with a weak community structure since the network acts in this case like a single big community. 12 Zakariya Ghalmane et al. Fig. 3 Rank of nodes according to (a) Weighted Community Hub-Bridge measure βc3 (b) Degree measure (c) Betweenness measure. Nodes are ranked from the most influential to the less influential node in the network. Table 1 LFR network parameters Number of nodes Average degree Maximum degree Exponent for the degree distribution Exponent for the community size distribution Mixing parameter Community size range set 15 000 7 122 3 2.5 0.1, 0.4, 0.7, 0.9 [50 250],[100 500] 4 Experimental Setting In this section, we present the data and methods used in the empirical evaluation of the various immunization strategies presented above. 4.1 Datasets In order to evaluate the various measures under study, synthetic networks with con- trolled topological properties, together with real-world networks have been used. 4.1.1 Synthetic networks Synthetic networks are generated using the LFR (Lancichinetti, Fortunato and Radicchi) algorithm [20]. It generates random samples of networks with power- law distributed degree and community size. Hence, LFR algorithm guarantees networks with realistic features [21]. This algorithm allows to control different parameters when generating networks. Mainly, the mixing parameter µ, determines the ratio of the number of external neighbors of a node to the total degree of the node. Its value controls the strength of the community structure. For small values of µ, the communities are well-separated because they share few links, whereas when µ increases the proportion of inter community links becomes higher, making community identification a difficult task. Experimental studies showed that for a scale-free network, the degree distribution exponent α usually ranges from 2 to 3, and the maximal degree is estimated to be kmax ∼ n1/(α−1) [22–24]. The parameters values used in our experiments are given in Table 1. n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n21221122122232233133233C4123Degree(b)1713n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n219981275436C4Betweeness(c)101011121213131414141414n1C1C2C3n2n3n4n5n6n7n9n8n10n11n13n12n14n15n16n17n18n20n19n213341882859886131367C4(a)βc31713101112121313 Immunization of networks with non-overlapping community structure 13 Table 2 The basic topological properties of six real-world networks. N and E are respectively the total numbers of nodes and links. Q is the modularity. Nc is the number of communities. Network Caltech Princeton Georgetown Oklahoma Power grid CR-QC N 620 5112 7651 10386 4941 5242 E 7255 28684 163225 88266 6594 14496 Q 0.788 0.753 0.662 0.914 0.93 0.86 Nc 13 21 42 67 41 396 4.1.2 Real-world networks Real-world networks of various nature (online social networks, a technological net- work and a collaboration network) are used in order to test the immunization strategies. - Facebook: We use a network gathered by Traud et al. [25] from Facebook 1 online social network . This data includes the friendship network of five univer- sities in the US. It provides also information about the individuals such as the dormitory, the major or the field of specialization and the year of class. - Power-grid: This technological network is an undirected, unweighted network containing information about the topology of the Western States Power Grid of the United States. An edge represents a power supply line. A node is either a generator, a transformer or a substation. This data2 is compiled by D. Watts and S. Strogatz [26]. - General Relativity and Quantum Cosmology (GR-QC): GR-QC3 is a collaboration network collected from the e-print arXiv. It covers scientific col- laborations between authors of papers submitted to the General Relativity and Quantum Cosmology category. The nodes represent the authors and there is a link between two nodes if they co-authored a paper. This data is available in the SNAP repository compiled by J. Leskovec et al. [27]. As the community structure of these networks is unknown, we use a commu- nity detection algorithm. We choose to use the Louvain algorithm that proved to be efficient in synthetic networks for a wide range of community strength [28]. Furthermore, the topological properties of the uncovered communities are also realistic [29]. The basic topological properties of these networks are given in Table 2. 4.2 Epidemiological model The Susceptible-Infected-Recovered (SIR) epidemic model [30,31] is used to simu- late the spreading process in networks. In this model, there are three states for each node: susceptible (S), infected (I) and recovered (R). The infection mechanism of the SIR model is shown in Figure 4. Initially, targeted nodes are chosen according to a given immunization strategy until a desired immunization coverage of the population is achieved, and their state is set to resistant R. All remaining nodes 1http://code.google.com/p/socialnetworksimulation/ 2http://www-personal.umich.edu/~mejn/netdata/ 3http://snap.stanford.edu/data/ca-GrQc.html 14 Zakariya Ghalmane et al. Fig. 4 The infection mechanism of the classic SIR model. are in S state. After this initial set-up, infection starts from a random susceptible node. Its state changes to I. At each time step, the epidemic spreads from one infected node to a neighboring susceptible node according to the transmission rate of infection λ. Furthermore, infected nodes recover at rate γ, i.e. the probability of recovery of an infected node per time step is γ. If recovery occurs, the state of the recovered node is set from infected to resistant. The epidemic spreading process ends when there is no infected node in the network. After each simulation, we record the total number of recovered nodes (the epidemic size). 4.3 Immunization scheme To investigate the spread of an infectious disease on a contact network, we use the methodology described in Figure 5. For deterministic strategies, the influence of every node in the network is calculated according to a given centrality mea- sure. Then, nodes are sorted in decreasing order of their influence values. Next, nodes with highest centrality are removed from the network (or their state is set to resistant) until a desired immunization coverage is achieved. For stochastic immu- nization, nodes are targeted and removed according to a random strategy initiated from randomly chosen nodes in the network. In both cases, the network obtained after the targeted immunization is used to simulate the spreading process, running the SIR epidemic model simulations. After a simulation, we record the total num- ber of cases infected (the epidemic size). In order to ensure the effectiveness of the SIR propagation model evaluation, results are averaged over 600 independent real- izations. Finally, we calculate the mean epidemic size to evaluate the effectiveness of the proposed methods. 4.4 Evaluation Criteria To compare the performance of different immunization strategies, we use the frac- tion of the epidemic size. We also use the relative difference of outbreak size ∆rβ0,βc defined by: ∆rβ0,βc = Rβ0 Rβc Rβ0 (7) Where Rβ0 and Rβc are respectively the final numbers of recovered nodes for the alternative and the proposed strategy after the SIR simulations. If the relative γλSIR Immunization of networks with non-overlapping community structure 15 Fig. 5 The main steps of the immunization scheme. difference of outbreak size is positive, the epidemic spreads less with the proposed strategy. Therefore, it is the most efficient one. Otherwise, the epidemic spreads more with the proposed strategy and the alternative strategy is more efficient. 5 Results and discussion In this section, we report the results of two sets of experiments. The first set of experiments is performed with synthetic networks with controlled community structure. It is aimed at getting a better understanding of the relationship between the community structure and the centrality measures. These experiments are con- ducted on networks generated with the LFR algorithm. Indeed, this algorithm allows to control various topological properties of the community structure. We investigate the influence of the strength of the community structure. The commu- nity size range effect is also studied. Finally, the proposed immunization strategies are compared with both deterministic strategies (Degree, Betweenness and Comm strategies) and stochastic strategies (Community Bridge Finder [10] and Bridge Hub Detector [12] strategies). The second set of experiments concerns real-world networks. Online Social net- works, a technological network and a collaboration network are used. Recall that, as there is no ground-truth data for these networks, the community structure is uncovered using the Louvain Algorithm. Indeed, previous studies on synthetic net- works have shown that it succeeds in identifying the communities for a large range of community structure strength [12]. First, the proposed immunization strate- gies are compared and discussed, then their evaluation is performed against both stochastic and deterministic alternative strategies. StochasticImmunizationDeterministicImmunizationEpidemicsizeCentralitymeasuresRemovingthe top n nodesSorting nodesS.I.R modelRandomsearchbasedselectionRemoving selected nodesLFR networksorReal-World networks 16 Zakariya Ghalmane et al. Fig. 6 Influence of the strength of the community structure on the epidemic size of the proposed methods. Simulations are performed on LFR-generated networks with various mixing parameter values µ. Each epidemic size value is the average of 600 S.I.R simulation runs. 5.1 Synthetic networks 5.1.1 Influence of the strength of the Community Structure In the LFR model, the mixing parameter value µ varies from 0 to 1. It allows to control the strength of the community structure from well-separated communities with few inter-community links (low values of µ) to a network with no community structure (high values of µ). In order to investigate the effect of the strength of the community structure on the performance of the proposed methods, five net- works have been generated for each value of the mixing parameter (µ = 0.1, 0.4, 0.7 and 0.9). Figure 6 reports the average fraction of the epidemic size versus the proportion of immunized nodes for each µ value. It can be noticed from the results reported in this figure, that the performance of Community Hub-Bridge and Weighted Community Hub-Bridge exhibits a similar behavior. Whatever the fraction of immunized nodes the methods, perform best when the communities are well-separated. When the fraction of inter-connections between the communities increases, performance decrease gradually. Indeed, with well-separated communi- ties, the epidemics is localized to few communities, while it tends to spread more 51015202530f (%)020406080100Epidemic Size (%)(a) Number of Neighboring Communities = 0.1 = 0.4 = 0.7 = 0.951015202530f (%)020406080100Epidemic Size (%)(b) Community Hub-Bridge = 0.1 = 0.4 = 0.7 = 0.951015202530f (%)020406080100Epidemic Size (%)(c) Weighted Community Hub-Bridge = 0.1 = 0.4 = 0.7 = 0.9 Immunization of networks with non-overlapping community structure 17 when the inter connections increase. The Number of Neighboring Communities strategy shows its best performance for a medium range community strength value (µ = 0.4). Its efficiency decreases slightly in the case of well-defined community structure, and it gets even worse when it is very loose. Let's now turn to the com- parisons of the proposed methods between them. We can distinguish three cases depending of the community structure strength. In networks exhibiting a very strong community structure, we can see in Fig- ure 6 that the Community Hub-Bridge strategy is the most efficient. This is due to the fact that both alternatives methods (Number of Neighboring Communities and Weighted Community Hub-Bridge strategies) target preferentially the bridges. In fact, it is not the best solution in a network where the intra-community links pre- dominate. As there is few external connections compared to the total connections (intra-community links are considered to be 90% of the total links of the network when µ=0.1), local outbreaks may die out before reaching other communities. Therefore, immunizing community hubs seems to be more efficient than immuniz- ing bridges in networks with strong community structure. This is the reason why the Community Hub-Bridge method which targets nodes having a good balance of inner and outer connections is more efficient. In networks with weak community structure as it can be seen in Figure 6, the Weighted Community Hub-Bridge method is the most efficient. Indeed, when µ has a high value, the network does not have a well-defined community structure. In that case, Weighted Community Hub-Bridge strategy can better adapt to the community structure. It gives more weight to the community hubs as they are the most influential nodes in networks with a loose community structure. Remember that the network acts as a single community in the extreme case where µ (cid:62) 0.9. That is the reason why it performs better than the other proposed methods. In networks with community structure of medium strength, the Number of Neighboring Communities outperforms all the other proposed methods as it re- ported in Figure 6. In this type of networks, nodes have many external connections while maintaining a well-preserved community structure. Therefore, there is much more options for the epidemic to spread easily to neighboring communities. As the Number of Neighboring Communities strategy targets the most influential com- munity bridges, it prevents the epidemic spreading to multiple communities. This is the reason why this immunization method shows its best performance in this case. To summarize, Community-Hub bridge strategy is well-suited to situations where the communities are well-defined (Dense communities with few links be- tween communities). One must prefer weighted Hub-Bridge strategy when the community structure is very loose. In between the Number of Neighboring Com- munities strategy is more efficient. 5.1.2 Community Size Range effects The aim of this investigation is to show the impact of the community size range on the performance of the proposed methods. Studies reported above have been performed with community structure size in the range [100, 500]. In this para- graph, they are also evaluated in networks with community size range equals to [50, 250]. Figure 7 reports the epidemic size versus the percentage of immunized nodes for values of the mixing parameter µ ranging from µ = 0.1 to µ = 0.9, 18 Zakariya Ghalmane et al. Fig. 7 Effect of community size range on the epidemic spreading of the proposed methods. Simulations are performed on LFR network with different community structure. Each value is the average of 600 runs per network and immunization method. and with the two community size range under study. One can see that all the immunization strategies exhibit the same behavior. They always perform better in networks with smaller community size range. Furthermore, the differences be- tween the epidemic sizes in the two situations decrease when the proportion of immunized nodes increases. In networks with a big community size range, there are a small number of communities. Consequently, the range of the Number of Neighboring Communities measure is also small, and many nodes have the same values (as it is shown in the example given in section 3.1). That makes the ranking less efficient. In networks with a smaller community size range, there are much more communities. In this case, more nodes have different numbers of neighbor- ing communities values and the ranking is more efficient. That is the reason why the Number of Neighboring communities performs better in the latter case. Con- cerning Community Hub-Bridge and Weighted Community Hub-Bridge measures, both are weighted by the number of neighboring communities. This weight be- comes more discriminative as the community size range decreases. That explains why they also perform better in networks with small community size range. From Figure 7, one can also see that the Community Hub-Bridge method is always the best immunization method in networks with well-defined community 51015202530f (%)020406080100Epidemic Size (%)(a) Number of Neighboring Communities51015202530f (%)020406080100Epidemic Size (%)(b) Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(c) Weighted Community Hub-Bridge = 0.1; [100,500] = 0.1; [50,250] = 0.4; [100,500] = 0.4; [50,250] = 0.7; [100,500] = 0.7; [50,250] = 0.9; [100,500] = 0.9; [50,250] Immunization of networks with non-overlapping community structure 19 structure, and that the Number of Neighboring Communities outperforms the other proposed immunization methods (where µ = 0.4). Moreover, the Weighted Community Hub-Bridge is still the most efficient one in networks with non-cohesive community structure. 5.1.3 Comparison with the alternative methods Figure 8 reports the relative difference of the outbreak size between the proposed strategies and both stochastic (Acquaintance, CBF, BHD) and deterministic al- ternatives (Degree, Betweenness and Comm) as a function of the fraction of immu- nized nodes. Community Hub-Bridge is taken as the reference in (a), (d) and (g), Number of Neighborhood communities in (b), (e) and (h) and Weighted Commu- nity Hub-Bridge in (c), (f) and (e). The values of the mixing parameter (µ = 0.1, µ = 0.4, µ = 0.7) cover the three situations in terms of community strength (strong, median and weak community structure). Figure 8 (a), (d) and (g) shows that ∆R/R0 has always a positive value. Thus, Community Hub-Bridge always yields a smaller epidemic size compared to all the alternative methods whatever the fraction of immunized nodes values, and this holds for all the range of community structure strength. The middle panels of Fig- ure 8 reports the results of the comparative evaluation of the Number of Neighbor- ing Communities strategy. Overall, it is more efficient than the tested alternative methods. However, Betweenness performs better in networks with strong commu- nity structure (µ = 0.1) and fraction of immunized nodes below 18%. Indeed, the relative difference is negative in this case. Therefore, targeting the community bridges is not the best immunization solution in networks with very well-defined community structure. It can be also noticed from Figure 8 (c), (f) and (i) that the Weighted Community Hub-Bridge method results always in the lowest epidemic size compared to the other methods. To summarize, if we exclude the case of the Number of neighborhood Communities strategy in the situation where the network has a strong community structure (µ = 0.1), in every other situations the relative difference of the outbreak is always positive. That indicates that all the proposed strategies outperform the alternatives. Let's now turn to more detailed compar- isons. First of all, these results clearly demonstrate the superiority of deterministic methods over stochastic methods. Indeed, in any case, the biggest differences are observed with Acquaintance followed by CBF and BHD. In fact, their rank is cor- related with the level of information that they possess on the network topology. In fact, Acquaintance is totally agnostic about the network topology, CBF targets the bridges between the communities while BHD targets both bridges and hubs. Even though CBF and BHD are community-based methods, they use the information only at the level of randomly chosen nodes, from where their low performances. The compared effectiveness of the three alternatives deterministic strategies de- pends on the strength of the community structure. For strong community structure (µ = 0.1), Degree and Comm strategy are very close while Betweenness centrality is slightly more performing whatever the value of fraction of immunized nodes. For medium community structure strength (µ = 0.4), results are more mixed, even if betweenness centrality is still a little bit more efficient. For weak community struc- ture (µ = 0.7), the three strategies are well separated. Degree ranks first, followed by Betweenness and Comm strategy in terms of efficiency. 20 Zakariya Ghalmane et al. Fig. 8 The relative difference of the outbreak size ∆R/R0 as a function of the fraction of immunized nodes f . The left panels show the difference between Community Hub-Bridge method and the alternative methods. The middle panels show the difference between Number of Neighboring Communities method and the alternative methods, while the right panels show the difference between Weighted Community Hub-Bridge and the alternative methods. We note that a positive value of ∆R/R0 means a higher performance of the proposed method. Simulations are performed on LFR network with different community structure. Final values are obtained by running 600 independent simulations per network, immunization coverage and immunization method. 51015202530f (%)020406080100ƊR/R0 (%)=0.1(a) Community Hub-Bridge51015202530f (%)020406080100ƊR/R0 (%)=0.1(b) Number of Neighboring Communities51015202530f (%)020406080100ƊR/R0 (%)=0.1(c) Weighted Community Hub-BridgeDegreeBetweenessAcq%aintanceCBF [10]BHD [12]NΔ G% ta et alΔ [15]51015202530f (%)010203040506070ƊR/R0 (%)=0.4(d) Community Hub-Bridge51015202530f (%)010203040506070ƊR/R0 (%)=0.4(e) Number of Neighboring Communities51015202530f (%)010203040506070ƊR/R0 (%)=0.4(f) Weighted Community Hub-Bridge51015202530f (%)01020304050ƊR/R0 (%)=0.7(g) Community Hub-Bridge51015202530f (%)01020304050ƊR/R0 (%)=0.7(h) Number of Neighboring Communities51015202530f (%)01020304050ƊR/R0 (%)=0.7(i) Weighted Community Hub-Bridge Immunization of networks with non-overlapping community structure 21 Fig. 9 The epidemic size of the proposed community based methods performed on six real networks of different types namely on facebook network of four universities (a) Caltech (b) Princeton (c) Georgetown (d) Oklahoma, and on (e) Collaboration network (f) Power network. Final values are obtained by running 600 independent simulations per network, immunization coverage and immunization method. 5.2 Real-world networks As our goal is to cover a wide range of situations, real-world data come from different domains (social, technical and collaboration networks). In order to link the results of this set of experiments with those performed on synthetic data, we estimate the mixing proportion parameter of the uncovered community structure 51015202530f (%)020406080100Epidemic Size (%)(a) CaltechNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(b) PrincetonNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(c) GeorgetownNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(d) OklahomaNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(e) ca-GrQcNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge51015202530f (%)020406080100Epidemic Size (%)(f) Power-gridNumber of Neighboring CommunitiesCommunity Hub-BridgeWeighted Community Hub-Bridge 22 Zakariya Ghalmane et al. Table 3 The estimated mixing parameter µ of the real-world networks. Network µ Power-grid ca-GrQc Princeton Oklahoma Caltech Georgetown 0.034 0.095 0.354 0.441 0.448 0.522 by the Louvain algorithm. Indeed, experiments performed with synthetic networks have shown that the community strength is a major parameter in order to explain the efficiency of the proposed immunization strategies. Estimated values reported in Table 3 show that the networks cover a wide range of community strength. 5.2.1 Spreading efficiency of the proposed methods Figure 9 shows the epidemic size as a function of the fraction of immunized nodes obtained after the SIR simulations for the proposed immunization methods. These results corroborate the conclusions we made with the synthetic networks. It can be observed on Figure 9 (e) and (f) that in networks with strong community struc- ture, Community Hub-Bridge is the most efficient immunization method. Indeed, the estimated mixing parameter value µ is equal to 0.03 and 0.09 respectively for the power-grid network and the collaboration network. Communities are very well separated, and the Community Hub-Bridge method targets nodes with a good bal- ance of intra-community and inter-community links. That is where its superiority lies. In networks with average community structure strength shown in Figure 9 (a), (b) and (d), the Number of Neighboring Communities outperforms the other proposed methods. It targets the bridges connected to multiple communities which facilitates the spread of epidemics throughout the whole network. Therefore, it is the most efficient method in Caltech, Princeton and Oklahoma networks. The Weighted Community Hub-Bridge is the most efficient method for the Georgetown network (where µ = 0.522) as reported in Figure 9 (c). This method depends on the fraction of the inter-community links for each community within the network, which allows us to give the appropriate weighting to favor either the inter-community or the intra-community influence. This is the reason why it outperforms the other proposed methods in the Georgetown network which does not have a strong community structure. Finally, these results confirm the paramount influence of the mixing proportion parameter in order to choose the most appropriate strategy in a given situation. Whatever the origin of the network, what matters the most is the strength of the community structure. 5.2.2 Comparison with the alternative methods The relative difference of the outbreak size between deterministic as well as stochas- tic strategies and the proposed strategies is reported in Figure 10. Similarly than with synthetic networks, the stochastic strategies (CBF and BHD) perform poorly as compared to deterministic ones. Indeed, it appears clearly that these two types of methods are well separated. The results of the comparative evaluation of the deterministic strategies are quite consistent with what might have been expected. The proposed strategies are globally more efficient than their competitors. This is all the more true when they are used appropriately. Immunization of networks with non-overlapping community structure 23 The left panels of Figure 10 show the comparison between the Community Hub-Bridge and the alternative methods. It outperforms the deterministic meth- ods in networks with strong community structure (Power Grid and ca-GrQc) with a minimal gain of around 10 % over the best alternative (Betweenness). Its benefits reduces when the strength of the community structure gets looser. It is still above Betweenness for Princeton and Oklahoma networks, despite their medium range mixing proportion. However, when the community structure becomes weaker (Cal- tech and Georgetown), it is less performing when the fraction of immunized nodes is greater than 20 %. The middle panels of Figure 10 show the comparison between the Number of Neighboring Communities and its alternative. It shows its best performances for networks with medium mixing proportion values (Princeton, Oklahoma, Caltech) with gains above 10 % as compared to the most performing alternative (Between- ness). It is still performing better than the best alternative for Georgetown (degree strategy), but with gains of less than 10 %. However, it performs in some cases worse than Degree and Betweenness in networks with strong community structure (Power-grid and the collaboration networks). The right panels of Figure 10 show the comparison between the Weighted Community Hub-Bridge and the alternative strategies. As expected, it outperforms its competitors in networks with average and high community structure strength. However, it can be worse than betweenness for networks with a strong community structure. To summarize, these experiments reveal that the proposed algorithms are very effective in identifying the influential nodes to be selected for immunization. When they are used on the appropriate networks in terms of community strength, they outperform the available strategies, simply by using relevant information about the community structure. 6 Conclusion The adoption of an appropriate immunization strategy aroused much interest among researchers to control any threat of infectious diseases spreading. Despite the presence of the community structure in all the social networks, this property has been mostly ignored by the existing immunization strategies. In this paper, three community based strategies are proposed. They engage more topological information related to networks with non-overlapping community structure. The proposed strategies are evaluated in different synthetic and real networks. To verify their effectiveness, SIR epidemic model is employed. First of all, results show that the performance of stochastic strategies is far from what can be expected from deterministic strategies. Indeed, as they do not have access to the whole network structure, it is not easy to exploit their properties. Extensive investigation shows also that generally, the proposed immunization strategies have a smaller epidemic size compared to the most influential determin- istic immunization strategies (Betweenness and Degree) and the Comm strategy designed for networks with non-overlapping community structure. The Commu- nity Hub-Bridge method is particularly suited to networks with strong community structure. The Number of Neighboring communities shows its best with medium strength community structure while Weighted Community Hub-Bridge is more 24 Zakariya Ghalmane et al. efficient in networks with weak community structure. Additionally, the commu- nity size range plays also an important role in the diffusion process. Immunization strategies are more efficient when the community size is small. One of the main benefit of this work is to show that significant gains can be achieved by mak- ing a better use of the knowledge on the community structure organization. It can be extended in multiple directions. First of all, these measures can surely be improved by using finer weights in order to make them more robust to the commu- nity structure variation. Now that the impact of the community structure strength has been clearly identified, stochastic versions of the proposed strategies need to be designed. Finally, extension to non-overlapping community structures can be considered. References 1. Porter, Mason A., Jukka-Pekka Onnela, and Peter J. Mucha. "Communities in networks." Notices of the AMS 56.9 (2009): 1082-1097. 2. Ferrara, Emilio. "Community structure discovery in facebook." International Journal of Social Network Mining 1.1 (2012): 67-90. 3. Jebabli, Malek, et al. "User and group networks on YouTube: A comparative analysis." Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Con- ference of. IEEE, 2015. 4. Jebabli, Malek, et al. "Overlapping community structure in co-authorship networks: A case study." u-and e-Service, Science and Technology (UNESST), 2014 7th International Conference on. IEEE, 2014. 5. Liu, Zonghua, and Bambi Hu. "Epidemic spreading in community networks." EPL (Eu- rophysics Letters) 72.2 (2005): 315. 6. Gupta, Naveen, Anurag Singh, and Hocine Cherifi. "Community-based immunization strategies for epidemic control." Communication Systems and Networks (COMSNETS), 2015 7th International Conference on. IEEE, 2015. 7. Chakraborty, Debayan, Anurag Singh, and Hocine Cherifi. "Immunization Strategies Based on the Overlapping Nodes in Networks with Community Structure." International Conference on Computational Social Networks. Springer, Cham, 2016. 8. Palla, Gergely, et al. "Uncovering the overlapping community structure of complex net- works in nature and society." nature 435.7043 (2005): 814. 9. Fortunato, Santo, and Darko Hric. "Community detection in networks: A user guide." Physics Reports 659 (2016): 1-44. 10. Salath, Marcel, and James H. Jones. "Dynamics and control of diseases in networks with community structure." PLoS computational biology 6.4 (2010): e1000736. 11. Cohen, Reuven, Shlomo Havlin, and Daniel Ben-Avraham. "Efficient immunization strate- gies for computer networks and populations." Physical review letters 91.24 (2003): 247901. 12. Gong, Kai, et al. "An efficient immunization strategy for community networks." PloS one 8.12 (2013): e83489. 13. Taghavian, Fatemeh, Mostafa Salehi, and Mehdi Teimouri. "A local immunization strategy for networks with overlapping community structure." Physica A: Statistical Mechanics and its Applications 467 (2017): 148-156. 14. L, Linyuan, et al. "Vital nodes identification in complex networks." Physics Reports 650 (2016): 1-63. 15. Gupta, Naveen, Anurag Singh, and Hocine Cherifi. "Centrality measures for networks with community structure." Physica A: Statistical Mechanics and its Applications 452 (2016): 46-59. 16. Hbert-Dufresne, Laurent, et al. "Global efficiency of local immunization on complex net- works." Scientific reports 3 (2013): 2171. 17. Kumar, Manish, Anurag Singh, and Hocine Cherifi. "An Efficient Immunization Strategy Using Overlapping Nodes and Its Neighborhoods." Companion of the The Web Conference 2018 on The Web Conference 2018. International World Wide Web Conferences Steering Committee, 2018. Immunization of networks with non-overlapping community structure 25 18. NEWMAN, Mark EJ. A measure of betweenness centrality based on random walks. Social networks, 2005, vol. 27, no 1, p. 39-54. 19. Brandes, Ulrik. "A faster algorithm for betweenness centrality." Journal of mathematical sociology 25.2 (2001): 163-177. 20. Lancichinetti, Andrea, Santo Fortunato, and Filippo Radicchi. "Benchmark graphs for testing community detection algorithms." Physical review E 78.4 (2008): 046110. 21. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "Towards realistic artificial benchmark for community detection algorithms evaluation." International Journal of Web Based Communities 9.3 (2013): 349-370. 22. Albert, Rka, and Albert-Lszl Barabsi. "Statistical mechanics of complex networks." Re- views of modern physics 74.1 (2002): 47. 23. Boccaletti, Stefano, et al. "Complex networks: Structure and dynamics." Physics reports 424.4-5 (2006): 175-308. 24. Newman, Mark EJ. "The structure and function of complex networks." SIAM review 45.2 (2003): 167-256. 25. Traud, Amanda L., Peter J. Mucha, and Mason A. Porter. "Social structure of facebook networks." Physica A: Statistical Mechanics and its Applications 391.16 (2012): 4165-4180. 26. Watts, Duncan J., and Steven H. Strogatz. "Collective dynamics of small-worldnetworks." nature 393.6684 (1998): 440. 27. Leskovec, Jure, Jon Kleinberg, and Christos Faloutsos. "Graph evolution: Densification and shrinking diameters." ACM Transactions on Knowledge Discovery from Data (TKDD) 1.1 (2007): 2. 28. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "On accuracy of community structure discovery algorithms." arXiv preprint arXiv:1112.4134 (2011). 29. Orman, Gnce Keziban, Vincent Labatut, and Hocine Cherifi. "Comparative evaluation of community detection algorithms: a topological approach." Journal of Statistical Mechan- ics: Theory and Experiment 2012.08 (2012): P08001. 30. Newman, Mark EJ. "Spread of epidemic disease on networks." Physical review E 66.1 (2002): 016128. 31. Moreno, Yamir, Romualdo Pastor-Satorras, and Alessandro Vespignani. "Epidemic out- breaks in complex heterogeneous networks." The European Physical Journal B-Condensed Matter and Complex Systems 26.4 (2002): 521-529. 26 Zakariya Ghalmane et al. 51015202530f (%)−10010203040506070ƊR/R0 (%)51015202530f (%)−10010203040506070ƊR/R0 (%)(a) Caltech51015202530f (%)−10010203040506070ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)01020304050607080ƊR/R0 (%)51015202530f (%)01020304050607080ƊR/R0 (%)(b) Princeton51015202530f (%)01020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)010203040506070ƊR/R0 (%)51015202530f (%)010203040506070ƊR/R0 (%)(c) Georgetown51015202530f (%)010203040506070ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)01020304050607080ƊR/R0 (%)51015202530f (%)01020304050607080ƊR/R0 (%)(d) Oklahoma51015202530f (%)01020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15] Immunization of networks with non-overlapping community structure 27 Fig. 10 The relative difference of the outbreak size ∆R/R0 as a function of the fraction of immunized nodes f . The left panels show the difference between Community Hub-Bridge method and the alternative methods. The middle and the right panels show respectively the difference between the Number of Neighboring Communities method, the Weighted Commu- nity Hub-Bridge and the alternative methods. We note that a positive value of ∆R/R0 means a higher performance of the proposed method. Simulations are performed on different types of real-world networks. Final values are obtained by running 600 independent simulations per network, immunization coverage and immunization method. 51015202530f (%)−1001020304050607080ƊR/R0 (%)51015202530f (%)−1001020304050607080ƊR/R0 (%)(e) ca-GrQc51015202530f (%)−1001020304050607080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]51015202530f (%)020406080ƊR/R0 (%)51015202530f (%)020406080ƊR/R0 (%)(f) Power-grid51015202530f (%)020406080ƊR/R0 (%)DegreeBe weenessCBF [10]BHD [12]NΔ Gup a e alΔ [15]
1601.07108
1
1601
2016-01-26T17:26:58
Centrality Measures for Networks with Community Structure
[ "cs.SI", "physics.soc-ph" ]
Understanding the network structure, and finding out the influential nodes is a challenging issue in the large networks. Identifying the most influential nodes in the network can be useful in many applications like immunization of nodes in case of epidemic spreading, during intentional attacks on complex networks. A lot of research is done to devise centrality measures which could efficiently identify the most influential nodes in the network. There are two major approaches to the problem: On one hand, deterministic strategies that exploit knowledge about the overall network topology in order to find the influential nodes, while on the other end, random strategies are completely agnostic about the network structure. Centrality measures that can deal with a limited knowledge of the network structure are required. Indeed, in practice, information about the global structure of the overall network is rarely available or hard to acquire. Even if available, the structure of the network might be too large that it is too much computationally expensive to calculate global centrality measures. To that end, a centrality measure is proposed that requires information only at the community level to identify the influential nodes in the network. Indeed, most of the real-world networks exhibit a community structure that can be exploited efficiently to discover the influential nodes. We performed a comparative evaluation of prominent global deterministic strategies together with stochastic strategies with an available and the proposed deterministic community-based strategy. Effectiveness of the proposed method is evaluated by performing experiments on synthetic and real-world networks with community structure in the case of immunization of nodes for epidemic control.
cs.SI
cs
Centrality Measures for Networks with Community Structure Naveen Gupta Computer Science and Engineering Discipline PDPM Indian Institute of Information Technology, Design & Manufacturing Jabalpur, Jabalpur, India email: Corresponding author: [email protected] Anurag Singh Department of Computer Science and Engineering, National Institute of Technology, Delhi, India Hocine Cherifi University of Burgundy, LE2I UMR CNRS 6306, Dijon, France Abstract Understanding the network structure, and finding out the influential nodes is a challenging issue in the large networks. Identifying the most influential nodes in the network can be useful in many applications like immunization of nodes in case of epidemic spreading, during intentional attacks on com- plex networks. A lot of research is done to devise centrality measures which could efficiently identify the most influential nodes in the network. There are two major approaches to the problem: On one hand, deterministic strategies that exploit knowledge about the overall network topology in order to find the influential nodes, while on the other end, random strategies are com- pletely agnostic about the network structure. Centrality measures that can deal with a limited knowledge of the network structure are required. Indeed, in practice, information about the global structure of the overall network is rarely available or hard to acquire. Even if available, the structure of the network might be too large that it is too much computationally expensive to calculate global centrality measures. To that end, a centrality measure is Preprint submitted to Physica A: Statistical Mechanics and its ApplicationsJanuary 27, 2016 proposed that requires information only at the community level to identify the influential nodes in the network. Indeed, most of the real-world networks exhibit a community structure that can be exploited efficiently to discover the influential nodes. We performed a comparative evaluation of prominent global deterministic strategies together with stochastic strategies with an available and the proposed deterministic community-based strategy. Effec- tiveness of the proposed method is evaluated by performing experiments on synthetic and real-world networks with community structure in the case of immunization of nodes for epidemic control. Keywords: Complex Networks, Epidemic Dynamics, Community Structure, Immunization Strategies 1. Introduction Outbreak of infectious diseases is a serious threat to the lives of people and it also brings serious economic loss for the victim countries. So, it is very important to discover the propagation rules in the social groups in or- der to prevent the epidemics or at least to control the epidemic spreading. Vaccination allows to protect people and prevent them to transmit disease among their contacts. As mass vaccination is not always feasible, due to limited vaccination resources, targeted immunization strategies are of prime interest for public health. Impact of the contact network topology on disease transmission is a hot topic in the large networks study. A lot of work is done towards this direction by various researchers [1, 2, 3, 4, 5, 6, 7, 8]. Network organization can be characterized at different scales ranging from the microscopic to the macroscopic level. At the microscopic level, one con- centrates on the differences between individuals in order to identify the most influential ones. At this level, statistical measures are used to summarize some of the overall network features. The centrality of a node is a very im- portant feature. Since the nodes with high centrality values can propagate information to the whole network more easily than the rest of the nodes with low centrality measures, they are the ones to be targeted for immunization. Unfortunately, there is no general consensus on the definition of centrality and many measures are proposed. Degree centrality and betweenness cen- trality are the most influential methods [9, 10]. They are studied extensively to understand their effect on epidemic dynamics. The degree centrality of a node is its number of links to other nodes, while the betweenness centrality 2 measures its contribution to the shortest paths between every pair of nodes in the network. As most real world-networks follow a power law distribution, it is very efficient to immunize the hubs (i.e., nodes having high degrees) preferentially. However, many real world networks are more structured than merely having heterogeneous degree distributions. Sometimes, there is no information available about the global structure of the real-world networks. Hence, centrality measures based on locally avail- able network information are of prime interest. Such strategies rely only on local information around the selected nodes. The most basic strategy is random immunization where target nodes are picked at random regardless of the network topology. In acquaintance immunization, the selected node is chosen randomly among the neighbors of a randomly picked node. As ran- domly selected acquaintances have more connections than randomly selected nodes, this method targets highly connected nodes [11]. It can be viewed as a local approximation of a global degree based strategy. The mesoscopic level of organization is mainly concerned by properties shared by sets of nodes called communities. A community-structured net- work is organized around different communities such that the number of links connecting the nodes in the same community is relatively large as compared to the number of links connecting nodes in different communities. While the effect on epidemic dynamics of degree distribution is studied extensively, the community structure of networks has attracted little attention. Its investi- gation has recently started, despite the fact that many real-world networks show significant community structure. Results reported in the literature con- firm that the knowledge of the network degree distribution is not sufficient to predict epidemic dynamics. Indeed, fundamentally different behaviors are observed due to variations of the community structure in the networks with the same degree distribution. Therefore, the design of immunization strate- gies needs to take into account the community structure. At this level, the focus is on structural hubs (i.e., the nodes connecting the largest number of different communities). Indeed, these nodes act as bridges facilitating the propagation of the epidemic from one dense community to another [12, 13]. The diffusion over the network is important to study for the epidemic spread- ing. Samukhin et al. have studied the Laplacian operator of an uncorrelated random network and diffusion processes on the networks. They have pro- posed a strict approach for diffusion process [14]. An exact closed set of integral equations are derived. which provide the averages of the Laplacian operators resolvent, it initiated to describe the propagation of a random walks 3 on the network. Mitrovic et al. have studied eigenvalue spectra and the dif- fusion process with random walk in a various class of networks at mesoscopic level [15]. Arenas et al. have studied the relationship among the topological scale and dynamic time scale in the networks based on the dynamics closer to synchronization of coupled oscillators. In their study they have considered the communities of nodes organized in a hierarchical manner at different time [16]. Immunization strategies in community-structured populations are previ- ously investigated. Masuda [17] proposed an immunization strategy based on the eigenvector centrality for community-structured networks. In this paper, module based strategy technique is used for measuring the contribution of the each node to the weighted community network in order to preferentially immunize nodes that bridge important communities. The number of links they share gives the weight of a link between any two communities. The in- fluence of a node is related to the importance of the community together with its connectivity to the other communities. The effectiveness of the method is compared to alternative centrality measures (degree, betweenness, eigen- vector) in the real and synthetic networks with modular structure. Three community detection algorithms are used to uncover the non-overlapping communities. The generated networks used to simulate real-world networks are made of equal-sized communities with heterogeneous degree distributions. [12] proposed an immunization strategy and targeted at nodes that connect to multiple communities, it was called community bridge finder (CBF). CBF is a local algorithm based on random walk. Starting from a node chosen randomly, it follows a random path until it reaches a node that does not connect to more than one of the previously visited nodes. They have used standard epidemic spreading model, susceptible-infected-resistant (SIR) [18] for finding the results on both real-world and synthetic networks. The authors compared three global centrality measures: degree, betweenness and random walk, and two local strategies: acquaintance and CBF. It is shown that the random walk centrality is the most successful strategy. Furthermore CBF outperforms the acquaintance method. In this work, the communities on the empirical network are defined functionally, and the synthetic data are generated using the Watts and Strogatz model [19]. Salath´e et al. However, there are some major issues associated with these contributions to the problem. First of all, the community structure of real-world networks is often not known, and one must rely on a community detection algorithm in 4 order to uncover it. Therefore, it is therefore difficult to measure the influence of this operation on the results. Indeed, the classes of techniques available to detect communities are both numerous and diverse, and until now, there is no consensus on either a community definition or a universal detection method. Even, when a ground truth based on functional features is avail- able, the topology of the selected networks can hardly be diverse enough to represent all types of systems encountered in various applications. To over- come these limitations, artificial networks can be used. Indeed, a random model allows generating as many networks as desired, while controlling some of their topological properties. However, this strategy raises another issue: the realism of the obtained networks, which should mimic closely real-world networks in order to get relevant test results. It is worth mentioning that some attempts are made to develop a theoretical framework for understand- ing the effects of the modular structure in networks. Unfortunately, models used in previous work are oversimplified. Simple cases in which modules are homogeneous and of equal size are considered while in real-world networks, modules are found to be heterogeneous in various aspects. For example, it is well established that networks with a community structure are characterized by a power-law distributed community size [20, 21, 22, 23]. Our investigations, address the above limitations. In order to under- stand how community structure affects epidemic dynamics we perform an extensive investigation using a realistic generative model [24] with controlled topological properties and a representative set of immunization strategies. The main goal of this study is to give a clear answer on which immuniza- tion strategy should be preferred in order to control epidemics in networks with community structure. Second, the impact of the community structure is analyzed using the LFR benchmark algorithm [24]. We also perform the experiments using the proposed method on some real-world networks to fur- ther validate results on synthetic benchmark. An extensive experimental evaluation is conducted in order to investigate their efficiency as compared to global centrality measures, random-walk based stochastic measures as well as another community-based strategy. The major contributions of this pa- per are twofold. First, a new local centrality measure based on the network community structure is introduced. Second, an extensive experimental evalu- ation is conducted in order to investigate its efficiency as compared to global centrality measures, random-walk based stochastic measures as well as an alternative community-based strategy. The impact of the community struc- ture is analyzed using both controlled synthetic benchmark produced by the 5 LFR algorithm [24] and real-world networks. The SIR epidemic spreading model [25] is considered in order to test the immunization strategies. The rest of the paper is organized as follows. In section 2, various cen- trality measures and immunization strategies are presented. Classic epidemic spreading model is discussed to understand the diffusion over the heteroge- neous networks. In section 4, the benchmark model is introduced and its main properties are recalled. Section 5 is devoted to the experimental re- sults. The observations and findings are described in section 7. 2. Immunization Strategies Targeted immunization strategies can be divided into three categories based on their requirement about the knowledge of the network topology. Global strategies exploit the knowledge of the full network structure in order to find the influential nodes while Community-based strategies are able to work with a limited amount of information. The third category of immuniza- tion strategies are stochastic strategies which rely only on local information around randomly selected nodes. These three types of strategies are de- scribed below in detail: 2.1. Global Strategies: These immunization strategies are based on an ordering of the nodes of the whole network according to an influence measure. Nodes are then tar- geted (removed) in the decreasing order of their rank. The influence of a node is computed according to some centrality measure. In this study, two promi- nent global centrality measures (degree and betweenness) are considered in order to compare with the proposed strategies. 1. Degree Centrality : Degree centrality denotes the number of imme- diate neighbors of a node, i.e. which are only one edge away from the node. It is simple but very coarse. It can be interpreted as the number of walk of length one starting at the considered node. It measures the local influence of a node. It has many ties and fails to take into account the influence weight of even the immediate neighbors (Algorithm 1). Even if it is a local measure, the immunization strategy is global because it needs to rank all the nodes of the network according to their degree. 2. Betweenness Centrality : Betweenness centrality defines the influ- ence of a node based on the number of shortest paths between every pair of 6 Algorithm 1 To calculate Degree Centrality Input Graph G(V, E) Output A map/dictionary with (node, centrality value) pairs Initialize an empty map, M with (node, value) pair. for each node u in set V : do Calculate the number, n of adjacent nodes or neighbors of u. Add the pair (u, n) to the map M. end for Return the map M. nodes that passes through that node. It basically tries to identify the influ- ence of a node in terms of information flow through the network (Algorithm 2). In this strategy, the nodes are target based on their overall betweenness centrality. The computation of betweenness has high time complexity. Algorithm 2 To calculate Betweenness Centrality Input Graph G(V, E) Output A map/dictionary with (node, centrality value) pairs Initialize an empty map, M with (node, value) pair format. Calculate the number (n) of shortest paths between every pair of nodes (a, b) in the graph. Store the result in step 2 in a map, M with pairs ( (a, b), n ). for each node u in set V : do Let BC(u) be the betweenness centrality of node u, and initialize it to zero. for each node pair (a, b) in the map M do Count the number (n1) of shortest paths between the nodes a and b, of which node u is also a part of. BC(u) = BC(u) + n1/n end for end for Return the map M. 2.2. Stochastic Strategies: Stochastic strategies do not need any information about the global struc- ture of the network. They are able to work with a very limited amount of local 7 information about a node. They basically try to find the influential nodes based on random walks. Such algorithms, agnostic about the full network structure are necessary in some situations. For example, the full structure of the contact network relevant to the spread of a disease is generally not known. 1. Random Acquaintance: Random Acquaintance immunization [11]. It works as follows: pick a ran- strategy is proposed by Cohen et al. dom node v0, and then pick its acquaintance or neighbor, v1 at random. Immunize the nodes which are picked as acquaintances at least n times. An acquaintance is immunized immediately in the case of n = 1. This strategy identifies highly connected individuals without any information about the global structure of the network. 2. Community Bridge Finder (CBF): The CBF algorithm, pro- [12], is a random walk based algorithm, aimed at posed by Salathe et al. identifying nodes connected to multiple communities. The algorithm begins with selecting a random node as the starting node. Then a random path is followed until a node is found that is not connected to more than one of the previously visited nodes on the random walk. It is based on the idea that the first node not connecting back to already visited nodes of the current ran- dom walk is more likely to belong to a different community. This strategy is completely agnostic about the network structure. 2.3. Community-based Strategies: These strategies do not require any information about the global struc- ture of the network. They only require information at the community level. In the case where the community structure is unknown, it can be uncov- ered with local community detection algorithms [26, 27]. In a network with community structure, the degree of a node can be split into two contribu- tions: the intra-community links connecting it to nodes in its community and the inter-community links connecting it to nodes outside its commu- nity. Strength of the community structure of a network depends upon inter and intra-community links. A network is said to have a strong community structure if a small fraction of total links in the networks lies between the communities. It is said to have well defined communities. On the contrary, if a large fraction of total links lies between the communities, then the net- work does not contain well-defined communities and it is said to have a weak community structure. 8 The topology of a network can be fully specified by its adjacency matrix A. In the case of an undirected, unweighted network, A(i, j) is equal to 1 if nodes i and j are directly connected to each other otherwise it is equal to zero. Considering a community C of a network, the total degree of a node i can be split in to two parts: ki(C) = kin i (C) + kout i (C). (1) The degree ki of a node i is equal to the total number of its connections with other nodes, ki = Pj A(i, j). The In-degree of a node is equal to the number of edges connecting it to other nodes of the same community and can be calculated as kin i (C) = Pj∈C A(i, j). The out-degree of a node i is equal to the number of connections to the nodes lying outside the community and can be calculated as kout 1. Mod Centrality: Masuda [17] proposed to apply the dynamical importance strategy to the network representing the community structure. Given a community structure of the original network the community weighted network is build. Its nodes are the communities and the weight of a link between two communities is equal to the number of links they share. Then node that maximizes the following quantity are sequentially removed: i (C) = Pj /∈C A(i, j). (2uK − x) X I6=K dkI uI (2) The first factor measures the importance of the module that node k belongs to (i.e. (2uK − x) ≈ 2uK) where, uK represents the eigen vector correspond- ing to Kth community. The second quantity in the equation represents the connectivity of node k to other important modules (i.e., PI6=K dkI uI). On the basis of the modular structure determined for the original network, uI is recalculated and nodes are removed one at a time. If all the modules are isolated, nodes are removed sequentially in the descending order of in-degree, kin i of the nodes. In-degree of all the remaining nodes is recalculated after the removal of each node. This strategy preferentially immunizes globally important nodes having important inter-community links rather than locally important ones such as local hubs (Algorithm 3). This strategy has got several drawbacks. It defines the importance of a node based on eigenvectors of the network. Calculation of eigenvectors is a computationally expensive task. Additionally, the centralities of the remain- ing nodes are re-calculated after the removal of nodes with high centrality. 9 It also needs a coarse global information to which other community nodes are connected. When the communities are isolated after removing all the bridge nodes, it reduces to selecting the nodes only on the basis of higher in-degree. To overcome these drawbacks, we propose a strategy requiring less information, computationally cheaper and as efficient. Algorithm 3 To calculate Mod Centrality Input Graph/Network G(V, E), Community Structure of the network Output A map/dictionary with (node, centralityvalue) pairs Initialize an empty map, M with (node, value) pair format. Build a community weighted network using the community structure as follows: Communities of the original network represent the nodes in the community weighted network. Total number of links between two communities denotes the weight of the link between the corresponding nodes in the weighted network. Build an eigen matrix of the weighted network. for each node k in the graph do Let MC(k) be the mod centrality of node k. Let uK represents the eigen vector corresponding to the community of node k. dkI represents the number of inter-community links that exist between node k and community I. if there are links remaining between any two communities in the network then MC(k) = (2uK) X I6=K dkI uI else MC(k) = dkK i.e. no of intra-connections of node k in its own com- munity end if Add the pair (k, MC(k)) to the map M. end for Return the map M. 2. Proposed Commn Centrality: Commn centrality of a node is the weighted combination of its in-degree and out-degree. This centrality 10 measure takes into account both intra and inter-community links of a node. It marks hubs or bridges as the influential nodes based on the strength of the community structure of the network. Let us consider an example of a network with community structure (Algorithm 4). Algorithm 4 To calculate Commn Centrality Input Graph/Network G(V, E), Community Structure of the network with community list, CL Output A map/dictionary with (node, centrality value) pairs Initialize an empty map, M with (node, value) pair format. for each community C in the list CL do calculate the fraction, µC of outer connections to the total connections in the community. end for for each node i in the graph do Calculate the no of intra-community links of node i, kcin calculate the no of inter-community links of i, kcout i i end for for each community C in the list CL do for each node i in community C do Calculate the Comm Centrality for node i using the equation (refer- ence to comm equation) end for Add the pair (i, CC(i)) to the map M. end for Return the map M. In Fig. 1, it can be seen that node 2 has got many connections with the other nodes in its own community. It can be called as the hub or leader in its own community and thus can be labeled as an influential node. This is the node which will play a major role in spreading any kind of information or epidemics in its community. If this node is removed, there is very little chance of epidemic spreading to other nodes in the community. On the other hand, node 12 has got many connections with the nodes in other communities. It can be called as a bridge node, which connects its community to other communities in the network. Hence, it will also be responsible for information or epidemic propagation to other communities. So, it can be concluded that both community hubs and bridges are influential nodes in a network and play 11 6 8 7 9 4 1 2 5 3 10 12 11 13 Figure 1: Proposed Centrality Measure a key role in epidemic propagation. Hence, a centrality measure is needed which marks those nodes as influential which have got a good balance of inner and outer connections in the community. In other words, it must be successful in finding both the community hubs and bridges. We propose new centrality measure, Commn centrality, defined as follows. Commn centrality for a node i, belonging to community C can be calcu- lated as follows: CC(i) = (1 + µC) ∗   (1 − µC) ∗   max j max j kin i (kin j ∀j ∈ C) kout i (kout j ∀j ∈ C) ∗ R  + ∗ R  2 (3) Here, R is any integer number of choice, to get both in-degree and out- degree values in the same range i.e. [0, R]. As usually, out-degree values of the nodes are very low as compared to their in-degree values. A good choice for the value of R will be maximum in-degree in the community C i.e. max (kin j ∀j ∈ C). j µC is the fraction of outer connections to the total connections in the community C, and can be calculated as follows: kout i /ki Pi∈C size(C) µC = 12 (4) In equation (3), first in-degree and out-degree of the nodes are normalized by the maximum in-degree and out-degree, respectively in the community and brought in the same range. Then the term with out-degree is raised up to power two where as the term with in-degree is not raised. This is done to give more importance to out-degree of the nodes than in-degree while calculating their centrality value. Consider two nodes i and j belonging to the same community. If we have to mark one node as more influential than the other, then there can be three possible cases to consider. • First case, both in-degree and out-degree of one node, say i is larger than the other node j i.e. kin i > kin j and kout i > kout j • Second, in-degree (or out-degree) of node i is equal to that of node j, and out-degree (or indegree) of i is larger than that of j i.e. (kin i = kin j and kout i > kout j ) or (kout i = kout j and kin i > ki1n j ) • Third, indegree of one node, say i is larger than that of other node j, but j has got higher outdegree than node i. i > kin kin j and kout i < kout j In the first two cases, indisputably, node i will be marked as more in- fluential. But, in the third case, we mark node j as more central or influ- ential than node i because of more outer connections of j. The only con- straint is that the in-degree of node j must not be very smaller than that of i. That is, node j must also have comparable number of inner connec- tions. Specifically, as per equation (3), node j is marked more influential if (kin )2), otherwise node i is considered more influen- tial. j ) ≤ ((kout )2 − (kout i − kin j i Also note, in the equation (3), µC and (1 − µC) are assigned as weights to the in-degree and out-degree terms respectively. This is done to adapt to the strength of a particular community. For example, if a community is very cohesive, i.e. there are very less outer connections as compared to total connections. µC value of this community will be low and hence more weight 13 will be given to the out-degree terms to target the rare nodes with outer connections in the community. On the other hand, if a community has a lot of outer connections and accordingly large value of µC, more weight will be given to the in-degree term. Nodes are removed sequentially from each community in the decreasing order of their centrality value in their respective community. Number of nodes to be removed from a community are kept proportional to the com- munity size. Hence, more nodes are removed from larger communities than from the smaller communities. Also note that removing a node can modify the network topology and hence the centrality of the remaining nodes might not be the same. So, the centralities of the remaining nodes are recalculated after removing the node with highest centrality value. 3. Classical epidemic spreading, SIR model Classical SIR model [25, 28] is one of the most investigated epidemic spreading model for complex networks. In this model, nodes are in one of the three compartments —Susceptible (healthy), Infected (those who in- fected with disease and also actively spread it) and Removed (immunized or dead). Susceptible nodes represent the individuals which are not yet in- fected with the disease. Infected nodes are the ones which are infected with the disease and can spread the disease to the susceptible nodes. Removed nodes represent the individuals which are infected and are immunized or died. These nodes are not neither infected again, nor they can transmit the infection to others. The epidemic is propagated through the nodes by pairwise contacts between the infected and susceptible nodes in the net- work. Following the law of mass action, the spreading process evolves with direct contact of the infected nodes with susceptible nodes in the popula- tion. The epidemic spreads from one infected node to another susceptible nodes in a single time step with λ rate, if an undirected edge exists be- tween them. An infected node become removed node if it is immunized/dead with rate σ. Here, S(k, t), I(k, t), R(k, t) are the expected values of suscep- tible, infected and removed nodes in network with degree k at time t. Let S(k,t) = S(k, t)/N(k), I(k,t) = I(k, t)/N(k), R(k,t) = R(k, t)/N(k) be the fraction of susceptible, infected and removed nodes, respectively with degree k at time t. These fractions of the nodes satisfy the normalization condition, S(k,t) + I(k,t) + R(k,t) = 1, where N(k) represents the total number of nodes 14 with degree k, in the network. Above epidemic spreading process can be summarized by the following set of pairwise interactions. λ−→ I1 + I2, S1 + I2 (when infected meets with the susceptible, it makes them infected at rate λ) σ−→ R1, I1 (spontaneously any infected node will become removed node with rate σ The formulation of this model for analyzing complex networks as interact- ing Markov chains. The framework is used to derive from the first-principles, the mean-field equations for the dynamics of epidemic spreading in the uncor- related heterogeneous complex networks (scale free networks) with arbitrary correlations. These are given below. dS(k,t) dt dI(k,t) dt dR(k,t) dt = −kλS(k,t)X l I(l, t)P (lk). = −σI(k,t) + λS(k, t)X l I(l, t)P (lk). = σI(k,t). (5) (6) (7) Where the conditional probability P (lk) is the degree-degree correlation function that is randomly chosen edge emanating from a node of degree k leads to a node of degree l. Here, it is assumed that the degree of nodes in the whole network are uncorrelated. Therefore, degree-degree correlation is P (lk) = lP (l) for uncorrelated complex networks where P (l) is the degree hki distribution and hki is the average degree of the network (the edge will be biased to fall on vertices of high degree, hence the conditional probability P (lk) is proportional to kP (k)). Epidemic spreading model is defined for correlated scale free networks [8]. It is shown that the critical threshold for epidemic spreading is independent of the removing mechanism. It was found that the critical threshold as, λc = hki hk2i . Hence, it implies that epidemic threshold is absent in large size scale free networks (hk2i → ∞, λc → 0). This result is not good for epidemic control, since the epidemics will exist in the real networks for any non zero value of spreading rate λ. 15 4. Synthetic Benchmark Data Generative models allow to produce large variations of synthetic networks easily and quickly. These models provide a control on some topological prop- erties of the generated networks, making it possible to mimic the targeted system features. The only point of concern is the level of realism of the generated networks, which is a prerequisite to obtain relevant test results. To date, the LFR (Lancichinetti, Fortunato and Radicchi) [24] model is the most efficient solution in order to generate synthetic networks with com- munity structure. Consequently, it is used to generate the networks with a non-overlapping community structure. It is based on the configuration model (CM) [29], which generates networks with power law degree distribution. The generative process performs in three steps. First, it uses the configuration model to generate a network with a power-law degree distribution with ex- ponent γ. Second, virtual communities are defined so that their sizes follow a power-law distribution with exponent β. Each node is randomly affected to a community, provided the community size is greater or equal to the node internal degree. Third, an iterative process takes place in order to rewire cer- tain links, such that the proportion of intra-community and inter-community links is changed so that it gets close to the mixing coefficient value µ, while preserving the degree distribution. This model guarantees to obtain real- istic features (power-law distributed degrees and community sizes). It also includes a rich set of parameters which can be tuned to get the desired net- work topology. These parameters are- the mixing parameter µ, the average degree k, the maximum degree kmax, the maximum community size cmax, and the minimum community size cmin. For small µ values, the communities are distinctly separated because they share only a few links, whereas when µ increases, the proportion of inter- community links becomes higher, making community identification a difficult task. The network has no community structure for a limit value of the mixing coefficient given by: µlim > (n − nmax c )/n, (8) where n and nmax community, respectively [30]. c are number of nodes in the network and in the biggest 16 5. Experimental Set-up To investigate the spread of an infectious disease, the classical SIR model of epidemic spreading is used. Initially, all the nodes are treated as suscepti- ble. After this initial set-up, a fraction of nodes are chosen at random to be infected and the remaining nodes are considered to be susceptible (Algorithm 5). Algorithm 5 SIR Algorithm Input:Graph G(V, E), I, λ, σ Output:Total no of nodes infected during the process, T I Select I number of nodes at random to be marked as infected and place them in infected list. Mark all other nodes as susceptible. while infected list is not empty do select one infected node u from the list. for every node v adjacent to u do if v is susceptible then with probability equal to λ: mark v as infected, and add to the infected list. increase T I by one. else with probability equal to σ: mark v as recovered, and remove from the infected list. end if end for end while return T I The infection spreads through the contact network during each time step, where λ is the transmission rate of infection being spread from an infected node to a susceptible node, and I is the number of infected neighboring nodes. Infected nodes removed with rate σ at each time step. After the recovery of a node occurs, its state is toggled from infected to resistant. Simulations are halted if there are no infected nodes left in the network, and the total number of infected nodes is analyzed. This time foe halting is called steady state time. 17 To investigate the efficiency of the proposed strategies, synthetic networks are generated using the LFR algorithm. In order to select appropriate val- ues for the network parameters, we considered several studies of real-world networks. For the power-law exponents, we used γ = 3 and β = 2, which seem to be the most representative values. Concerning the number of nodes and links, no typical values emerge. Studies show that real-world complex networks can have very different sizes, defined on a wide range going from tens to millions of nodes. The average and maximal degrees are also very variable, so it is difficult to characterize them too. As a result, we selected some consensual values for these parameters, while considering also the com- putational aspect of the simulations [31]. The parameters values used for the generation of the LFR networks in this study are given in the Table 1. Table 1: Parameters for the LFR network generation Number of nodes, n Average degree, hki Maximum degree, kmax Mixing parameter, µ 7500 10 180 0.2, 0.3, 0.5 γ β Minimum community size, Cmin Maximum community size, Cmax 3 2 5 180 In order to better understand the influence of the community structure, networks with various µ values (ranging from 0.2 to 0.5) are generated. For each µ value, 10 sample networks are generated. Each simulation is run on these 10 networks and the mean values of the results together with their standard deviation are reported in the Fig. 2. After forming the community structure various immunization strategies are performed on the given network according to the Algorithm 6. The network obtained after applying immunization is used to study the epidemic diffusion by using SIR model. 6. Results and Discussion In the simulations, final population of the removed nodes (R∞) is calcu- lated to study the epidemic outbreak in the given population (network). As, 18 Algorithm 6 Immunization Algorithm Input:Graph G(V, E), Centrality measure(C), No of nodes to immunize(n) Output:Graph with Immunized/Removed Nodes 1. Calculate the centrality of every node in the graph using the measure C. 2. Sort the nodes in decreasing order of their centrality values. 3. Remove top n nodes with highest centrality values from the graph G. 4. Return graph G with immunized/removed nodes. R(k, t) represents the size of removed nodes with degree k at time t. Hence, the final number of removed nodes at t = ∞, time, ∞ is sufficiently large at which epidemic process will be achieved its steady state. At this time no more infected nodes will left. The total number of remove nodes are at t = ∞ Rt = X k R(k, t) R∞ = X k R(k, ∞) (9) The results of the simulations using various available immunization strate- gies (degree, betweenness, acquaintance, CBF, mod) and proposed immu- nization strategies, Commn on LFR generated networks are shown in Fig. 2. Here, recovering rate σ is kept equal to 0.1 and spreading rate, λ is varied with two values, 0.1 and 0.9. The removed fraction of nodes (%) is men- tioned by g. Let us take the case when λ = 0.1 at the left side of the Fig. 2 for all µ values. The global centrality based methods (degree, betweenness) work efficiently in every case. After removing or immunizing only 30% of the nodes and epidemic spreading die. This is expected as both the meth- ods exploit the information about the overall network topology. When the stochastic strategies (Random Acquaintance and CBF ) are used, 50% nodes need to be removed in order to stop the epidemic spreading. This is the price to pay for not knowing the global structure of the network. It is interesting that the proposed community-based centrality measures, Commn and Mod strategies are almost as effective as the global centrality methods despite the fact that they are agnostic about the full network structure. Furthermore, they perform a lot better than the Acquaintance and CBF strategies, with just the information about the community structure of the network. 19 The reason why the proposed Commn centrality based strategy is effec- tive, can be explained by the specific position of the targeted nodes within the network. It takes into account, both the in-degree and out-degree of the nodes. First it tries to remove or immunize the nodes which have more outer connections to other communities. In the equation 3, out-degree of the node is raised up to power two, for this purpose. In a group of people, these are the individuals which pass all the information contained in their group to other groups. These nodes can be considered to be the bridges between the communities. When these nodes are removed, most of the paths or bridges between different communities are lost. Communities are isolated and thus the epidemic is not able to spread across the communities. After removing the nodes with higher out-degrees, nodes are selected which have lot of connections inside their own community. They can be considered as the core points of their community. In a network of people, these individuals are the leaders, representatives or agents of information flow in their com- munities. These high in-degree nodes are connected to many other nodes in their community. Most of the regular nodes in a community are not directly connected to each other. They would be connected to each other through the paths which would most likely contain these high in-degree nodes. These nodes if infected from outside, have a greater chance of infecting the whole community. When these high in-degree nodes are removed from the com- munities, the communities break from inside. In other words, the paths connecting the regular nodes to each other are broken. The remaining nodes are not able to contact each other and thus the epidemic is not able to affect a significant part of community, and it dies soon. The underlying idea in proposing the centrality measure which is sim- ply based on in-degree and out-degree of the nodes is that they intuitively represent the global degree and betweenness centralities at the community level. A node with a high in-degree or out-degree has generally a high overall degree. Indeed, the total degree of a node is the addition of in-degree and out-degree. A node with high in-degree is probably a node with a high be- tweenness measure in its community, as it will be contained in most of the paths connecting the regular nodes to each other in the community. Simi- larly, a node with high out-degree is probably a node with high betweenness measure in the overall network. Indeed, these high out-degree nodes are part of most of the paths connecting the nodes falling in different communities. Fig. 2 {(b), (d), (f)} reports the SIR simulation results for λ = 0.9 and σ = 0.1. The results are very similar except the fact that in this case, a 20 greater g need to be immunized in order to stop the epidemic spreading. This is true for all the strategies. For example, when λ is equal to 0.1, degree and betweenness centrality based methods required only 30% of the nodes to be removed to mitigate the epidemic spreading, whereas now they require 50% of the nodes to be immunized or removed. Indeed, when λ increases, the probability of an infected node to infect its neighbors gets higher. So, the epidemic spread at a higher rate, and thus more nodes are needed to be immunized to prevent the epidemic spreading. The dynamics of the fraction of susceptible (ρs), infected (ρi) and removed (ρr ) nodes (in %) for different values of spreading rate λand removing rate σ are reported in Fig. 3 plots without immunization and with the proposed community based immunization by considering, g = 20% are given for com- parative purposes. The dynamics of of respectively, the fraction of nodes of the total nodes in % for the susceptible (ρs), infected (ρi) and removed (ρr ) for different values of spreading rates, λ and removing rate σ is reported in Fig. 3. In the given Fig. 3, time evolution is plotted without immunization and with proposed community based immunization, Commn, strategy. We also used real-world networks to further validate the results on syn- thetic networks with controlled properties. Statistics of these networks are given in Table 2. Community structures of the networks are discovered us- ing local community detection algorithms [26, 27]. Figs. 4(a)-4(d) show the results of comparison of available and proposed immunization strategies on these real-world networks. Table 2: Statistics of Real-World Networks Dataset Power Grid Network PGP Network Gnutella Network WWW Network Nodes 5,004 10,680 62,586 3,52,729 Edges No. of Communities 6,597 24,316 1,47,892 11,17,563 168 153 171 3060 The first network is the Power grid network [19]. Power grid data set comprises of an undirected, unweighted network representing the topology of the Western States Power Grid of the United States. Numerical results are shown in Fig. 4(a). Proposed Commn centrality performs as well as degree centrality and better than all other centrality measures. 21 The Second example is the social network called Pretty Good Privacy(PGP) network [32]. This is the interaction network of users of the PGP algorithm. A link between two persons denotes the sharing of confidential information using the encryption algorithm on the internet. Results for the network are shown in Fig. 4(b). Here, Mod centrality works a little better than the Commn centrality, but at least both takes around 10% of the nodes needed to be removed from the network in order to lose its giant component. Fig. 4(c) shows the results for the third network, Gnutella peer-to-peer network [33]. This is a network of Gnutella hosts from 2002. The nodes rep- resent Gnutella hosts, and the directed edges represent connections between them. Again, the network is treated as undirected ignoring the direction of edges. For this network, Commn and degree centrality work better, but performance of other centrality measures is also close. Results of various centrality measures on the fourth network, World Wide Web [34] are shown in Fig. 4(d). In this network, each node represents a webpage and a directed link between the nodes shows a hyperlink from a webpage to another. Direction of the links have been ignored. For this network, Commn centrality outperforms other centrality measures. Hence, the proposed centrality measure performs at least as good as the global degree and in some cases, better than betweenness and community- based mod centralities with less information about the network structure and in lesser time. To quantify the dynamical differences in the epidemic spreading process when a fraction of nodes is immunized by using the proposed immunization strategy, time evolution plots are generated. Time evolution plots of, re- spectively, the fraction of the total nodes in % of susceptable, infected and recovered population in the network with immunization and without immu- nization, are displayed in Fig. 3. λ = 0.5 & σ = 0.1 and λ = 1 & σ = 0.1 is considered for the time evolution plots to understand the dynamical differ- ences. The experimental results reveal that, the proposed Commn centrality is effective in identifying the influential nodes to be selected for immunization to prevent or mitigate the epidemic spreading. The proposed measure is as effective as the global degree and betweenness centrality based methods, but do not require any information about the global structure of the network. Community-based centrality and Mod centrality also works as well but they have certain drawbacks as pointed out earlier. We have proposed an alter- native centrality measure which can be employed to find out the influential 22 nodes in networks with community structure. The investigated strategy also performs better than the stochastic strategies, Acquaintance and CBF strate- gies, with only the information about the local (community-wise) structure of the network. This suggests that the local information is sufficient to design an immunization strategy. 7. Conclusions There is no enough information available about the global structure of the underlying relevant contact network in order to control the epidemic spread- ing. Therefore, efficient immunization strategies are required that can work with the information available at the community level. Results of our inves- tigation, on a realistic synthetic benchmark as well as real-world social net- works, show that the community structure plays a major role in the epidemic dynamics. It is observed that the proposed Commn centrality based immu- nization strategy is effective in controlling the epidemic spreading. It works as well as the global centrality measures (degree and betweenness), without any knowledge of the global network structure. This centrality measure defined at the community level is a good approximation of global centrality mea- sures. The in-degree part of the Commn centrality of a node represents its degree and betweenness centralities, relative to its own community, whereas, the out-degree part represents these global centralities relative to the other communities of the network. This strategy is also sensitive to the community structure of the network and hence automatically selects the influential nodes which have got a good balance of inner and outer connections to their com- munity. Hence, this strategy is quite efficient as it generalizes to the networks with varying strength of community structure. Furthermore, unlike global centrality measures, the proposed measures do not require any knowledge of the global network topology and thus can be easily and quickly computed. It also overcomes the drawbacks of the Mod strategy also proposed for net- works with community structure. Furthermore, it performs better than the stochastic strategies, Acquaintance and CBF. Finally, the main lesson of this work is that exploiting the local information on the network topology can be very effective in order to design efficient immunization strategies that can be used in large scale networks. These preliminary results pave the way for more investigations on alternative community topological measures. 23 Acknowledgement The authors thank Mr. Upendra Singh (B.Tech., MANIT Bhopal, India) for implementing the SIR model of epidemics, used in this paper. References References [1] M. Barth´elemy, A. Barrat, R. Pastor-Satorras, A. Vespignani, Velocity and hierarchical spread of epidemic outbreaks in scale-free networks, Physical Review Letters 92 (17) (2004) 178701. [2] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, D.-U. Hwang, Complex networks: Structure and dynamics, Physics reports 424 (4) (2006) 175– 308. [3] K. Gong, M. Tang, P. M. Hui, H. F. Zhang, D. Younghae, Y.-C. Lai, An efficient immunization strategy for community networks, PloS one 8 (12) (2013) e83489. [4] M. E. Halloran, N. M. Ferguson, S. Eubank, I. M. Longini, D. A. Cum- mings, B. Lewis, S. Xu, C. Fraser, A. Vullikanti, T. C. Germann, et al., Modeling targeted layered containment of an influenza pandemic in the united states, Proceedings of the National Academy of Sciences 105 (12) (2008) 4639–4644. [5] R. Pastor-Satorras, A. Vespignani, Epidemic spreading in scale-free net- works, Physical review letters 86 (14) (2001) 3200. [6] A. Singh, Y. N. Singh, Rumor spreading and inoculation of nodes in complex networks, in: Proceedings of the 21st international conference companion on World Wide Web, ACM, 2012, pp. 675–678. [7] A. Singh, Y. N. Singh, Nonlinear spread of rumor and inoculation strate- gies in the nodes with degree dependent tie stregth in complex networks, Acta Physica Polonica B 44 (1) (2013) 5–28. [8] A. Singh, Y. N. Singh, Rumor dynamics with inoculations for corre- lated scale free networks, in: Communications (NCC), 2013 National Conference on, 2013, pp. 1–5. doi:10.1109/NCC.2013.6488047. 24 [9] M. J. Newman, A measure of betweenness centrality based on random walks, Social Networks 27 (1) (2005) 39 – 54. [10] R. Pastor-Satorras, A. Vespignani, Immunization of complex networks, Phys. Rev. E 65 (2002) 036104. [11] R. Cohen, S. Havlin, D. Ben-Avraham, Efficient immunization strategies for computer networks and populations, Physical review letters 91 (24) (2003) 247901. [12] M. Salath´e, J. H. Jones, Dynamics and control of diseases in networks with community structure, PLoS computational biology 6 (4) (2010) e1000736. [13] Y. Wang, Z. Di, Y. Fan, Identifying and characterizing nodes important to community structure using the spectrum of the graph, PloS one 6 (11) (2011) e27418. [14] A. Samukhin, S. Dorogovtsev, J. Mendes, Laplacian spectra of, and random walks on, complex networks: Are scale-free architectures really important?, Physical Review E 77 (3) (2008) 036115. [15] M. Mitrovi´c, B. Tadi´c, Spectral and dynamical properties in classes of sparse networks with mesoscopic inhomogeneities, Physical Review E 80 (2) (2009) 026123. [16] A. Arenas, A. D´ıaz-Guilera, C. J. P´erez-Vicente, Synchronization reveals topological scales in complex networks, Physical review letters 96 (11) (2006) 114102. [17] N. Masuda, Immunization of networks with community structure, New Journal of Physics 11 (12) (2009) 123018. [18] W. O. Kermack, A. G. McKendrick, A contribution to the mathematical theory of epidemics, in: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, Vol. 115, The Royal Society, 1927, pp. 700–721. [19] D. J. Watts, S. H. Strogatz, Collective dynamics of small-worldnetworks, nature 393 (6684) (1998) 440–442. 25 [20] G. Palla, I. Der´enyi, I. Farkas, T. Vicsek, Uncovering the overlapping community structure of complex networks in nature and society, Nature 435 (7043) (2005) 814–818. [21] R. Guimera, M. Sales-Pardo, L. A. N. Amaral, Modularity from fluc- tuations in random graphs and complex networks, Physical Review E 70 (2) (2004) 025101. [22] A. Vespignani, G. Caldarelli, Large scale structure and dynamics of complex networks: From information technology to finance and natural science (2007). [23] A. Clauset, M. E. Newman, C. Moore, Finding community structure in very large networks, Physical review E 70 (6) (2004) 066111. [24] A. Lancichinetti, S. Fortunato, F. Radicchi, Benchmark graphs for test- ing community detection algorithms, Phys. Rev. E 78 (2008) 046110. [25] Y. Moreno, R. Pastor-Satorras, A. Vespignani, Epidemic outbreaks in complex heterogeneous networks, Euro. Phy, J B 26 (4) (2002) 521–529. [26] Q. Chen, M. Fang, An efficient algorithm for community detection in complex networks, in: the 6th Workshop on Social Network Mining and Analysis, 2012. [27] E. L. Martelot, C. Hankin, Fast multi-scale community detection based on local criteria within a multi-threaded algorithm, arXiv preprint arXiv:1301.0955. [28] M. Newman, Spread of epidemic disease on networks, Phys. Rev. E 66 (1) (2002) 016128. [29] M. Molloy, B. Reed, A critical point for random graphs with a given degree sequence, Random structures & algorithms 6 (2-3) (1995) 161– 180. [30] A. Lancichinetti, S. Fortunato, Community detection algorithms: a com- parative analysis, Physical review E 80 (5) (2009) 056117. [31] G. K. Orman, V. Labatut, H. Cherifi, Comparative evaluation of com- munity detection algorithms: a topological approach, Journal of Statis- tical Mechanics: Theory and Experiment 2012 (08) (2012) P08001. 26 [32] M. Bogu, R. Pastor-Satorras, A. Daz-Guilera, A. Arenas, Models of social networks based on social distance attachment, Phys. Rev. E 70 (5) (2004) 056122. [33] M. Ripeanu, I. Foster, A. Iamnitchi, Mapping the Gnutella network: Properties of large-scale peer-to-peer systems and implications for sys- tem design, IEEE Internet Computing J. 6. [34] R. Albert, H. Jeong, A.-L. Barab´asi, Internet: Diameter of the world- wide web, Nature 401 (6749) (1999) 130–131. 27 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 Degree Betweenness Acq CBF Mod Comm 20 40 g 60 80 100 (a) µ=0.2, λ=0.1 Degree Betweenness Acq CBF Mod Comm 20 40 g 60 80 100 (c) µ=0.3, λ=0.1 Degree Betweenness Acq CBF Mod Comm 20 40 g 60 80 100 (e) µ=0.5, λ=0.1 28 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 8000 7000 6000 5000 ∞ R 4000 3000 2000 1000 0 0 Degree Betweenness Acq CBF Mod Comm 20 40 g 60 80 100 (b) µ=0.2, λ=0.9 Degree Betweenness Acq CBF Mod Comm 20 40 60 g 80 100 (d) µ=0.3, λ=0.9 Degree Betweenness Acq CBF Mod Comm 20 40 g 60 80 100 (f) µ=0.5, λ=0.9 Figure 2: Effect of various immunization strategies on the total number of infected nodes during the SIR simulation on LFR network with σ = 0.1 Without Immunization After Immunization 100 90 80 70 s ρ 60 Without Immunization After Immunization 10 20 t 30 40 (b) λ = 0.5 and σ = 0.1 Without Immunization After Immunization 10 20 t 30 40 (d) λ = 0.5 and σ = 0.1 Without Immunization After Immunization 20 t 30 40 s ρ i ρ r ρ 100 80 60 40 20 0 0 50 40 30 20 10 0 0 100 80 60 40 20 0 0 t 10 20 30 40 50 (a) λ = 1 and σ = 0.1 Without Immunization After Immunization i ρ 10 20 t 30 40 50 (c) λ = 1 and σ = 0.1 r ρ Without Immunization After Immunization 50 40 30 20 0 35 30 25 20 15 10 5 0 0 80 70 60 50 40 30 20 10 10 20 t 30 40 50 0 0 10 (e) λ = 1 and σ = 0.1 29 (f)λ = 0.5 and σ = 0.1 Figure 3: Dynamical diffusion over the network against time, t. Fraction of the susceptible, infected and removed nodes (%) in the population respectively, ρs, ρi and ρr nodes without immunization and with immunization (20%) strategy for different values of λ and σ 5000 4000 3000 2000 1000 t n e n o p m o C d e t c e n n o C t s e g r a L 0 0 5 6 5 4 3 2 1 t n e n o p m o C d e t c e n n o C t s e g r a L 0 0 Degree Betweenness Acq CBF Mod Comm 20 25 10 15 5 30 Fraction of nodes removed (%) (b) PGP network Degree Betweenness Acq CBF Mod Comm 35 35 10 15 20 25 30 Fraction of nodes removed (%) (a) Power Grid Network x 104 Degree Betweenness Acq CBF Mod Comm 35 Degree Betweenness Acq CBF Mod Comm 10000 8000 6000 4000 2000 t n e n o p m o C d e t c e n n o C t s e g r a L 0 0 x 105 3 2.5 2 1.5 1 0.5 t n e n o p m o C d e t c e n n o C t s e g r a L 10 15 20 25 30 5 Fraction of nodes removed (%) (c) Gnutella network 35 0 0 5 10 15 20 25 30 Fraction of nodes removed (%) (d) WWW network Figure 4: Size of Largest Connected Component against the various centrality measures (a) Power Grid Network (b) PGP Network (c) Gnutella Network (d) WWW Network 30
1807.03505
1
1807
2018-07-10T07:48:33
Automatic Rumor Detection on Microblogs: A Survey
[ "cs.SI" ]
The ever-increasing amount of multimedia content on modern social media platforms are valuable in many applications. While the openness and convenience features of social media also foster many rumors online. Without verification, these rumors would reach thousands of users immediately and cause serious damages. Many efforts have been taken to defeat online rumors automatically by mining the rich content provided on the open network with machine learning techniques. Most rumor detection methods can be categorized in three paradigms: the hand-crafted features based classification approaches, the propagation-based approaches and the neural networks approaches. In this survey, we introduce a formal definition of rumor in comparison with other definitions used in literatures. We summary the studies of automatic rumor detection so far and present details in three paradigms of rumor detection. We also give an introduction on existing datasets for rumor detection which would benefit following researches in this area. We give our suggestions for future rumors detection on microblogs as a conclusion.
cs.SI
cs
Automatic Rumor Detection on Microblogs: A Survey Juan Cao, Junbo Guo, Xirong Li, Zhiwei Jin, Han Guo, and Jintao Li 1 8 1 0 2 l u J 0 1 ] I S . s c [ 1 v 5 0 5 3 0 . 7 0 8 1 : v i X r a ! Abstract-The ever-increasing amount of multimedia content on mod- ern social media platforms are valuable in many applications. While the openness and convenience features of social media also foster many rumors online. Without verification, these rumors would reach thousands of users immediately and cause serious damages. Many efforts have been taken to defeat online rumors automatically by mining the rich content provided on the open network with machine learn- ing techniques. Most rumor detection methods can be categorized in three paradigms: the hand-crafted features based classification ap- proaches, the propagation-based approaches and the neural networks approaches. In this survey, we introduce a formal definition of rumor in comparison with other definitions used in literatures. We summary the studies of automatic rumor detection so far and present details in three paradigms of rumor detection. We also give an introduction on existing datasets for rumor detection which would benefit following researches in this area. We give our suggestions for future rumors detection on microblogs as a conclusion. Index Terms-rumor detection, fake news detection, microblogs, social media. media during the election [4]. These rumors reached millions of voters via social network promptly and potentially influenced the election. • On April 23rd 2013, the official Twitter account of Associated Press was hacked to sent out a tweet claiming two explosions happened in the White House and the president got injured. Even though this rumor was quickly debunked, it still spread to millions of users and caused severe social panic, resulting in a dramatic crash of the stock market immediately [5]. In March 2014, promptly after the emergency event "Malaysia Airlines Flight MH370 Lost Contact", 92 different rumor stories were spread widely on Sina Weibo, the primary microblog service in China [6]. These rumors blocked people from knowing the real situation of the event and damaged the feelings of family members related to the missing passengers on the plane. • 1 INTRODUCTION The explosive development of contemporary social media platforms has witnessed their key role for reporting and propagating news in the modern society. According to a recent study from Pew Research, 62 percent of people re- ceive news from social media, with 18 percent doing so very often [1]. Social media users not only read news but also propagate and even produce immediate news on the social network. With millions of people serving as "news sensors", news on social media is valuable for opinion mining and decision making. However, the convenience of publishing news also fosters the emergence of various rumors. According to a report in China [2], over one third of trending events on microblogs contain fake information. The widespread of rumors can pose a threat to the internet credibility and cause serious consequences in real life [3]. Followings are some examples showing rumors that cause damages to political events, economy and social stability. • During the 2016 U.S. presidential election, candidates and their supporters were actively involved on Face- book and Twitter to do campaigns and express their opinions. However, as many as 529 different rumor stories pertaining to presidential candidates Donald Trump and Hillary Clinton were spreading on social Rumors on social media have become a serious con- cern recently, especially when people are aware of their capabilities to influence the society. Commercial giants, government authorities and researchers are all taking great efforts in defeating the negative impacts of rumors. Figure 1 showcases anti-rumor designs in three major platforms including Facebook, Twitter and Weibo. Facebook labels fake news stories with the help of users and outside fact checkers (Figure 1(a)). Users alert the platform to possible rumors, which will be sent by the platform to fact-checking organizations such as AP, FactCheck.org and Snopes.com for verification. Verified fake story will be publicly flagged as disputed by a 3rd party fact-checkers whenever it appears on the social network. Users will get another warning if they insist on sharing verified fake stories [7]. Twitter employs a semi-automatic strategy combining automatic evaluation and crowd-sourcing annotation to flag possible fake tweets (Figure 1(b)). Each tweet is assigned with a credibility rating automatically generated by an algorithm [8]. Users are allowed to give their feedback if they disagree with the rating. On Weibo, users are encouraged to report possible fake tweets. These tweets are passed to a commit composed of elite users to scrutinize and judge them (Figure 1(c)). Verified fake tweets will be labeled. The above methods depend on social media users or human experts to detect rumors. Moreover, these methods mostly focus on defeating This work has been submitted to the IEEE for possible publication. Copyright may betransferred without notice, after which this version may no longer be accessible. 2 users. The low-quality labels will directly jeopardize the identification of rumors and fail to meet the qualification of accurate rumor detection. Due to the above challenges, most existing applications aim at simultaneously exploring humans and computers for rumor detection. In comparison with pure manual labeling, they are able to provide better results with high efficiency because labor cost is reduced, as users may not need to label all the data. Automatic rumor detection on social media faces many challenges, as the social multimedia data is numerous and ever-increasing. What's more, the non-structural, in- complete and noisy nature of online data makes it very challenging to process and understand. We summarize the challenges as follows. 1) Semantics understanding. Most rumors are deliber- ately fabricated to misleading the public. Fake infor- mation is mixed and disguised in a rumor story. It is very difficult for machine to completely understand such semantics. 2) Huge variations. Rumors can cover all kinds of topics and take various language styles. Features effective to distinguish certain type of rumors may work poorly on other types. Algorithms trained on limited labeled data would probably fail on unseen new rumors. 3) Multimodal data. Rumors on social media often take the form of images or videos, apart from pure texts. Although information in different modalities can provide clues for rumor detection, how to extract prominent features from each modality and effec- tively fuse them together is challenging. 4) Heterogeneous propagation structure. During the diffusion of rumors on the social network, users can discuss and make comments. The users' behaviors help to construct an underlying social context for rumors. Characterizing these behaviors on the prop- agation network is crucial to identify rumors online. Facing these challenges, good efforts have been made to attack the automatic rumor detection problem from different angles, as visualized in Fig. 2. Most approaches formulate the automatic rumor detection as a two-class classification task. We divide these approaches into three categories: handcrafted features based approaches, propagation-based approaches and neural networks approaches. 1) Category I: handcrafted features based approaches. The traditional methods apply hand-crafted fea- tures to describe the distribution of rumors in high dimensional space and the separating hyperplane will be learned by classifiers [11]–[16]. These studies extract features from the textual and visual content of rumors. To avoid the variations in content se- mantics, some social context features are also pro- posed to capture the characteristics of rumors, so the feature engineering becomes a fatal step before classification. However, as some rumors lack of some crucial features, these methods often lead to unstable and unreliable results. (a) Fackebook (b) Twitter (c) Weibo Fig. 1. An illustration of rumor combating strategies in three major social media platforms: (a) Facebook, (b) Twitter, and (c) Weibo. rumors during their propagation process on social media, rather than detecting emerging rumors at an early stage. Although manual rumor annotation of large-scale social media data becomes feasible, manual labeling encounters the following challenges: 1) Intensive labor and cost of time [9]. Even with a good motivation, users may be frustrated by the in- tensive labor and cost of naive manual interactions to label rumors. Heavy labor and cost of time are obstacles for manually labeling of large-scale online data. 2) Label quality. Unlike common human interactive annotations such as tagging pictures on image shar- ing websites [10], identifying a fresh rumor involves much more domain knowledge and elaborative ex- amination. It is nontrivial for an journalism expert to fact-check a news story, let alone nonprofessional 3 Fig. 2. Paradigms for automatic rumor detection. 2) Category II: propagation based approaches. To uti- lize the heterogeneous structure of social network, Graph-based optimization methods link messages and users into a whole network and evaluate their credibilities as a whole [17] [6] [18]. The category of a unclassified text can be obtained when the network is convergent. However, it is obviously to see that these work ignore the textual information represented by rumors. 3) Category III: neural network approaches. More re- cently, deep neural networks are proposed to learn and fuse multi-modal features automatically for ru- mor detection [9], [19]–[23]. By modeling text data as time-series, either recurrent neural network or convolutional neural network can learn the latent textual representation and improve the accuracy of classification. Compared to the work that leverage traditional classifiers, these work can significantly improve the performance. Several survey papers exist. Zubiaga et al. propose an overview of how to develop a rumor detection system, which consists of four steps: rumor detection, rumor track- ing, rumor stance classification, and rumor veracity classifi- cation [24]. As their work pays less attention on analyzing the feature engineering step and neural network based algorithms, which can not summarize and compare different methods from the perspective of algorithms. Boididou et al. empirically compare three methods on a dataset collected form Twitter [25], without considering the development of rumor detection on Weibo, which ignore some prominent re- searches [6], [12], [16]. To sum up, the previous lacks of com- prehensive analysis for detection algorithms and ignores the development of neural network on rumor detection, which motivates our work. Most rumor detection methods can be modeled as a two-step work, consisting of feature selection and binary classification. Depending on the difference in selecting features and machine learning algorithms among the present researches, we aim to provide a comprehen- sive introduction for existing rumor detection algorithms. Specifically, we categorize the methods described in over 50 papers into three paradigms: hand-crafted feature based methods, propagation based methods and neural network based methods. We analyze the advantages and weakness of each paradigm as well. Such an analysis helps to point out the application context for each algorithm. The rest of the article is organized as follows. In Section 2, we introduce the formal detection of rumor detection. We then introduce the work on the classification-based approaches for rumor detection in Section 3. We give our a detailed introduction of categories of prominent features extracted for rumor detection models followed by classi- fication methods integrating these features for the rumor detection task in this section. Two types of state-of-the- art rumor detection models, propagation-based models and deep neural networks models are then introduced in section 4 and 5, respectively. In Section 6, we discuss the dataset sta- tus for the research of rumor detection. Finally, we conclude the paper and discuss future research directions in Section 7. 2 DEFINITIONS The definition of a rumor varies over publications. In [26], for instance, DiFonzo et al. define rumor as a story or statement in general circulation without confirmation or Text Image User Event Feature Extraction Textual Visual Context Classification rumor non-rumor Message Network Construction Credibility Propagation Neural Networks Paradigm One: Hand-Crafted Features based Approaches Paradigm Two: Propagation-based Approaches Paradigm Three: Neural Networks Approaches rumor non-rumor certainty to facts. While in [27], a story or a statement whose truth value id unverified or deliberately false is considered as rumor. The lack of consistency in this fundamental con- cept makes a head-to-head comparison between existing methods difficult. In this section, we first introduce three typical rumor definitions used in the literature. We then give a formal definition of the rumor detection problem, which allows us to interpret existing methods in a unified framework. We give an objective definition for rumors discussed in this survey as follows: Definition: Objective Rumor This definition of rumor is strictly equivalent to verified fake information. Once a statement is confirmed to have false or fabricated content by authoritative sources, it is labeled as a rumor. This kind of rumor is also referred as "false rumor" [15] or "fake news" [6] [18] [20]. Besides objective rumors, there also exist alternative def- initions such as general rumors and subjective rumors, see Fig. 3. A traditional definition of rumor is derived from the social psychology [27]. That is, a rumor is an unconfirmed statement that widely spread and the truth value of which is unverified or deliberately false. Under this definition, the general rumor is deemed as a piece of information, the veracity of which has not been verified. Unverified rumors refer to information without official confirmation from authoritative or credible sources, e.g. authoritative news agencies or witnesses on site. Another definition for rumor is from the subjective judgment of users [11], [13], [17]. An analogy of this definition is that the sentiment polarity of a statement is often defined based on people's subjective feelings. Different definitions are better adopted in different sce- narios. General rumors are often used in monitoring public opinions towards controversial stories on social media [28]. General rumors may be gossips of celebrities or a campaign strategy to slander political opponents [4], which attract people to spread the story rather than finding out its ve- racity. Some research [2] also suggests to use this definition to filter out unrelated posts and then classify the veracity of remained general rumors. Subjective rumors can be used to understand users' behavior. Based on this definition, Morris et al. [29] study what kinds of messages are more likely to get the trust of the public on Twitter. Rumors with objective confirmation is widely used for automatic rumor detection [9], [12], [21], [30], methods for detecting verified rumors aim to detect false information at the early stage and thus prevent the hazard of rumors on social media. Given our focus on detecting the veracity of a statement, we adopt the objective definition of rumors throughout the paper. A news story e is defined as a set of n pieces of related messages M = {m1, m2, ..., mn}. For each messages mi, it is comprised of a tuple of attributes representing the text, images, videos and other content it contains. Each message mi is also associated with a user ui who posted it. The user ui is represented with a set of attributes, including name, age, register time and avatar images, etc. The rumor detection task is then defined as follows: Definition: Rumor Detection: Given a news story e with its message set M and user set U, the rumor detection task aim to determine whether this story can be confirmed as 4 Fig. 3. Three definitions of rumors and their relationships true or false, i.e to learn a prediction function F (e) → {0, 1} satisfying: (cid:26) 1, if e is conf irmed as f alse F (e) = (1) 0, otherwise The definition formulates the rumor detection as a verac- ity classification task aiming to determine whether a given story on social media is confirmed as true or false. It reveals two main challenges in rumor detection: 1) the understand- ing of contents and social context associating with the story and 2) the constructing of effective detection algorithms. As illustrated in Figure 2, three paradigms are proposed focusing on extracting effective features representing rumor content or robust prediction algorithms. We summary these methods in the following three sections. AP- BASED FEATURES 3 HAND-CRAFTED PROACHES The basic definition of rumor detection is a binary classi- fication problem. Most literatures on this task follows the commonly used learning paradigms of supervised classi- fication from the machine learning area: 1) extracting fea- tures representing samples from both classes; 2) training an appropriate classifier with provided samples; 3) testing and evaluating on unseen data. The first key step of these procedures is how to extract prominent features. Moreover, contents are not independent and from different modalities. The classification method should be capable of integrating and interpreting these features for robust rumor detection. In this section, we first give a review of all kinds of features used in the rumor detection literatures. We then introduce typical classifiers applied for rumor detection. In the scope of social media, a news story e contains rich multi-modal resources as its content and associated with certain social context during its spreading, as shown in Figure 4. Features come from two main aspects of a story: its content and its social context, see Figure 5. The content of a news story contains plenty of infor- mation, so we define content features are those features extracted from the text and image. The social context reflects the relationship among different users and describe the propagating process of a rumor, so we define social context features are those features extracted from the user behavior and the propagation network. Two types of features are going to be detailed in Section 3.1 and 3.2, respectively. Subjective RumorsThetruthvalueisdeterminedbythesubjectivejudgementofusersGeneral RumorsThe truth value is unverifiedObjective RumorsThetruthvalueisconfirmedbyauthoritativesources 5 et al. propose features that describe the fraction of tweets containing the first person pronoun [13]. Yang et al. focus on whether the message includes a URL pointing to an external source. According to the study by Zhao et al. [2], the informative part of rumor messages can be of the following two types: inquiries of the event situation (verification / confirmation questions) and corrections / disputes of the event. They de- tect the inquiry and correction patterns of rumor messages through supervised feature selection on a set of labeled mes- sages. Specifically, the uni-grams, bi-grams, and tri-grams lexical parts are extracted from these messages after stan- dard word segmentation. Frequency features (tf) of each ex- tracted word or phrase are then calculated. Following that, Chi-Squared test and information gain ratio method are utilized to select prominent patterns. The feature selection methods rank features based on their ability to distinguish rumor tweets from non-rumor ones. From the ranked list of features, human experts select event-independent phrases as final lexical patterns for rumors. Finally, the lexical word patterns are discovered, including verification patterns ( "is it real/fake?", "need more evidence/confirmation", etc.) and correction patterns ( "rumor/false rumor", "spreading/ fab- ricating rumor", etc.). Once discovered these lexical features can be used to filter out rumors in real time, such as detect rumors in live tweet streams [2] [31] or analyzing online rumors at a large scale [4]. Lexical words expressing specific semantics or senti- ments are also very important clues to characterize the text. In [11], emotional marks( question mark and exclamation mark) and emotion icons are counted as textual features. In [13], many sentimental lexical features are proposed based on sentiment dictionary. Specifically, they utilize a sentiment tool called the Linguistic Inquiry and Word Count (LIWC) to count words in psychologically meaningful cat- egories. For each input text, this tool provides sentiment analysis results on five major categories and a number of subcategories, such as social, affective, cognitive, perceptual, and biological processes. After comparative study of these features, they find that some categories of sentiments are distinctive features for rumor detection, including positive affect words, cognitive action words and tentative action words. Syntactic features represent rumors at the sentence level. The basic syntactic features are simple statistics of a rumor message, such as the number of keywords, the sen- timent score or polarity of the sentence [11] and part-of- speech tagging [32]. To represent a document based on the words it contains, the bag-of-words (BoW) language model is commonly uti- lized. In this model, each text document is represented as a v-dimensional vector, where v is the size of the dictionary of the corpus. Each element in the vector stands for the TF-IDF score of the corresponding word in the text. TF is the term frequency. IDF score is the inverse document frequency, which is calculated on the whole corpus. Some work utilized BoW for rumor detection [33] or rumor analysis [4]. Recently, semantic embedding algorithms are widely used in many natural language understanding applications. The Word2Vec model [34] represents each word in a corpus with a real-valued vector in a common semantic vector Fig. 4. An example message on Weibo with some of its key features and contents marked. 3.1 Content Features For a news story e, the message set M describes all the key information of it, which has content from three aspects: • • Textual content: a text describing the news event. They provide details of the event and may contain certain opinions or sentiments towards the story. Images/Videos: sometimes a message will provide visual material to support its story. • Other content: the specific communication style of social media would provide other informative con- tent, such as hashtag topics(#), user references(@), links to outer sources, and emoj icons, etc. Various content features are extracted from above primi- tive content, which can be categorized into two main types: textual features and visual features. 3.1.1 Textual Features Compared with non-rumors, rumor texts are fabricated to mislead the public. Aiming to arouse much attention and stimulate the public mood, rumor texts tend to have certain patterns in contrast to non-rumor ones. For example, after analyzing a large amount of tweet streams, Zhao et al. [2] discover two types of language patterns in rumors: the correction type and the enquiry type. Thus, it is possible to extract features from the textual content, which can characterize rumors. From different levels granularity of the language struc- ture, various textual features are extracted to represent a rumor from the aspects of words, sentences, messages, topics and events. General textual features are derived from the linguistics of a text, which are widely used in many natural language understanding tasks. Three categories of general textual fea- tures are commonly used: lexical features, syntactic features, and topic features. Lexical features are features extracted at the word-level of a rumor, which could be statistics of words, lexical rumor patterns or sentimental lexicons. Castillo et al. compute some statistics of rumor texts based on the words it contains, including the total number of words and characters, the number of distinctive words and the average length of word in a rumor, etc [11]. Apart from simple statistical features, some work extract inter- esting lexical words by examining their semantics. Kwon uimi 6 during Hurricane Sandy. Some interesting conclusions are drawn: the original fake images are limited, and 86% of fake images were re-tweets. These findings could be utilized to design prominent visual features for rumor detection. However, their work is mainly based on traditional textual features. Aiming to automatically predict whether a tweet that shares multimedia content is fake or real, Boididou et al. [38] proposed the Verifying Multimedia Use task that took place as part of the MediaEval benchmark in 2015 and 2016. This task attracts attentions for verifying images in tweets from the research area. Visual features are features characterizing the visual content(images or videos) from different aspects. Regarding the methods of feature extraction, visual features can be categorized into three types: visual statistical features, visual content features, and visual embedding features. Visual statistical features are statistics of images at- tached in rumors. Similar to the statistical features of tex- tual content, some basic statistics of images proved to be distinctive in separating rumors and non-rumors. Gupta et al. [17] define a feature to record whether the user has a profile image for evaluating the credibility of user. A "has multimedia" feature is defined in [15] to record the status of multimedia attachment of a tweet: whether the tweet has any picture, video or audio attached. In [14], the authors point out that the rumors are more likely to contain outdated images. They propose a time span feature to capture this time delay. In [36], the relation of images and health related rumors were studied. The Baidu search engine is deployed to find the original image for calculating this time span between the original image and the current one. According to their results, this feature is quite effective. However, the sparsity of outdated images and the difficul- ties to search them limit the usage of this feature. Summarizing existing statistical features and proposing several novel features, seven visual statistical features are presented in [30] from three aspects: • Count: Users can post zero, one or more than one images along with a text content in a tweet. To mark the occurrence of images in rumor messages, they count the total images in a rumor event and the ratio of messages containing at least one or more than one images. • Popularity: Some images are very popular and gain more re-tweets and comments than others in an event. The ratio of the most popular images are calculated to denote this feature. Image type: Some images have particular type in resolution or style. For example, long images are images with a very large length-to-width ratio. The ratio of these types of images is also counted as a statistical feature. • Visual content features are extracted to describe image distributions from a visual perspective, such as visual clar- ity, diversity and coherence. In [30], the authors find that images in rumors and non- rumors are visually distinctive on their distributions. To describe image distributions based on the visual content, five image visual features are proposed in their work: visual Fig. 5. Main categories of features used for rumor detection on mi- croblogs. space. This algorithm models words based on their semantic analogies. Inspired by its success, some recent rumor de- tection applications [33] [4] also represent texts via word embedding. Topic features are extracted from the level at the mes- sage set, which aim to understand messages and their underlying relations within a corpus. Wu et al. [15] define a set of topic features to summaries semantics for detecting rumors on Weibo. They train a La- tent Dirichlet Allocation (LDA) [35] model with an 18-topic distribution on all messages. And each message can belong to one or more topics. They transform the 18-dimensional distribution vector into binary vector by setting the top k- highest probability topics to 1 and the rest of topics to 0. The size of k is selected based on the coverage of remained topics. Jin et al. [16] cluster topics based the event a message refers to and extract features both at the message level and the topic level. They assume that messages under a same topic probably have similar credibility values. Under this assumption, they cluster messages into different topics and obtain the topic-level feature by aggregating features on the message level. They claim that this kind of topic- level feature can reduces the impact of noisy data while maintaining most of details on the message level. Towards a more comprehensive understanding of text on social media, existing work also come up with textual features derived from the traits of social media platform, apart from general textual features. For example, features extracted from outer source links [36]. 3.1.2 Visual features While most work detects rumors depend on textual content, only some very recent work try to extract features from the visual content of rumors. Gupta et al. [37] make a first attempt to understand the temporal, social reputation and influence patterns for the spreading of fake images on Twitter. They propose a classification model to identify the fake images on Twitter Features for Rumor Detection Content Features Textual Features Lexical Features Syntactic Features Topic Features Visual Features Visual Statistical Features Visual Content Features Social Context Features User Features Individual Features Group Features Propagation Features Temporal Features clarity score, visual coherence score, visual similarity distri- bution histogram, visual diversity score, and visual cluster- ing score, which describe image distribution characteristics from different visual aspects. • Visual Clarity Score measures the distribution dif- ference between two image sets: one is the image set in a certain news event (event set) and the other is the image set containing images from all events (collection set) [39]. This feature is designed under the assumption that a non-rumor event would con- tain many original images specifically related to this event, which have a different image distribution in comparison with the overall image set. The clarity score is defined as the Kullback-Leibler divergence [40] between two language models rep- resenting the target image set and all image set, re- spectively. The bag-of-word image representation is employed to define language models for images. To be specific, local descriptors (e.g. the scale-invariant feature transform (SIFT) [41] feature) for each im- age are extracted and then quantized to form a visual word vocabulary. Each image is represented by words from the vocabulary. • Visual Coherence Score measures how coherent im- ages in a certain news event are [42] [43]. This fea- ture is computed based on visual similarity among images and can reflect relevant relations of images in news events quantitatively. More specifically, the av- erage of similarity scores between every two images is computed as the coherence score. In implementa- tion, the similarity between image pairs is calculated based on their GIST feature representations [44]. • Visual Similarity Distribution Histogram describes inter-image similarity in a fine granularity level. It evaluates image distribution with a set of values by quantifying the similarity matrix of each image pair in an event [43]. The visual similarity matrix is obtained by calculating pairwise image similarity in an event. The visual similarity is also computed based on their GIST feature representations. The image similarity matrix is then quantified into an H-bin histogram by mapping each element in the matrix into its corresponding bin, which results in a feature vector of H dimensions representing the similarity relations among images. • Visual Diversity Score measures the visual differ- ence of the image distribution. Compared with visual coherence score, it computes the image diversity distribution directly and gives more emphasis on representative images. The diversity of an image is defined as its minimal difference with the images ranking before it in the whole image set [45]. Here images are ranked accord- ing to their popularity on social media, based on the assumption that popular images would have better representation for the news event. The visual diver- sity score is then calculated as a weighted average of dissimilarity over all images, where top-ranked images have larger weights [46]. So that this feature can reduce the impact of unpopular noisy images. 7 Dissimilarity of an image pair is computed as the complementary of its similarity. • Visual Clustering Score evaluates the image distri- bution from a clustering perspective. It is defined as the number of clusters formed by all images in a news event. To cluster images, the hierarchical agglomerative clustering (HAC) algorithm [47] is employed, which merges nearest atomic clusters into larger clusters in a bottom-up strategy. HAC does not require the num- ber of clusters to be determined or estimated before clustering. Thus, the number of clusters yielded by HAC reveals the diversity feature of images. In implementation, the single-link strategy is used to measure the similarity between two clusters, and the Euclidean distance of image GIST feature vectors is used as the distance measurement. Very small clus- ters are considered as outliers and removed before calculating the final score [30]. Evaluation of these visual content features on a set of 25,513 images from 146 events shows that images in rumors are more coherentm less diverse and forming less clusters compared with those in non-rumors. Consequently, these feature can be useful for detecting rumor events. 3.2 Social context features One of the key features of social media is the openness for all kinds of interactions, in comparison with traditional media. Three types of social interactions universally exit on social media: • Interactions among users, such as "adding friend" and "following". This kind of interaction forms the huge and complex underlying network where all information circulates. • Links among multimedia content are formed through tags, hashtag topics or url links. Online con- tents are organized into sub-groups with this kind of links. Interactions among users and content, such as "post- ing","commenting", "reposting", and "tagging". • Many features are derived from the social connection characteristic of social media on the rumor detection task. Three main types of social features are user feature, propa- gation features and temporal features. User features are derived from the user social network. Rumors are created by a few users and spread by many users. Analyzing their characteristics could provide crucial clues for rumor detection. User features could describe the characteristics of a single user or a user group comprised of multiple related users. • Individual features are extracted from single user. Common individual features are calculated from a user's profile, such as "register time", "age", "gen- der"and "occupation" [29], or user's online actions, such as "number of followers", "number of fol- lowees" and "number of posted messages" [11]. Yang et al. [12] proposed two features to mark the user's posting behavior: the "client" feature is the software that was used by the user and the "location" feature marks whether the message is sent from from where the event happened or not. Liu et al. [48] evaluated a user's reliability from the perspective of journalists and proposed user features including the credibility identification, diversity and location of a source user. • Group features are overall features of a group whose members have certain similar behaviors in the rumor diffusion process [12]. Group features can be gen- erated by aggregating features of single user, such as "the ratio of verified users" and "the average followee count". Propagation features are derived from the fusion net- work on which rumors spread. In [11], some statistics of messages' propagation trees, such as the average depth or size of propagation trees, were proposed to capture basic propagation features. The work of Kwon et al. [13] further extended them with 15 structural features extracted from the diffusion network as well as the user friendship network, including the number of nodes and links, the median degree and density of these networks. Wu et al. [15] proposed a concise structure to describe the propagation process for a single message. Yang et al. [49] proposed a set of net- work features based on network created via the comment providers. In [50], certain propagation structures are studied to find the distinctive patterns for rumor detection. Temporal features mark the import time points or the life circle pattern about the diffusion of rumors. In [13] message spikes along the time line are modeled to capture the spreading patterns of rumors. Ma et al. [51] proposed a method for discretizing time stream and capturing the variation of time features. Giasemidis et al. [52] split every rumor events into 20 time-intervals and extract features for each subset of messages. Kwon et al. studied the stability of features over time [53]. They found that for rumor detection linguistic and user features are suitable for early stage, while structural and temporal features tend to have good performance in the long-term stage. 3.3 Classification Methods With sufficient features available, many classification meth- ods are proposed in literatures focusing on finding effective features for the rumor detection task. Most work experimented with more than one classifiers to find the most suitable method, including Decision Tree [11] [51] [52], Bayesian networks [11], Random Forest [13] [30], Logistic Regression [52] [36] and SVM [11] [13] [12] [30] [51]. Some work proposed novel classification algorithms for better aggregating diverse features. Wu et al. [15] proposed an SVM with a hybrid kernel technique consisting of ran- dom walk kernel [54] and an RBF kernel [55]. The random walk kernel is specifically designed to capture propagation features from the comments tree of a message, while the RBF kernel is applied on content and user features. A two-level classification framework was proposed in [16] to leverage features at the message-level and topic-level. Regarding 8 rumors as anomalies, Chen et al. [56] initially used anomaly detection to classify rumors. 4 PROPAGATION-BASED APPROACHES Hand-crafted features based approaches evaluate each mes- sage and event individually. However, some underlying correlations exist among messages and events on social media. One simple observation is that similar messages tend to have the same veracity polarity in an event. The propagation-based approaches are proposed by mining re- lations among entities and evaluate the credibility of mes- sages and events as a whole. As illustrated in Figure 2, the paradigm of propagation-based rumor detection commonly has two main steps [17] [6] [18]: 1) Constructing a credibility network. Entities in- volved in rumor detection, such as messages, users, topics or events, are defined as nodes in the net- work. Each node has an initial credibility value to indicate its confidence of truthfulness. Links among these entities are defined and computed based on their semantic relation or interaction relation on social media. 2) Credibility propagation. Under some assumptions of node consistency and network smoothness, cred- ibility values are propagated on the constructed network along weighted links until converge, which yields the final credibility evaluation for each entity. This credibility propagation paradigm is inspired by the work on truth discovery, which aims to find the truth with conflicting information [57]. The propagation problem is formed as semi-supervised graph learning task [58] [59] [60]. Compared with direct classification on individual entity, propagation-based approaches can leverage the inter-entity relations and achieve robust results. We give a survey of three typical implementations of propagation-based rumor detection approaches, namely user-message-event network, hierarchical content network and conflicting viewpoints net- work. 4.1 User-Message-Event Network Gupta et al. [17] first introduced the propagation method . They constructed a network consists of users, messages and events under two intuitions: • Credible users do not offer credibility to rumor events in general. • Links between credible messages have larger weights than those for rumor messages, as messages in an rumor event don't make coherent claims. 4.1.1 Network structure As illustrated in Figure 6(a), the structure of this network is formed as followings: • Each user is linked to a message if puts up that message. • Each message is linked to an event if it belongs to that event (i.e. containing the same keywords as the event). 9 (a) User-Message-Event Network (b) Hierarchical Content Network (c) Conflicting Viewpoints Network Fig. 6. Three different networks for propagation-based rumor detection. • Messages are linked with each other to denote the inter-message relationship. • Events are linked with other events to denote inter- event relationship. The inter-message links denote how a message would influence other messages. These influence is computed as semantic similarity between two messages in [17]. The ratio of shared unigrams is calculated as the link's weight to rep- resent the influence degree between two linked messages. Similarly, the links between events are computed as the shared unigrams in the event keywords representing two events. As for the weights of the rest two types of links: links from users to messages and links from messages to events, are not defined and set as 1 by default. 4.1.2 Credibility propagation The initial credibility values of each messages are obtained from the results of a feature-based classifier, similar to that of [11]. Then they are propagated on this network using PageRank-like iterations. At each iteration, the credibility valuses are updated as follows: • • • For each message, its credibility value is affected by three aspects: the user and event it links to and other linked messages. Contributions from these aspects are weighted to make sure that they are comparable when updating its credibility. For each event, its credibility value is affected by two aspects: the messages it links to and other linked events. Therefore, its credibility value is updated accordingly. For each user, the average credibilities of all the messages it links to is computed for updating. After several iterations, this algorithm would converge and produce the final predictions for each entity. 4.2 Hierarchical Content Network Inspired by the idea of linking entities altogether and lever- aging inter-entity implications for credibility propagation, Jin et al. [6] proposed a three-layer credibility network constructed from different semantic levels of content of an event. They firstly pointed out that the involving of users in the network in [17] is less convincible. Based on their observation, many users spread rumors unintentionally on social media and even credible users would be misguided to spread rumors. They also found that a news event, as a whole, contains both real and fake information in many occasions. Thus, without deeper analysis of its components, it is hard to get a convincing evaluation for the event. Motivated by these observations, they aimed to minimize users' influence and focus on an event's deeper semantic relations by proposing a three-layer credibility propagation network. 4.2.1 Network structure The hierarchical content network has three layers of entities: message layer, sub-event layer and event layer (Figure 6(b)). They are all content-based, and have direct relations with news credibility. The sub-event layer is initially introduced to capture the deeper sematic information within an event. Sub-events are various point of views of an event which are message clusters representing major parts or topics of an event. To be specific, the network is formed as followings: a message is linked to a sub-vent if it is clustered into that sub- events; a sub-event is linked to the event; all the messages are linked with each other so are the sub-events. Similar to [17], the four types of inter-entity links de- note how entities would influence each other on credibility evaluation. In [6], the link weights are mostly determined by two facts: the semantic similarity and the social impor- tance. By assuming semantically similar entities would have similar credibility values, the sematic similarity scores are computed between entity pairs based on their word repre- sentation. Meanwhile, the social importance score, which is calculated from the number of re-tweets or comments gained by an entity, is incorporated to give emphasis on more popular content in a sub-event or event. 4.2.2 Credibility propagation Under the assumption that entities with large link weight between them should have similar credibility values, the credibility propagation problem is formulated as a graph optimization problem. The authors gave a loss function which are constraints ensure the propagation should not change too much between entities with large link weight or from the entities' initial values. They then deduced the iterative solution for optimizing the loss function with the gradient descent method. The authors claimed that their for- mulation of the credibility propagation is a convex problem UserMessageEventMessageSub-eventEventsupportingopposingConflicting Viewpoints NetworkOriginal NetworkConflicting Viewpoints MingviewpointTopic-viewpoint…Message… which ensures that they can provide the globally optimal solution with an iterative algorithm. Compared with the institutive propagation method in [17], this is a theoretical improvement. 4.3 Conflicting Viewpoints Network According to [18], there exist two kinds of relations be- tween messages on microblogs. One relation is supporting, where messages expressing the same viewpoint support each others credibility. The other relation is opposing, where messages expressing conflicting viewpoints decrease each other's credibility. As microblogs are open media platforms, people can post their skeptical and even opposing responses after they read a news event. These opposing voices would arise against the news along with original supportive voices in the case of rumors, which are very crucial components for evaluating the truthfulness of news events. 4.3.1 Network structure Based on this observation, the authors proposed a credibility network with both supporting and opposing relations by exploiting the conflicting viewpoints in microblogs (Figure 6(c)). • Conflicting viewpoints mining. Conflicting view- points are mined through a joint topic-viewpoint model [61]. This model represents each message as a mixture of topics and a mixture of viewpoints for each topic. These topic-viewpoint pairs are then clus- tered under constraints to form the final conflicting viewpoints. • Link definition. The link between any two messages are computed based on the results of mined conflict- ing viewpoints. The wight of the link is computed as the distance between the probability representations of the two messages from the topic model. And the polarity of the link is defined from the viewpoints clustering: messages have the same viewpoints form the positive link, otherwise they form the negative link. • Network construction. All messages in an event are linked with each other. Links between them are com- puted as above. 4.3.2 Credibility propagation Similar to that in [6], the credibility propagation on this network is also defined as a graph optimization problem. To deal with the negative links in the network, the authors propose a loss function which can ensure that messages with supporting relations have similar credibility values and messages with opposing relations have opposite credibility values or values both close to zero. Given the loss function, they also derived the optimal solution to it. 5 DEEP NEURAL NETWORKS APPROACHES Compared to the traditional classifiers, deep neural net- works (DNN) have demonstrated clear advantages for many machine learning problems, such as object detection, sentiment classification and voice recognition. DNN based methods aim to learn deep representation of rumor data 10 automatically. Based on the different structures of neural networks, the neural network methods can be further clas- sified into the two categories: • Recurrent Neural Networks: Based on the structure of RNN, this kind of approach models the rumor data as sequential data. The key point is that the connections between units in an RNN form a direct cycle and create an internal state of the network that might allow it to capture the dynamic temporal signals characteristic of rumor diffusion [9], [19]–[21]. • Convolutional Neural Networks: CNN is composed by stacked convolutional and pooling layers, the structure of which help model significant semantic features. The CNN based methods [22] [23] assume that CNN can not only automatically extract local- global significant features from an input instance but reveal those high-level interactions. We now introduce some representative works for each category. 5.1 RNN-based methods Ma et al. first apply recurrent neural network to detect rumors. They observe that a rumor event consists of an original post and a group of related posts including reposts and comments, which create a continues stream of posts. Thus, they model the rumor data as a variable length time series. However, a rumor event consists of tens of thousands of posts, so they batch posts into time intervals and treat them as a single unit in a time series that is then modeled using an RNN sequence. In each interval, they use the tf ∗ idf values of the top-K terms in the vocabulary as input. Their model aims to learn both temporal and textual representations from the rumor data under supervision and extensive experiments demonstrate that their model achieves outstanding performance compared to those work utilizing hand-crafted features. Some malicious words in the content may be strongly related to the rumor category. To better understand what words the model pay more attention to, Chen et al. leverage attention mechanism in their model [19]. One assumption of their work is that textual features of the rumor data may change their importance with time and it is crucial to determine which of them are more important to the detection task. Similar to [9], they first batch posts into time intervals and use tf ∗ idf as the representation of the input. In each timestep, the hidden state will be allocated a weight parameter to measure its importance and contribution to the results. The performance of experiments demonstrate the ef- ficiency of attention mechanism and show that most words connected with the event itself are given less attention weight than words expressing users' doubting, esquiring and anger caused by the rumor, while ignore unrelated words. Ruchansky et al. focus on three characteristics of the rumor data [20]: the text of an article, the user response it receives, and the source users promoting it. These charac- teristics represent different aspects of the rumor data, and it is also challenging to detect rumors based on one of them. Thus, they propose a hybrid model(CSI) that combines all three characteristics for a more accurate and automated prediction. The model is composed of three modules: Cap- ture, Score, and Integrate. The first module is based on the response and text; it uses a Recurrent Neural Network to capture the temporal pattern of user activity on a given article. The second module learns the source characteristic based on the behavior of users, and a user is represented by a vector. In the third module, the result of the first two modules are integrated to a vector which is used to classify an article as fake or not. Aside from accurate prediction, the CSI model also produces latent representations of both users and articles that can be used for separate analysis. Jin et al. not only leverage the textual information but also visual and social information and propose a multi- modal fusion based model. An increasing number of users are using images and videos to post news in addition to texts. Therefore, for given a post, its text and social context are first fused with an LSTM unit. The joint representation are then fused with visual features extracted from pre- trained deep VGG-19. The output of the LSTM at each time step is employed as the neuron-level attention to coordinate visual features during the fusion. Extensive experiments conducted on Weibo and Twitter datasets demonstrate that their model can effectively detect rumors based on multi- media content, in comparison with existing feature-based methods and several multimodal fusion methods based on neural networks. 5.2 CNN-based methods Yu et al. find that the RNN is not qualified to the early detection tasks with limited inputting data and has a bias to- wards the latest elements of input sequence [22]. To address those issues, they propose a convolutional neural network based approach for rumor detection. Specifically, they put forward a method to split every rumor event into several phases. Subsequently, all events are split into several groups of microblog posts. And representation of each group is learnt though doc2vec, so an input sequence of CAMI is formed of a group of vectors. Finally, the vectors are fed to a two-layer convolutional neural networks, obtaining the final results of two-class classification. Their model can extract significant features from an input instance and achieve high performance on the two open dataset. Nguyen et al. focus on detect rumors at the early stage of rumor propagation, who proposed a CNN + RNN based model. In the unified model, the part of CNN is applied for representation. Each tweet is first formed of a set of word embeddings which are learnt jointly in the model training process. Specifically, the model utilizes CNN to extract a sequence of higher-level phrase representations to learn the hidden representations of individual rumor-related tweets. Then the part of RNN is used to process the time series obtained by CNN. By using limited rumor data, extensive experiments show the good performance of their model within the very first hours during the propagation of a rumor. 6 DATASETS Since different papers report experimental results utilizing different datasets, to compare methods fairly on a reason- TABLE 1 Statistics on the datasets 11 Dataset Data source Rumor Non-rumor KWON MediaEval RUMDECT RUMOURREVAL MULTI Twitter Twitter Twitter & Weibo Twitter Weibo 47 9000 498 145 4749 55 6000 494 74 4779 able scale, a few benchmark datasets have recently been proposed. We review the following representative datasets because they were collected from real-world social media platforms and have been widely used in rumor detection. KWON dataset. The KWON dataset [13], released in 2013, consists of 47 events of rumor and 55 events of non- rumor collected from Twitter, each events contains 60 tweets at least. To ensure all the events are valid, each event is labeled by four participants and the dataset only contains those events that are evaluated by at least four participants and had the majority agreement. MediaEval dataset. The MediaEval dataset is released by The Verifying Multimedia Use task at MediaEval [62], which aims to detect false multimedia content on Twitter. It contains 9000 tweets of rumor and 6000 non-rumor tweets related to 17 events in the development set, and 2000 tweets related to 35 events in the test set. RUMDECT dataset. The RUMDECT dataset [9], released in 2016, consists of two types of data from Weibo and Twitter, respectively. For Weibo data, a group of known ru- mors are first collected from Sina community management center and another group of non-rumor events are crawled from the posts of general threads. Therefore, the Weibo data contains 2313 rumors and 2351 non-rumors. For the Twitter data, 778 reported events during March-December 2015 are collected from Snopes.com. For each event, the keywords from its Snopes URL are applied as query to search related posts from Twitter. In order to balance the two classes, some non-rumor events are added from two another datasets [11], [13]. The resulting twitter data contains 498 rumor events and 494 non-rumor events. RUMOUREVAL dataset. The RUMOUREVAL dataset is produced for RumourEval 2017 [63], a shared subtask in SemEval 2017. The training set consists of 297 rumourous threads collected for 8 events, which include 297 source and 4,222 reply tweets. The testing set includes, in total, 1,080 tweets, 28 of which are source tweets and 1,052 replies. MULTI dataset. The MULTI dataset [21] released in 2017, includes 4749 posts of rumor and 4779 posts of non- rumor collected from the official rumor debunking system of Weibo. Unlike the previous datasets, the MULTI dataset is the first dataset that focuses on leveraging multimodal con- tents to detect rumors on Weibo platform, which contains not only textual information but also visual information. Table I summarizes the datasets used for rumor detec- tion. Based on their statistic information, we can observe that each dataset either consists of a set of events or a set of messages. Datasets containing rumor events are suited for classifying a wide spread event on social media platforms, while datasets composed by rumor messages are suited for classifying a single message. 7 CONCLUSION AND PERSPECTIVES Rumors spreading on social media could severely influ- ence people' daily life. However, most applications still rely on manual efforts, either by human experts or by common user, to combat the ever-increasing rumors. Un- der this circumstances, the research on automatic rumor detection attracts more and more attention. In this survey, we attempt to provide a comprehensive survey for exit- ing studies towards the development of automatic rumor detection approaches. Moreover, we have categorized the existing work into three paradigms, hand-crafted features based approach, propagation-based approach and neural networks approach. We start from introducing the features of rumors and then we analyze the principles of the existing classification algorithms. Three different paradigms for rumor detection are elab- orately described: the feature-based classification approach, the credibility propagation approach and the neural net- works approaches. For each method in these paradigm, it aims to tow goals: one is to extract prominent features to representing the multimedia content comprise rumors and the social context generated by rumors on social network, the other goal is to build robust machine learning algorithms to separate rumors from common stories. Moreover, we introduce several public datasets and give the statistic details for each of them. All the datasets are collected from Weibo or Twitter platform. Each sample in event based dataset refers to a group of messages with one topic, while the sample in message based dataset refers to a single message . We can observe an encouraging trend that some works, begin to build large datasets. But in most works, the datasets are still not large enough. A main difficulty in collecting dataset is that rumor are those news debunked by authorities, the number of which is less than that of nonrumor samples. Apart from finding more efficient features or algorithms, we summary the four main challenges for future studies: Early detection. The life circle of a story propagating on social networks is quite short, some studies suggested it is less than three days. What's more, rumors become viral in seconds or minutes [3]. It is crucial to detect rumors at their very early stage. However, most existing studies detect rumors by assuming they have all content in all life time of the rumor. The resource on the beginning of a rumor is such limited that it is very challenging to detect it at the early stage. Although Yu et al. propose a method to solve this problem, the performance is unable to meet the need of early detection. Explanatory detection. Exiting rumor detection methods only give a final decision of whether a story is a rumor. Little information is revealed why they make the decision. However, unlike simple object classification, finding the evidences supporting the decision would be beneficial in debunking the rumor and prevent its further spreading. The explanatory rumor detection requires algorithms to monitor much more closely into every components in rumors, which is a challenge to be resolved. 12 Long text rumor detection. The objects of rumor detec- tion methods at present are short text spread on social me- dia. However, more and more long text news such as blogs and passages are generated on some online communities, which arise a growing demand for verification. Different from short text rumors, long text rumors have affluent semantic information which poses an obvious obstacle for comprehensive understanding. Moreover, in most cases, only part of a given long text rumor contains false informa- tion, while the rest of which is true. So it is unfair to classify the whole passage as a rumor or not. More efforts should be addressed not only on improving the performance for detecting long text rumor but also on pointing out the precise position of false information in a passage. Multimodal rumor detection. The fact that an increasing number of rumors consisting of multimodal data are prop- agating on social media brings difficulties for traditional detection methods. Therefore, analyzing the relationships among data with multiple modalities and developing ad- vanced fusion based models to utilize these data can be the key to detect rumors in more complex scenarios. Though Jin et al. proposed a fusion based model to detection ru- mors with multiple modalities [21], the complex relation- ship among different modalities should be modeled more accurately. REFERENCES [1] J. Gottfried and E. Shearer, "News use across social media plat- forms 2016," Pew Research Center, 2016. [2] Z. Zhao, P. Resnick, and Q. Mei, "Enquiring minds: Early detection of rumors in social media from enquiry posts," in Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2015, pp. 1395– 1405. [3] A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng, "Rumor cascades," in Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, 2014. [4] Z. Jin, J. Cao, H. Guo, Y. Zhang, Y. Wang, and J. Luo, "Detection and analysis of 2016 US presidential election related rumors on twitter," in Social, Cultural, and Behavioral Modeling - 10th Interna- tional Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings, 2017, pp. 14–24. [5] P. Domm, "False rumor of explosion at white house causes stocks to briefly plunge; ap confirms its twitter feed was hacked," 2013. [6] Z. Jin, J. Cao, Y.-G. Jiang, and Y. Zhang, "News credibility evalua- tion on microblog with a hierarchical propagation model," in 2014 IEEE International Conference on Data Mining (ICDM). IEEE, 2014, pp. 230–239. "Facebook to begin flagging fake news in response to mount- ing criticism," https://www.theguardian.com/technology/2016/ dec/15/facebook-flag-fake-news-fact-check, 2016, [Online; Ac- cessed 15-December-2016]. [8] A. Gupta, P. Kumaraguru, C. Castillo, and P. Meier, TweetCred: Springer Real-Time Credibility Assessment of Content on Twitter. International Publishing, 2014, pp. 228–243. J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K.-F. Wong, and M. Cha, "Detecting rumors from microblogs with recurrent neural networks," in Proceedings of IJCAI, 2016. [10] M. Wang, B. Ni, X.-S. Hua, and T.-S. Chua, "Assistive tagging: A survey of multimedia tagging with human-computer joint explo- ration," ACM Comput. Surv., vol. 44, no. 4, pp. 25:1–25:24, Sep. 2012. [11] C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on twitter," in Proceedings of the 20th international conference on World Wide Web (WWW). ACM, 2011, pp. 675–684. [12] F. Yang, Y. Liu, X. Yu, and M. Yang, "Automatic detection of rumor on sina weibo," in Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. ACM, 2012, pp. 1–7. [7] [9] [13] S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang, "Prominent features of rumor propagation in online social media," in Data Mining (ICDM), 2013 IEEE 13th International Conference on. IEEE, 2013, pp. 1103–1108. [14] S. Sun, H. Liu, J. He, and X. Du, "Detecting event rumors on sina weibo automatically," in Web Technologies and Applications. Springer, 2013, pp. 120–131. [15] K. Wu, S. Yang, and K. Q. Zhu, "False rumors detection on sina weibo by propagation structures," in IEEE International Conference on Data Engineering, ICDE, 2015. [16] Z. Jin, J. Cao, Y. Zhang, and Z. Yongdong, "Mcg-ict at mediaeval 2015: Verifying multimedia use with a two-level classification model," in Proceedings of the MediaEval 2015 Multimedia Benchmark Workshop, 2015. [17] M. Gupta, P. Zhao, and J. Han, "Evaluating event credibility on twitter," in Proceedings of the SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2012, p. 153. [18] Z. Jin, J. Cao, Y. Zhang, and J. Luo, "News verification by exploit- ing conflicting social viewpoints in microblogs," in Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12- 17, 2016, Phoenix, Arizona, USA., 2016. [19] T. Chen, L. Wu, X. Li, J. Zhang, H. Yin, and Y. Wang, "Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection," arXiv preprint arXiv:1704.05973, 2017. [20] N. Ruchansky, S. Seo, and Y. Liu, "Csi: A hybrid deep model for fake news detection." CIKM, 2017. [21] Z. Jin, J. Cao, H. Guo, Y. Zhang, and J. Luo, "Multimodal fu- sion with recurrent neural networks for rumor detection on mi- croblogs," in Proceedings of the 2017 ACM on Multimedia Conference, MM 2017, Mountain View, CA, USA, October 23-27, 2017, 2017, pp. 795–816. [22] F. Yu, Q. Liu, S. Wu, L. Wang, and T. Tan, "A convolutional approach for misinformation identification." [23] T. N. Nguyen, C. Li, and C. Nieder´ee, "On early-stage debunking rumors on twitter: Leveraging the wisdom of weak learners," in International Conference on Social Informatics. Springer, 2017, pp. 141–158. [24] A. Zubiaga, A. Aker, K. Bontcheva, M. Liakata, and R. Procter, "Detection and resolution of rumours in social media: A survey," arXiv preprint arXiv:1704.00656, 2017. [25] C. Boididou, S. E. Middleton, Z. Jin, S. Papadopoulos, D.-T. Dang- Nguyen, G. Boato, and Y. Kompatsiaris, "Verifying information with multimedia content on twitter," Multimedia Tools and Applica- tions, pp. 1–27, 2017. [26] N. DiFonzo and P. Bordia, Rumor psychology: Social and organiza- tional approaches. American Psychological Association Washing- ton, DC, 2007, vol. 1. [27] G. W. Allport and L. Postman, "The psychology of rumor." 1947. [28] D. E. Alexander, "Social media in disaster risk reduction and crisis management," Science and engineering ethics, vol. 20, no. 3, pp. 717– 733, 2014. [29] M. R. Morris, S. Counts, A. Roseway, A. Hoff, and J. Schwarz, "Tweeting is believing?: understanding microblog credibility per- ceptions," in Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 2012, pp. 441–450. [30] Z. Jin, J. Cao, Y. Zhang, J. Zhou, and Q. Tian, "Novel visual and statistical image features for microblogs news verification," IEEE Trans. Multimedia, vol. 19, no. 3, pp. 598–608, 2017. [31] Z. Jin, J. Cao, J. Luo, and Y. Zhang, "Image credibility analysis with effective domain transferred deep networks," CoRR, vol. abs/1611.05328, 2016. [32] A. Hassan, V. Qazvinian, and D. Radev, "What's with the atti- tude?: identifying sentences with attitude in online discussions," in Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2010, pp. 1245–1255. [33] B. Ma, D. Lin, and D. Cao, "Content representation for microblog rumor detection," in Advances in Computational Intelligence Systems. Springer, 2017, pp. 245–251. [34] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their com- positionality," in Advances in neural information processing systems, 2013, pp. 3111–3119. [35] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," Journal of machine Learning research, vol. 3, no. Jan, pp. 993–1022, 2003. 13 [36] Z. Zhang, Z. Zhang, and H. Li, "Predictors of the authenticity of internet health rumours," Health Information & Libraries Journal, vol. 32, no. 3, pp. 195–205, 2015. [37] A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi, "Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy," in Proceedings of the 22nd international conference on World Wide Web companion. International World Wide Web Conferences Steering Committee, 2013, pp. 729–736. [38] C. Boididou, K. Andreadou, S. Papadopoulos, D.-T. Dang- Nguyen, G. Boato, M. Riegler, and Y. Kompatsiaris, "Verifying multimedia use at mediaeval 2015," in MediaEval 2015 Workshop, Sept. 14-15, 2015, Wurzen, Germany, 2015. [39] C. Hauff, V. Murdock, and R. Baeza-Yates, "Improved query difficulty prediction for the web," in Proceedings of the 17th ACM conference on Information and knowledge management. ACM, 2008, pp. 439–448. [40] S. Kullback and R. A. Leibler, "On information and sufficiency," The annals of mathematical statistics, pp. 79–86, 1951. [41] D. G. Lowe, "Distinctive image features from scale-invariant key- points," International journal of computer vision, vol. 60, no. 2, pp. 91–110, 2004. [42] J. He, M. Larson, and M. De Rijke, "Using coherence-based measures to predict query difficulty," in Advances in Information Retrieval. Springer, 2008, pp. 689–694. [43] X. Tian, Y. Lu, and L. Yang, "Query difficulty prediction for web image search," IEEE Transactions on Multimedia, vol. 14, no. 4, pp. 951–962, 2012. [44] A. Oliva and A. Torralba, "Modeling the shape of the scene: A holistic representation of the spatial envelope," International journal of computer vision, vol. 42, no. 3, pp. 145–175, 2001. [45] M. Wang, K. Yang, X. S. Hua, and H. J. Zhang, "Towards a relevant and diverse search of social images," IEEE Transactions on Multimedia, vol. 12, no. 8, pp. 829–842, Dec 2010. [46] T. Deselaers, T. Gass, P. Dreuw, and H. Ney, "Jointly optimising relevance and diversity in image retrieval," in Proceedings of the ACM international conference on image and video retrieval. ACM, 2009, p. 39. [47] B. King, "Step-wise clustering procedures," Journal of the American Statistical Association, vol. 62, no. 317, pp. 86–101, 1967. [48] X. Liu, A. Nourbakhsh, Q. Li, R. Fang, and S. Shah, "Real-time rumor debunking on twitter," in Proceedings of the 24th ACM In- ternational on Conference on Information and Knowledge Management. ACM, 2015, pp. 1867–1870. [49] Y. Yang, K. Niu, and Z. He, "Exploiting the topology property of social network for rumor detection," in Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on. IEEE, 2015, pp. 41–46. [50] S. Wang and T. Terano, "Detecting rumor patterns in streaming social media," in Big Data (Big Data), 2015 IEEE International Conference on. IEEE, 2015, pp. 2709–2715. [51] J. Ma, W. Gao, Z. Wei, Y. Lu, and K.-F. Wong, "Detect rumors using time series of social context information on microblogging websites," in Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 2015, pp. 1751– 1754. [52] G. Giasemidis, C. Singleton, I. Agrafiotis, J. R. Nurse, A. Pilgrim, C. Willis, and D. V. Greetham, "Determining the veracity of rumours on twitter," in International Conference on Social Informatics. Springer, 2016, pp. 185–205. [53] S. Kwon, M. Cha, and K. Jung, "Rumor detection over varying time windows," PloS one, vol. 12, no. 1, p. e0168344, 2017. [54] K. M. Borgwardt, C. S. Ong, S. Schonauer, S. Vishwanathan, A. J. Smola, and H.-P. Kriegel, "Protein function prediction via graph kernels," Bioinformatics, vol. 21, no. suppl 1, pp. i47–i56, 2005. [55] M. D. Buhmann, Radial basis functions: theory and implementations. Cambridge university press, 2003, vol. 12. [56] W. Chen, C. K. Yeo, C. T. Lau, and B. S. Lee, "Behavior deviation: An anomaly detection view of rumor preemption," in Information Technology, Electronics and Mobile Communication Conference (IEM- CON), 2016 IEEE 7th Annual. IEEE, 2016, pp. 1–7. [57] V. Vydiswaran, C. Zhai, and D. Roth, "Content-driven trust prop- agation framework," in Proceedings of the 17th ACM SIGKDD inter- national conference on Knowledge discovery and data mining. ACM, 2011, pp. 974–982. [58] X. Zhu and Z. Ghahramani, "Learning from labeled and unlabeled data with label propagation," 2002. [59] X. Zhu, Z. Ghahramani, and J. D. Lafferty, "Semi-supervised learn- ing using gaussian fields and harmonic functions," in Proceedings of the 20th International conference on Machine learning (ICML-03), 2003, pp. 912–919. [60] D. Zhou, O. Bousquet, T. N. Lal, J. Weston, and B. Scholkopf, Juan Cao Institute of Computing Technol- ogy,Chinese Academy of Sciences, Center for Advanced Computing Research, Beijing, China. University of Chinese Academy of Sciences, Bei- jing, China Juan Cao received the Ph.D. degree from the Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, in 2008. She is currently working as an Associate Profes- sor with the Institute of Computing Technology, Chinese Academy of Sciences. Her research interests include large scale social media analysis. Junbo Guo Institute of Computing Technol- ogy,Chinese Academy of Sciences, Center for Advanced Computing Research, Beijing, China Junbo Guo received the Ph.D. degree from the Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, in 2010. He is currently working as an Senior Engineer with the Institute of Computing Technology, Chi- nese Academy of Sciences. His research inter- ests include social media analysis and retrieval. Xirong Li received the B.S. and M.E. degrees from Tsinghua University, Beijing, China, in 2005 and 2007, respectively, and the Ph.D. degree from the University of Amsterdam, Amsterdam, The Netherlands, in 2012, all in computer sci- ence. He is currently an Associate Professor with the Key Lab of Data Engineering and Knowl- edge Engineering, Renmin University of China, Beijing, China. His research includes image and video retrieval. Prof. Li was an Area Chair of ACMMM 2018 and ICPR 2016, Publi- cation Co-Chair of ICMR 2015 and Publicity Co-Chair of ICMR 2013. He was the recipient of the ACM Multimedia 2016 Grand Challenge Award, the ACM SIGMM Best Ph.D. Thesis Award 2013, the IEEE TRANSACTIONS ON MULTIMEDIA Prize Paper Award 2012, the Best Paper Award of the ACM CIVR 2010, the Best Paper Runner-Up of PCM 2016 and PCM 2014 Outstanding Reviewer Award. 14 "Learning with local and global consistency," in Advances in neural information processing systems, 2004, pp. 321–328. [61] A. Trabelsi and O. R. Zaiane, "Mining contentious documents using an unsupervised topic model based approach," in Data Mining (ICDM), 2014 IEEE International Conference on. IEEE, 2014, pp. 550–559. [62] C. Boididou, S. Papadopoulos, Y. Kompatsiaris, S. Schifferes, and N. Newman, "Challenges of computational verification in social multimedia," in Proceedings of the 23rd International Conference on World Wide Web. ACM, 2014, pp. 743–748. [63] L. Derczynski, K. Bontcheva, M. Liakata, R. Procter, G. W. S. Hoi, and A. Zubiaga, "Semeval-2017 task 8: Rumoureval: Determin- ing rumour veracity and support for rumours," arXiv preprint arXiv:1704.05972, 2017. Zhiwei Jin Institute of Computing Technol- ogy,Chinese Academy of Sciences, Center for Advanced Computing Research, Beijing, China. University of Chinese Academy of Sciences, Bei- jing, China Zhiwei Jin received the B.S. degree in software engineering from Wuhan University, Wuhan, China, in 2012, and is currently work- ing toward the Ph.D. degree at the Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, under the supervision of Prof. Y. Zhang. His research interests include multimedia content analysis and data mining. Han Guo Institute of Computing Technol- ogy,Chinese Academy of Sciences, Center for Advanced Computing Research, Beijing, China. University of Chinese Academy of Sciences, Bei- jing, China Han Guo received the B.S. degree in software engineering from Shandong University, Jinan, China, in 2015, and is currently working toward the Master degree at the Institute of Computing Technology, Chinese Academy of Sciences, Bei- jing, China, under the supervision of Prof. J. Li. His research interests include multimedia content analysis. Jintao Li Jintao Li Institute of Computing Technol- ogy,Chinese Academy of Sciences, Center for Advanced Computing Research, Beijing, China. received the Ph.D. degree from the Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, in 1989. He is currently a Professor with the Institute of Computing Technology, Chinese Academy of Sciences. His research interests focus on multi- media technology, virtual reality technology, and pervasive computing
1603.04447
1
1603
2016-03-14T20:00:43
On the Efficiency of the Information Networks in Social Media
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Social media sites are information marketplaces, where users produce and consume a wide variety of information and ideas. In these sites, users typically choose their information sources, which in turn determine what specific information they receive, how much information they receive and how quickly this information is shown to them. In this context, a natural question that arises is how efficient are social media users at selecting their information sources. In this work, we propose a computational framework to quantify users' efficiency at selecting information sources. Our framework is based on the assumption that the goal of users is to acquire a set of unique pieces of information. To quantify user's efficiency, we ask if the user could have acquired the same pieces of information from another set of sources more efficiently. We define three different notions of efficiency -- link, in-flow, and delay -- corresponding to the number of sources the user follows, the amount of (redundant) information she acquires and the delay with which she receives the information. Our definitions of efficiency are general and applicable to any social media system with an underlying information network, in which every user follows others to receive the information they produce. In our experiments, we measure the efficiency of Twitter users at acquiring different types of information. We find that Twitter users exhibit sub-optimal efficiency across the three notions of efficiency, although they tend to be more efficient at acquiring non-popular than popular pieces of information. We then show that this lack of efficiency is a consequence of the triadic closure mechanism by which users typically discover and follow other users in social media. Finally, we develop a heuristic algorithm that enables users to be significantly more efficient at acquiring the same unique pieces of information.
cs.SI
cs
On the Efficiency of the Information Networks in Social Media Mahmoudreza Babaei MPI-SWS, Germany Przemyslaw Grabowicz MPI-SWS, Germany Isabel Valera MPI-SWS, Germany Krishna P. Gummadi MPI-SWS, Germany Manuel Gomez-Rodriguez MPI-SWS, Germany 6 1 0 2 r a M 4 1 ] I S . s c [ 1 v 7 4 4 4 0 . 3 0 6 1 : v i X r a ABSTRACT Social media sites are information marketplaces, where users pro- duce and consume a wide variety of information and ideas. In these sites, users typically choose their information sources, which in turn determine what specific information they receive, how much information they receive and how quickly this information is shown to them. In this context, a natural question that arises is how effi- cient are social media users at selecting their information sources. In this work, we propose a computational framework to quantify users' efficiency at selecting information sources. Our framework is based on the assumption that the goal of users is to acquire a set of unique pieces of information. To quantify user's efficiency, we ask if the user could have acquired the same pieces of informa- tion from another set of sources more efficiently. We define three different notions of efficiency -- link, in-flow, and delay -- corre- sponding to the number of sources the user follows, the amount of (redundant) information she acquires and the delay with which she receives the information. Our definitions of efficiency are general and applicable to any social media system with an underlying in- formation network, in which every user follows others to receive the information they produce. In our experiments, we measure the efficiency of Twitter users at acquiring different types of information. We find that Twitter users exhibit sub-optimal efficiency across the three notions of ef- ficiency, although they tend to be more efficient at acquiring non- popular pieces of information than they are at acquiring popular pieces of information. We then show that this lack of efficiency is a consequence of the triadic closure mechanism by which users typically discover and follow other users in social media. Thus, our study reveals a tradeoff between the efficiency and discoverability of information sources. Finally, we develop a heuristic algorithm that enables users to be significantly more efficient at acquiring the same unique pieces of information. Categories and Subject Descriptors: H.1.2 [Information Sys- tems]: Models and Principles -- Human information processing Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. WSDM'16, February 22 -- 25, 2016, San Francisco, CA, USA. c(cid:13) 2016 ACM. ISBN 978-1-4503-3716-8/16/02. . . $15.00 DOI: http://dx.doi.org/10.1145/2835776.2835826 General Terms: Human Factors; Measurement; Performance. Keywords: Efficiency; information network; social media; infor- mation; cover set; rewiring algorithm; optimization; lossless. 1. INTRODUCTION Over the last decade, the advent of social media has profoundly changed the way people produce and consume information online. A characteristic feature of many social media sites (e.g., Twitter or Pinterest) that distinguishes them from mainstream news me- dia sites (e.g., CNN.com or NYTimes.com) is the information net- work created by consumers following their preferred producers of information [6, 18, 10]. However, the task of selecting informa- tion sources from potentially tens to hundreds of millions of users poses serious challenges and raises important questions that have not yet been addressed. For example, recent studies have observed that out of fear of missing out on important information, users tend to follow too many other users [14]. In the process, they receive a lot of redundant information [4], become overloaded, and effec- tively miss the information they are interested in [12, 19]. More- over, it is very hard to ascertain the quality, relevance, and credibil- ity of information produced by social media users [2, 8, 11]. Also, many users rely on their network neighborhood for discovering new sources of information, as observed by the large number of triadic closures [26, 13, 24] in link creation. The motivation behind this work originates from two fundamen- tal questions: 1) How efficient are the users of a social media site at selecting which other users to follow to acquire information of their interest? and, 2) can we propose methods to enable a user to acquire the same pieces of information from another set of users in the social media site more efficiently? To answer these intertwined questions, we view the structure of the information networks in so- cial media sites as the outcome of a network formation game [17], where a node (i.e., user) links to other nodes to solve a specific task (i.e., acquire information relevant to the user). In this work, we pro- pose a general computational framework to quantify and optimize the efficiency of links created by users to acquire information. With such a framework in place, we analyze the efficiency of information networks of social media users, addressing several im- portant additional questions. For instance, a user might aim to re- ceive pieces of information of different popularity. However, can popular information be covered as efficiently as non-popular in- formation? Additionally, previous studies have identified triadic closure [26, 13, 24] and information diffusion [28, 23, 3] as salient mechanisms that trigger new link creation in social networks. How- ever, how efficient are information networks created with these mechanisms? Similarly, it has been observed that in information systems such as Wikipedia [29, 30], links are primarily established to make related content more easily discoverable, rather than for some nuanced notion of efficiency. Is the link creation in user- generated information networks such as Twitter driven by a similar goal, i.e., discovering users in the network neighborhood, rather than for efficiency in acquiring information? Our computational framework is based on the following key con- cept: given a set of unique ideas, pieces of information, or more generally, memes I spreading through an information network, there is an optimal set of nodes that, if followed, would enable us to get to know I. Naturally, this concept relies on defining what is an optimal set. Here, we consider three notions of optimality, which lead to three types of efficiencies: I. Link efficiency. The optimal set U l(I) is the one that con- tains the smallest number of users. Then, we compute link efficiency by comparing the number of people a user follows, i.e., the number of followees, with the size of the optimal set U l(I). Finding the optimal set reduces to a minimum set cover problem, which can be solved using a well-known and efficient greedy algorithm with provable guarantees [15]. II. In-flow efficiency. The optimal set U f (I) is the one that provides the least amount of tweets per time unit. Then, we compute in-flow efficiency by comparing the amount of tweets per time unit a user receives from the people she fol- lows with the amount of tweets per time unit she would have received by following the users in the optimal set U f (I). Finding the optimal set reduces to a minimum weighted set cover problem, which again can be solved efficiently with provable guarantees [15]. III. Delay efficiency. The optimal set U t(I) is the one that pro- vides the memes as early as possible. Then, we compute delay efficiency by comparing the average delay per meme that the user achieves through the people she follows with the average delay she would achieve by following the users in the optimal set. Here, we define the delay at acquiring a meme in a social media system as the difference between the time when the user received the meme in her timeline and the time when the meme was first mentioned by a user in the social media system. Finding the optimal set reduces to find- ing the set of users who made the first mention of each of the memes in the social media system. Although the concept of link efficiency has been previously in- troduced by us in [4], here we extend it to account for other def- initions of efficiency, i.e., in-flow and delay efficiency. Another study related to ours uses set covers for efficient detection of out- breaks [21]. However, that related work does not compare the op- timal sets to the sets encountered in reality. In this study, we apply the three notions of efficiency to the infor- mation network of Twitter users. Our analysis does not only show how efficient users are at acquiring information, but also helps us in understanding the influence of different factors on efficiency: 1. We find that users acquire information sub-optimally with respect to the three notions of efficiency. However, the higher is the coverage of information that they want to acquire, the higher is the efficiency. 2. While the popular pieces of information are acquired ineffi- ciently, less popular pieces of information are acquired more efficiently. (A) Users per meme (B) The number of followees Figure 1: The distributions of (A) the number of users posting a unique meme and (B) the number of followees posting a specific type of meme at least once. For (A), a power-law is fitted (solid lines) and the exponent α is given. 3. Users trade followees' discoverability for information effi- ciency. While, for a typical Twitter user, many people in her original ego-network may be discovered by triadic closure, very few people in the optimized efficient ego-networks can be discovered in that way. 4. We introduce a heuristic algorithm that considerably increases both user's inflow and delay efficiencies and delivers to her the same unique pieces of information, by rewiring user's in- formation network. Our empirical findings also shed light on how our notion of effi- ciency relates to user's ego-network structure (e.g., triangle closure, clustering coefficient). 2. DATASET We use a large Twitter dataset, as reported in previous work [9], which comprises the following three types of information: profiles of 52 million users, 1.9 billion directed follow links among these users, and 1.7 billion public tweets posted by the collected users. The link information of the network is based on a snapshot taken at the time of data collection, in September 2009. In our work, we limit ourselves to tweets published during one week, from July 1, 2009 to July 7, 2009, and filter out users that did not tweet before July 1, in order to be able to consider the social graph to be approx- imately static. After this filtering, we have 395,093 active users, 39,382,666 directed edges, and 78,202,668 tweets. Then, we sample 10,000 users at random out of the 395,093 active users and reconstruct their timelines by collecting all tweets published by the (active) people they follow (among all the 395,093 users), build their ego-networks (i.e., who follows whom among the people they follow), and track all the unique memes they were ex- posed to during the observation period. We consider four different types of memes: I. Hashtags. Hashtags are words or phrases inside a tweet which are prefixed with the symbol "#". They provide a way for a user to generate searchable metadata, keywords or tags, in order to describe her tweet, associate the tweet to a (trending) topic, or express an idea. Hashtags have be- come ubiquitous and are an integral aspect of the social Web nowadays [25]. II. URLs. We extract all URLs mentioned inside tweets [22]. Since most of URLs in Twitter are shortened, we unwrap them by calling the API of the corresponding shortening ser- vice. Here, we considered seven popular URL shorteners: 10−1100101102103104105uniqueposters10−1010−910−810−710−610−510−410−310−210−1100101PDFHashtags,α=-2.16URLs,α=-2.1Newsdomains,α=-1.7YouTube,α=-2.7100101102103104105#followees10−910−810−710−610−510−410−310−210−1100PDFHashtagsURLsNewsdomainsYouTube bit.ly, tinyurl.com, is.gd, twurl.nl, snurl.com, doiop.com and eweri.com, and discard any URL that could not be unwrapped. In general, URLs correspond to online articles, posts, links, or websites. III. News domains. We extract all domain names mentioned inside tweets that correspond to mainstream media sites in- dexed by Google News [20]. News domains correspond to media outlets, which may be specializing in the coverage of some topics or perspectives. IV. YouTube videos. We extract all URLs mentioned inside tweets that match the pattern www.youtube.com/watch. Here, each of these URLs corresponds to a different YouTube video. The above memes provide different levels of granularity. For example, news domains are very generic, while YouTube videos are fairly specific. In more detail, the set of active users mention 286, 219 unique hashtags, 379, 424 URLs, 18,616 news domains, and 19, 998 YouTube videos. Figure 1A shows the distribution of the number of unique posters for different types of memes, which follows a power-law distribution. The tail of the distribution, as expected, is the heaviest for news domains, while the lightest for YouTube videos. Moreover, as shown in Figure 1B, the tail of the distribution of the number of followees tweeting at least one of the memes is also a power-law. In the remainder, we consider only such followees.1 Also, we focus on users whose information network is fairly developed by filtering out any user following less than 20 followees. Note that, although our methodology does not depend on the par- ticular choice of meme, it does make two key assumptions. First, it assumes we can distinguish whether two memes are equal or differ. Distinguishing certain memes such as hashtags may be trivial but distinguishing others, such as ideas, may be very difficult. Second, it assumes that receiving several copies of the same meme from different users does not provide additional information, even if dif- ferent users express different opinions about the meme. It would be interesting to relax the second assumption in future work. Importantly, in 2009 Twitter did not have features such as "Lists" and "Personalized Suggestions", so the main way users received and processed information was through their feed, for which we have complete data. The drawback of using older data is smaller number of users and social activity. 3. DEFINITIONS OF EFFICIENCY In this section, we introduce three different notions of efficiency, namely, link, in-flow and delay efficiency. For each type of ef- ficiency, we provide a formal definition and propose a method to approximately compute it with provable guarantees.2 Then, we use the methods to investigate the efficiency of Twitter users at acquir- ing information. 3.1 Link efficiency Definition: Our definition of link efficiency follows from our prior definition [4]. Consider a user u and the set of unique memes Iu she is exposed to through her feed in a given time period, by following Uu users. Then, we define the optimal set U l(Iu) as the minimal set of users that, if followed, would expose the user to 1Considering all followees leads to qualitatively similar results, but lower absolute values of efficiency. 2Delay efficiency, unlike link and in-flow efficiencies, can be com- puted exactly. ∗ 1, u u. We define link ef- Figure 2: Our notion of link efficiency, El ficiency as El u = U l(Iu)/Uu, where Iu is the set of (unique) memes (blue circles) a user u receives in her timeline by follow- ing a set of followees Uu = {u1, . . . , u5} (left), and U l(Iu) = ∗ 3} (right) is the minimal set cover (of users) that, if {u followed, would provide the same set of memes Iu. In the il- lustration, each user ui posts the memes within the associated ellipsoid. Hence, in this example, the link efficiency value is El u = 3/5. ∗ 2, u Algorithm 1: Greedy set cover for estimating link efficiency Input: set of all users U; set of unique memes Iu; followee set Set U l = ∅; Set X = Iu; while X (cid:54)= ∅ do Uu; set of memes I v posted by user v ∗ = argminv∈U\U l 1 X∩Iv ; Set v Set U l = U l ∪ {v ; Set X = X\I v ∗ ∗ }; end Output: U l at least Iu, and define the link efficiency of a user u at acquiring memes as u = U l(Iu) El Uu , (1) where 0 ≤ El u ≤ 1. If the number of users she follows coincides with the number of users in the minimal set, then her efficiency value is El u = 1. The larger the original number of followees in comparison with the size of the minimal set, the smaller the link efficiency. Figure 2 illustrates our definition of link efficiency. Examples of link inefficiency: Our definition captures two types of link inefficiency, which we illustrate by two extreme examples. If a user u follows Uu other users, each of them mentioning differ- ent (disjoint) sets of memes, and there is another user v /∈ Uu that cover all the memes the followees cover, then the user's efficiency will be El u = 1/Uu. If a user u follows Uu other users and all these users mention exactly the same memes, then the user's effi- ciency will be El u = 0. The former type of link inefficiency is due to following users that individually post too few memes, while the latter is due to following users that collectively produce too many redundant memes. u = 1/Uu and limUu→∞ El Computing link efficiency: In practice, computing El u, as de- fined by Eq. 1, reduces to finding the minimal set of users U l(Iu), which can be cast as the classical minimum set cover problem [16]. Although the minimum set cover problem is NP-hard, we can ap- proximate U l(Iu) using a well-known and efficient greedy algo- rithm [15], which returns an O(log d) approximation of the min- u. We define in- Figure 3: Our notion of in-flow efficiency, Ef flow efficiency as Ef u = f (U f (Iu))/f (Uu), where Iu is the set of (unique) memes (blue circles) a user receives in her timeline by following a set of followees Uu = {u1, . . . , u5} (left), and ∗ 3} (right) is the set cover (of users) with the U f (Iu) = {u smallest associated in-flow f (U f (Iu)) that, if followed, would provide the same set of memes Iu. In the illustration, each user ui posts the memes within the associated ellipsoid and the red values in the ellipsoid represent the in-flow of each user. Hence, in this case, the in-flow efficiency value is Ef u = 30/60 = 0.5. ∗ 1, u ∗ 2, u Algorithm 2: Greedy set cover for estimating in-flow efficiency Input: set of all users U; set of unique memes Iu; number of tweets N v posted by user v; set of memes I v posted by user v Set U f = ∅; Set X = Iu; while X (cid:54)= ∅ do ∗ end Output: U f = arg minv∈U\U f N v Iv∩X ; Set v Set U f = U f ∪ {v Set X = X\I v ∗ ∗ }; In-flow efficiency imum size set cover, where d = maxv∈U I v is the maximum number of memes posted by any user. Refer to Algorithm 1 for a full description of our procedure to approximate link efficiency. 3.2 Definition: Consider a user u and the set of unique memes Iu she is exposed to through her feed in a given time period, by follow- ing Uu users. Then, we define the optimal set U f(Iu) as the set of users that, if followed, would expose the user to, at least, Iu, while providing the least amount of tweets per time unit, i.e., the mini- mum tweet in-flow. In particular, we define the in-flow efficiency of a user u at acquiring memes as Ef u = f (U f(Iu)) f (Uu) , (2) where f (Uu) denotes the amount of tweets produced by the set of users Uu per time unit (user u's in-flow) and 0 ≤ Ef u ≤ 1. The in-flow efficiency Ef u = 1 if user u's in-flow coincides with the amount of tweets per time unit posted by the users in the optimal set U f(Iu). Here, the larger is user u's in-flow in comparison with the amount of tweets per time unit posted by the users in the opti- mal set, the lower is her in-flow efficiency. Figure 3 illustrates our definition of in-flow efficiency using an example. Examples of in-flow inefficiency: As in the case of link ineffi- ciency, this definition captures several types of in-flow inefficiency. u = 1/(1 + (cid:104)ti − t0 Figure 4: Our notion of delay efficiency, Et u. We define delay i(cid:105)i∈Iu ), where ti is the time efficiency as Et in which a user receives meme i in her timeline, t0 i is the time when the meme is first mentioned by a user in the whole social media system, Iu is the set of (unique) memes (blue circles) a user receives in her timeline by following a set of followees Uu = ∗ {u1, . . . , u5} (left), and U t(Iu) = {u 5} (right) is the set cover (of users) that, if followed, would provide the same set of memes Iu as early as possible. In the illustration, each user ui adopts the memes within the associated ellipsoid for the first time after a delay indicated by the red number. Hence, the delay efficiency is Et u = 1/(1 + 30/13). ∗ 1, . . . , u First, it is easy to see that the example of extreme link inefficiency due to following users posting exactly the same memes, also leads to in-flow inefficiency. Second, there is another type of in-flow inefficiency, which we il- lustrate by an additional extreme example. Consider user u that fol- lows Uu other users and the amount of tweets produced by these followees has a divergent mean, e.g., it has a Pareto distribution (a power law) with exponent α ≤ 1. Then, if there exists another set of Uu users mentioning the same unique memes and the amount of tweets produced by them has a non-divergent mean, e.g., it is a Pareto distribution with exponent α > 1, the user's efficiency will converge to zero as Uu increases, i.e., limUu→∞ El u = 0. Asymptotically, an infinite in-flow could be replaced with a finite in-flow that include the same set of unique memes. Computing in-flow efficiency: In practice, computing the opti- mal set of users U f(Iu) reduces to solving the weighted set cover problem, which is also NP-hard. Analogously, we can find an ap- proximate solution to U f(Iu) using a greedy algorithm [15], which returns an O(log d) approximation to the set cover with minimum in-flow, where d = maxv∈U I v is the maximum number of memes posted by any user. Refer to Algorithm 2 for a full description of our procedure to approximate in-flow efficiency with an approxi- mation factor O(log d). 3.3 Delay efficiency Definition: Consider a user u and the set of unique memes Iu she is exposed to through her feed in a given time period, by fol- lowing Uu users. Then, we define the optimal set U t(Iu) as the set of users that, if followed, would expose the user to, at least, Iu, with the smallest time delay. Here, we define the delay at ac- quiring a meme provided by a set Uu as the difference between the time when a user in Uu first mentions the meme and the time when the meme was first mentioned during the given time period by any user in the whole social media system. We then define the delay efficiency of a user u at acquiring memes as Et u = 1 1 + (cid:104)ti − t0 i(cid:105)i∈Iu , (3) (A) Link efficiency (B) In-flow efficiency (C) Delay efficiency Figure 5: The distributions of link, in-flow, and delay efficiencies for the four types of memes. Figure 6: The distribution of the ratio between the number of received tweets and unique memes. i is the where ti is the time a user in Uu first mentions meme i, t0 time when the meme is first mentioned by a user in the whole social media system, and (cid:104)ti−t0 i(cid:105)i∈Iu is an average delay over all memes received by user u, measured in days. The delay efficiency Et u = 1 if the followees of the user u are the first to post the set of memes Iu in the whole system. The delay efficiency becomes lower than 1 when the user is exposed to the memes at later times than their time of birth. The larger is the average delay of received memes, the smaller is the delay efficiency. Figure 4 illustrates our definition of delay efficiency using an example. Computing delay efficiency: In this case, we can compute the delay efficiency directly by finding when each of the memes ap- peared for the first time in the system, without resorting to approx- imation algorithms, as in the case of link and in-flow efficiencies. One can query the first time of appearance for each meme in O(1) by building a mapping between memes and their first time of ap- pearance in a hashtable. 3.4 Efficiency of Twitter users Once we have the three definitions of users' efficiency defined by Eqs. 1-3, we use them to investigate how efficient Twitter users are at acquiring four different types of memes: hashtags, URLs, news domains and YouTube videos. First, we estimate the empirical probability density function3 (PDF) for each type of efficiency and meme. We show the results in Figure 5, in which we find several interesting patterns. First, all PDFs resemble a normal distribution, however, their peaks (modes) and widths (standard deviations) differ across efficiencies and type of memes. For most users and most types of memes, the effi- ciency value is significantly below one, giving empirical evidence that users are typically sub-optimal. Second, while the PDFs for 3The PDFs have been empirically estimated using kernel density estimation [7]. (A) Link efficiency (B) Inflow efficiency Figure 7: The average link and in-flow efficiencies versus the percentage of covered memes. link (Figure 5A) and delay (Figure 5C) efficiencies look quite sim- ilar, the in-flow efficiency differs significantly (Figure 5B). Third, users are most efficient at acquiring YouTube videos, followed by URLs and hashtags, and news domains. This order coincides with the ordering of the exponents of the corresponding power-law dis- tribution of memes' popularity (Figure 1A), i.e., the exponent of the power-law (its absolute value) is the highest for YouTube links, followed by URLs and hashtags, and finally for news domains. Note that the higher the exponent is, the higher the proportion of non-popular memes with respect to the popular ones, and thus one can conclude that users are more efficient at acquiring non-popular memes than popular memes. A plausible explanation is that users posting non-popular memes are likely to be included in the opti- mal set, since there is nobody else who posts these memes and, as a consequence, the optimal set differs less from the original set of followees. Moreover, note that in Figure 5B, the in-flow ef- ficiency of both news domains and YouTube videos is shifted to the left (i.e., presents much lower efficiency values) compared to the link efficiency in Figure 5A. This shift is due to the fact that, as shown in Figure 6, ratio between the total number of received tweets and unique memes is much larger for unique news domains and YouTube video memes than for hashtags and URLs, which in turn, translates into a lower in-flow efficiency. In the above measurements, we estimated the probability density functions of user's efficiency considering full coverage of the re- ceived memes. Importantly, it is straightforward to extend our def- initions of link and in-flow efficiencies to account for partial cov- erage, by simply considering a set of users that, if followed, would expose the user to, at least, a percentage of the unique memes Iu, by stopping the greedy algorithm whenever the given percentage is reached. Note, however, that computing the efficiency for a partial 0.00.20.40.60.81.0LinkEfficiency,El0123456789PDFHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0InflowEfficiency,Ef10−1100101102PDFHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0DelayEfficiency,Eδ024681012PDFHashtagsURLsNewsdomainsYouTube10−210−1100101102103104In-flow/#uniquecontagions10−710−610−510−410−310−210−1PDFHashtagsURLsNewsdomainsYouTube20%40%60%80%100%Coverage0.00.20.40.60.81.0LinkEfficiencyHashtagsURLsNewsdomainsYouTube20%40%60%80%100%Coverage0.00.20.40.60.81.0InflowEfficiencyHashtagsURLsNewsdomainsYouTube (A) Hashtags, URLs, news (B) YouTube videos (A) Effect of in-flow efficiency optimization on link efficiency (B) Effect of delay efficiency optimization on link efficiency Figure 8: The average popularity of covered memes as a func- tion of the percentage of covered memes. (A) 100% Coverage (B) 80% Coverage Figure 9: In-flow efficiency measured for hashtags appearing in the time periods of different lengths. The results for other efficiencies and meme types are qualitatively the same. coverage based on the full set of followees would be unfair, since some of the followees in Uu may be not tweeting any of the covered memes. Thus, for the purpose of computing the efficiencies for par- tial coverage, we take into account only the users in Uu who tweet at least one of the covered memes. Figure 7 shows the average link and in-flow efficiencies against coverage for the same four memes. As one may have expected, the higher the coverage, the higher the link and in-flow efficiency, since the memes that are covered first by the greedy algorithm are the popular ones, as shown in Figure 8. This result confirms that users are more efficient at acquiring less popular information, but less so at acquiring more popular infor- mation. A plausible explanation is that less popular information is produced by only a handful of users and so the optimization is limited to this set of users. Finally, we investigate if our results are consistent across differ- ent time periods. In particular, we measure user efficiency based on time periods of different lengths: one, two, four and eight weeks. In Figure 9A, we can observe that as we increase the period, there are more unique memes there to cover, which results in an increase in the efficiency. However, the distribution of efficiency is nearly unchanged for 80% coverage (Figure 9B). Thus, the findings pre- sented in this study are qualitatively robust to the choice of time period. Additionally, we find that the choice of the week does not influence the distributions of efficiency, however, these results are not shown due to space limitation. 4. CROSS-EFFICIENCY In our definitions of efficiency, the optimal set for a given user is the set of users that minimizes the number of links, in-flow or delay, while covering the same set of unique memes. However, this naturally raises the question as to how efficient the optimal sets for a given definition of efficiency are in terms of the other defini- (C) Effect of link efficiency optimization on in-flow eff. (D) Effect of delay efficiency optimization on in-flow eff. (E) Effect of link efficiency optimization on delay eff. (F) Effect of in-flow efficiency optimization on delay eff. Figure 10: The effect of optimization of one of the efficiencies on another efficiency, plotted as the ratio of the efficiency in the optimized network and the original network against the num- ber of followees. The dashed line marks the ratio equal to 1, which corresponds to the lack of change in the efficiency due to the respective optimization. tions. For example, how efficient is the link-optimal set with re- spect to in-flow or delay efficiency? In this section, we first address this question, then introduce the idea of finding sets of users that jointly optimize multiple notions of efficiency, and finally develop a heuristic algorithm that simultaneously improves both in-flow and delay efficiency of users. 4.1 Cross-efficiency of optimal sets Given a user u and the set of unique memes Iu she is exposed to in a given time period, our definitions of efficiency compare the original set of followees with the optimal sets U l(Iu), U f(Iu) and U t(Iu) in terms of number of links, in-flow and average delay, respectively. Here, we assess the efficiency of the optimal sets for each definition of efficiency in terms of the other definitions, which we call cross-efficiencies. More specifically, we compute the link efficiency of the optimal sets for in-flow and delay efficiency, i.e., the in-flow efficiency of the optimal sets for link and delay effi- u,t = U l(Iu) U t(Iu) , u,f = U l(Iu) El U f(Iu) and El 20%40%60%80%100%Coverage02000400060008000100001200014000AveragepopularityHashtagURLsNewsdomains20%40%60%80%100%Coverage405060708090100AveragepopularityYouTube0.00.20.40.60.81.0Efficiency,Ef0.00.51.01.52.02.5PDF1week2weeks4weeks8weeks0.00.20.40.60.81.0Efficiency,Ef0123456789PDF1week2weeks4weeks8weeks101102103104105Numberoffollowees2−22−120212223242526Elu,f/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−120212223242526Elu,t/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Efu,l/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−32−22−12021222324Efu,t/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Etu,l/EtuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees2−22−12021Etu,f/EtuHashtagsURLsNewsdomainsYouTube ciency, i.e., Ef u,l = f (U f(Iu)) f (U l(Iu)) and Ef u,t = f (U f(Iu)) f (U t(Iu)) , and the delay efficiency of the optimal sets for link and in-flow efficiency, i.e., Et u,l = 1 i − t0 and Et u,f = 1 i − t0 , i i(cid:105)i∈Iu 1 + (cid:104)tf 1 + (cid:104)tl i(cid:105)i∈Iu where tl i is the time a user in U l(Iu) first mentions meme i and tf is the time a user in U f(Iu) first mentions meme i. Typically, we would like to know if an efficiency of an optimized information network is increased in comparison with the efficiency of the original network. Thus, in the reminder of this section we focus on measuring the ratio of an efficiency of the optimized and original networks. If the ratio is higher than one for the given opti- mization algorithm, then the corresponding efficiency is improved by that algorithm with respect to the original set of followees. If the ratio is below one then the respective efficiency is decreased by the optimization algorithm. We measure the ratio between the efficiency of the optimal sets and the original set of followees for the three definitions of effi- ciency (see Figure 10). The ratio tends to be below one or close to one for most meme types, which indicates that optimizing for one definition of efficiency generally results in decreased efficiency with respect to the other two definitions. However, there are a few exceptions. For example, in terms of link and in-flow efficiency, the optimal sets for news domains are more efficient than the original sets (diamonds in Figures 10A, 10B, and 10D). This observation may happen due to the following rea- son: news domains tend to be more popular than the other types of memes (as shown in Figure 1). As a consequence, a user may receive multiple copies of the same news domain from various fol- lowees, and it is very easy to find efficient sets in terms of in-flow; it is enough to simply remove some of their followees from the network to improve both link and in-flow efficiencies.4 Finally, in Figures 10A-10D, we note that the improvement in the link and in-flow efficiencies tends to grow with the number of followees due to the increased number of redundant (non-unique) information received by the users who follow many other people. However, in Figures 10E-10F, the improvement in the delay effi- ciency tends to drop with the number of followees because it is likely that users who receive many copies of the same meme re- ceive it early on. Thus, for users with many followees, it is harder to improve the delay efficiency. 4.2 Joint-optimization of efficiencies So far, we have looked for optimal sets of users in terms of a single efficiency (be it link, in-flow or delay). Moreover, in the previous section, we have shown that optimal sets in terms of a single efficiency typically decrease the other efficiencies. There- fore, one could imagine developing an algorithm a looking for sets of users that are optimized with respect to several efficiencies; in other words, a multi-objective algorithm. Given such an algorithm a, we could compute the efficiency of the optimal set Ua(Iu) with 4In fact, over 85% of users receive less unique news domains than they have followees. Algorithm 3: Greedy set cover for jointly optimizing in-flow and delay efficiencies Input: set of all users U; set of unique memes Iu; set of Set U * = ∅; Set X = Iu; while X (cid:54)= ∅ do memes I v posted by user v = arg minv∈U\U f v T β N α Iv∩X ; v ∗ Set v Set U * = U * ∪ {v Set X = X\I v ∗ ∗ }; end Output: U * respect to single quantities, i.e., u,a = U l(Iu) El U a(Iu) Et u,a = , Ef u,a = 1 i − t0 1 + (cid:104)ta f (U f(Iu)) f (U a(Iu)) i(cid:105)i∈Iu and where ta i is the time a user in U a(Iu) first mentions meme i. Ideally, we would like to find optimal sets that are efficient with respect to the considered quantities. Here, as a proof of concept, we next de- velop a heuristic method to find sets of users optimized with respect to both in-flow and delay. Joint optimization of in-flow and delay efficiency We leverage the greedy algorithm from the weighted set cover prob- lem to design a heuristic method that finds sets of users with high in-flow and delay efficiencies, while delivering the same unique In particular, in the memes to the user (refer to Algorithm 3). heuristic method, the weights are powers of tweets in-flow N α v and average delay T β v over all unique memes produced by the user v. The exponents α and β can be readily adjusted to induce higher or lower in-flow efficiency and delay efficiency, respectively. Here, we experiment with α = 1 and β = 0.5, which achieves a good balance between in-flow and delay efficiency. We summarize the ratio of link, in-flow and delay efficiency of the set of users provided by our heuristic method and the original set of followees in Figure 11. We discus several interesting obser- vations. First, since the algorithm does not optimize with respect to the number of links, the link efficiency is not improved by this algorithm, i.e., the ratio between the link efficiency of the set pro- vided by the heuristic method and the link efficiency of the original set of followees ratio is around or below 1 for three out of four meme types. Second, we find that both in-flow and delay efficien- cies are significantly increased over the efficiency of the original set of followees for all types of memes. The in-flow efficiency is, on average, 7.4-times higher for news domains, 1.8-times higher for hashtags, 1.3-times higher for URLs, 1.2-times higher for YouTube videos. The delay efficiency is, on average, 1.8-times higher for news domains, 1.4-times higher for hashtags, 1.4-times higher for URLs, 1.2-times higher for YouTube videos. There is always an in- crease in in-flow and delay efficiencies independently of the num- ber of followees that the users have originally. However, while the improvement in the in-flow efficiency tends to be larger for users with many followees, the improvement in the delay efficiency is larger for users with fewer followees. Thus, we conclude that our algorithm increases both in-flow and delay efficiency of users. (A) Effect on link efficiency (B) Effect on in-flow efficiency (C) Effect on delay efficiency Figure 11: The effect of optimization of both in-flow and delay efficiencies on different types of efficiencies, plotted as the ratio of the affected efficiency of the optimized network and the original network against the number followees. (A) Original (B) Minimal set cover Figure 12: Ego-networks for a Twitter user (red node). Some users (black nodes) only belong to one of the ego-networks while others (gray nodes) belong to both. The original ego- network contains more triangles than the ego-network induced by the minimal set cover, whose structure is closer to a star. 5. STRUCTURE OF EGO NETWORKS: ORIGINAL VS. OPTIMIZED In the previous sections, we have introduced three meaningful definitions of efficiency and applied them to show that Twitter users tend to choose their information sources inefficiently. In this sec- tion, we investigate the rationale behind this sub-optimal behavior by comparing the structure of the user's ego-networks associated with both the original set of followees and the sets optimized for efficiency. Here, we define a user's ego-network as the network of connections (who-follows-whom) between the ego user and her followees. First, as an example, we take one particular user and illustrate the structure of her original ego-network and the ego-network of an optimal set in terms of link efficiency (Figure 12). By visual comparison of both ego-networks, we can see that while the ego- network induced by the optimal set displays a structure much closer to a star, the original ego-network contains many more triangles and higher clustering coefficient. Due to its proportionally lower number of triangles, the optimal set is not discoverable by triadic closure [26, 13, 24] or information diffusion [5], which have been recently shown to be two major driving forces for link creation in social networks [28, 23, 3]. Remarkably, this phenomenon happens systematically across all users, efficiency definitions, and types of memes, as displayed in Figure 13, which shows the distribution of local clustering coef- ficient (LCC) for the users' original ego-networks and the ego- (A) Hashtags (B) URLs (C) News domains (D) YouTube videos Figure 13: The distributions of local clustering coefficient (LCC) of the original ego-network (green circles) and the ego- networks optimized for link (blue circles), in-flow (red cir- cles), delay (teal circles), and inflow-delay efficiency (black cir- cles) for: (A) hashtags, (B) URLs, (C) news domains, (D) and YouTube videos. networks induced by different optimized sets. We find that while the LCC distribution for the original ego-networks is well spread and centered at 0.15 − 0.30, the LCC distributions for the ego- networks induced by the optimal sets are skewed towards zero.5 One could still think that this is simply a consequence of differ- ences in the number of followees, i.e., the size of the ego-network. However, Figure 14 rules out this possibility by showing a striking difference of several orders of magnitude between the LCC of the original ego-networks and the ego-networks induced by the opti- mal sets across a wide range of number of followees. These find- ings suggest that the way in which social media users discover new people to follow (e.g., triadic closure or information diffusion) or 5Note that the distribution of clustering coefficient of inflow-delay optimized network is located between distributions of in-flow opti- mized and delay optimized ego-networks. 101102103104105Numberoffollowees2−22−120212223242526Elu,a/EluHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees202122232425Efu,a/EfuHashtagsURLsNewsdomainsYouTube101102103104105Numberoffollowees202122Etu,a/EtuHashtagsURLsNewsdomainsYouTube0.00.20.40.60.81.0LCC01020304050PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC05101520253035PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC10−1100101102PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks0.00.20.40.60.81.0LCC10−1100101PDFOriginalego-networksLinkoptimizedego-networksIn-flowoptimizedego-networksDelayoptimizedego-networksInflow-delayoptimizedego-networks (A) Hashtags (B) URLs (A) Hashtags (B) URLs (C) News domains (D) YouTube videos (C) News domains (D) YouTube videos Figure 14: Average local clustering coefficient versus the num- ber of followees in the original ego-network (green circles) and the ego-networks optimized for link (blue squares), in-flow (red triangles), delay (teal triangles), and inflow-delay efficiency (black triangles). Figure 15: Local clustering coefficient of the optimized ego- networks versus the overlap between the original ego-network and the ego-networks optimized for link (blue squares), in- flow (red triangles), delay (teal triangles), and inflow-delay effi- ciency (black triangles). receive recommendations (e.g., pick people in a 2-hop neighbor- hood [1]) can lead to sub-optimal information networks in terms of (link, in-flow and delay) efficiency. We have argued that optimal sets typically differ from the orig- inal set of followees due to their low number of triangles in the associated ego-networks, and thus lack of discoverability. How- ever, are optimal sets with higher number of triangles in efficient ego-networks easier to discover for users? Figure 15 answers this question positively by showing the average local clustering coef- ficient in the ego-network induced by the optimal set against the overlap between the users in the optimal set and the original set of followees. Here, by overlap we mean the fraction of users in the optimal set that are also in the original set of followees. In partic- ular, we find a positive correlation (Pearson's 0.07 < r < 0.55, −10) between the local clustering coefficient and the over- p < 10 lap, which indicates that if the nodes in the optimal set are discov- erable through triadic closure, the user may be more likely to find them and decide to follow them. 6. DISCUSSION We have defined three intuitive notions of user's efficiency in so- cial media -- link, in-flow and delay efficiency -- to assess how good users are at selecting who to follow within the social media system to acquire information. Our framework is general and applicable to any social media system where every user follows others within the system to receive the information they produce. We have then leveraged our notions of efficiency to help us in understanding the relationship between different factors, such as the popularity of re- ceived information and the users' ego-networks structure. Here, we have focused on three definitions of efficiency (link, in-flow, and delay). However, we could leverage this idea to de- fine more complex notions of efficiency. For example, we could define efficiency in terms of diversity, i.e., it would be interesting to find the set of users that, if followed, would cover the same unique memes while maximizing the diversity of topics or per- spectives that are delivered with the memes, and then compare this set with the original set of followees in terms of diversity. This would provide a framework to mitigate the effects of the filtering bubble and echo chamber present in current social media systems. Moreover, some of the memes could be treated preferentially over other memes. This could be achieved by means of covering a list of non-unique memes favoring repetitions of a preferential subset of memes, e.g., memes matching the user's interests should be de- livered to the user more often. Remarkably, these more complex notions of efficiency can often be expressed as integer linear pro- grams, similarly to the minimal set cover problem, which can be solved using relaxation methods with provable guarantees [27]. Additionally, we have introduced a heuristic method that im- proves both in-flow and delay efficiency of users, while still de- livering them the same unique memes. Similar heuristics can be naturally designed to optimize efficiency with respect to multiple quantities (be it link, in-flow, delay, or diversity). In this context, it would be very interesting to design methods with provable guar- antees to find sets of users that are optimal with respect to multiple quantities. Our work also opens other interesting venues for future work. For example, we have defined and computed a measure of effi- ciency for each user independently. However, one could also think on global notions of efficiency for the Twitter information network as a whole, perhaps using a multi set cover approach. Finally, since we have applied our framework to study information efficiency only on Twitter, it would be interesting to study information effi- ciency of other microblogging services (Weibo, Pinterest, Tumblr) and social networking sites (Facebook, Google+). 7. REFERENCES 101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay100101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay101102103104Numberoffollowees10−510−410−310−210−1100LCCOriginalLinkIn-flowDelayInflow-delay0.00.20.40.60.81.0OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.56In-flow,r=0.5Delay,r=0.18Inflow-delay,r=0.120.00.20.40.60.81.0OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.54In-flow,r=0.47Delay,r=0.32Inflowdelay,r=0.280.000.050.100.150.200.250.30OverlapN∗∩N/N10−410−310−210−1100LCCLink,r=0.23In-flow,r=0.0Delay,r=0.8Inflow-delay,r=0.70.00.20.40.60.81.0OverlapN∗∩N/N10−310−210−1100LCCLink,r=0.64In-flow,r=0.53Delay,r=0.62Inflow-delay,r=0.52 International Conference on World Wide Web, pages 591 -- 600, 2010. [19] K. Lerman and T. Hogg. Leveraging position bias to improve peer recommendation. PLoS One, 9(6), 2014. [20] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 497 -- 506, 2009. [21] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 420 -- 429. ACM, 2007. [22] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 29 -- 42, 2007. [23] S. A. Myers and J. Leskovec. The bursty dynamics of the twitter information network. In Proceedings of the 23rd International Conference on World Wide Web, pages 913 -- 924, 2014. [24] D. M. Romero and J. Kleinberg. The directed closure process in hybrid social-information networks, with an analysis of link formation on twitter. In Proceedings of the 4th International AAAI Conference on Weblogs and Social Media, 2010. [25] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In Proceedings of the 20th International Conference on World Wide Web, pages 695 -- 704, 2011. [26] G. Simmel. The Sociology of Georg Simmel. Free Press of Glencoe, 1950. [27] V. V. Vazirani. Approximation algorithms. Springer, 2001. [28] L. Weng, J. Ratkiewicz, N. Perra, B. Gonçalves, C. Castillo, F. Bonchi, R. Schifanella, F. Menczer, and A. Flammini. The role of information diffusion in the evolution of social networks. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 356 -- 364, 2013. [29] R. West and J. Leskovec. Automatic versus human navigation in information networks. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, 2012. [30] R. West and J. Leskovec. Human wayfinding in information networks. In Proceedings of the 21st International Conference on World Wide Web, pages 619 -- 628, 2012. [1] L. A. Adamic and E. Adar. Friends and neighbors on the web. Social networks, 25(3):211 -- 230, 2003. [2] E. Agichtein, C. Castillo, D. Donato, A. Gionis, and G. Mishne. Finding high-quality content in social media. In Proceedings of the 1st International Conference on Web Search and Data Mining, pages 183 -- 194, 2008. [3] D. Antoniades and C. Dovrolis. Co-evolutionary dynamics in social networks: A case study of twitter. arXiv preprint arXiv:1309.6001, 2013. [4] M. Babaei, P. Grabowicz, I. Valera, and M. Gomez-Rodriguez. On the users' efficiency in the twitter information network. In Proceedings of the 9th International AAAI Conference on Weblogs and Social Media, 2015. [5] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web, pages 519 -- 528, 2012. [6] R. Bosagh Zadeh, A. Goel, K. Munagala, and A. Sharma. On the precision of social and information networks. In Proceedings of the first ACM conference on Online social networks, pages 63 -- 74. ACM, 2013. [7] A. W. Bowman and A. Azzalini. Applied smoothing techniques for data analysis. Clarendon Press, 2004. [8] C. Castillo, M. Mendoza, and B. Poblete. Information credibility on twitter. In Proceedings of the 20th International Conference on World Wide Web, pages 675 -- 684, 2011. [9] M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proceedings of the 4th International AAAI Conference on Weblogs and Social Media, pages 10 -- 17, 2010. [10] N. A. Christakis and J. H. Fowler. Social network sensors for early detection of contagious outbreaks. PloS one, 5(9):e12948, 2010. [11] M. Farajtabar, M. Gomez-Rodriguez, N. Du, M. Zamani, H. Zha, and L. Song. Back to the past: Source identification in diffusion networks from partially observed cascades. In Proceedings of the 18th International Conference on Artificial Intelligence and Statistics, 2015. [12] M. Gomez-Rodriguez, K. Gummadi, and B. Schoelkopf. Quantifying Information Overload in Social Media and its Impact on Social Contagions. In Proceedings of the 8th International AAAI Conference on Weblogs and Social Media, pages 170 -- 179, 2014. [13] M. S. Granovetter. The strength of weak ties. American journal of sociology, pages 1360 -- 1380, 1973. [14] N. Hodas and K. Lerman. How visibility and divided attention constrain social contagion. In Proceedings of the 2012 ASE/IEEE International Conference on Social Computing, pages 249 -- 257, 2012. [15] D. S. Johnson. Approximation algorithms for combinatorial problems. In Proceedings of the fifth annual ACM symposium on Theory of computing, pages 38 -- 49. ACM, 1973. [16] R. M. Karp. Reducibility among combinatorial problems. Springer, 1972. [17] M. Kearns. Experiments in social computation. Communications of the ACM, 55(10):56 -- 67, 2012. [18] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In Proceedings of the 19th
1604.03454
1
1604
2016-04-12T15:50:11
GenPerm: A Unified Method for Detecting Non-overlapping and Overlapping Communities
[ "cs.SI", "physics.soc-ph" ]
Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping and overlapping communities, without any prior input about the network or its community distribution. To do so, we introduce a vertex-based metric, GenPerm, that quantifies by how much a vertex belongs to each of its constituent communities. Our community detection algorithm is based on maximizing the GenPerm over all the vertices in the network. We demonstrate, through experiments over synthetic and real-world networks, that GenPerm is more effective than other metrics in evaluating community structure. Further, we show that due to its vertex-centric property, GenPerm can be used to unfold several inferences beyond community detection, such as core-periphery analysis and message spreading. Our algorithm for maximizing GenPerm outperforms six state-of-the-art algorithms in accurately predicting the ground-truth labels. Finally, we discuss the problem of resolution limit in overlapping communities and demonstrate that maximizing GenPerm can mitigate this problem.
cs.SI
cs
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 1 GenPerm: A Unified Method for Detecting Non-overlapping and Overlapping Communities Accepted in IEEE TKDE Tanmoy Chakraborty∗, Suhansanu Kumar, Niloy Ganguly, Animesh Mukherjee, Sanjukta Bhowmick Abstract- Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping and overlapping communities, without any prior input about the network or its community distribution. To do so, we introduce a vertex- based metric, GenPerm, that quantifies by how much a vertex belongs to each of its constituent communities. Our community detection algorithm is based on maximizing the GenPerm over all the vertices in the network. We demonstrate, through experiments over synthetic and real-world networks, that GenPerm is more effective than other metrics in evaluating community structure. Further, we show that due to its vertex-centric property, GenPerm can be used to unfold several inferences beyond community detection, such as core-periphery analysis and message spreading. Our algorithm for maximizing GenPerm outperforms six state-of-the-art algorithms in accurately predicting the ground-truth labels. Finally, we discuss the problem of resolution limit in overlapping communities and demonstrate that maximizing GenPerm can mitigate this problem. Index Terms-GenPerm, non-overlapping communities, overlapping communities, community scoring metric, algorithm ! 1 INTRODUCTION C OMMUNITY detection is one of the intensely studied problems in network science. In general terms, a com- munity is a set of vertices that have more internal connec- tions (connections to vertices within the community), than external connections (connections to vertices outside the community). A real life analogy would be groups of people with similar interests, such as in music or in sports. This description assumes a strict boundary where a vertex can belong to only one community. However, as often occurs in real world, a person might be interested in both music and sports. When vertices can belong to more than one community, then the boundaries of communities overlap. These communities are called overlapping communities as opposed to the previously mentioned non-overlapping com- munities. it From the description, is easy to see that non- overlapping communities generalize to overlapping com- munities. However, the existing state-of-the-art algorithms for detecting overlapping communities are so tuned to find overlaps that they output overlapping regions even when the communities are non-overlapping. On the other hand, most algorithms for finding non-overlapping communities cannot easily be extended to their overlapping counterparts. Therefore, even though they essentially have the same ob- jective, detecting overlapping and non-overlapping commu- nities are treated as very different problems. • TC is with University of Maryland, College Park, USA. NG and AM are with Indian Institute of Technology Kharagpur, India. SK is with University of Illinois at Urbana-Champaign, USA. SB is with University of Nebraska, Omaha, Nebraska, USA. E-mail: [email protected] that We posit this illusory division between non- overlapping and overlapping communities is only due to the limitations of the algorithms. Most of the current algo- rithms evaluate the communities as a whole and do not take into account the properties of the individual vertices. There is an implicit assumption that a vertex completely belongs to its community, and in the overlapping case, belongs equally to all its constituent communities. This premise might not be true for all the cases. A person can be interested in both music and sports, but she may like music slightly more than sports or vice-versa. A vertex-centric evaluation, that focuses on an individual's relation to the community, would be able to model this non-uniformity in belonging more realistically. for non-overlapping communities Recently, we proposed a vertex-centric metric, called "permanence" [1]. The permanence of a vertex ranges from 1 (completely belonging to its community) to -1 (assigned to a completely wrong community) and provides a quantitative measure of how much the vertex belongs to its community. It was also theoretically proved that identifying communities by maximizing permanence reduces the problem of resolution limit. There was however a caveat to this proof, namely that the vertices should be tightly connected to at most one of its neighboring communities. In other words, resolution limit is mitigated only when the communities in the network are clearly separated from each other. When a vertex becomes more tightly connected to more than one neighboring community, the communities might become overlapped. In such case, permanence fails to handle the resolution limit. Our contributions. This observation motivated us to gen- JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 eralize the concept of permanence such that it is applicable to both overlapping and non-overlapping communities. We develop a vertex-centric metric called "Generalized Per- manence" (abbreviated as GenPerm) (Section 2). GenPerm provides a quantitative value of how much a vertex belongs to each of its constituent communities. Unlike permanence which does not consider the membership of the adjacent edges of a node, GenPerm penalizes the membership value of the node if its adjacent edges share multiple community memberships. This consideration leads to a more gener- alized version of the metric – although GenPerm is de- signed for overlapping community analysis, it can easily be reduced to permanence if the underlying community structure is non-overlapping. We show that GenPerm is very effective at evaluating goodness of communities compared to other metrics because: (i) community distributions with high GenPerm exhibit high correlation with the ground- truth, and (ii) GenPerm is more sensitive to perturbations in the network (Section 4). Our main contributions are as follows: • Algorithm for unified community detection: We shall present an algorithm, based on maximizing Gen- Perm over all vertices, for unified community detec- tion, i.e., the algorithm can detect both overlapping and non-overlapping communities. In contrast to other algorithms, our method does not require prior information whether the network has overlapping or non-overlapping communities or the expected number of communities. Experimental results show that our method outperforms six state-of-the-art al- gorithms in identifying ground-truth communities. Inferences drawn from GenPerm: We shall show that GenPerm can be used in unfolding inferences be- yond community detection, including understanding the core-periphery structure of the communities and identifying good initiators for message spreading. Study of resolution limit for overlapping communities: We shall conduct the first study of resolution limit in overlapping communities and demonstrate that maximizing GenPerm can mitigate the resolution limit in overlapping communities. • • The remainder of the paper is arranged as follows. In Section 2, we illustrate our rationale for formulating GenPerm. In Section 3, we present other metrics and algo- rithms with which we shall compare GenPerm and a test suite of networks on which we shall conduct our empirical evaluations. In Section 4, we show GenPerm is superior in evaluating the quality of a detected community and is appropriately sensitive under different perturbations. In Section 5, we study how the different parameters in the GenPerm formula change with community structure. We also demonstrate how GenPerm can be used to analyze the core-periphery structure and select good initiator vertices for message spreading. In Section 6, we provide a heuristic to maximize GenPerm for overlapping community detec- tion and show how this algorithm be used for detecting non-overlapping communities depending on the network under consideration. We also show how our method is more stable under vertex orderings and outputs more accurate communities. In Section 7 we demonstrate that maximiz- 2 Fig. 1. (Color online) Toy example depicting GenPerm of a vertex v which belongs to both C1 and C2 and has two external neighboring communities, C3 and C4. The red-colored edge shares membership in both C1 and C2. ing GenPerm can reduce the effect of resolution limit. We provide a review of related work in this area in Section 8 and conclude in Section 9 with an overview of our future research plans. 2 FORMULATION OF GENERAL PERMANENCE We first provide a brief description of the formula for permanence for non-overlapping communities [1], and then discuss how we extend it for the generalized case. Notations and Preliminaries. Consider a vertex v with degree D(v). The vertex v belongs to the community X. Let the number of internal connections, i.e., the connections to other vertices in community X, of v be I(v)1. Let cin(v) be the internal clustering coefficient, i.e., clustering coefficient2 among the neighbors of v that also belong to the commu- nity X. The vertex v might have external connections to communities other than X. Let Emax(v) be the number of maximum connections that v has to a single external community. Given these factors, permanence of vertex v, P (v) is given as follows: P (v) = I(v) Emax(v) × 1 D(v) − (1 − cin(v)) (1) I(v) Emax(v) × 1 Permanence is composed of two factors. The first factor (Pull), D(v) , measures by how much v is "pulled" within its community versus how much it is pulled by the next contending community. The novelty of this measure is that it does not consider all the external connections, but only the connections to the community to which v is likely to move. If Emax(v) is zero, it is set as 1. The second factor (Connectedness), (1−cin(v)), measures how tightly the vertex v is connected in its own community. If the number of internal neighbors is less than two, then cin(v) is set to one. Formulating GenPerm. To create a generalized version of permanence, we assume that the distinction between in- ternal and external communities still holds, and there is no overlap between any internal and external community. However, among the internal connections, vertex v does not belong to just one community, but to a super-community, 1. The internal connections of a node is measured in the context of a subgraph induced by the nodes belonging to a community, i.e., I(v) = I(v, G[C]), where C is a set of nodes and G[C] is the induced subgraph. 2. The clustering coefficient for a vertex is given by the proportion of links between the vertices within its neighborhood divided by the number of links that could possibly exist between them. ggg JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 3 Properties of the real-world networks. N: number of nodes, E: number of edges, C: number of communities, ρ: average edge-density per community, S: average size of a community, ¯Om: average number of community memberships per node. TABLE 1 Networks LiveJournal Amazon Youtube Orkut Flickr Coauthorship Node type User Product User User User Researcher Edge type Friendship Co-purchased products Friendship Friendship Friendship Collaborations Community type User-defined group Product category User-defined group User-defined group Joined group Research area N 3,997,962 334,863 1,134,890 3,072,441 80,513 391,526 E 34,681,189 925,872 2,987,624 117,185,083 5,899,882 873,775 C 310,092 151,037 8,385 6,288,363 171 8,493 ρ 0.536 0.769 0.732 0.245 0.046 0.231 S 40.02 99.86 43.88 34.86 470.83 393.18 ¯Om Reference 3.09 14.83 2.27 95.93 18.96 10.45 [2] [2] [2] [2] [3] [4] C, consisting of several overlapping communities. The for- mulation of GenPerm concerns quantifying how much the vertex v belongs to each of these overlapping communities. Figure 1 shows an example of a vertex belonging to more than one community. From a permanence perspective, ver- tex v belongs to the super-community consisting of vertices A, B, C, D and H. The objective of GenPerm is to quantify by how much v belongs to the subgroups C1 and C2. I(v) Emax(v) × 1 Generalizing Pull. Let us consider the first factor in per- manence, D(v) . The terms Emax(v) and D(v) remain unchanged because the possible overlaps within C will not effect the maximum external connections or the total degree of the vertex. The internal connections, however, can now be grouped into two classes: (i) the non-shared connec- tions where an edge belongs completely to one community, such as the edge < v, C > in Figure 1, and (ii) the shared connections, such as the edge < v, B >, where the edge falls in the overlap. v We posit that the internal pull a vertex experiences in a smaller community will be the sum of the non-shared edges (as in the original permanence) plus the sum of the shared edges normalized by the number of communities over which they are shared. The normalization is necessary so that the effect of the shared edges is counted in proportion to their commitment to the different communities. Given this, the effective internal connections of v in community c, v denotes the total set of internal edges of v in community c, and xe is the number of communities in C that contains the edge e. where c ∈ C is I c(v) = (cid:80) , where Γc e∈Γc 1 xe Generalizing Connectedness. The second part of the for- mula concerns how tightly connected v is with its internal neighbors. The permanence formulation computes this as a penalty factor, as one minus the internal clustering coeffi- cient. The computation of the clustering coefficient remains the same, because we are still computing the connectedness of the neighbors. However, if the neighbors are endpoints to a shared edge, they may not belong equally to the com- munity. To take this into account, we normalize the internal clustering coefficient by the fraction of the effective internal connections of the vertex v. Therefore the connectedness of v in community c, where c ∈ C is (1 − cc 1 xe . e∈Γc v I(v) Taking these two factors together, we compute GenPerm, P c g (v) of v in community c as follows: (cid:80) in(v)) · (cid:80) (cid:80) P c g (v) = e∈Γc 1 xe Emax(v) v × 1 D(v) − (1 − cc in(v)) · 1 xe (2) e∈Γc I(v) v This formula can be written as, × 1 D(v) g (v) = Emax(v) I c(v) P c − (1 − cc in(v)) · I c(v) I(v) (3) As shown in Equation 3, the values of GenPerm still maintain the bounds of permanence, i.e, between 1 (vertex is completely integrated within a clique) and -1 (vertex is wrongly assigned). The GenPerm over the network is given by the mean of the GenPerm values of the vertices. A high GenPerm indicates that most of the vertices in the network are assigned to their correct communities. Therefore, a good or accurate community assignment is the one that maxi- mizes GenPerm. communities C can be computed as Pg(v) =(cid:80) The total GenPerm of a vertex over all its associated g (v). (cid:80) The total GenPerm of a network G, with the vertex set V , is the average of the GenPerm values of all the vertices, v∈V Pg(v). Note that when C = 1, i.e., Pg(G) = 1V i.e., the super-community consists of only one community, Pg(v) = P (v). These derivations show that GenPerm is indeed a generalization of permanence. It can break down the belongingness of a vertex to the smaller communities within the super-community. Under special boundary cases, when the super-community is just one community, Gen- Perm translates to the same formula as permanence. There- fore, GenPerm is a rare metric that can be useful for both non-overlapping and overlapping community detection. c∈C P c 3 EXPERIMENTAL SETUP We shall now present our empirical results where we com- pare communities obtained through maximizing GenPerm with the ground-truth communities from our test suite. Since GenPerm is a generalized metric, it should be equally successful in finding both non-overlapping and overlapping communities. However, we observed that almost all net- works have some degree of overlapping communities, even the ones claiming to have (or create) only non-overlapping communities. The ground-truth provided by the apparent non-overlapping communities merely ignore the overlaps that occur. In these cases, the ground-truth cannot be accu- rately compared with the communities produced by Gen- Perm, because GenPerm identifies the hidden overlaps as well. Therefore, for an equitable comparison against ground- truth, we shall conduct experiments on datasets that are known to have overlapping communities, and use met- rics for evaluating overlapping communities to assess our results. To demonstrate that maximizing GenPerm is also successful in identifying non-overlapping communities, we show its performance on idealized networks consisting of loosely connected cliques. JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 3.1 Test Suite of Networks Our synthetic test set consists of LFR3 benchmark networks [5]. LFR provides a rich set of parameters to control the network topology, including the percentage of overlapping nodes On, number of communities to which a node belongs Om, the number of nodes n, the mixing parameter µ, the average degree ¯k, the maximum degree kmax, the maximum community size cmax, and the minimum community size cmin. Unless otherwise stated, we generate LFR graphs with the following configuration: µ = 0.2, N=1000, Om=4, On=5%; other parameters are set to their default values4. Note that for each parameter configuration, we generate 100 LFR networks, and the values in all the experiments are reported by averaging the results. We also use six real networks whose underlying ground-truth community structures are known a priori. The properties of these networks are summarized in Table 1. Sampling real-world networks. Most of the baseline com- munity detection algorithms (Section 3.3) do not scale to large networks. Therefore, we use the technique from [2] to obtain subnetworks with overlapping community structure from larger networks. We pick a random node u in graph G that belongs to at least two communities. We then take the subnetwork to be the induced subgraph of G consisting of all the nodes that share at least one ground-truth community membership with u. In our experiments, we created 500 different subnetworks for each of the six real-world datasets, and the results are averaged over these 500 samples5. The properties of the sampled graphs are reported in SI Text. 3.2 Overlapping Community Scoring Metrics We compare GenPerm with the following metrics for evalu- ating quality of the overlapping community structure. • Modularity: Shen et al. [6] introduced EQ, an adaptation of modularity function [7] for overlapping communities: (cid:88) (cid:88) (cid:20) (cid:21) EQ = 1 2m 1 Aij − kikj 2m c∈C i∈c,j∈c OiOj (4) where, Aij indicates (i, j) entry in the adjacency matrix A, m is the number of edges in the graph, C is the set of communities, and Oi is the number of communities to which the node i belongs. L´az´ar et al. [8] provided a more complex formulation of modularity for overlapping community structure: (cid:34)(cid:80) i∈c (cid:88) (cid:80) j∈c,i(cid:54)=j Aij−(cid:80) j /∈c di·si c∈C nc (cid:19)(cid:35) (5) Aij c(cid:18)nc · ne 2 Qov = 1 C where C is the set of communities, nc and ne c are the number of nodes and edges that community c contains respectively, di is the degree of node i, and si is the number of communities to which i belongs. 3. http://sites.google.com/site/andrealancichinetti/files. 4. https://sites.google.com/site/santofortunato/inthepress2 5. Note that in the rest of the paper while reporting the average results over many samples, we notice that the variance is significantly less. Therefore, we omit reporting the variance for the sake of brevity. 4 • Community Coverage (CC): This metric [9] counts the fraction of nodes that belong to at least one community of three or more nodes. A size of three is chosen since it constitutes the smallest non-trivial community structure. • Overlap Coverage (OC): This metric [9] counts the aver- age number of node memberships in non-trivial communi- ties (of size at least three). 3.3 Baseline Algorithms We compare our method with the following state-of-the-art overlapping community detection algorithms. These algo- rithms together cover the types of overlapping community detection heuristics mentioned in [10]: (a) Local expansion and optimization: OSLOM [11], EAGLE [6] (b) Agent-based dy- namical algorithms: COPRA [12], SLPA [13] (c) Fuzzy detection using mixture model: MOSES [14], BIGCLAM [2]. 3.4 Community Validation Metrics We use the following metrics that quantify the level of correspondence between the ground-truth communities and those obtained from an algorithm: (a) Overlapping Normal- ized Mutual Information (ONMI) [15], (b) Omega (Ω) Index [16], (c) F-Score [2]. The higher the value of the metrics, the closer the match with the ground-truth (see SI Text). 4 GENPERM FOR COMMUNITY EVALUATION We now demonstrate that GenPerm is a better metric for evaluating the quality of communities than the metrics listed in Section 3.2. 4.1 Correspondence to Ground-truth Structure We show using rank correlation (following the approach in [17]) that communities with high GenPerm best correspond to the ground-truth. To do so, we perform the following steps (Table 2 is used to illustrate this experiment): (i) For each network, we execute six algorithms from Section 3.3 and obtain the communities; (ii) For each of these com- munities, we compute the GenPerm value and the scoring metrics discussed in Section 3.2; (iii) The algorithms are then ranked based on the value of these metrics, with the highest rank given to the highest value (as an example, in the second column of Table 2, we show the values for GenPerm and the corresponding ranks of the algorithms); (iv) The community structures are compared with the ground-truth labels in terms of the validation metrics, ONMI, Omega Index and F-score; (v) The algorithms are again ranked based on the values of each of the validation metrics (highest value/best match has the best rank) (in the third column of Table 2, the algorithms are ranked based on the values of ONMI); (vi) Finally, we obtain Spearman's rank correlation between the rankings obtained for a scoring metric (step (iii)) and each of the ground-truth validation metric (step (v)). We posit that since these two types of measures are orthogonal, and because the validation metrics generally provide a stronger measure of correctness due to direct cor- respondence with the ground-truth structure, the ranking of a good community scoring metric should "match" with those of the validation metrics. We compare the relative JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 5 Fig. 2. (Color online) Spearman's rank correlation between five scoring metrics with three validation measures for LFR by varying (a) µ (where N=1000, Om=4, On=5%), (b) Om (where N=1000, µ=0.2, On=5%), (c) On (where N=1000, µ=0.2, Om=4) and (d) real-world networks. Note that the values of On are expressed in % of N. For Amazon network, the values of average GenPerm of the network on the output obtained from different algorithms and ONMI with respect to the ground-truth community. The ranks of the algorithms (using TABLE 2 dense ranking) are shown within parenthesis. Algorithms OSLOM EAGLE COPRA SLPA MOSES BIGCLAM Pg 0.63 (1) 0.53 (4) 0.60 (2) 0.56 (3) 0.41 (5) 0.60 (2) ONMI 0.73 (1) 0.52 (4) 0.70 (3) 0.70 (3) 0.50 (5) 0.71 (2) ranks instead of the absolute values, because the range of the values is not commensurate across the quantities and therefore the rank order is a more intrinsic measure. Figure 2 shows the correlation values for different LFR networks (where µ, Om and On are varied) and six real- world networks (the values are reported by averaging over 500 subnetworks in each case). The vertical panel corresponds to a validation measure. Each line in a panel corresponds to an evaluation function. For all the cases, the lines corresponding to Pg (average GenPerm of the network) is higher than the other metrics, which is mostly followed by Qov, EQ, CC and OC. Therefore, we conclude that GenPerm can evaluate communities better than other metrics. We also notice that with the increase in µ, the line corresponding to GenPerm tends to decrease due to the deterioration of the ground-truth community structure. However, the GenPerm-based rank correlation is almost consistent with the increase of Om and On, which is not as consistent for the other metrics. This indeed indicates that GenPerm does not get affected much with the extent of over- lap among communities as long as the explicit community structure is retained in the network. 4.2 Robustness to Perturbations So far we have examined the ability of different scoring metrics to rank algorithms according to their goodness. In this section, we evaluate the metrics on their robustness under perturbations to the network. A metric is robust if its value is commensurate with the change in ground-truth communities. This means that under small perturbations to the ground-truth, the results change slightly. However, if the ground-truth labels are highly perturbed such that the un- derlying community structure gets largely deformed, then a good community scoring metric should produce a low score. Given a graph G=<V,E> and perturbation intensity p, we start with the ground-truth community S and modify it by using the following strategies (as used in [1]). (i) Edge-based perturbation selects an inter-community edge (u, v) where u ∈ S and v ∈ S(cid:48) (S (cid:54)= S(cid:48)) and assigns u to S(cid:48) and v to S. This continues for p · E iterations. (ii) Random perturbation selects two random nodes u ∈ S and v ∈ S(cid:48) (S (cid:54)= S(cid:48)) and then swaps their memberships. This continues for p · V iterations. (iii) Community-based perturbation takes each commu- nity s from the ground-truth structure S and swaps p · s constituent nodes in s with non-constituent nodes. We perturb different networks using these three strate- gies for values of p ranging between 0.01 to 0.5, and compute five community scoring metrics, i.e., Pg, EQ, Qov, CC, CC. Figure 3 shows the representative results only for one LFR (µ = 0.2, N=1000, Om=4, On=5%) and all real-world networks. For all three strategies, the value of the scoring metrics tends to decrease with the increase in p; the effect is most pronounced in community-based strategy. For each network, once p has reached a certain threshold, the de- crease is much faster in GenPerm. This happens because the internal structure of a community completely breaks down if the perturbation is taken beyond a point and thus has an avalanche effect on the value of the clustering coefficient (cc 5 INFERENCES DRAWN FROM GENPERM We show how, due to its vertex-centric view, GenPerm can help us understand the distribution of nodes in the con- stituent communities. We also show how ranking vertices in(v) in Equation 3). JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 6 Fig. 3. (Color online) Change in the value of five overlapping community scoring functions with the increase of perturbation intensity (p) in three perturbation strategies: edge-based (top panel), random (middle panel) and community-based (bottom panel) strategies for a LFR and six real-world networks. Each data point is the average over 500 simulations. The values of each function are normalized by the maximum value obtained from that function. Most of the cases, the lines for community coverage (CC) and overlap coverage (OC) are starkly juxtapose because of their high similarity. in increasing order of GenPerm can be used to explore the core-periphery structure of a community, and in selecting initiator nodes during message spreading in networks. Fi- nally, we show how the layered structure obtained from GenPerm can affect the performance of the community detection algorithms. 5.1 Understanding the Community Structure We study the distribution of GenPerm for each node- community pair. We compute P c g of each vertex on the ground-truth communities of the benchmark networks. In Figure 4, we divide the values of P c g ranging from -1 to 1 into 20 bins on x-axis where the low (high) numbered bins contain nodes with lower (higher) P c g . On the y-axis we plot different features as described below. Fraction of vertices. In Figure 4(a) - 4(b), we plot in y- axis the fraction of vertices present in the network. This curve follows a Gaussian-like distribution, i.e., there are few vertices with very high or very low P c g values, and the majority have intermediate values. In Figure 4(a), the peak shifts from left to right with the decrease of µ (other parameters of LFR are constant). The shift in the peak shows that as the structure of the communities gets more well-defined, most vertices move towards higher values of GenPerm. The real-world networks, except Flickr show a similar Gaussian distribution in Figure 4(b), where most of the vertices fall in medium P c g range. For Flickr network, we notice in Table 1 that the communities are large (high S) and their edge density is low (low ρ). Moreover, most of the vertices in Flickr have low internal clustering coefficient (0.12, where the average for the other networks is 0.31). These factors contribute to the very low P c g . Number of constituent communities. We plot the number of communities to which a vertex belongs in Figure 4(c) - 4(d). This pattern also follows a Gaussian distribution for LFR networks. This indicates that vertices exhibiting average P c g tend to belong to multiple communities, than vertices with very high or low values. This is because vertices with very high P c g values, such as 1, tend to be tightly integrated within one community and those with low P c g values have low degree and therefore are not part of many communities. Parameters of GenPerm. In Figure 4(e) - 4(f) we plot the average value of the effective internal connections, I c(v), of vertices for each P c g bin. For each network, the values of I c(v) are normalized by the maximum value. We observe the minimum value of I c(v) is in the middle bins. This is because the vertices participating in many communities contribute a small fraction of internal edges to each commu- nity. Next, we plot the average cc in(v) of the vertices in each bin. Here we notice a nearly linear relation. Finally, we plot the degree in Figure 4(i) - 4(j). We observe that vertices with higher degree exhibit medium P c g . This is because vertices with high degree, but low effective internal connections, belong to multiple communities. Taking these results together, we conclude that the effec- tive internal connections and the degree are good indicators of the number of communities to which the vertex belongs and the internal clustering coefficient is a good indicator of the GenPerm value of the vertex. 5.2 Core-periphery Structure of Community To study the relation between GenPerm and the core- periphery of the communities, we use farness centrality (d) [18] as a measure of the position of a vertex within a com- munity. To measure farness centrality for each community, we construct the induced subgraph of all the nodes in the community and measure average shortest path for each vertex within this subgraph6. The lower the value of d for a 6. Farness centrality is just the opposite of closeness centrality in a connected component. JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 7 indicator of the position of the vertex in the community. We observe that in coauthorship network, at d = 2.8, the value of GenPerm drops suddenly, the reason being very less internal clustering coefficient of the nodes at that region of the community. We next measure assortativity (r)7 [19] with respect to GenPerm to evaluate the extent to which the vertices in a community c to attach to other vertices with similar GenPerm. For each ground-truth communities, we calculate P c g of all the vertices. Then we divide the values of P c g into 20 bins. Vertices falling in the same bin are assumed to have similar P c g , and then we measure the assortativity, r, for the vertices in the community c. We compare this measure with the degree-based assortativity of vertices in each com- munity. We observe, in Table 3, that both the synthetic and the real-world networks are highly assortative in terms of GenPerm, i.e., nodes exhibiting same P c g value are often connected with each other than the nodes with different P c g values. This result presents a new perspective about the configuration of nodes within a community: vertices in a community tend to be highly connected within each layer than across layers. Moreover communities are organized into several layers, with each layer being composed of vertices with similar GenPerm. Average of the assortativity scores, < r > (degree-based and g -based) of the communities per network. P c TABLE 3 < r > Degree-based P c g -based LFR (µ = 0.1) -0.045 0.645 LFR (µ = 0.3) -0.018 0.483 LFR (µ = 0.6) 0.139 0.421 < r > Degree-based P c g -based LiveJournal Amazon -0.275 0.497 0.037 0.465 Youtube Orkut 0.221 -0.182 0.438 0.528 Flickr -0.098 0.402 Coauthorship 0.281 0.469 Fig. 4. (Color online) The relation of average P c g with (a)-(b) fraction of vertices, (c)-(d) < Om >, average community memberships per node, (e)-(f) < I c(v) >, average internal degree (normalized by the maximum value), (g)-(h) < cc in(v) >, average internal clustering coefficient, (i)-(j) < D(v) >, average degree of nodes for LFR and real-world networks. The value of P c g of vertices in each community is equally divided into 20 buckets indicated in x-axis (bin 1: −1 ≤ P c g < −0.9, ..., bin 20: 0.9 ≤ P c g ≤ 1). Fig. 5. (Color online) Community-wise average GenPerm, < P c g > of vertices as a function of farness centrality d for LFR and real-world networks. vertex, the closer the vertex is to the core of the community. We plot average P c g of vertices as a function of d in Figure 5. We observe that for both LFR and real-world networks, average P c g decreases with the distance from the center of the community. Therefore, the value of GenPerm is a strong 5.3 Effect on Community Detection Algorithms In Section 5.2, we have noticed that GenPerm provides a gradation/ranking of nodes in each community that in turn produces a layered structure inside the community. We believe that this layered structure also affects the per- formance of different community finding algorithms. We consider the following two overlapping community detec- tion algorithms – BIGCLAM [2] and SLPA [13], and see how these algorithms get affected after removing selected nodes (based on the values of GenPerm) from the network based. To begin with, we consider the ground-truth com- munity structure of a network. Then for each community, we calculate the GenPerm for all the constituent vertices and divide the range of GenPerm into four equal bins, representing four layers. Following, we remove x% of nodes (refer to as set R) from each layer of the community in isolation (x varies from 1 to 30). At a time, we remove nodes from one layer in all the communities, run the two overlapping community finding algorithms and see for each algorithm, how the community structure obtained from the resultant graph (refer to as community Cx) matches with the community structure obtained initially without removing 7. Assortativity (r) lies between -1 and 1. When r = 1, the network is said to have perfect assortative patterns, when r = 0 the network is non-assortative, while at r = -1 the network is completely disassortative. 1510152000.10.20.3Real−world networks 1510152000.050.10.150.2Frac. of verticesLFR µ=0.1µ=0.3µ=0.6LiveJournalAmazonYoutubeOrkutFlickrCoauthorship(b)(a)1510152020406080 151015201234 <Om>(d)(c)1510152000.20.40.60.81 510152000.20.40.60.81Normalized <Ic(v)>(f)(e)510152000.20.40.60.81<cinc(v)> 510152000.20.40.60.81(g)(h)g123400.51Farness centrality, d<Pgc>LFR1234500.20.40.60.81Real−world networksLiveJournalAmazonYoutubeOrkutFlickrCoauthorshipµ=0.1µ=0.3µ=0.6 JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 any nodes (refer to as community C1). We measure the correspondence between two community structures using ONMI. Note that for fair comparison, we first remove the set of nodes R from the initial community structure C1 and then compare two communities C1 and Cx. For each value of x, the simulations are done 100 times and the average value is reported. Figure 6 shows the change in the value of ONMI with the increase in the percentage of removed nodes, x from each layer for Amazon network (the results are identical for other networks). We observe that the rate of decrease in ONMI tends to increase when the nodes are removed from inner layers. This result indicates that the nodes in the inner layers are mostly responsible to form the community structure. The removal of nodes from the core of a community results in producing amorphous community structure. We believe that this information is quite helpful in the context of community-centric immunization [20] and targeted attacks [21] in the network. Fig. 6. (Color online) Change in the value of ONMI with the removal of nodes from different layers within the communities for Amazon network. Layer 1 corresponds to the outer-most layer, and layer 4 correspon- dences to the inner-most layer. Each point in the line is an average of 100 simulations. 5.4 Initiator Selection for Message Spreading In message spreading [22], a set of source vertices (initia- tors) start sending a message. At every time step, a vertex containing the message transfers the message to one of its neighbors who does not have the message. The algorithm terminates when all vertices have received the message. The selection of the initiators is critical to how quickly the message spreads. A fundamental issue in message spreading is the se- lection of initiators. The traditional practice is to select initiators based on the degree of nodes, which was proved to be more useful than the random node selection in terms of average time steps required to broadcast the message [23]. We posit that initiator selection based on P c g would help in disseminating the message more quickly. For our experiments, we create LFR network with the number of nodes from 1,000 to 90,000, keeping the other parameters constant. We select initiators based on the following criteria separately: (i) random, (ii) highest degree, (iii) highest P c g as per ground-truth communities and (iv) highest P c g based on communities obtained by our proposed algorithm, Max- GenPerm (described in Section 6). For each network config- uration, we run 500 simulations. Figure 7 shows the average number of time steps required for the message to reach all the vertices. We observe that P c g -based initiator selection from ground-truth communities requires minimum time steps and P c g -based initiator selection for the communities obtained from MaxGenPerm is a close second. These results thus highlight the importance of P c g -based ranking within a community. 8 Fig. 7. (Color online) Number of time steps required to spread a mes- sage in LFR network by varying the number of nodes. 6 COMMUNITY DETECTION BY MAXIMIZING GEN- PERM We develop MaxGenPerm (pseudocode in Algorithm 1), an iterative method for maximizing GenPerm (the objective function of the algorithm). Such iterative methods have shown to be very effective in optimizing metrics for finding non-overlapping communities such as modularity [24] and permanence [1]. Here the challenge is to update the values based on one or more communities. Initialization: The algorithm starts with initializing each edge of a network as a separate community. Thus a vertex can belong to more than one community. Update: For each iteration, GenPerm of vertex v, P c g (v), in each of its neighboring communities c is computed. If the value of P c g (v) is greater than zero, vertex v is assigned to the community c. This creates a new set of communities, T empComm, to which v belongs. If the total GenPerm of the new community set, T empComm, is greater than the previous community set CurComm, to which v belonged then the community set of v is updated. In this manner, the communities of v are updated per iteration. In this process, one might encounter singleton communities (communities with single node); we retain the singleton communities without merging them further. The algorithm ends when there is no further improvement in the total GenPerm for all the vertices or the maximum number of iterations is reached. Convergence: There is no theoretical guarantee of the convergence of the algorithm. However we noticed that for both synthetic and large (complete) real-world networks, the algorithm converges before reaching the maximum number of iterations (we set it to 15) as follows: LFR (n=10,000, µ=0.2, On=5%, Om=4): 4, LiveJournal: 12, Ama- zon: 6, Orkut: 10, Youtube: 9, Flickr: 5, and Coauthorship: 6. Complexity analysis. Let a vertex v has degree dv and C i number of neighboring communities at iteration i; out of these C i v are communities to which v belongs. v number of communities. Let this time be T.C i At each iteration for vertex v, we add its GenPerm over all C i v. At each iteration for vertex v, we go through all the com- munities C i, to compute the update of GenPerm. Let the internal degree of v in a community c ∈ C i v be Ic. The time to compute GenPerm in c is dominated by computational 110203000.10.20.30.4% of nodes removedONMIBIGCLAM11020300.20.30.4SLPA Layer 1Layer 2Layer 3Layer 4123456789x 1041015202530# of nodesTime stepsRandomDegreeGround−truth+PgcMaxGenPerm+Pgc JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 time of the clustering coefficient. It is therefore O(I 2 c ). We compute this over all the neighboring communities. So the total time is O(C i v) · O(I 2 c ). However, the sum of Ic from all the communities will be less than equal to Rdv, where R is the maximum number of times an edge is shared between communities. Therefore, the time to update can be written as the square of sum of components that together add to Rdv. Since sum of squares of elements is less than the square of the sum of the element, therefore, an upper bound on the time is O(Rdv Therefore the total operation on v is O(T C i 2), which can be rounded to the more expensive operation O(Rd2). It is done over every vertex and for (say,) Iter iterations. So total time is O(Iter · n · (Rd2)) (where d is the average degree of the vertices ans n is the number of nodes). v) + O(Rdv 2). In order to make a comparison, we also report the complexity of all the competing algorithms in Table 4. TABLE 4 Time complexity of the competing overlapping community finding algorithms (n: number of nodes, m: number of edges, T : maximum number of iterations, d: average degree of the nodes). Algorithm OSLOM COPRA SLPA EAGLE MOSES Complexity O(n2) O(v3n) plus O(vn log(v)) per iteration, where v is maximum number of communities per vertex) O(T nk) or O(T m) O(n2 + (h + n)T ), where h is the number of cliques O(mn2) O(m) per iteration BIGCLAM MaxGenPerm O(n · (Rd2)) per iteration, where R is the maximum number of communities shared by an edge 6.1 Performance Analysis In order to evaluate MaxGenPerm, we (i) compare the detected community with the ground-truth community and measure the similarity, and (ii) check whether the algorithm is stable under different vertex orderings. 6.1.1 Comparison with ground-truth communities We run MaxGenPerm along with six other algorithms men- tioned in Section 3.3 and compare their performance with networks whose ground-truth communities are known. We further consider MaxPerm (permanence maximization) [1] as another competing method in order to see what extent it captures the underlying community structure. Since the baseline methods do not scale for large-size real networks, we use the sampled subnetworks as mentioned in Section 3.1. For the LFR benchmark, however, the results are re- ported on the entire networks. In the interest of space, the results are shown for the following setting of the LFR network: n=1000, µ=0.2, On=5% and Om=4. For each real network, we measure the average value of each validation metric for 500 different samples. For each validation metric (ONMI, Ω Index, F-Score), we separately scale the scores of the methods so that the best performing community detection method has the score of 1. Finally, we compute the composite performance by sum- ming up the 3 normalized scores. If a method outperforms all the other methods in all the scores, then its composite performance is 3. Figure 8 displays the composite performance of the methods for different networks (actual values are reported in SI Text). On an average, the composite performance g (v) ← 0.0 P temp T empComm ← ∅ for each community c in CN eigh do Temporarily assign v to community c Calculate P c if P c g (v), GenPerm of v in c (v) ← P temp g (v) > 0 then P temp T empComm ← T empComm ∪ c g (v) + P c g (v) g end if end for if P temp g P cur CurComm ← T empComm (v) > P cur (v) ← P temp (v) g g end if SumP erm ← SumP erm + P cur g (cid:46) Update CurComm if overall GenPerm is higher. g (v) then Algorithm 1 MaxGenPerm: GenPerm Maximization Input: A connected graph G = (V, E) Output: Detected overlapping communities and GenPerm of G, GenP erm G 9 Initialization: Assign each edge (two end vertices) to a separate community GenP erm G ← 0.0, SumP erm ← 0.0 OldP erm ← −1.0 Set the value of maximum number of allowable iteration as M axIter Iter ← 0 Update: while Iter < M axIter or SumP erm (cid:54)= OldP erm do Iter ← Iter + 1 OldP erm ← SumP erm for each vertex v do CurComm is the set of communities to which v belongs Find P cur g if P cur (v) == 1 then (v), the GenPerm of v in CurComm g SumP erm ← SumP erm + P cur (v) g (cid:46) CurComm represents the highest GenPerm value of v. (cid:46) No need to continue further. else Determine CN eigh, the set of neighboring communities of v (cid:46) Find overlapping permanence of v in CN eigh end if end for end while GenP erm G ← SumP erm/V return GenP erm G (v) (cid:46) GenPerm of the graph of MaxGenPerm (2.88) significantly outperforms other competing algorithms: 6.27% higher than that of BIGCLAM (2.71), 18.03% higher than that of SLPA (2.44), 101.3% higher than that of OSLOM (1.43), 36.4% higher than that of COPRA (2.11), 48.4% higher than that of MOSES (1.94), 70.41% higher than that of MaxPerm (1.69), and 77.8% higher than that of EAGLE (1.62). The absolute average ONMI of MaxGenPerm for one LFR and six real networks taken together is 0.85, which is 4.93% and 26.8% higher than the two most competing algorithms, i.e., BIGCLAM8 (0.81), and SLPA (0.67) respectively. In terms of absolute values of scores, MaxGenPerm achieves the average F-Score of 0.84 and average Ω Index of 0.83. Overall, MaxGenPerm gives the best results, followed by BIGCLAM, SLPA, COPRA, MOSES, EAGLE, MaxPerm and OSLOM. Comparison with BIGCLAM for large networks: As most of the baseline algorithms except BIGCLAM do not scale for large real networks [2], we separately compare MaxGen- Perm with BIGCLAM (which is also the most competing algorithm) on actual large real datasets. The table in Figure 8 shows the percentage improvement of MaxGenPerm over 8. We did two experiments: first, we fixed the number of communities of BIGCLAM same as that in the ground-truth structure, and second, we retained the default values to the parameters used in BIGCLAM and it automatically computed the number of communities on the fly. We observed that the second case produced comparatively better results, and therefore we report these value here. JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 10 Fig. 8. (Color online) Performance of various competing algorithms (ranging from 0 to 3) to detect the ground-truth communities. The table shows the performance improvement of MaxGenPerm over BIGCLAM in detecting communities in large real networks. BIGCLAM for different real networks. On average, Max- GenPerm achieves 17.67% higher ONMI, 14.96% higher Ω Index, and 10.78% higher F-Score. Overall, MaxGenPerm outperforms BIGCLAM in every measure and for every network. The absolute values of the scores of MaxGenPerm averaged over all the networks are 0.81 (ONMI), 0.82 (Ω Index), and 0.81 (F-Score). Therefore, the improvement of MaxGenPerm over BIGCLAM is higher considering the en- tire network in comparison to that in the sampled networks. current implementation of MaxGenPerm (BIGCLAM10) for large real networks are as follows: LiveJournal: 108,000 (86,198); Amazon: 9,145 (7,632); Orkut: 92,998 (72,806); Youtube: 31,650 (28,763); Flickr: 2,072 (1,876); and Coauthorship: 9,572 (7,983). One of the future task would be to make MaxGenPerm algorithm fast with efficient data structures. seconds) times9 of The running (in Identifying non-overlapping communities: As discussed earlier, all real-world networks contain some degree of overlaps in their communities. Therefore, we generate two examples, shown in Figure 9, to demonstrate the ability of MaxGenPerm to identify non-overlapping groups. We compare MaxGenPerm with BIGCLAM which was the clos- est competitor. For Figure 9(a), BIGCLAM produces three community structures: {0,1,2,3}, {4,5,6,7}, {1,2,3,5,4,7}; whereas MaxGenPerm detects two non-overlapping com- munities: {0,1,2,3}, {4,5,6,7}. Similarly, for Figure 9(b), BIGCLAM detects six communities: {0,1,2,3}, {4,5,6,7}, {8,9,10,11}, {12,13,14,15}, {2,4,8}, {2,8,12}; whereas Max- GenPerm produces four disjoint communities: {0,1,2,3}, {4,5,6,7}, {8,9,10,11}, {12,13,14,15}. Note that one can obtain the same community structure by using MaxPerm (perma- nence maximization) [1] as obtained from MaxGenPerm. Although these examples are on idealized networks, this experiment demonstrates that MaxGenPerm can detect non- overlapping communities, without including non-intuitive overlapping structures. 9. All the experiments that we report here were run on a 64bit Linux machine (Ubuntu 10.04.4 LTS) with 4X 2.27 GHz i3 CPU and 3GB of RAM. 10. Note other baseline algorithms are not scalable and can not run on large networks. Fig. 9. Networks containing non-overlapping community structure. 6.1.2 Effect of vertex ordering Most of the community detection algorithms are based on optimizing certain functions (such as modularity), and the values are heavily dependent on the order in which vertices are processed [25], [26]. Hence an intrinsic goodness of an algorithm can be measured in terms of its (resistant to) change in output (communities) with change in initial vertex ordering. Such changes in community structure due to vertex ordering have been observed earlier in the case of non-overlapping communities [25], [26]. This can be more specifically measured in terms of number of invariant groups of vertices which stay in the same output community in spite of the fluctuation. These groups have been termed as "constant communities" [25]. In our earlier work, we showed that despite such fluctuations in the final outcome, there exist few such constant communities which always remain same across different vertex orderings. We measure the ratio (φ) of the number of constant communities to the total number of nodes. In the worst case, the number of constant communities would be equal to the number of nodes with each node being a community. If the value of φ for an algorithm remains constant and small over different vertex orderings, then the algorithm is less sensitive to vertex ordering. By comparing the value of φ for different vertex order- ings (Figure 10), we observe that MaxGenPerm is the least sensitive algorithm, followed by BIGCLAM, SLPA, COPRA, MOSES, EAGLE and OSLOM. These results unfold another major characteristic of our algorithm that by producing lesser number of competing solutions, our algorithm is (a)(b)132465700123456789101115131412 JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 11 two criteria for identifying small but distinct groups of vertices in overlapping communities. 1) 2) Small communities that are loosely connected to larger communities will remain distinct and do not fall into the overlap between the larger communities If all the vertices in a community belong to overlap regions, the community should still be identified as a separate community by itself. These criteria are illustrated in Figure 13. Figure 13(a) shows a circle of cliques, where two consecutive cliques are connected by a bridging vertex. All the baseline algorithms output communities where the bridging vertex is an over- lapping vertex and part of two neighboring cliques (shown by the community structure marked through solid lines). However, maximum value of GenPerm is obtained when each bridging vertex forms a separate singleton community along with the individual cliques (shown by the community structure marked through broken lines), as required by Criterion 1. In Figure 13(b), we have a central clique, and four other cliques sharing one edge each with the central clique. Most baseline algorithms detect four communities (indicated by the four colors) and vertices a, b, c and d are treated as overlapping vertices. However, there are actually five cliques including the one in the center (shown by the com- munity structure marked by the broken lines). Maximizing GenPerm is able to detect these five cliques as separate communities, with overlap at the corners of the central clique. This satisfies the second criterion. We can generalize these examples to the following two theorems, over cliques of any given size as follows (see SI Text for detailed discussion): THEOREM 1. Given three cliques X, Y and Z, such that X and Z are not connected to each other and Y is connected to X and Z by two edges (ux, vx) and (uz, vz) respectively where ux ∈ X, uz ∈ Z and vx, vz ∈ Y , the highest GenPerm is obtained, if X, Y and Z are three separate communities with no overlap. Proof. We prove the theorem using the example given in Figure 13(c). The detailed proof is mentioned in SI Text. Let the size of cliques X, Y and Z be nx, ny and nz respectively. We consider the following scenarios where Y forms an overlap with X and Z. In every scenario, we only consider the sum of GenPerm of ux, vx, uz and vz because all other vertices are unaffected by any kind of community assignment and have GenPerm equal to 1. In Case 1 (shown in Figure 13(d)), X has an overlap with part of Y (community C1), Y has an overlap with part of X (community C2), Y also has an overlap with part of Z (community C3) and Z has an overlap with part of Y (community C4). The overlaps are such that ux ∈ C1, ux ∈ C2; vx ∈ C1, vx ∈ C2, vx ∈ C3; vz ∈ C2, vz ∈ C3, vz ∈ C4; uz ∈ C3, uz ∈ C4. This represents the most general case of overlap between the cliques. Note that all the vertices in the network except ux, vx, uz and vz are unaffected for any kind of community assignment and they have Pg as 1. Vertex ux has no external connection in C1 and C2. In that case, we assume Emax = 1 to avoid the "divide Fig. 10. (color online) The φ value for each algorithm across 2000 different vertex orderings. The x-axis is rescaled by a constant factor of 100. For better visualization, we rescale φ with the minimum value for each algorithm so that the sensitivity of all the algorithms starts from 1. able to significantly reduce the problem of "degeneracy of solutions" [27]. Fig. 11. (Color online) Examples comparing the behavior of permanence and GenPerm. Vertices of the same color represent the communities given by maximizing permanence. Vertices within the same dotted circle represent the communities given by maximizing GenPerm. 7 MITIGATION OF RESOLUTION LIMIT BY GEN- PERM Resolution limit [27], [28] occurs when communities smaller than a certain size get merged into larger communities. In [1], we theoretically proved that communities obtained by maximizing permanence can mitigate the resolution limit problem. However, maximizing permanence still experi- ences resolution limit if a vertex is tightly connected to more than one community. In such cases, finding communities by maximizing GenPerm provides a better solution. Figure 11(a) shows two loosely connected communities. In this case, both permanence and GenPerm give the same communities upon maximization. Figure 11(b) shows tightly connected communities. Maximum permanence is obtained when all the vertices are in the same community and therefore fails to overcome the resolution limit. In contrast, maximizing GenPerm, produces three overlapping communities. Resolution limit in overlapping communities: The exam- ple discussed above demonstrates that maximizing Gen- Perm can mitigate the resolution limit for both non- overlapping and overlapping communities. To the best of our knowledge, resolution limit in overlapping communi- ties has not been studied before. We define the following 510152015101520Flickr510152014080Number of different orderings of vertices (rescaled by 100)Normalized sensitivityLFR (µ=0.3)OSLOMCOPRA MOSES EAGLESLPAMaxGenPerm BIGCLAM JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 12 Fig. 12. (Color online) Toy examples used to demonstrate the theorems (Kx: clique of size x). 2n2 x by zero" case for computing Pg. Therefore, Pg(ux) = P C1 g (ux) + P C2 g (ux) = (nx−2)(2nx−1) . Similarly for vx, there is no external connection in any of its assigned communities C1, C2 and C3. Therefore, Pg(vx) = 2ny−3 . The connectivity of vz is similar to vx. Therefore, Pg(vz) = 2ny−3 . Further, the connectivity of vertex uz is similar to that of ux except the degree of uz being nz. Therefore, Pg(uz) = (nz−2)(2nz−1) 2ny 2ny . Now combining GenPerm of the affected vertices, we 2n2 z obtain: P 1 g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) 1 n2 z = 4 − 5 2nx − 5 2nz − 3 ny 1 n2 x + + (6) In Case 2, as shown in Figure 13(e), X has complete overlap with Y , and Z also has a complete overlap with Y . Therefore ux ∈ C1; vx ∈ C1, vx ∈ C2; vz ∈ C1, vz ∈ C2; uz ∈ C2. g (ux) = nx−2 For vertex ux which belongs to community C1 only, there is no external connection, and no internal edges are shared. Therefore, Pg(ux) = P C1 . For vertex vx belonging to both C1 and C2, the internal edges in clique y−ny−1 n2 . Y are shared by two communities. So, Pg(vx) = Similarly, GenPerm of vz is similar to that of vx. Therefore, Pg(vz) = degree of uz being nz. Therefore, Pg(uz) = nz−2 The connectivity of uz is similar to that of ux, except the y−ny−1 n2 n2 y n2 y nx . . Now combining GenPerm of all the affected vertices, we nz obtain: P 2 g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) − 2 n2 y = 4 − 2 nx − 2 ny − 2 nz (7) In Case 3, as shown in Figure 13(f), each of ux, vx, vz and uz have one external neighbor and the internal clustering − (1− coefficient is 1. Therefore, Pg(ux) = P C1 , Pg(vz) = ny−1 1) · nx−1 and Pg(uz) = nz−1 . Similarly, Pg(vx) = ny−1 g (ux) = nx−1 = nx−1 nx nx nx ny ny . Therefore, combining GenPerm of the affected vertices, nz we obtain: P 3 g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) − 1 nz = 4 − 1 nx − 2 ny (8) When comparing P 1 g , P 2 g and P 3 g , the last scenario gives the highest GenPerm value. Thus the theorem is proved. THEOREM 2. Given a central clique X and n surrounding cliques such that each shares exactly one edge with X, the highest GenPerm is obtained if each of the surrounding cliques and X are identified as a separate community (total n+1 communities) with the vertices of X forming an overlap with X and the two other communities to which it is connected. Proof. Let us assume the toy example shown in Figure 13(b), a generalized version of which is shown in Figure 13(g). Assume that there is a central clique X of size n which is surrounded by n cliques, C1, C2, ...., Cn with size n1, n2,..., nn respectively such that each of the surrounding cliques share one edge with X. Now let us assume the community structure as shown by the broken lines in Figure 13(b) where there are n + 1 communities, namely X, C1, C2, ...., Cn, and the nodes in X such as a, b, c, d, ... are overlapping nodes and each of them belong to two communities (we call these overlapping nodes together as set Vov). One can measure GenPerm of the graph in this setting. It is simple to show that the vertices except Vov have Pg as 1. However, we calculate Pg of each vertex in Vov as follows. Note that each node in Vov has equal Pg value. Let us consider vertex a (∈ Vov) which shares C1, C2 and X communities. The degree of a is D(a) = n1 + n2 + n − 5. In community C1, a has n1 − 2 internal connections which are not shared, but edge (a, d) is shared with both C1 and X. It has no external connection and its internal clustering coefficient in this community is 1. Therefore, P C1 g (a) = n1−3/2 n1+n2+n−5 . Similarly, P C2 In community X, a has n−1 internal connections among which two edges, namely (a, b) and (a, d) are part of two communities. It has no external connection and the internal clustering coefficient is 1. Therefore, P X n1+n2+n−5 . Combining all these cases, we obtain the overall Gen- Perm of vertex a as Pg(a) = n1+n2+n−5 g (a) = n2−3/2 n1+n2+n−5 . g (a) = n1+n2+n−5 = 1. Similarly, one can show that GenPerm of each vertex in Vov is 1. Since the maximum value of Pg for a vertex is 1, this configuration is the best community assignment one can obtain using maximizing Pg. Therefore, this arrangement gives the highest GenPerm. 8 RELATED WORK There exist many different methods for identifying non- overlapping communities. For details on different commu- nity detection methods, readers are referred to following reviews: [29]. n−2 When the true community structure is not known, a quality function such as modularity [7] is used to evalu- ate the performance of the clustering algorithms. Shen et JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 13 al. [6] introduced a variant of modularity for overlapping communities, which was later modified by L´az´ar et al. [8]. Shen et al. [30] proposed another variant on the basis that a maximal clique only belongs to one community. Nicosia et al. [31] extended the definition to directed graphs with overlapping communities. Chen et al. [32] proposed an extension of modularity density for overlapping community structure. Several other extensions of modularity [16], [33] have also been proposed. It is worth mentioning that the formulation of GenPerm is an extension of our earlier work, where we proposed permanence, a new scoring metric for non-overlapping community [1]. There has been a class of algorithms for network clus- tering, which allow nodes belonging to more than one community. Palla proposed "CFinder" [34], the seminal and most popular method based on clique-percolation tech- nique. However, due to the clique requirement and the sparseness of real networks, the communities discovered by CFinder are usually of low quality [35]. The idea of partitioning links instead of nodes to discover community structure has also been explored [9] On the other hand, a set of algorithms utilized local expansion and optimization to detect overlapping commu- nities. For instance, Baumes et al. [36] proposed "RankRe- moval" using a local density function. MONC [37] uses the modified fitness function of LFM which allows a single node to be considered a community by itself. OSLOM [11] tests the statistical significance of a cluster with respect to a global null model (i.e., the random graph generated by the configuration model) during community expansion. Chen et al. [33] proposed selecting a node with maximal node strength based on two quantities – belonging degree and the modified modularity. EAGLE [6] and GCE [38] use the agglomerative framework to produce overlapping communities. Few fuzzy community detection algorithms have been proposed that quantify the strength of association between all pairs of nodes and communities [16]. Nepusz et al. [39] modeled the overlapping community detection as a nonlin- ear constrained optimization problem which can be solved by simulated annealing methods. Due to the probabilistic nature, mixture models provide an appropriate framework for overlapping community detection [40]. MOSES [14] uses a local optimization scheme in which the fitness function is defined based on the observed condition distribution. Ding et al. [41] employed the affinity propagation clustering algorithm for overlapping community detection. Whang et al. [42] developed an overlapping community detection algorithm using a seed set expansion approach. Recently, BIGCLAM [2] algorithm is also built on NMF framework. The label propagation algorithm has been extended to overlapping community detection by allowing a node to have multiple labels. In COPRA [12], each node updates its belonging coefficients by averaging the coefficients from all its neighbors at each time step in a synchronous fashion. SLPA [13], [43] spreads labels between nodes according to pairwise interaction rules. A game-theoretic framework is proposed by Chen et al. [44] in which a community is associated with a Nash local equilibrium. Beside these, Zhang et al. [45] proposed an iterative pro- cess that reinforces the network topology and proximity that is interpreted as the probability of a pair of nodes belonging to the same community. Istv´an et al. [46] proposed an approach focusing on centrality-based influence functions. Gopalan and Blei [47] proposed an algorithm that naturally interleaves subsampling from the network and updating an estimate of its communities. Recently, Sun et al. [48] pro- posed fuzzy clustering based non-overlapping community detection technique that can be extended to overlapping case. However, none of these algorithms can work equally well for both overlapping and non-overlapping cases. 9 CONCLUSION AND FUTURE WORK We proposed a novel vertex-based metric, called GenPerm which provides a quantitative measure of how much a vertex belongs to each of its constituent communities, and to the whole network. Experimental results showed that our metric qualifies as a better community scoring metric. Our work has several implications: First, our metric is a gener- alized formulation that can be used evaluate the quality of a community structure. Second, MaxGenPerm is the first generalized algorithm that can identify both overlapping and non-overlapping communities, without any prior infor- mation. Third, to the best of our knowledge, the issue related to resolution limit in the context of overlapping community structure is discussed for the first time in this work. We showed that maximizing GenPerm, quite significantly, re- duces the effect of resolution limit. Fourth, we showed that GenPerm suitably explains the position of vertices within a community, and provides a ranking scheme of vertices that has been shown to be effective for initiator selection in message spreading. Finally, being a vertex-based metric, overlapping permanence is fine-grained, therefore allows partial estimation of communities in a network whose entire structure is not known. We plan to extend our metric to evaluating dynamic communities and for detecting local communities around a specified vertex. We also plan to explore other uses of GenPerm such as in identifying critical vertices during spread of epidemics. Tanmoy Chakraborty is currently a postdoc- toral fellow at Dept. of Computer Science, Uni- versity of Maryland, College Park, USA. Prior to this, he completed his Ph.D. as a Google India fellow from Dept. of CSE, IIT Kharagpur, India in 2015. His primary research interests include Complex Networks, Social Media, Data Mining and NLP. More details: https://sites.google.com/ site/tanmoychakra88/ JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 14 Suhansanu Kumar is a graduate student in the Department of Computer Science, University of Illinois at Urbana-Champaign. He received his B.Tech degree in 2014 from IIT Kharagpur, India. His primary research interests include Social Networking, Machine Learning and Game The- ory. More details: http://illinois.academia.edu/ SuhansanuKumar. Supplementary Materials 10 SAMPLED NETWORKS Since all the baseline algorithms (except BIGCLAM) are not suitable to run on the large networks, we adopt a community-centric sampling strategy [2] to get small net- works from each real-world network. The strategy is de- scribed in Section 3.1 of the main text. Here we report the properties of the sampled networks corresponding to each real-world network in Table 5. Niloy Ganguly is a Professor in the Department of CSE, IIT Kharagpur, India. His primary re- search interests include Online Social Network- ing, Peer to peer networking and Machine Learn- ing. More details: http://www.facweb.iitkgp.ernet. in/∼niloy/. TABLE 5 Average properties of the sampled real-world networks. ¯N: avg. number of nodes, ¯E: avg. number of edges, ¯C: avg. number of communities, ¯ρ: avg. edge-density per community, ¯S: avg. size of a community, ¯Om: avg. number of community memberships per node. Network LiveJournal Amazon Youtube Orkut Flickr Coauthorship ¯N 874.50 357.93 856.78 623.43 763.21 976.76 ¯E 2463.09 1345.45 3180.34 2645.12 2897.65 3219.87 ¯C 96.73 12.76 261.94 87.54 88.74 145.87 ¯ρ 0.32 0.34 0.12 0.45 0.24 0.19 ¯S 10.34 14.34 13.63 7.54 8.98 12.55 ¯Om 4.80 15.56 5.19 48.34 8.76 9.45 11 EXPERIMENTAL SETUP 11.1 Community validation metrics The availability of ground-truth communities allows us to quantitatively evaluate the performance of community de- tection algorithms. For evaluation, we use metrics that quan- tify the level of correspondence between the detected and the ground-truth communities. Given a network G(V, E), we consider a set of ground-truth communities C and a set of detected communities C∗ where each ground-truth community Ci ∈ C and each detected community C∗ i ∈ C∗ is defined by a set of its member nodes. To quantify the level of correspondence of C to C∗, we consider the following three validation metrics. Animesh Mukherjee is an Assistant Professor in the Department of CSE, IIT Kharagpur, India, and a Simons Associate in the Abdus Salam International Centre for Theoretical Physics, Tri- este, Italy. His main research interests center around applying complex system approaches to different problems in (a) human language evolu- tion, web social media, and NLP. More details: cse.iitkgp.ac.in/∼animeshm/. Sanjukta Bhowmick is an Associate Professor in the Department of Computer Science, Univer- sity of Nebraska, Omaha. Her research interests include Network Analysis, HPC and Graph The- ory. More details: http://faculty.ist.unomaha.edu/ sbhowmick/. • Overlapping Normalized Mutual Information (ONMI) [15] adopts the criterion used in infor- mation theory to compare the detected communi- ties and the ground-truth communities. We use the ONMI implementation written by the authors and is available at https://github.com/aaronmcdaid/ Overlapping-NMI. • Omega (Ω) Index [16] is the accuracy on estimating the number of communities that each pair of nodes shares: (cid:88) u,v∈V 1 V 2 1{Cuv = C∗ uv} (9) • where Cuv is the set of ground-truth communities that u and v share, and C∗ uv is the set of detected communities that u and v share. F-Score measures a correspondence between each detected community to one of the ground-truth com- munities. To compute it, we need to determine which i ∈ C∗ corresponds to which Ci ∈ C. We define C∗ F-Score to be the average of the F-Score of the best- matching ground-truth community to each detected JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 15 community, and the F-score of the best-matching de- tected community to each ground-truth community as follows: 1 2 F (Ci, C∗ (cid:88) (cid:88) 1 C∗ g(i)) + 1 C F (Cg ( Ci∈C i ∈C∗ C∗ (cid:48) (i), C∗ i )) (10) is defined (i) = j ) is the harmonic j ), g (cid:48) (cid:48) where the best matching g and g as follows: g(i) = arg maxj F (Ci, C∗ arg maxj F (Cj, C∗ mean of Precision and Recall. i ), and F (Ci, C∗ Performance of various overlapping community detection algorithms in terms of three validation measures to detect ground-truth communities from LFR networks. TABLE 7 Algorithms OSLOM COPRA SLPA MOSES EAGLE BIGCLAM MaxGenPerm ONMI 0.237 0.974 0.987 0.852 0.149 0.908 0.984 LFR Ω Index 0.903 0.976 0.978 0.972 0.913 0.851 0.978 F-Score 0.086 0.731 0.945 0.803 0.108 0.785 0.968 12 COMPARING MAXGENPERM WITH OTHER BASELINE ALGORITHMS In this section, we show the performance of all the al- gorithms in terms of three validation measures (ONMI, Omega Index and F-Score) on various synthetic and real- world networks. As mentioned in the main text, we run each algorithm on 500 different samples of each real-world network and the average performance is reported in Table 6. However, for LFR network we retain the original size with the following parameters: n=1000, µ=0.2, On=5% and Om=4; and the results are reported in Table 7. As we can ob- serve in both the tables, for most of the cases, MaxGenPerm outperforms other competing algorithms. 13 RESOLUTION LIMIT IN OVERLAPPING COMMU- NITY In this section, we theoretically prove that using maximizing GenPerm, one can reduce the effect of resolution limit in overlapping community detection. PROOF OF THEOREM 1 Let us assume that there are three cliques X, Y and Z (shown in Figure 13(c)) of size nx, ny, and nz respectively, such that X and Z are not connected to each other. Y is connected to X and Z by two edges (ux, vx) and (uz, vz) respectively, where ux ∈ X, uz ∈ Z and vx, vz ∈ Y . There can be three possible ways mentioned below by which one can group nodes into different overlapping communities. Case 1. The overlapping community structure shown in Figure 13(d). In this case, one can compute Pg of the net- work. Note that all the vertices in the network except ux, vx, uz and vz are unaffected for any kind of community assignment and they have Pg as 1. Vertex ux has no external connection in C1 and C2. In that case, we assume Emax = 1 to avoid the "divide by zero" case for computing Pg. g (ux) = nx−1+1/2 P C1 (nx−2)(2nx−1) 1 − (nx−1)(nx−2) nx(nx−1) − (cid:16) (nx−1+1/2) (cid:17) · nx nx = 2 2 2n2 x , P C2 g (ux) = 1/2 nx Therefore, − (1 − 0) · 1/2 nx = 0. Pg(ux) = P C1 g (ux) + P C2 g (ux) = (nx − 2)(2nx − 1) 2n2 x (11) Similarly for vx, there is no external connection in any of − (1 − its assigned communities C1, C2 and C3. P C1 0) · 1/2 g (vx) = 1/2 ny = 0; −(cid:16) 1 − (ny−1)(ny−2) ny (ny−1) ny−1 2 2 − (1 − 1) 2 ny = ny−1 2ny . ny /2 ny ny−1 2 ny (cid:17) · ny /2 ny ny−2 2ny = ny P C2 g (vx) = P C3 g (vx) = Therefore, Pg(vx) = ny − 2 2ny ny − 1 2ny + = 2ny − 3 2ny (12) (13) P C2 g (vz) = P C3 g (vz) = g (vz) = 0. P C4 Therefore, The connectivity of vz is similar to vx. ny−1 2 ny ny /2 ny − (1 − 1) · ny−1 −(cid:16) 1 − (ny−1)(ny−2) ny (ny−1) 2 ny = 2 ny−1 2ny ; (cid:17) · ny /2 ny ny−2 2ny ; = 2 Pg(vz) = ny − 1 2ny + ny − 2 2ny + 0 = 2ny − 3 2ny Further, the connectivity of vertex uz is similar to that of ux except the degree of uz being nz. Therefore, Pg(uz) = (nz − 2)(2nz − 1) 2n2 z (14) Now combining the GenPerm of the affected vertices shown in Equations 11, 12, 13 and 14, we obtain: (nx − 2)(2nx − 1) g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) 2(2ny − 3) (nz − 2)(2nz − 1) P 1 = + 2n2 x 2n2 z − 5 2nz + − 3 ny + (15) 2ny 1 n2 x + 1 n2 z = 4 − 5 2nx Case 2. The overlapping community structure shown in Figure 13(e). We again calculate Pg for the affected vertices as follows. For vertex ux which belongs to community C1 only, there is no external connection, and no internal edges are shared. Therefore, Pg(ux) = P C1 g (ux) = nx nx −(cid:16) 1 − (nx−1)(nx−2) nx (nx−1) 2 2 = (cid:17) · nx nx nx − 2 nx (16) For vertex vx belonging to both C1 and C2, the internal edges in clique Y are shared by two communities. Therefore, P C1 g (vx) = y−ny−2 n2 − (1 − ny−2 (ny +1)(ny−2) ) · ( ny−1 ny−1 2 ny 2 ny ) = 2n2 y ny = +1 +1 ; 2n2 y P C2 g (vx) = Therefore, ny−1 2 ny − (1 − 1) · ny−1 2 ny ny−1 2ny . = Pg(vx) = P C1 g (vx) + P C2 g (vx) = y − ny − 1 n2 n2 y (17) JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 16 Performance of various overlapping community detection algorithms in terms of three validation measures to detect ground-truth communities TABLE 6 from six real-world networks. Algorithms OSLOM COPRA SLPA MOSES EAGLE BIGCLAM MaxGenPerm Algorithms OSLOM COPRA SLPA MOSES EAGLE BIGCLAM MaxGenPerm ONMI 0.741 0.593 0.535 0.433 0.690 0.780 0.789 ONMI 0.436 0.410 0.650 0.387 0.516 0.821 0.831 LiveJournal Ω Index 0.609 0.760 0.801 0.756 0.728 0.719 0.775 Youtube Ω Index 0.426 0.683 0.832 0.612 0.584 0.759 0.821 F-Score 0.557 0.775 0.821 0.641 0.622 0.606 0.782 F-Score 0.307 0.639 0.570 0.448 0.531 0.801 0.912 ONMI 0.052 0.028 0.273 0.473 0.010 0.766 0.854 ONMI 0.489 0.459 0.729 0.433 0.816 0.806 0.883 Amazon Ω Index 0.131 0.190 0.173 0.301 0.209 0.954 0.904 Flickr Ω Index 0.464 0.745 0.908 0.668 0.637 0.908 0.849 F-Score 0.388 0.689 0.865 0.566 0.518 0.412 0.887 F-Score 0.279 0.583 0.292 0.409 0.484 0.703 0.831 ONMI 0.643 0.757 0.731 0.447 0.177 0.738 0.767 ONMI 0.416 0.521 0.799 0.548 0.711 0.740 0.817 Orkut Ω Index 0.671 0.676 0.788 0.667 0.487 0.598 0.812 Coauthorship Ω Index 0.521 0.712 0.772 0.562 0.665 0.756 0.782 F-Score 0.528 0.569 0.947 0.528 0.502 0.958 0.904 F-Score 0.403 0.409 0.580 0.418 0.556 0.768 0.778 Fig. 13. (Color online) Toy examples used to demonstrate the theorems (Kx: clique of size x). Similarly, the GenPerm of vz is similar to that of vx. Therefore, Case 1 vs. Case 3: Subtracting Equation 21 from Equation 15, we obtain The connectivity of uz is similar to that of ux, except the degree of uz being nz. Therefore following Equation 16, Pg(vz) = y − ny − 1 n2 n2 y Pg(uz) = nz − 2 nz (18) g − P 3 P 1 g = − 3 2nx − 3 2nz − 1 ny + 1 n2 x + 1 n2 z (22) Now, P 1 > 1 3 n2 x g − P 3 g < 0, if 3 , . Note that . So the above condition always holds. 2nx Therefore, GenPerm will always prefer case 3 in comparison to case 1 during maximization. > 1 n2 z > 1 n2 x + 3 2nz + 1 n2 z + 1 ny 2nz 3 2nx (19) Now combining the GenPerm of all the affected vertices, we obtain: Case 2 vs. Case 3: Subtracting Equation 21 from Equation 20, we obtain P 2 g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) y − ny − 1) nx − 2 nz − 2 2(n2 = nx + nz = 4 − 2 nx + − 2 ny n2 y − 2 nz − 2 n2 y (20) Case 3. The community structure shown in Figure 13(f). Note that in this case, each of ux, vx, vz and uz have one external neighbor and the internal clustering coefficient is = nx−1 1. Therefore, Pg(ux) = P C1 nx . Similarly, Pg(vx) = − (1 − 1) · nx−1 and Pg(uz) = nz−1 nz . g (ux) = nx−1 nx ny−1 ny ny−1 ny , Pg(vz) = Therefore, combining the GenPerm of the affected ver- nx tices, we obtain: P 3 g = Pg(ux) + Pg(vx) + Pg(vz) + Pg(uz) nz − 1 2(ny − 1) nx − 1 = nx + ny = 4 − 1 nx + − 2 ny (21) nz − 1 nz g − P 3 P 2 g = − 1 nx − 1 nz − 4 n2 y < 0 (23) Therefore, maximum value of Pg will always be obtained for case 3 in comparison to case 2. From this two comparison, we observe that the highest Pg is obtained when X, Y and Z are three separate com- munities as shown in Figure 13(f). Note that there can be other scenarios as well such as Case 4 where any of the two consecutive cliques are combined together to form a community along with the remaining clique as separate community, thus forming two non-overlapping communi- ties, or Case 5 where all three cliques are combined to form one single community. In case of permanence [1], the author showed that if one can maximize permanence, case 3 always wins with respect to cases 4 and 5. Therefore, we can conclude that for the network shown in Figure 13(c), maximizing Pg always yields the community structure JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 shown in Figure 13(f), thus reducing the effect of resolution limit in community detection irrespective of the community size. PROOF OF THEOREM 2 Let us assume the toy example shown in Figure 13(b), a generalized version of which is shown in Figure 13(g). Assume that there is a central clique X of size n which is surrounded by n cliques, C1, C2, ...., Cn with size n1, n2,..., nn respectively such that each of the surrounding cliques share one edge with X. Now let us assume the community structure as shown by the broken lines in Figure 13(b) where there are n + 1 communities, namely X, C1, C2, ...., Cn, and the nodes in X such as a, b, c, d, ... are overlapping nodes and each of them belong to two communities (we call these overlapping nodes together as set Vov). One can measure the GenPerm of the graph in this setting. It is simple to show that the vertices except Vov have Pg as 1. However, we calculate Pg of each vertex in Vov as follows. Note that each node in Vov has equal Pg value. Let us consider vertex a (∈ Vov) which shares C1, C2 and X communities. The degree a is D(a) = n1 + n2 + n − 5. In community C1, a has n1 − 2 internal connections which are not shared, but edge (a, d) is shared with both C1 and X. It has no external connection and its internal clustering coefficient in this community is 1. Therefore, P C1 g (a) = n1 − 2 + 1/2 n1 + n2 + n − 5 − (1 − 1) · ( = n1 − 2 + 1/2 n1 + n2 + n − 5 n1 − 3/2 n1 + n2 + n − 5 ) (24) Similarly, the GenPerm of a in community C2 is as follows. P C2 g (a) = n2 − 3/2 n1 + n2 + n − 5 (25) In community X, a has n−1 internal connections among which two edges, namely (a, b) and (a, d) are part of two communities. It has no external connection and the internal clustering coefficient is 1. Therefore, P X g (a) = n − 3 + 1/2 + 1/2 n1 + n2 + n − 5 n1 + n2 + n − 5 n − 2 = (26) Combining Equations 24, 25 and 26, we obtain the over- all GenPerm of vertex a as follows: g (a) + P C2 Pg(a) = P C1 g (a) + P X n1 + n2 + n − 5 n1 + n2 + n − 5 g (a) = 1 = (27) Similarly, one can show that the GenPerm of each vertex in Vov is 1. Since the maximum value of Pg for a vertex is 1, this configuration is the best community assignment one can obtain using maximizing Pg. REFERENCES [1] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and S. Bhowmick, "On the permanence of vertices in network com- munities," in SIGKDD, New York, USA, 2014, pp. 1396–1405. J. Yang and J. Leskovec, "Overlapping community detection at scale: A nonnegative matrix factorization approach," in WSDM. New York, USA: ACM, 2013, pp. 587–596. [2] 17 [3] X. Wang, L. Tang, H. Liu, and L. Wang, "Learning with multi- resolution overlapping communities." Knowl. Inf. Syst., vol. 36, no. 2, pp. 517–535, 2013. [4] G. Palla, I. J. Farkas, P. Pollner, I. Der´enyi, and T. Vicsek, "Fun- damental statistical features and self-similar properties of tagged networks," New J. Phys., vol. 10, no. 12, p. 123026, 2008. [5] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Benchmark graphs for testing community detection algorithms," Phys. Rev. E, vol. 78, no. 4, p. 046110, Oct. 2008. [6] K. C. H. Shen, X. Cheng and M. B. Hu, "Detect overlapping and hierarchical community structure in networks," Physica A, vol. 388, no. 8, pp. 1706–1712, 2009. [7] M. E. J. Newman and M. Girvan, "Finding and evaluating com- munity structure in networks," Phys. Rev. E, vol. 69, no. 026113, 2004. [8] A. L´az´ar, D. ´Abel, and T. Vicsek, "Modularity measure of networks with overlapping communities," Europhys. Lett., vol. 90, no. 1, p. 18001, 2010. [9] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, "Link communities reveal multiscale complexity in networks," Nature, vol. 466, pp. 761–764, 2010. [10] J. Xie, S. Kelley, and B. K. Szymanski, "Overlapping commu- nity detection in networks: The state-of-the-art and comparative study," ACM Comput. Surv., vol. 45, no. 4, pp. 43:1–43:35, Aug. 2013. [11] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato, "Finding statistically significant communities in networks," PLoS ONE, vol. 6, no. 4, p. e18961, 2011. [12] S. Gregory, "Finding overlapping communities in networks by label propagation," New J. Phys., vol. 12, no. 10, p. 103018, 2010. [13] J. Xie and B. K. Szymanski, "Towards linear time overlapping community detection in social networks," in PAKDD, 2012, pp. 25–36. [14] A. McDaid and N. Hurley, "Detecting highly overlapping com- munities with model-based overlapping seed expansion," in ASONAM, Washington, DC, USA, 2010, pp. 112–119. [15] A. F. McDaid, D. Greene, and N. J. Hurley, "Normalized mutual information to evaluate overlapping community finding algo- rithms," CoRR, vol. abs/1110.2515, 2011. [16] S. Gregory, "Fuzzy overlapping communities in networks," J. Stat. Mech., vol. 2011, no. 02, p. P02017, 2011. [17] K. Steinhaeuser and N. V. Chawla, "Identifying and evaluating community structure in complex networks," Pattern Recognition Letters, vol. 31, no. 5, pp. 413–421, 2010. [18] J. Yang and J. Leskovec, "Overlapping communities explain core- periphery organization of networks," Proceedings of the IEEE, vol. 102, pp. 1892 – 1902, 2014. [19] M. E. J. Newman, "Mixing patterns in networks," Phys. Rev. E, vol. 67, no. 2, p. 026126, Feb. 2003. [20] R. Pastor-Satorras and A. Vespignani, "Immunization of complex networks," Phys. Rev. E, vol. 65, p. 036104, Feb 2002. [21] R. Albert, H. Jeong, and A. Barabasi, "Error and attack tolerance of complex networks," Nature, vol. 406, no. 6794, pp. 378–382, 2000. [22] F. Chierichetti, S. Lattanzi, and A. Panconesi, "Rumour spreading and graph conductance," in SODA. SIAM, 2010, pp. 1657–1663. [23] A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry, "Epidemic algorithms for replicated database maintenance," in PODC, New York, USA, 1987, pp. 1–12. [24] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," J. Stat. Mech., vol. 2008, no. 10, p. P10008, Oct. 2008. [25] T. Chakraborty, S. Srinivasan, N. Ganguly, S. Bhowmick, and A. Mukherjee, "Constant Communities in Complex Networks," Sci. Rep., vol. 3, 2013. [26] A. Lancichinetti and S. Fortunato, "Consensus clustering in com- plex networks," Sci. Rep., vol. 2, 2012. [27] S. Fortunato and M. Barthelemy, "Resolution limit in community detection," PNAS, Jan. 2007. [28] B. Good, Y. D. Montjoye, and A. Clauset, "Performance of mod- ularity maximization in practical contexts," Phys. Rev. E, vol. 81, no. 4, p. 046106, 2010. [29] M. A. Porter, J. P. Onnela, and P. J. Mucha, "Communities in networks." Notices of the American Mathematical Society, vol. 56, no. 9, 2009. JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. XX, SEPTEMBER 2016 18 [30] H.-W. Shen, X.-Q. Cheng, and J.-F. Guo, "Quantifying and identi- fying the overlapping community structure in networks," J. Stat. Mech. Theor. Exp., vol. 2009, no. 07, p. P07042, 2009. [31] V. Nicosia, G. Mangioni, V. Carchiolo, and M. Malgeri, "Extending the definition of modularity to directed graphs with overlapping communities," J. Stat. Mech. Theor. Exp., vol. 2009, no. 03, p. P03024, 2009. [32] M. Chen, K. Kuzmin, and B. K. Szymanski, "Extension of mod- ularity density for overlapping community structure," in SNAA Workshop, ASONAM, 2014. [33] D. Chen, M. Shang, Z. Lv, and Y. Fu, "Detecting overlapping communities of weighted networks via a local algorithm," Physica A, vol. 389, no. 19, pp. 4177 – 4187, 2010. [34] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, "Uncovering the overlapping community structure of complex networks in nature and society," Nature, vol. 435, no. 7043, pp. 814–818, June 2005. [35] S. Fortunato and A. Lancichinetti, "Community detection algo- rithms: A comparative analysis: Invited presentation, extended abstract," in Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, ICST, Brussels, Belgium, Bel- gium, 2009, pp. 27:1–27:2. [36] J. Baumes, M. K. Goldberg, M. S. Krishnamoorthy, M. Magdon- Ismail, and N. Preston, "Finding communities by clustering a graph into overlapping subgraphs." in IADIS AC. IADIS, 2005, pp. 97–104. [37] F. Havemann, M. Heinz, A. Struck, and J. Glser, "Identification of overlapping communities and their hierarchy by locally calcu- lating community-changing resolution levels," JSTAT, vol. 2011, no. 01, p. P01023, 2011. [38] C. Lee, F. Reid, A. McDaid, and N. Hurley, "Detecting highly- overlapping community structure by greedy clique expansion," in ACM KDD-SNA, 2010, pp. 33–42. [39] T. Nepusz, A. Petr´oczi, L. N´egyessy, and F. Bazs´o, "Fuzzy commu- nities and the concept of bridgeness in complex networks," Phys. Rev. E, vol. 77, p. 016107, Jan 2008. [40] M. E. J. Newman and E. A. Leicht, "Mixture models and ex- ploratory analysis in networks," PNAS, vol. 104, no. 23, pp. 9564– 9569, 2007. [41] F. Ding, Z. Luo, J. Shi, and X. Fang, "Overlapping community detection by kernel-based fuzzy affinity propagation," in ISA, 2010, pp. 1–4. [42] J. J. Whang, D. F. Gleich, and I. S. Dhillon, "Overlapping commu- nity detection using seed set expansion," in CIKM. ACM, 2013, pp. 2099–2108. [43] J. Xie and B. Szymanski, "Community detection using a neighbor- hood strength driven label propagation algorithm," in IEEE NSW, 2011, pp. 188–195. [44] W. Chen, Z. Liu, X. Sun, and Y. Wang, "A game-theoretic frame- work to identify overlapping communities in social networks," Data Min. Knowl. Discov., vol. 21, no. 2, pp. 224–240, Sep. 2010. [45] Y. Zhang, J. Wang, Y. Wang, and L. Zhou, "Parallel community detection on large networks with propinquity dynamics." in KDD. ACM, 2009, pp. 997–1006. [46] A. Istv´an, R. Palotai, M. S. Szalay, and P. K. Csermely, "Community landscapes: An integrative approach to determine overlapping network module hierarchy, identify key nodes and predict net- work dynamics," PLoS ONE, vol. 5, no. 9, p. e12528, 09 2010. [47] P. K. Gopalan and D. M. Blei, "Efficient discovery of overlapping communities in massive networks," Proceedings of the National Academy of Sciences, vol. 110, no. 36, pp. 14 534–14 539, 2013. [48] P. G. Sun, L. Gao, and S. S. Han, "Identification of overlapping and non-overlapping community structure by fuzzy clustering in complex networks," Information Sciences, vol. 181, no. 6, pp. 1060– 1071, 2011.
1507.07017
2
1507
2015-11-18T01:27:16
Stability of Spreading Processes over Time-Varying Large-Scale Networks
[ "cs.SI", "math.DS", "math.OC", "physics.soc-ph", "q-bio.PE" ]
In this paper, we analyze the dynamics of spreading processes taking place over time-varying networks. A common approach to model time-varying networks is via Markovian random graph processes. This modeling approach presents the following limitation: Markovian random graphs can only replicate switching patterns with exponential inter-switching times, while in real applications these times are usually far from exponential. In this paper, we introduce a flexible and tractable extended family of processes able to replicate, with arbitrary accuracy, any distribution of inter-switching times. We then study the stability of spreading processes in this extended family. We first show that a direct analysis based on It\^o's formula provides stability conditions in terms of the eigenvalues of a matrix whose size grows exponentially with the number of edges. To overcome this limitation, we derive alternative stability conditions involving the eigenvalues of a matrix whose size grows linearly with the number of nodes. Based on our results, we also show that heuristics based on aggregated static networks approximate the epidemic threshold more accurately as the number of nodes grows, or the temporal volatility of the random graph process is reduced. Finally, we illustrate our findings via numerical simulations.
cs.SI
cs
Stability of Spreading Processes over Time-Varying Large-Scale Networks Masaki Ogura, Member, IEEE, and Victor M. Preciado, Member, IEEE 1 Abstract—In this paper, we analyze the dynamics of spreading processes taking place over time-varying networks. A common approach to model time-varying networks is via Markovian random graph processes. This modeling approach presents the following limitation: Markovian random graphs can only replicate switching patterns with exponential inter-switching times, while in real applications these times are usually far from exponential. In this paper, we introduce a flexible and tractable extended family of processes able to replicate, with arbitrary accuracy, any distribution of inter-switching times. We then study the stability of spreading processes in this extended family. We first show that a direct analysis based on Ito’s formula provides stability conditions in terms of the eigenvalues of a matrix whose size grows exponentially with the number of edges. To overcome this limitation, we derive alternative stability conditions involving the eigenvalues of a matrix whose size grows linearly with the number of nodes. Based on our results, we also show that heuristics based on aggregated static networks approximate the epidemic threshold more accurately as the number of nodes grows, or the temporal volatility of the random graph process is reduced. Finally, we illustrate our findings via numerical simulations. Index Terms—Dynamic random graphs, complex networks, epidemics, stochastic processes, random matrix theory. ! 1 INTRODUCTION U NDERSTANDING spreading processes in complex net- works is a central question in the field of Network Science with applications in rumor propagation [1], mal- ware spreading [2], epidemiology, and public health [3]. In this direction, important advances in the analysis of spreading processes over time-invariant (TI) networks have been made during the last decade (see [4] and [5] for recent surveys). Under the time-invariance assumption, we find several recent breakthroughs in the literature, such as the rigorous analysis of mean-field approximations [6], the connection between the eigenvalues of a network and epidemic thresholds [7], [8], [9], new modeling tools for analysis of multilayer networks [10], and the use of control and optimization tools to contain epidemic outbreaks [11], [12], [13], [14]. In practice, most spreading processes of practical interest take place in networks with time-varying (TV) topologies, such as human contact networks, online social networks, biological, and ecological networks [15]. A naive, but com- mon, approach to analyze dynamic processes in TV net- works is to build an aggregated static topology based on time averages. When the time scales of the network evo- lution are comparable to those of the spreading process, the static aggregated graph is not well-suited to study the dynamics of TV networks, as pointed out in [16], [17]. Using extensive numerical simulations, it has been observed that the speed of spreading of a disease in a TV network can be substantially slower than in its aggregated static representa- tion [18]. This observation is also supported by the study of spreading processes in a real TV network constructed from a mobile phone dataset [19]. More recent studies point • The authors are with the Department of Electrical and Systems Engineer- ing at the University of Pennsylvania, Philadelphia, PA 19104. out the key role played by the addition and removal of links [20], as well as the distribution of contact durations between nodes [21] in the dynamics of the spread. The works mentioned above provide empirical evidence about the nontrivial effect that the dynamics of the network has on the behavior of spreading processes. Apart from these empirical studies, we also find several works providing theoretical support to these numerical observations. The authors in [22], [23] derived the value of the epidemic threshold in particular types of TV networks, assuming that all nodes in the network present a homo- geneous infection and recovery rates. In [24], Perra et al. proposed a model of temporal network, called the activity- driven model, able to replicate burstiness in node/edge activity and analyzed contagion processes taking place in this model in [25]. Karsai et al. proposed in [26] a time- varying network using a reinforcement process able to replicate the emergence of strong and weak ties observed in a mobile call dataset. A wide and flexible class of TV network model, called edge-Markovian graphs, was proposed in [27] and analyzed in [28]. In this model, edges appear and disappear independently of each other according to Markov processes. Edge-Markovian graphs have been used to model, for example, intermittently-connected mobile net- works [29], [30] and information spread thereon [31]. Taylor et al. derived in [32] the value of the epidemic threshold in edge-Markovian graphs and proposed control strategies to contain an epidemic outbreak, assuming homogeneous spreading and recovery rates. It is worth remarking that, although most existing anal- yses of spreading processes over dynamic networks rely on the assumption that nodes present homogeneous rates and the Markov processes used to generate edge-switching sig- nals are identical, these assumptions are not satisfied in real- world networks. Furthermore, most theoretical analyses mentioned above assume that edges appear and disappear in the network according to exponential distributions. How- ever, as was found in several experimental studies [33], [34], [35] utilizing radio-frequency identification devices (RFID), the probability distribution of contact durations in human proximity networks is far from exponential. Therefore, it is of practical interest to develop tools to analyze spreading processes in TV networks with heterogenous rates and non-identical edge-switching signals able to replicate non- exponential switching patterns. In this paper, we study spreading processes over TV networks with heterogeneous rates and non-identical edge- switching signals. First, we propose a wide class of TV networks where edges appear and disappear following ag- gregated Markov processes [36]. Since the class of aggregated Markov processes contains all Markov processes, the pro- posed class includes all edge-Markovian graphs [27]. We furthermore observe that, due to the modeling flexibility of aggregated Markov processes, the proposed class of TV networks can replicate human-contact durations following non-exponential distributions with an arbitrary accuracy. Second, we theoretically analyze the dynamics of spreading process over the proposed class of dynamic graphs. We model the dynamics of spreading processes on this class us- ing a set of stochastic differential equations, which is a time- varying version of the popular N-intertwined SIS model [9]. Third, we derive conditions for these stochastic differential equations to be globally exponentially stable around the infection-free equilibrium, i.e., the infection ‘dies out’ ex- ponentially fast over time. One of the main challenges in this analysis is to derive computationally tractable stability conditions. For example, as will be illustrated later, if we simply apply a recently proposed stability condition [37] based on the direct application of Ito’s formula for jump processes (see, e.g., [38]), we obtain a stability condition that requires the computation of the largest eigenvalue of a matrix whose size grows exponentially with the number of edges in the network. Hence, this condition is hard (if not impossible) to verify for large-scale networks. In this paper, we use spectral graph theory [39] to derive stability conditions for the set of stochastic difference equations in terms of the largest eigenvalues of a matrix whose size grows linearly with the number of nodes in the network. This paper is organized as follows. In Section 2, we introduce the notation and preliminary facts used in the paper and, then, introduce a flexible model of TV networks model called aggregated-Markovian random graph process. In Section 3, we state computationally tractable stability con- ditions for spreading processes taking place in this dynamic network model. In Section 4, we illustrate our results with some numerical examples. The proofs of the theorems are presented in Section 5. 2 PRELIMINARIES AND PROBLEM STATEMENT This section starts by introducing notation in Subsection 2.1. Then, in Subsection 2.2, we review preliminary facts about spreading processes over static networks. In Subsection 2.3, we introduce the class of TV network models under consid- eration. We finalize this section by stating the problem to be studied in Subsection 2.4. 2 2.1 Notation For a positive integer n, define the set [n] = {1, . . . , n}. For c ∈ R, define c− = (c − c)/2. Let sgn(·) denote the sign function over R, which can be extended to matrices by entry-wise application. The Euclidean norm of x ∈ Rn is denoted by (cid:107)x(cid:107). Let In denote the n × n identity matrix. A square matrix is said to be Metzler if its off-diagonal entries are nonnegative. The spectral abscissa of a square matrix A, denoted by η(A), is defined as the maximum real part of its eigenvalues. We say that A is Hurwitz stable if η(A) < 0. Also, we define the matrix measure [40] of A by µ(A) = η(A + A(cid:62))/2. For a square random matrix X, its expectation is denoted by E[X] and its variance is defined by Var(X) = E[(X − E[X])2]. The diagonal matrix with diagonal elements a1, . . . , an is denoted by diag(a1, . . . , an). A directed graph is defined as the pair G = (V,E), where V = {v1, . . . , vn} is a set of nodes1 and E ⊆ V × V is a set of directed edges (also called diedges or arcs), defined as ordered pairs of nodes. By convention, we say that (vj, vi) is a directed edge from vj pointing towards vi. The adjacency matrix A = [aij] of a directed graph G is defined as the n × n matrix such that aij = 1 if (vj, vi) ∈ E, and aij = 0 otherwise. A stochastic process σ taking values in a set Γ is said to be an aggregated Markov process (see, e.g., [36]) if there exists a time-homogeneous Markov process θ taking values in a set Λ and a function f : Λ → Γ such that σ = f (θ). Through- out the paper, it is assumed that Λ is finite, f is surjective, and all the Markov processes are time-homogeneous. We say that a Markov process θ is irreducible if all the states in Λ can be reached from any other state in Λ (see, e.g., [41] for more details). We say that an aggregated Markov process σ = f (θ) is irreducible if θ is irreducible. We will use the next lemma in our proofs. Lemma 2.1 ([41]). Let θ be an irreducible Markov process taking values in a finite set Λ. Then, θ has a unique stationary distribution π. Moreover, π(λ) = lim t→∞ Pr(θ(t) = λ), for every λ ∈ Λ and θ(0) ∈ Λ. 2.2 Spreading Process over Static Networks In this subsection, we review a model of spreading processes over static networks called the Heterogeneous Networked SIS (HeNeSIS) model, which is an extension of the popular N-intertwined SIS model [9] to the case of nodes with heterogeneous rates. This model can be described using a continuous-time Markov process, as follows. Let G be a directed graph, where nodes in G represent individuals and diedges represent interactions between them (which we consider to be directed). At a given time t ≥ 0, each node can be in one of two possible states: susceptible or infected. We define the variable Xi(t) as Xi(t) = 1 if node i is infected at time t, and Xi(t) = 0 if i is susceptible. In the HeNeSIS model, when a node i is infected, it can randomly transition to the susceptible state according to a Poisson process with rate δi > 0, called the recovery rate of node i. 1. For simplicity in notation, we sometimes refer to node vi as i. (cid:80)n On the other hand, if node i is in the susceptible state, it can randomly transition to the infected state according to a i=1 aijXj(t), where βi > 0 Poisson process with rate βi is called the infection rate of node i. In other words, the rate of transition of node i from susceptible to infected is proportional to the number of its infected neighbors. Since the above Markov process has a total of 2n possible states (two states per node), its analysis is very hard for arbitrary contact networks of large size. A popular approach to simplify the analysis of this type of Markov process is to consider upper-bounding linear models. Let A denote the adjacency matrix of G, and define p = (p1, . . . , pn)(cid:62), P = diag(p1, . . . , pn), B = diag(β1, . . . , βn), and D = diag(δ1, . . . , δn). Then, it is known that the solutions pi(t) (i = 1, . . . , n) of the linear differential equation p = (BA − D)p (1) upper-bounds the evolution of E[Xi(t)] (i = 1, . . . , n) from the exact Markov process with 2n states [9]. Thus, if the dynamics in (1) is globally exponentially stable, the infection dies out exponentially fast in the exact Markov process [6], [13]. In the case of homogeneous infection and recovery rates, i.e., βi = β and δi = δ for all i, the dynamics (1) is globally exponentially stable if and only if [9] β δ < 1 η(A) . (2) Apart from the continuous-time Markov process de- scribed above, we can also model the dynamics of a spread using a discrete-time networked Markov chain with an exponential number of states [8]. As in the continuous- time case, we can show [8] that the solution of the linear difference equation p(k + 1) = (BA + I − D)p(k), (3) where p = (p1, . . . , pn)(cid:62), upper-bounds the probabili- ties Pr(i is infected at time k) (i = 1, . . . , n). As in the continuous-time case, it turns out that if the discrete-time linear system in (3) is globally exponentially stable, the infection dies out exponentially fast in the exact Markov process [6]. In the case of homogeneous infection and re- covery rates, the system in (3) is stable if and only if (2) holds [8]. 2.3 Aggregated-Markovian Random Graph Processes In this subsection, we introduce two new models of TV networks: the aggregated-Markovian edge-independent (AMEI) and the aggregated-Markovian arc-independent (AMAI) mod- els. As we mentioned above, these models generalize the class of edge-Markovian time-varying networks [27]. Let G = {G(t)}t≥0 be a stochastic graph process taking values in the set of directed graphs with n nodes. Let A(t) denote the adjacency matrix of G(t) for each t ≥ 0. The class of dynamic random graphs studied in this paper is defined as follows. Definition 2.2. Consider a collection of aggregated Markov processes σij = gij(θij) where gij are {0, 1}-valued functions and θij are stochastically independent Markov processes for 1 ≤ i < j ≤ n. An aggregated-Markovian 3 c1 p1 / c2 p2 ··· pn−1 / / cn q1 q2 sm qn s1 s2 dm rm−1 ··· r2 d2 r1 d1 Fig. 1. A Markov process described in Example 2.3. edge-independent (AMEI) network is a random graph pro- cess in which Aij = Aji = σij for i < j and Aii = 0 for all i ∈ [n]. If σij is irreducible for all possible pairs (i, j), then we say that G is irreducible. In other words, the upper-triangular entries of the time- varying adjacency matrix A(t) of an AMEI graph are in- dependent aggregated Markov processes. The lower trian- gular entries are constructed via symmetry and the diag- onal entries are zero. Hence, the graph is undirected by construction and does not contain self-loops. AMEI graphs extend the class of edge-Markovian graphs [27] and allow us to model a wider class of edge processes. For exam- ple, in an edge-Markovian graph, the time it takes for an edge to switch from connected to disconnected (or vice versa) follows an exponential distribution. In contrast, in an AMEI graph, we can design the function gij and the Markov process θij to fit any desired distribution for the contact durations with arbitrary precision, as illustrated in the following example: Example 2.3. Let θ be the Markov process over the state space S = {c1, . . . , cn, d1, . . . , dm} presenting the state- transition diagram shown in Fig. 1. Consider an edge modeled by the aggregated Markov process σ = f (θ), where the function f : S → {0, 1} is defined by f (ci) = 1 and f (dj) = 0 for all i ∈ [n] and j ∈ [m]. Therefore, the edge is active if and only if θ is in one of the states c1, . . . , cn. From the diagram in Fig. 1, we see that the edge is active from the time θ enters c1 until the time θ arrives to d1. It can be proved that the time elapsed between these two events follows a Coxian probability distribution, which forms a dense subset in the set of nonnegative random variables [42]. Therefore, by appro- priately choosing the transition rates p1, . . . , pn−1, q1, . . . , qn, it is possible to tune the distribution followed by the time the edge is active in order to follow any distribution with an arbitrary accuracy (when n is large enough). From the symmetry of the diagram in Fig. 1, we can also tune the parameters r1, . . . , rm−1, s1, . . . , sm so that the time the edge is inactive follows any given probability distribution with an arbitrary accuracy. In the following definition, we introduce a directed version of AMEI graphs. Definition 2.4. Consider a collection of aggregated Markov processes σij = gij(θij) where gij are {0, 1}-valued functions and θij are stochastically independent Markov processes for i, j ∈ [n] and i (cid:54)= j. An aggregated- Markovian arc-independent (AMAI) network is a random graph process in which Aij = σij for i (cid:54)= j and Aii = 0 / ! ! / /     C C o o o o S S o o a a for all i ∈ [n]. If σij is irreducible for all possible pairs (i, j), then we say that G is irreducible. Once the class of aggregated-Markovian networks is introduced, we analyze spreading processes taking on these random graph processes. 2.4 Problem Statement In this paper, we address the following question: Under what conditions does a spreading process taking place in a TV network with aggregated-Markovian link dynamics die out exponentially fast? In other words, we consider the problem of analyzing the stability of the upper-bounding linear model (1) when the graph is an aggregated-Markovian network. In this case, the entries of the adjacency matrix are random processes and, therefore, (1) is the following stochastic linear differen- tial equation: Σ : p(t) = (BA(t) − D) p(t), where A(t) is a random matrix process. In the following section, we will derive conditions under which the disease- free equilibrium of Σ is stable, i.e., the infection probabilities converge to zero as t → ∞ exponentially fast, in the following sense: Definition 2.5. Consider a random graph process G defined by either an AMEI or AMAI graph. We say that the disease-free equilibrium of Σ is almost surely exponentially stable if there exists λ > 0 such that (cid:18) log(cid:107)p(t)(cid:107) t lim sup t→∞ Pr (cid:19) ≤ −λ = 1, for all initial states p(0) = p0 and σij(0) = σij,0. The supremum of λ satisfying the above condition is called the decay rate. 3 STABILITY OF SPREADING PROCESSES IN RAN- DOM GRAPH PROCESSES In this section, we state the main results in this paper. In particular, we derive conditions for the spreading model Σ to be stable when the network structure varies according to an AMEI (or AMAI) random graph process. In Subsec- tion 3.1, we apply a stability condition [37] based on the direct application of the Ito formula for jump processes to derive stability conditions in terms of the largest eigenvalue of a matrix whose size depends exponentially on the num- ber of edges in the graph. Due to the exponential size of this matrix, this condition is hard (if not impossible) to apply in the analysis of large-scale networks. Motivated by this limitation, we propose in Subsection 3.2 an alternative approach using tools from the theory of random matrices. In particular, we derive stability conditions in terms of the largest eigenvalue of a matrix whose size depends linearly on the number of nodes. In Subsection 3.3, we extend our re- sults from continuous-time Markov processes to spreading processes modeled as discrete-time Markov chains. 4 3.1 Stability Conditions: Exponential Matrix Size In this subsection, we show that the result in [37, Theo- rem 7.1] based on the direct application of the Ito formula for jump processes results in stability conditions that are not well-suited for large-scale graphs. We illustrate this idea through the analysis of the stability of the spread when G is an AMAI random graph process. For simplicity in our exposition, we here temporarily assume that all the processes σij are Markovian; i.e., the mappings gij are the identities. To state our claims, we need to introduce the follow- ing notations. Let G be an AMAI random graph process (Definition 2.4). Let E be the set of (time-varying) directed edges in G (i.e., those directed edges such that σij is not the zero stochastic process). Let m = E be the number of diedges in G and label the diedges using integers 1, . . . , m. Recall that these edges are not always present in the graph, but they appear (link is ‘on’) and disappear (link is ‘off’) according to a collection of aggregated-Markov processes. Therefore, at a particular time instant, only a subset of the edges in E are present in the graph. The set of present edges can be represented by an element of {0, 1}m, since we have m possible edges that can be either ‘on’ of ‘off’. In other words, at a particular time, the contact network is one of the 2m possible subgraphs of G. To analyze the resulting dynamics, we consider the set of 2m possible subgraphs of G and label them using integers {1, . . . , 2m}. We define the one-to-one function χ : {1, . . . , 2m} → {0, 1}m, as the function that maps a particular subgraph of G into the binary string in {0, 1}m that indicates the subset of present edges in the subgraph. For the subgraph labeled (cid:96), we denote by χ(cid:96) the corre- sponding binary sequence and by χ(cid:96)(k) the k-th entry in this sequence. In other words, χ(cid:96)(k) = 1 means that the edge labeled k in G is present in the subgraph labeled (cid:96). Furthermore, we denote by F(cid:96) ∈ {0, 1}n×n the adjacency matrix representing the structure of the subgraph labeled (cid:96). Given two labels (cid:96), (cid:96)(cid:48) ∈ [2m], define the edit dis- tance d((cid:96), (cid:96)(cid:48)) to be the minimum number of links that must be added and/or removed from the subgraph the subgraph labeled (cid:96)(cid:48), labeled (cid:96) to construct i.e., d((cid:96), (cid:96)(cid:48)) = {k ∈ [m] : χ(cid:96)(k) (cid:54)= χ(cid:96)(cid:48)(k)}. If d((cid:96), (cid:96)(cid:48)) = 1 (i.e., the subgraphs differ in a single diedge), we define k(cid:96),(cid:96)(cid:48) as the (only) index k such that χ(cid:96)(k) (cid:54)= χ(cid:96)(cid:48)(k) (i.e., the label of the single edge that must added/removed). Finally, assume that the transition probabilities of the Markov process σij ((i, j) ∈ E) are given by Pr(σij(t + h) = 1 σij(t) = 0) = uijh + o(h), Pr(σij(t + h) = 0 σij(t) = 1) = vijh + o(h), for some nonnegative constants uij and vij. We define u(k) = uikjk and v(k) = vikjk for each k ∈ [m]. Under the above notations, the following stability condi- tion readily follows from [37, Theorem 7.1]: Proposition 3.1. Let G be an AMAI random graph process. Define Π ∈ R2m×2m entry-wise, as follows. For (cid:96) (cid:54)= (cid:96)(cid:48), if d(χ(cid:96), χ(cid:96)(cid:48)) = 1 and χ(cid:96)(k(cid:96),(cid:96)(cid:48)) = 0, if d(χ(cid:96), χ(cid:96)(cid:48)) = 1 and χ(cid:96)(k(cid:96),(cid:96)(cid:48)) = 1, otherwise. u(k(cid:96),(cid:96)(cid:48)), v(k(cid:96),(cid:96)(cid:48)), 0, Π(cid:96)(cid:96)(cid:48) = For (cid:96) = (cid:96)(cid:48), we let Π(cid:96)(cid:96) = −(cid:80) (cid:96)(cid:48)(cid:54)=(cid:96) Π(cid:96)(cid:96)(cid:48). Then, for every i, the probability that i is infected at time t in the HeNeSIS model converges to zero exponentially fast as t → ∞ if the (n2m) × (n2m) matrix 2m(cid:77) Π ⊗ In + (4) where ⊗ denotes the Kronecker product of matrices, is Hurwitz stable. As stated before, this stability condition is not applicable to large-scale networks, since it requires the computation of the eigenvalue with the largest real part of a matrix whose size increases exponentially with the number of edges in the graph G. In the following subsection, we present alternative stability conditions that are better-suited for stability analy- sis of large networks. (BF(cid:96) − D), (cid:96)=1 3.2 Stability Analysis: Linear Matrix Size In this subsection, we present sufficient conditions for al- most sure exponential stability of the disease-free equilib- rium of Σ when the underlying time-varying network is described by an AMEI (or AMAI) random graph process. For clarity in our exposition, we state and discuss our main results in this section, leaving the details of the proofs for Subsections 5.1 and 5.2. We now state our main results. Let us consider two pos- itive constants b and d, and define the decreasing function κb,d : [0,∞) → (0, n] by (cid:18) bs + d (cid:19)− bs+d b2 κb,d(s) = nes/b d , (5) where n is the number of the nodes in the network. The fol- lowing theorem provides conditions for a spreading process taking place in an AMAI random graph process to be almost surely exponentially stable. Theorem 3.2. Let G be an irreducible AMAI random graph process and define ¯A ∈ Rn×n component-wise, as fol- lows Let ¯β = max1≤i≤n βi, ∆1 = max 1≤i≤n ¯Aij = lim t→∞ Pr(Aij(t) = 1). δ = min1≤i≤n δi, and ¯ ¯Aij(1 − ¯Aij) + β2 j ¯Aji(1 − ¯Aji)(cid:1) , (cid:0)β2 i (6) n(cid:88) j=1 c1 = µ(B(sgn ¯A) − D) − κ−1 (1) , ¯β,∆1 2 δ + 2c− ¯s1 = 2 1 . ¯ Define τA = maximize s∈(κ −1 ¯β,∆1 (1),¯s1] (cid:32) − s + 2c1κ ¯β,∆1(s) 2(1 − κ ¯β,∆1(s)) If µ(B ¯A − D) < τA, (cid:33) . (7) (8) then the disease-free equilibrium of Σ is almost surely exponentially stable with a decay rate greater than or equal to −µ(B ¯A − D)(cid:0)1 − κ ¯β,∆1(s∗)(cid:1) − (s∗/2) − c1κ ¯β,∆1 (s∗), 5 where s∗ denotes the optimal value of s in the maximiza- tion problem (7). Proof: See Subsection 5.1. Remark 3.3. The existence of the limit in (6) is guaran- teed by the irreducibility of G as will be discussed in Subsection 5.1, where we will also give an explicit representation of the limit. The major computational cost for checking the stability condition in (8) comes from that of finding the matrix measure µ(B ¯A − D). Since the matrix B ¯A − D has size n, we can compute µ(B ¯A − D) in O(nm2) operations using Lanczos’s algorithm [43], where n and m are the number of nodes and diedges in G. In contrast, computing the dom- inant eigenvalue of the n2m-dimensional matrix in (4) re- quires O(nm22m) operations, since this matrix has O(m2m) nonzero entries. Therefore, the result in Theorem 3.2 (based on random graph-theoretical results) represents a major computational improvement with respect to the result in Proposition 3.1 (based on a direct application of the Ito formula for jump processes [37]). Above, we have analyzed the stability of spread- ing processes in aggregated-Markovian arc-independent (AMAI) networks. In the rest of the subsection, we derive stability conditions for spreading processes taking place in aggregated-Markovian edge-independent (AMEI) net- works. The next theorem is the AMEI counterpart of The- orem 3.2. Theorem 3.4. Let G be an irreducible AMEI random graph process. Let n(cid:88) (cid:0)βiβj ¯Aij(1 − ¯Aij)(cid:1) , j=1 ∆2 = max 1≤i≤n c2 = η(B(sgn ¯A) − D) − κ−1 ¯β,∆2 ¯s2 = δ + c− 2 . ¯ (1), (cid:32) (9) (cid:33) . (10) (11) Define If τE = maximize s∈(κ −1 ¯β,∆2 (1),¯s2] − s + c2κ ¯β,∆2 (s) 1 − κ ¯β,∆2(s) η(B ¯A − D) < τE, then the disease-free equilibrium of Σ is almost surely exponentially stable with a decay rate greater than or equal to − η(B ¯A− D)(cid:0)1 − κ ¯β,∆2(s∗)(cid:1)− s∗ − c2κ ¯β,∆2 (s∗), (12) where s∗ denotes the optimal value of s in the maximiza- tion problem (10). Proof: See Subsection 5.2. Theorems 3.2 and 3.4 provide threshold conditions for stability of spreading processes in time-varying networks when agents present heterogeneous infection and recovery rates, βi and δi, respectively. In the particular case of net- works with homogeneous rates, i.e., βi = β and δi = δ for all i, our results have an appealing interpretation that can be related with existing results in the literature. The following theorem states a threshold stability condition in the homogeneous case: Theorem 3.5. Let G be an irreducible AMEI random graph process. Assume that βi = β > 0 and δi = δ > 0 for all i ∈ [n]. Let n(cid:88) (cid:0) ¯Aij(1 − ¯Aij)(cid:1) , ∆3 = max 1≤i≤n c3 = η(sgn ¯A) − κ−1 j=1 (1), 1,∆3 (13) ¯s3 = + c− 3 . δ β Define ξH = maximize s∈(κ −1 1,∆3 (1),¯s3] If 1 − (β/δ) (s + c3κ1,∆3(s)) 1 − κ1,∆3 (s) . (14) β δ < ξH η( ¯A) , (15) then the disease-free equilibrium of Σ is almost surely exponentially stable with decay rate greater than or equal to (δ/β) − η( ¯A) − s∗ − (c3 − λ3)κ1,∆3 (s∗), where s∗ denotes the optimal value of s in the optimiza- tion problem (14). Moreover, if ≥ β δ 1 η(sgn ¯A) , (16) then ξH < 1. Proof: See Subsection 5.2. Remark 3.6. Since A(t) ≤ sgn ¯A entry-wise for every t ≥ 0, the solution of Σ is always upper-bounded the deterministic differential equation by that of p(t) = (β sgn ¯A − δI)p(t), whose solution converges to zero as t → ∞ if and only if β/δ < 1/η(sgn ¯A). There- fore, if the inequality (16) is false, then the disease-free equilibrium of Σ is almost surely exponentially stable and, hence, we do not need to check condition (15). In other words, condition (16) guarantees that stability analysis of Σ is not a trivial problem. As shown in Subsection 2.2, the epidemic threshold in a static network of agents with homogeneous rates is given by β/δ < 1/η(A). Condition (15) provides a similar epidemic threshold for time-varying networks in terms of the spectral abscissa of ¯A, which can be interpreted as an aggregated static network based on long-time averages. Furthermore, ξH is a multiplicative factor that modifies the epidemic threshold corresponding to the aggregated static network. Below, we derive explicit expressions of η( ¯A) for a few particular examples of time-varying graph models found in the literature: Example 3.7 (Dynamic small-world networks). We con- sider a time-varying version of the small-world network model studied in [44]. The network consists of n nodes and n static edges in the set E0 = {(1, 2), (2, 3), . . . , (n − 1, n), (n, 1)} (see Fig. 2). Apart from these static edges, we also consider a collection of dynamic edges that switch on and off over time. In particular, we allow (cid:54)= j) to be any other pair of nodes (i, j) /∈ E0 (i 6 Fig. 2. Dynamic small-world network. Solid lines represent static edges, while dashed lines represent temporarily active edges modeled by aggregated-Markov processes. dynamically connected according to an irreducible ag- gregated Markov process aij = gij(θij). For simplicity in our analysis, we assume that the stationary proba- bility of an edge (i, j) /∈ E0 being active, defined by rij = limt→∞ Pr(aij(t) = 1), equals a constant r > 0 independent of i and j. In this case, the matrix ¯A takes the form 0, ¯Aij = if i = j, if (i, j) ∈ E0, 1, r, otherwise. The spectral abscissa of ¯A is given by 1 + r(n− 2). There- fore, the stability condition (15) reads β/δ < ξH /(1 + r(n − 2)). Example 3.8 (Edge-Markovian graph). In this example, we consider the edge-Markovian graph model proposed in [27]. In this model, all the undirected edges (i, j) (i < j) are time-varying and modeled by independent {0, 1}-valued Markov processes θij sharing the same activation rate q > 0 and de-activation rate r > 0. In this case, we have (cid:40) ¯Aij = 0, q/(q + r), otherwise, if i = j, and therefore η( ¯A) = (n − 1)q/(q + r). The stability condition (15) hence reads β/δ < ξH (q + r)/((n − 1)q). In what follows, we elaborate on the behavior of the factor ξH. In particular, we will analyze its dependence on ∆3 defined in (13). Notice that ∆3 is zero when ¯Aij is either 0 or 1 for all pairs (i, j), which corresponds to the case of a static, deterministic graph G. In contrast, the maximum value of ∆3 is achieved when ¯Aij = 1/2, i.e., edges are either ‘on’ or ‘off’ with equal probability (asymptotically). Therefore, the term ∆3 can be interpreted as a measure of structural variability, in the long run. In Fig. 3, we illustrate the behavior of the factor ξH as we modify the network size n, the epidemic ratio δ/β, and the uncertainty measure ∆3. We observe that the smaller the value of ∆3, the larger the value of ξH. In other words, as we reduce the structural variability (i.e., we reduce ∆3), we obtain a better approximation using an aggregated static model (i.e., ξH approaches 1). Furthermore, notice that the value of ξH tends to 1 as n increases. This indicates that the aggregated static network approximates the epidemic threshold more accurately as the network grows. 7 (a) (b) (c) Fig. 3. Plots of ξH as δ/β and ∆3 vary for the following cases: (a) n = 100 and η(sgn ¯A) = 10, (b) n = 1, 000 and η(sgn ¯A) = 100, and (c) n = 10, 000 and η(sgn ¯A) = 1, 000. In this section, we have introduced our main theoretical results, namely, we have studied the epidemic threshold in the wide class of aggregated-Markovian random graph pro- cesses. Before we illustrate our results with some numerical simulations in Section 4, we will discuss the case when the epidemics is modeled as a discrete-time stochastic process. 3.3 Discrete-Time Epidemic Dynamics In this subsection, we briefly present a discrete-time ver- sion of the stability analysis provided above. We define a discrete-time dynamic random graph as a stochastic pro- cess G = {G(k)}∞ k=0 taking values in the set of directed graphs with n nodes. In the discrete-time case, aggregated- Markovian edge- and arc-independent dynamic random graphs are defined in the same way as in the continuous- time case. Let us consider the discrete-time epidemic model in (3) taking place in the dynamics random graph G. The resulting dynamics is described in the following stochastic difference equation: Σd : p(k + 1) = (BA(k) + I − D)p(k), where A(k) denotes the adjacency matrix of G(k). We define almost sure exponential stability of the disease-free equilibrium of Σd in the same way as we did for the continuous-time case: Definition 3.9. Let G be a discrete-time edge-independent dynamic random graph. We say that the disease-free equilibrium of Σd is almost surely exponentially stable if there exists λ > 0 such that (cid:18) Pr log(cid:107)p(k)(cid:107) k lim sup k→∞ ≤ −λ = 1 (cid:19) for all p(0) = p0 ∈ [0, 1]n and σij(0) = σij,0 (1 ≤ i < j ≤ n). We call the supremum of λ satisfying the above condition the decay rate. For simplicity in our exposition, we focus only on the edge-independent case (AMEI graph process), since the analysis is identical for the arc-independent case. The next theorem provides a sufficient condition for almost sure exponential stability of the disease-free equilibrium of Σd. Theorem 3.10. Consider an irreducible and aperiodic2 AMEI random graph process G in discrete-time. Let λ4 = η(B ¯A + I − D) and Mmax = B(sgn ¯A) + I − D. Define (cid:19)κ ¯β,∆2 (cid:33) (s) − s , (17) τD = maximize 0≤s≤1−λ4 λ4 η(Mmax) (cid:32)(cid:18) where ∆2 is defined in (9). If λ4 < τD, (18) then the disease-free equilibrium of Σd is almost surely exponentially stable with decay rate greater than or equal to γD = − log(λ4 + s∗) − κ ¯β,∆2(s∗) log (19) where s∗ denotes the value of s giving the solution to the optimization problem (17). η(Mmax) λ4 , Proof: See Subsection 5.3. 4 NUMERICAL SIMULATIONS In this section, we illustrate the effectiveness of our results with numerical simulations. In our illustrations, we consider a discrete-time edge-independent dynamic random graph G with n nodes. This random graph process is specified by the two following rules: 2) 1) Construct an undirected Erdos-R´enyi random graph over the nodes of G [45]. Denote the resulting n × n adjacency matrix by A. If Aij = 1, then nodes i and j are connected in G via a stochastic link described by a {0, 1}-valued time-homogeneous Markov chain σij. The transi- tion probability from 0 to 1 in this Markov process is given by qij ≥ 0; while the transition probability from 1 to 0 is given by rij ≥ 0. If Aij = 0, then nodes i and j are not connected in G at any time. One can easily deduce that, according to the second rule, ¯Aij = ¯Aji = qij/(rij + qij) if Aij = 1. In the following simulations, we let n = 500 and consider a realization of an 2. We say that an AMEI random graph process in discrete-time is aperiodic if all the aggregated Markov processes in the adjacency matrix of the graph are the images of aperiodic Markov chains. δ/β0510ξH00.51∆30510152025δ/β050100ξH00.51∆3050100150200250δ/β05001000ξH00.51∆305001000150020002500 8 Fig. 4. The upper bound γD of decay rates. Red dashed line shows the epidemic threshold given by Theorem 3.10. Fig. 5. The averaged numbers of the infected nodes at time k = 1000 versus β. Red dashed line: Epidemic threshold predicted by Theo- rem 3.10. Blue dotted line: Epidemic threshold predicted by using ag- gregated static network ¯A. (a) β = 6.0 × 10−4 (b) β = 7.5 × 10−4 (c) β = 9.0 × 10−4 Fig. 6. Sample paths of the number of infected nodes for different values of β. the Erdos-R´enyi graph with an edge probability of 0.2 (in step 1 above). The values of the transition probabilities rij (in step 2 above) are heterogeneous over the links of the Erdos-R´enyi graph. In particular, we have chosen for rij a collection of random values from the Gaussian N (1/2, 1/8), where we have truncated those values rij > 1 to rij = 1, and rij < 0 to rij = 0. Finally, we let qij = 1 − rij. We consider a discrete-time spreading process with ho- mogeneous infection and recovery rates, i.e., βi = β and δi = 0.05 for all i. Using Theorem 3.10, we deduce that the disease-free equilibrium of Σd is almost surely exponentially stable if β < 6.32 × 10−4. The upper bound γD of the decay rate versus β is shown in Fig. 4. In order to check the accuracy of this epidemic threshold, we compare this threshold with the one obtained from the following simula- tion. We simulate the spreading process over the dynamic random graph described above for various values of β. For each value of β, we generate 500 sample paths of the spreading process. In this simulation, we prevent a spread- ing process from dying out by re-infecting a randomly chosen node immediately after the infection process dies (i.e., when all the nodes become susceptible). A similar re- infection mechanism is employed for simulating spreading processes over static networks [46]. After the simulation, we compute the averaged number of infected nodes y∗ at time k = 1, 000. This is the meta-stable number of infected nodes when re-infection of nodes is allowed. We then determine the metastable number of infected nodes in the original spreading process without reinfection as z∗ = y∗ − 1, where the subtraction of one compensates the effect of re-infection. Finally, we define the empirical epidemic threshold β∗ as the maximum value of β such that z∗ < 1. Fig. 5 shows the value of z∗ as β varies. We see that the above defined empirical threshold β∗ lies between 7.2 × 10−4 and 7.5 × 10−4, confirming that our condition indeed gives a sufficient condition for stability. On the other hand, the epidemic threshold based on the aggregated static network ¯A (i.e., the supremum of β such that β/δ < 1/η( ¯A)) is 9.95 × 10−4 and, therefore, overestimates the actual epi- demic threshold. In Fig. 6, we show multiple realizations of the sample paths used to obtain Fig. 5 for β = 6.0 × 10−4, 7.5 × 10−4, and 9.0 × 10−4. 5 PROOFS OF MAIN RESULTS This section presents the proofs of the theorems presented in Section 3. 5.1 Proof of Theorem 3.2 We begin by recalling a basic result on the stability analysis of a class of stochastic differential equations called switched linear systems. Let σ = f (θ) be an aggregated Markov process defined by the mapping f : Λ → Γ and a Markov process θ with state space Λ. For each γ ∈ Γ, there is an associated state matrix Aγ ∈ Rn×n. An aggregated Markov β×10-412345678γD00.10.20.3β×10-434567891011z∗0102030k05001000Infectednodes01002003004008001000050k05001000Infectednodes01002003004008001000050k05001000Infectednodes01002003004008001000050 jump linear system is defined by the following stochastic differential equation x(t) = Af (θ(t))x(t), (20) where x(0) = x0 ∈ Rn and θ(0) = θ0 ∈ Λ. We remark that, if f is the identity mapping, then the system in (20) is a Markov jump linear system [47]. We say that the system in (20) is almost surely exponentially stable if there exists λ > 0 such that Pr(lim supt→∞ t−1 log(cid:107)x(t)(cid:107) ≤ −λ) = 1 for all x0 and θ0. The supremum of λ satisfying the above condition is called the decay rate. In order to prove Theorem 3.2, we will need the following criterion for almost sure exponential stability of aggregated Markov jump linear systems. Lemma 5.1. Assume that θ is an irreducible Markov process and let π be its unique stationary distribution. Assume that E(cid:2)µ(Af (π))(cid:3) < 0. (21) Then, the aggregated Markov jump linear system in (20) is almost surely exponentially stable with a decay rate greater than or equal to −E[µ(Af (π))]. Proof: The above statement is known to be true for Markov jump linear systems [48, Theorem 4.2], i.e., when f is the identity mapping. Let us now consider an arbitrary function f. Define Bλ = Af (λ) for each λ ∈ Λ. Then, we see that the system in (20) is equivalent to the Markov jump linear system x(t) = Bθ(t)x(t), for which we can guarantee almost sure exponential stability with decay rate grater than or equal to −E[µ(Bπ)] > 0 via the condition E[µ(Bπ)] < 0 [48, Theorem 4.2]. This condition is equivalent to (21) by the definition of Bλ. Using Lemma 5.1, we can prove the following prelimi- nary result, which will be useful in the proof of Theorem 3.2. Proposition 5.2. Consider an irreducible AMAI random graph process G. For all distinct and ordered pairs (i, j) ∈ [n]2, let hij be an independent Bernoulli random variable with mean ¯Aij. Define the random matrix M1 = −D + βihijEij, (22) n(cid:88) (cid:88) i=1 j(cid:54)=i where Eij denotes the {0, 1}-matrix whose entries are all zero except its (i, j)-entry. If E[µ(M1)] < 0, then, the infection-free equilibrium of Σ is almost surely ex- Proof: Define the direct product θ = (cid:78)n ponentially stable with decay rate greater than or equal to −E[µ(M1)]. (cid:78) (cid:78)n j(cid:54)=i θij, which is a stochastic process with state space Λ = j(cid:54)=i Λij. Define f : Λ → {0, 1}n(n−1) by (f (λ))ij = fij(λij). Also, for γ = (γij)i,j ∈ {0, 1}n(n−1), define the matrix (cid:78) i=1 i=1 Fγ = γijEij. (23) j(cid:54)=i i=1 i=1 Then, (cid:80) (cid:80)n from Definition 2.4, we that A(t) = j(cid:54)=i σij(t)Eij = Fσ(t) = Ff (θ(t)). Therefore, we can rewrite ¯Σ as the aggregated Markov jump linear system Σ1 : p(t) = (BFf (θ(t)) − D)p(t). By the irreducibility of G, each time-homogeneous Markov process θij has a unique stationary distribu- tion πij on Λij. Then, the unique stationary distribution see n(cid:88) (cid:88) 9 of θ is π =(cid:78)n (cid:78) i=1 j(cid:54)=i πij. Therefore, by Lemma 5.1, if E[µ(BFf (π) − D)] < 0, then Σ1 = Σ is almost surely exponentially stable with decay rate greater than or equal to −E[µ(BFf (π) − D)]. Therefore, to complete the proof of the proposition, we need to show that BFf (π) − D = M1, (24) in the sense that the random matrices appearing in the both sides of the equation share the same probability distribution. From (23) and the definition of the matrix B, we have βifij(πij)Eij. (25) BFf (π) − D = −D + (cid:16) Pr (fij(πij) = 1) = πij n(cid:88) (cid:88) i=1 j(cid:54)=i (cid:17) (cid:16) ij ({1}) f−1 Since fij maps into {0, 1}, the random variable fij(πij) is the Bernoulli random variable with mean equal to (cid:17) = lim θij(t) ∈ f−1 t→∞ Pr t→∞ Pr(σij(t) = 1) ij ({1}) = lim = ¯Aij, where we used Lemma 2.1. Moreover, all the random vari- ables fij(πij) (i, j ∈ [n], i (cid:54)= j) are independent of each other because G is arc-independent. From these observations and the equation (25), we obtain (24), as desired. In order to complete the proof of Theorem 3.2, we need the following result from the theory of random graphs concerning the maximum eigenvalue of the sum of random symmetric matrices. Proposition 5.3 ([49]). Let X1, . . . , XN be independent ran- dom n × n symmetric matrices. Let C be a nonnegative constant such that (cid:107)Xk − E[Xk](cid:107) ≤ C for every k ∈ [N ] k=1 Var(Xk)(cid:107). with probability one. Also let v2 = (cid:107)(cid:80)N Then the sum X =(cid:80)N k=1 Xk satisfies Pr (η(X) > η(E[X]) + s) ≤ κC,v2(s) (26) for every s ≥ 0 (where κb,d(s) was defined in (5)). (cid:18) Proof: Let s ≥ 0 be arbitrary. Under the assumptions (cid:19) stated in the proposition, it is shown in [49] that, for every θ > 0, Pr (η(X) > η(E[X]) + s) ≤ n exp , where g is defined by g(x) = 2x−2(ex − x − 1) for x > 0. It is easy to show that the right hand side of the inequality takes its minimum value with respect to θ when θ = (1/C) log(1 + (Cs/v2)). Substituting this particular value of θ into the inequality, we readily obtain (26). g(Cθ)θ2v2 −θs + 1 2 In order to complete the proof of Theorem 3.2, we also need the next lemma concerning Metzler matrices. Lemma 5.4 ([50, Lemma 2]). Let A and B be Metzler matrices. If A ≤ B, then we have η(A) ≤ η(B) and µ(A) ≤ µ(B). We can now provide a proof of Theorem 3.2. Proof of Theorem 3.2: Let λ1 = µ(B ¯A − D) and define X = M1 + M(cid:62) 1 − 2λ1I − κ−1 ¯β,∆1 (1)I. Notice that η(E[X]) = −κ−1 ¯β,∆1 (1), (27) 1 ]) = 2µ(E[M1]) = 2µ(B ¯A − D) = because η(E[M1 + M(cid:62) 2λ1 by (24). Also, from the definition of M1 in (22), we have (cid:16)−2λ1I − 2D − κ−1 X = (cid:17) n(cid:88) (cid:88) i=1 j(cid:54)=i (1)I + ¯β,∆1 Xij, where Xij = βi(Eij + Eji)hij (i, j ∈ [n] and i (cid:54)= j) are random, independent symmetric matrices. We then ap- ply Proposition 5.3 to the random matrix X, for which we choose C = ¯β. Clearly, the first constant term of X has zero variance, while a simple computation shows that Var(Xij) = β2 i v2 = = i=1 β2 i j(cid:54)=i (cid:13)(cid:13)(cid:13)(cid:13) ¯Aij(1 − ¯Aij)(Eii + Ejj) (cid:13)(cid:13)(cid:13)(cid:13) n(cid:88) ¯Aij(1 − ¯Aij)(Eii + Ejj). Therefore (cid:88) (cid:13)(cid:13)(cid:13)(cid:13) n(cid:77) (cid:18) n(cid:88) Pr(cid:0)η(X) > −κ−1 (1) + s(cid:1) ≤ κ ¯β,∆1 (s) ¯Aij(1 − ¯Aij) + β2 ¯Aji(1 − ¯Aji) β2 i j=1 j ¯β,∆1 i=1 = ∆1. Combining (26), (27), and (28), we obtain the estimate (28) (29) (cid:19)(cid:13)(cid:13)(cid:13)(cid:13) (1). for s > κ−1 ¯β,∆1 Let (Ω,F, Pr) be the fundamental probability space and (1) + s} consider the set Ωs = {ω ∈ Ω : η(X) > −κ−1 ¯β,∆1 (1). If ω /∈ Ωs, then η(X) ≤ −κ−1 for s > κ−1 (1) + s ¯β,∆1 ¯β,∆1 vacuously. On the other hand, if ω ∈ Ωs, then Lemma 5.4 gives the obvious estimate η(X) ≤ 2µ(B(sgn ¯A) − D) − 2λ1 − κ−1 ¯β,∆1 (1) because M1 ≤ −D +(cid:80)n = 2c1 − 2λ1 i=1 (cid:80) j(cid:54)=i βiEij = B(sgn ¯A) − D. Therefore, from (29) it follows that E[η(X)] ≤(−κ−1 ¯β,∆1 ≤ − κ−1 ¯β,∆1 (1) + s) Pr(Ω\Ωs) + (2c1 − 2λ1) Pr(Ωs) (1) + s + (2c1 − 2λ1)κ ¯β,∆1 (s). (30) (31) 2(cid:0)1 − κ ¯β,∆1(s∗)(cid:1) λ1 < −s∗−2c1κ ¯β,∆1(s∗). Therefore, when By the definition of the random matrix X, this inequality implies that 2E[µ(M1)] ≤ 2λ1(1 − κ ¯β,∆1(s)) + s + 2c1κ ¯β,∆1(s). Now we assume that condition (8) in the theo- rem holds. Then, there exists s∗ > κ−1 (1) such that ¯β,∆1 s = s∗, the inequality (31) yields that E[µ(M1)] ≤ λ1(1 − κ ¯β,∆1(s∗)) + (s∗/2) + c1κ ¯β,∆1(s∗) < 0 and hence we can complete the proof of Theorem 3.2 by Proposition 5.2. Remark 5.5. The upper bound ¯s1 of the interval in the maximization problem (7) does not play any role in the proof of Theorem 3.2. In fact, the theorem holds true even if we replace the interval with the infinite (1),∞). The reason why we introduce the interval (κ−1 ¯β,∆1 upper bound is that 1) it makes it easy for us to find the maximum and 2) it does not introduce conserva- tiveness. To prove the second statement, it is sufficient to show that the objective function in (7) is less than µ(B ¯A − D) if s > κ−1 (1) and s > ¯s1. From the ¯β,∆1 former inequality, we obtain 0 < κ(s) < 1. Also, notice the that from Lemma 5.4 there follows the inequality − δ = µ(−D) ≤ µ(B ¯A − D). Therefore, we can estimate ¯ the objective function as 10 − s + 2c1κ ¯β,∆1(s) 2(1 − κ ¯β,∆1 (s)) < − s 2 − ¯s1 + c− 2 − c1κ ¯β,∆1 (s) ≤ 1 = − δ ≤ µ(B ¯A − D), ¯ as desired. We can justify the upper bounds ¯s2 and ¯s3 in the maximization problems (10) and (14) in the same way. Remark 5.6. It can be easily verified that the proof of Theorem 3.2 still holds true even if we define c1 to be µ(B(sgn ¯A) − D). However, the inclusion of the term −κ−1 (1)/2 into c1, as was done in the theorem, ¯β,∆1 makes the maximum in condition (8) larger, and hence can reduce the conservativeness of this condition. 5.2 Proof of Theorems 3.4 and 3.5 In this subsection, we prove Theorems 3.4 and 3.5 for the edge-independent case in this subsection. We begin with the following analogue of Proposition 5.2. Proposition 5.7. Consider an irreducible AMEI random graph process G. Let hij (1 ≤ i < j ≤ n) be independent Bernoulli random variables with mean ¯Aij. Define the random matrix n(cid:88) (cid:88) (cid:113) M2 = −D + If βiβj(Eij + Eji)hij. i=1 j>i E[η(M2)] < 0, (32) n(cid:88) (cid:88) then, the disease-free equilibrium of Σ is almost surely Proof: Define the direct product θ = (cid:78)n exponentially stable with decay rate greater than or equal to −E[η(M2)]. (cid:78) (cid:78)n j>i θij, which is a Markov process having the state space Λ = j>i Λij. Also, define g : Λ → {0, 1}n(n−1)/2 by (g(λ))ij = gij(λij). For γ = (γij)i,j ∈ {0, 1}n(n−1)/2, define the matrix (cid:78) i=1 i=1 (33) Gγ = Then, we can show that A = (cid:80)n i=1 j>i (cid:80) γij(Eij + Eji). i=1 j>i σij(Eij + Eji) = Gσ = Gg(θ) by Definition 2.2. Moreover, g(θ) is an aggre- gated Markov process, since θ is a Markov process. Hence, we can rewrite Σ as the aggregated Markov jump linear system p(t) = (BGg(θ(t))− D)p(t). The state transformation −1/2 x (cid:55)→ B−1/2x, where B−1/2 = diag(β ), n shows that almost sure exponential stability of this system is equivalent to almost sure exponential stability of the following aggregated Markov jump linear system: Σ2 : p(t) = (B1/2Gg(θ(t))B1/2 − D)p(t). −1/2 1 , . . . , β prove almost sure it To of Σ2, by Lemma 5.1, to prove that E[η(B1/2Gg(π)B1/2 − D)] < 0, where we have used the fact that η(A) = µ(A) for a symmetric matrix A. On the other hand, in the same way as we did in the proof exponential sufficient stability is of Proposition 5.2, we can prove that random matrices B1/2Gg(π)B1/2 − D and M2 have the same probability distribution. Therefore, condition (32) to guarantee almost sure exponential stability of Σ2 and hence of Σ. Moreover, from the above argument, it is straightforward to see that the decay rate of the almost sure exponential stability is greater than or equal to −E[η(M2)]. This completes the proof of the proposition. is sufficient Let us prove Theorem 3.4. Proof of Theorem 3.4: Let λ2 = η(B ¯A − D) and define X = M2 − λ2I − κ−1 ¯β,∆2 (1)I (cid:16)−λ2I − D − κ−1 (cid:17) n(cid:88) (cid:88) = i=1 j>i + (1)I Xij, ¯β,∆2 where Xij = (cid:112)βiβj(Eij + Eji)hij. We now apply Propo- (1) + s(cid:1) ≤ κ ¯β,∆2(s). from (26) we obtain Pr(cid:0)η(X) > −κ−1 sition 5.3 to the random matrix X, for which we choose C = ¯β. Also, in the same way as we derived (28), we can show v2 = ∆2. Since η(E[X]) = −κ−1 (1), ¯β,∆2 Then, in the same way as we derived (30), we can show E[η(X)] ≤ −κ−1 (1)+s+(c2−λ2)κ ¯β,∆2 (s), which implies ¯β,∆2 E[η(M2)] ≤ λ2(1 − κ ¯β,∆2 (s)) + s + c2κ ¯β,∆2 (s). Using this inequality and Proposition 5.7, in the same way as we did in the proof of Theorem 3.2, we can show that condition (11) in the theorem is indeed sufficient for almost sure exponential stability of the disease-free equilibrium of Σ with decay rate greater than or equal to (12). ¯β,∆2 Finally, we give an outline of the proof of Theorem 3.5 for M3 = (cid:80)n below. Proof of Theorem 3.5: Consider an irreducible AMEI random graph process G. Assume homogeneous spreading and recovery rates, βi = β > 0 and δi = δ > 0 for all i. In the same way as we did in the proofs of Proposi- tions 5.2 and 5.7, we can show that if η(E[M3]) < δ/β j>i(Eij + Eji)hij, then the disease-free equilibrium of Σ is almost surely exponentially stable with decay rate greater than or equal to (δ/β) − η(E[M3]). Let λ3 = η( ¯A) and define X = M3 − λ3I − κ−1 (1). Applying Proposition 5.3 to the random matrix X, we obtain (cid:80) 1,∆3 i=1 E[η(X)] ≤ −κ−1 1,∆3 (1) + s + (c3 − λ3)κ1,∆3(s). Therefore, E[η(M3)] ≤ λ3 +s+(c3−λ3)κ1,∆3(s). Using this inequality and the assumption (15), we can actually show η(E[M3]) < δ/β and therefore the almost sure exponential stability of Σ in the same way as the proofs of Theorems 3.2 and 3.4. We omit the details of the derivation of the lower bound (19) of the decay rate. Also, it is straightforward to show that (16) implies ξH < 1. This completes the proof of the theorem. 5.3 Proof of Theorem 3.10 In this subsection, we give the proof of Theorem 3.10 for spreading processes running in discrete-time. In order to prove this theorem, we need to recall some facts regarding the stability of switched linear systems. Let σ = f (θ) be an aggregated Markov chain defined by the mapping f : Λ → Γ and a Markov chain σ with state space Λ. Let us define a state matrix Aγ ∈ Rn×n for each γ ∈ Γ. A discrete-time aggregated-Markov jump linear system is described by the stochastic difference equation x(k + 1) = Af (θ(k))x, (34) 11 where x(0) = x0 and θ(0) = θ0. We say that the system in (34) is almost surely exponentially stable if there exists λ > 0 such that Pr(lim supk→∞ k−1 log(cid:107)x(k)(cid:107) ≤ −λ) = 1 for all x0 and θ0. The supremum of λ satisfying the above condi- tion is called the decay rate. To prove Theorem 3.10, we need the following criterion for almost sure exponential stability of aggregated-Markov jump linear systems in discrete-time. Lemma 5.8. Consider an irreducible Markov chain θ and denote its unique stationary distribution by π. Assume that Aγ is nonnegative and symmetric for every γ ∈ Γ. if E(cid:2)log(η(Af (π)))(cid:3) < 0, then the discrete-time aggregated Markov jump linear system in (34) is almost surely ex- ponentially stable with decay rate greater than or equal to −E[log(η(Af (π)))]. Proof: Let (cid:107)A(cid:107) denote the maximum singular value of a matrix A. Since η(A) = (cid:107)A(cid:107) for a nonnegative and symmetric matrix A, it is sufficient to show that E[log(cid:107)Af (π)(cid:107)] < 0 implies almost sure exponential stability of the aggregated Markov jump linear system (34) with decay rate smaller than or equal to −E[log(cid:107)Af (π)(cid:107)]. This claim is known to be true if f is the identity mapping, i.e., if f (θ) itself is a Markov chain [51, Proposition 2.1]. The proof for the general case where f (θ) is not necessarily a Markov chain has the same structure as the proof of Lemma 5.1. We omit the details. Using this lemma, we prove the next proposition. Proposition 5.9. Consider an irreducible and aperiodic AMEI random graph process G in discrete-time. Let hij (1 ≤ i < j ≤ n) be independent Bernoulli random variables with mean ¯Aij. Define the random matrix n(cid:88) (cid:88) (cid:113) M4 = I − D + βiβj(Eij + Eji)hij. i=1 j>i If E [log(η(M4))] < 0, (35) then the disease-free equilibrium of Σd is almost surely exponentially stable with decay rate greater than or equal to −E[log(η(M4))]. Proof: For each k ≥ 0, let A(k) denote the adjacency matrix of G(k). Define the product process θ on the state space Λ in the same way as in the proof of Proposition 5.7. For γ = (γij)i,j ∈ {0, 1}n(n−1)/2, consider the matrix Gγ defined in (33). Then, in the same way as in the proof of Proposition 5.7, we can show A(k) = Gg(θ(k)). Therefore Σ is equivalent to the following discrete-time aggregated Markov jump linear system p(k + 1) = (BGg(θ(k)) + I − D)p(k). Furthermore, the state transformation x (cid:55)→ B−1/2x shows that almost sure exponential stability of this system is equivalent to that of the following aggregated-Markov jump linear system Σ4 : p(k + 1) = (B1/2Gg(θ(k))B1/2 + I − D)p(k). Since the matrix B1/2Gg(θ(k))B1/2 + I − D is nonnegative and symmetric, by Lemma 5.8, the system Σ4 is almost Pr > 1 + ≤ κ ¯β,∆2(s) (cid:19) s λ4 (cid:18) η(M4) (cid:18) (cid:21) λ4 surely stable if E[log(η(B1/2Gg(π)B1/2 + I − D))] < 0, where π denotes the stationary distribution of the irre- ducible and aperiodic Markov chain θ. On the other hand, in the same way as in the proof of Proposition 5.7, we can show that the random matrices B1/2Gg(π)B1/2 + I − D and M4 have the same probability distribution. Therefore, condition (35) is indeed sufficient for almost sure exponential stability of Σ4, which implies almost sure exponential stability of the disease-free equilibrium of Σd as we observed above. Also, from the above discussion, it is easy to verify that −E[log(η(M4))] gives a lower bound on the decay rate of stability. We are now in condition to prove Theorem 3.10. Proof of Theorem 3.10: Applying Proposition 5.3 to the random matrix M4, we obtain the inequality Pr (η(M4) > η(E[M4]) + s) ≤ κ ¯β,∆2 (s). Since λ4 = η(B ¯A + I − D) = η(E[M4]), this inequality implies that for every s ≥ 0. Therefore, in the same way as we derived (cid:20) (30), we can show that ≤ log η(Mmax) η(M4) (cid:19) 1 + + κ ¯β,∆2(s) log log E s λ4 λ4 λ4 λ4 η(Mmax) and, hence, E [log(η(M4))] ≤ log(λ4 +s)+κ ¯β,∆2(s) log . (36) Therefore, if there exists s ∈ [0, 1 − λ4] such that the right hand side of this inequality is negative, then disease-free equilibrium of Σd is almost surely exponentially stable by Proposition 5.9. A simple algebra shows that the existence of such s ≥ 0 is equivalent to (18). Notice that we do not need to consider any s larger than 1 − λ4 because, for such s, the right hand side of (36) is positive. Moreover, the upper bound (19) of the decay rate immediately follows from (36). This completes the proof of the theorem. 6 CONCLUSION AND DISCUSSION In this paper, we have analyzed the dynamics of spreading processes taking place over time-varying networks. First, we have proposed the family of aggregated-Markovian ran- dom graph processes as a flexible and analytically tractable dynamic random graph able to replicate, with arbitrary accuracy, any distribution of inter-switching times. We have then studied spreading processes in aggregated-Markovian random graph processes and derived conditions to guar- antee that the disease-free equilibrium is almost surely ex- ponentially stable. A direct analysis based on Ito’s formula for jump processes results in stability conditions in terms of the eigenvalues of a matrix whose size grows exponentially with the number of edges in the network. Using tools from random graph theory, we have derived alternative stability conditions in terms of the eigenvalues of a matrix whose size grows linearly with the number of nodes in the graph. Based on our theoretical results, we have shown that (i) aggregated static networks approximate the epidemic threshold more accurately as the number of nodes in the network grows, and (ii) aggregated static networks provide 12 a better approximation as we reduce the degree of temporal variability in the random graph process. A possible direction for future research is containment of epidemic outbreaks over time-varying networks. Although several optimization frameworks have been recently pro- posed in the literature to find the cost-optimal allocation of medical resources to prevent epidemic outbreaks in static networks [11], [12], [13], [14], these results cannot be readily applied to the case of time-varying networks. REFERENCES [1] K. Lerman and R. Ghosh, “Information contagion: An empirical study of the spread of news on Digg and Twitter social networks,” in Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, 2010, pp. 90–97. [2] M. Garetto, W. Gong, and D. Towsley, “Modeling malware spread- ing dynamics,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2003, pp. 1869–1879. [3] M. Tizzoni, P. Bajardi, C. Poletto, J. J. Ramasco, D. Balcan, B. Gonc¸alves, N. Perra, V. Colizza, and A. Vespignani, “Real-time numerical forecast of global epidemic spreading: case study of 2009 A/H1N1pdm.” BMC medicine, vol. 10, p. 165, 2012. [4] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespig- nani, “Epidemic processes in complex networks,” Reviews of Mod- ern Physics, vol. 87, pp. 925–979, 2015. [5] C. Nowzari, V. M. Preciado, and G. J. Pappas, “Analysis and control of epidemics: A survey of spreading processes on complex networks,” IEEE Control Systems Magazine (accepted), 2015. [6] H. J. Ahn and B. Hassibi, “On the mixing time of the SIS Markov chain model for epidemic spread,” in 53rd IEEE Conference on Decision and Control, 2014, pp. 6221–6227. [7] A. Ganesh, L. Massouli´e, and D. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings - IEEE INFO- COM, vol. 2, 2005, pp. 1455–1466. [8] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, “Epidemic thresholds in real networks,” ACM Transactions on Information and System Security, vol. 10, 2008. [9] P. Van Mieghem, J. Omic, and R. Kooij, “Virus spread in net- works,” IEEE/ACM Transactions on Networking, vol. 17, pp. 1–14, 2009. [10] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, “Generalized epidemic mean-field model for spreading processes over multi- layer complex networks,” IEEE/ACM Transactions on Networking, vol. 21, pp. 1609–1620, 2013. [11] Y. Wan, S. Roy, and A. Saberi, “Designing spatially heterogeneous strategies for control of virus spread.” IET systems biology, vol. 2, pp. 184–201, 2008. [12] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. Pap- pas, “Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks,” in 52nd IEEE Conference on Decision and Control, 2013, pp. 7486–7491. [13] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas, “Optimal resource allocation for network protection against spreading processes,” IEEE Transactions on Control of Net- work Systems, vol. 1, pp. 99–108, 2014. [14] K. Drakopoulos, A. Ozdaglar, and J. Tsitsiklis, “An efficient curing policy for epidemics on graphs,” IEEE Transactions on Network Science and Engineering, vol. 1, pp. 67–75, 2014. [15] P. Holme and J. Saramaki, “Temporal networks,” Physics Reports, vol. 519, pp. 97–125, 2012. [16] N. Fefferman and K. Ng, “How disease models in static networks can fail to approximate disease in dynamic networks,” Physical Review E, vol. 76, p. 031919, 2007. [17] N. Masuda and P. Holme, “Predicting and controlling infectious disease epidemics using temporal networks.” F1000prime reports, vol. 5:6, 2013. [18] A. Vazquez, B. R´acz, A. Luk´acs, and A.-L. Barab´asi, “Impact of non-Poissonian activity patterns on spreading processes,” Physical Review Letters, vol. 98, p. 158702, 2007. [19] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A.-L. Barab´asi, and J. Saramaki, “Small but slow world: How network topology and burstiness slow down spreading,” Physical Review E, vol. 83, p. 025102, 2011. [20] P. Holme and F. Liljeros, “Birth and death of links control disease spreading in empirical contact networks.” Scientific reports, vol. 4, p. 4999, 2014. [21] C. L. Vestergaard, M. G´enois, and A. Barrat, “How memory gen- erates heterogeneous dynamics in temporal networks,” Physical Review E, vol. 90, p. 042805, 2014. [22] E. Volz and L. A. Meyers, “Epidemic thresholds in dynamic contact networks.” Journal of the Royal Society, Interface / the Royal Society, vol. 6, pp. 233–241, 2009. [23] Y. Schwarzkopf, A. R´akos, and D. Mukamel, “Epidemic spreading in evolving networks,” Physical Review E, vol. 82, p. 036112, 2010. [24] N. Perra, A. Baronchelli, D. Mocanu, B. Gonc¸alves, R. Pastor- Satorras, and A. Vespignani, “Random walks and search in time- varying networks,” Physical Review Letters, vol. 109, p. 238701, 2012. [25] N. Perra, B. Gonc¸alves, R. Pastor-Satorras, and A. Vespignani, “Activity driven modeling of time varying networks.” Scientific reports, vol. 2:469, 2012. [26] M. Karsai, N. Perra, and A. Vespignani, “Time varying networks and the weakness of strong ties.” Scientific reports, vol. 4, p. 4001, 2014. [27] A. E. Clementi, C. Macci, A. Monti, F. Pasquale, and R. Silvestri, “Flooding time in edge-Markovian dynamic graphs,” in Proceed- ings of the twenty-seventh ACM symposium on Principles of distributed computing - PODC ’08, 2008, pp. 213–222. [28] I. Z. Kiss, L. Berthouze, T. J. Taylor, and P. L. Simon, “Modelling approaches for simple dynamic networks and applications to disease transmission models,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 468, pp. 1332– 1355, 2012. [29] J. Whitbeck, V. Conan, and M. D. de Amorim, “Performance of opportunistic epidemic routing on edge-Markovian dynamic graphs,” IEEE Transactions on Communications, vol. 59, pp. 1259– 1263, 2011. [30] L. Maggi and F. De Pellegrini, “Not always sparse: Flooding time in partially connected mobile ad hoc networks,” 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014, pp. 413–420, 2014. [31] H. Baumann, P. Crescenzi, and P. Fraigniaud, “Parsimonious flooding in dynamic graphs,” Proceedings of the 28th ACM sym- posium on Principles of distributed computing - PODC ’09, p. 260, 2009. [32] M. Taylor, T. J. Taylor, and I. Z. Kiss, “Epidemic threshold and control in a dynamic network,” Physical Review E, vol. 85, p. 016103, 2012. [33] C. Cattuto, W. van den Broeck, A. Barrat, V. Colizza, J. F. Pinton, and A. Vespignani, “Dynamics of person-to-person interactions from distributed RFID sensor networks,” PLoS ONE, vol. 5, pp. 1–9, 2010. [34] J. Stehl´e, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J. F. Pinton, M. Quaggiotto, W. van den Broeck, C. R´egis, B. Lina, and P. Van- hems, “High-resolution measurements of face-to-face contact pat- terns in a primary school,” PLoS ONE, vol. 6, 2011. [35] J. Stehl´e, N. Voirin, A. Barrat, C. Cattuto, V. Colizza, L. Isella, C. R´egis, J.-F. Pinton, N. Khanafer, W. Van den Broeck, and P. Van- hems, “Simulation of an SEIR infectious disease model on the dynamic contact network of conference attendees.” BMC medicine, vol. 9, p. 87, 2011. [36] D. R. Fredkin and J. A. Rice, “On aggregated Markov processes,” Journal of Applied Probability, vol. 23, pp. 208–214, 1986. [37] M. A. Rami, V. S. Bokharaie, O. Mason, and F. R. Wirth, “Stability criteria for SIS epidemiological models under switching policies,” Discrete and Continuous Dynamical Systems - Series B, vol. 19, pp. 2865–2887, 2014. [38] R. W. Brockett, “Stochastic Control,” 2009. [Online]. Available: http://www.eeci-institute.eu/pdf/M015/RogersStochastic.pdf [39] F. Chung, L. Lu, and V. Vu, “Spectra of random graphs with given expected degrees,” Proceedings of the National Academy of Sciences of the United States of America, vol. 100, pp. 6313–6318, 2003. [40] C. Desoer and H. Haneda, “The measure of a matrix as a tool to analyze computer algorithms for circuit analysis,” IEEE Transac- tions on Circuit Theory, vol. 19, pp. 480–486, 1972. [41] E. C¸ inlar, “Exceptional paper–Markov renewal theory: A survey,” Management Science, vol. 21, pp. 727–752, 1975. [42] R. Schassberger, “On the waiting time in the queuing system GI/G/1,” The Annals of Mathematical Statistics, vol. 41, pp. 182– 187, 1970. 13 [43] C. Lanczos, “An iteration method for the solution of the eigen- value problem of linear differential and integral operators,” Journal of Research of the National Bureau of Standards, vol. 45, pp. 255–282, 1950. [44] J. Saramaki and K. Kaski, “Modelling development of epidemics with dynamic small-world networks.” Journal of theoretical biology, vol. 234, pp. 413–21, 2005. [45] L. Erdos and A. R´enyi, “On random graphs. I,” Publicationes Mathematicae, vol. 6, pp. 290–297, 1959. [46] E. Cator and P. Van Mieghem, “Susceptible-infected-susceptible epidemics on the complete graph and the star graph: Exact analy- sis,” Physical Review E, vol. 87, p. 012811, 2013. [47] O. L. V. Costa, M. D. Fragoso, and M. G. Todorov, Continuous-time Markov Jump Linear Systems. Springer, 2013. [48] Y. Fang and K. Loparo, “Stabilization of continuous-time jump linear systems,” IEEE Transactions on Automatic Control, vol. 47, pp. 1590–1603, 2002. [49] F. Chung and M. Radcliffe, “On the spectra of general random graphs,” The Electronic Journal of Combinatorics, vol. 18, #P215, 2011. [50] N. K. Son and D. Hinrichsen, “Robust stability of positive continu- ous time systems,” Numerical Functional Analysis and Optimization, vol. 17, pp. 649–659, 1996. [51] P. Bolzern, “On almost sure stability of discrete-time Markov jump linear systems,” in 43rd IEEE Conference on Decision and Control, 2004, pp. 3204–3208. ACKNOWLEDGMENTS This work was supported in part by the NSF under grants CNS-1302222 and IIS-1447470. A part of this research was performed while the first author was visiting the Center for BioCybernetics and Intelligent Systems at Texas Tech University. He would like to thank Professor Bijoy Ghosh for his hospitality during this visit. Masaki Ogura received his B.Sc. degree in en- gineering and M.Sc. degree in informatics from Kyoto University, Japan, in 2007 and 2009, re- spectively, and his Ph.D. degree in mathemat- ics from Texas Tech University in 2014. He is currently a Postdoctoral Researcher in the De- partment of Electrical and Systems Engineering at the University of Pennsylvania. His research interest includes dynamical systems on time- varying networks, switched linear systems, and stochastic processes. Victor M. Preciado received his Ph.D. degree in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology in 2008. He is currently the Raj and Neera Singh Assistant Professor of Electrical and Systems Engineering at the University of Pennsylvania. He is a member of the Networked and Social Systems Engineering (NETS) program and the Warren Center for Network and Data Sciences. His research interests include network science, theory, and convex dynamic systems, control optimization with applications in socio-technical systems, technological infrastructure, and biological networks.
1411.1132
7
1411
2016-06-05T16:19:24
Are you going to the party: depends, who else is coming? [Learning hidden group dynamics via conditional latent tree models]
[ "cs.SI" ]
Scalable probabilistic modeling and prediction in high dimensional multivariate time-series is a challenging problem, particularly for systems with hidden sources of dependence and/or homogeneity. Examples of such problems include dynamic social networks with co-evolving nodes and edges and dynamic student learning in online courses. Here, we address these problems through the discovery of hierarchical latent groups. We introduce a family of Conditional Latent Tree Models (CLTM), in which tree-structured latent variables incorporate the unknown groups. The latent tree itself is conditioned on observed covariates such as seasonality, historical activity, and node attributes. We propose a statistically efficient framework for learning both the hierarchical tree structure and the parameters of the CLTM. We demonstrate competitive performance in multiple real world datasets from different domains. These include a dataset on students' attempts at answering questions in a psychology MOOC, Twitter users participating in an emergency management discussion and interacting with one another, and windsurfers interacting on a beach in Southern California. In addition, our modeling framework provides valuable and interpretable information about the hidden group structures and their effect on the evolution of the time series.
cs.SI
cs
Are you going to the party: depends, who else is [Learning hidden group dynamics via conditional latent tree models] coming? 6 1 0 2 n u J 5 ] I S . s c [ 7 v 2 3 1 1 . 1 1 4 1 : v i X r a Forough Arabshahi∗, Furong Huang†, Animashree Anandkumar‡, Carter T. Butts§ and Sean M. Fitshugh¶ ∗farabsha, †furongh, ‡a.anandkumar, §buttsc, ¶sean.fitzhugh @uci.edu University of California, Irvine Abstract-Scalable probabilistic modeling and prediction in high dimensional multivariate time-series is a challenging prob- lem, particularly for systems with hidden sources of dependence and/or homogeneity. Examples of such problems include dynamic social networks with co-evolving nodes and edges and dynamic student learning in online courses. Here, we address these problems through the discovery of hierarchical latent groups. We introduce a family of Conditional Latent Tree Models (CLTM), in which tree-structured latent variables incorporate the unknown groups. The latent tree itself is conditioned on observed covariates such as seasonality, historical activity, and node attributes. We propose a statistically efficient framework for learning both the hierarchical tree structure and the parameters of the CLTM. We demonstrate competitive performance in multiple real world datasets from different domains. These include a dataset on stu- dents' attempts at answering questions in a psychology MOOC, Twitter users participating in an emergency management discus- sion and interacting with one another, and windsurfers interacting on a beach in Southern California. In addition, our modeling framework provides valuable and interpretable information about the hidden group structures and their effect on the evolution of the time series. Keywords: Multivariate time series, conditional latent tree models, hierarchical latent groups, dynamic networks. I. INTRODUCTION In this work we address the problem of modeling and predicting high dimensional time-series with latent dependence and/or unobserved heterogeneity. Such time series arise in numerous important applications, including dynamic social networks with co-evolving nodes and edges, and dynamic student learning in MOOCs. Of particular interest in modeling such high dimensional series is the problem of predicting their evolution. Such predictions can in turn be used to provide use- ful feedback such as recommendations to network participants or students to improve their experience in the network and help them learn the course material (respectively). Modeling and tracking such high dimensional series jointly, however, is a greatly challenging task since each sequence can interact with others in unknown and complex ways. Before delving into the details of the prediction model, we thus first identify several factors that influence the dynamics of high-dimensional time series in a social context. First and foremost, individual-level behavioral variables in a multivariate time series are strongly influenced by group dynamics. For example, the nodes in a social network tend to participate in communities, and the evolution of node behavior can be captured in part by the dynamics of those communities. In some cases, the resulting dependence is endogenous: for instance, a network attendee might wonder who else is going to attend a social event (e.g., a party) before deciding whether to attend him or herself. In other cases, group-level dependence may stem from unobserved heterogeneity: in the student learn- ing scenario, for instance, students may be divided into groups of strong and weak learners whose learning curves evolve in drastically different ways. Hence, finding such underlying groupings and considering their dynamics for predicting the evolution of each individual sequence is of great importance. A second challenge for modeling in this context (as implied by the first example above), is that the dynamic behavior of each random variable affects the dynamics of other random variables, making the individual sequences dependent on one another. Treating each individual sequence independently ig- nores such interdependence and results in poor predictions. A third challenge for modeling in this context is the need to account for the impact of relevant external factors (covariates) that are predictive of dynamics. Seasonal or period effects are examples of covariates whose states can be predictive of the evolution of the series. E.g. in weekly social events, the day of week is a highly predictive factor of the attendance dynamics of the participants. Another example of relevant covariates in the context of student learning is the topic of each lesson or problem being studied, as each student has topic specific learning strengths and weaknesses. Last but not least, consecutive time points are highly correlated in typical time-series contexts. Therefore, knowing the previous state of the variables (and appropriately handling inertia) is vital for making good predictions. the effect of all Here, we introduce a parametric model class, namely the Conditional Latent Tree Models (CLTM), that takes into account the above factors for predicting high-dimensional time-series. The effect of the covariates and previous time points is captured via Conditional Random Fields (CRF's). More specifically, conditioned on exogenous covariates and previous time points, the dependency structure among the variables is modeled via a latent tree whose hidden nodes represent the unobserved hidden groupings in the data. Therefore, CLTM represents the joint distribution of the observed and latent random variables which factorizes according to a Markov latent tree conditioned on the covariates and previous time points. This model is versatile in its ability to model group structure and provide the ability to carry out exact inference through the simple belief propagation (BP) algorithm [5] that makes the model potentially scalable. We provide a statistically efficient algorithm for learning the struc- ture of the latent tree, and estimate the parameters of the model using a Maximum Likelihood (ML) approach. Therefore, our goal in the sequel is to learn unobserved groups of similar behavior and incorporate them into prediction of the evolution of high dimensional time-series conditioned on some relevant covariates. It is worth mentioning that like many common alterna- tives (e.g., hidden Markov models), the latent tree structural assumption used here is a reasonable approximation to the true dependence structure underlying the random variables arising from typical social settings. This approximation is obviously more realistic than a purely independent model, but also captures subtle hierarchical features that are missed or obscured by alternatives such as latent state models. It is also denser and more flexible than a simple tree over the observed variables due to the presence of the latent variables (since if we marginalize out the latent variables, the structure will not remain a tree anymore). Although we do not claim that latent tree structures are perfect representations of the myriad sources of dependence in large, complex social systems, we thus do regard the CTLM as an effective "middle ground" between simple independence and/or latent state models and difficult- to-scale models with unbounded dependence (e.g. full temporal ERGMs with endogenous attributes [11]). As we show here, predictive results obtained by applying these models to several real-world data sets provide further evidence for their efficacy. answered daily. Our model automatically learns groups of stu- dents who demonstrate similar evolution of learning behavior. Such information can be valuable to an instructor, since it gives him/her the ability to target different groups of students, and tune the instruction accordingly. Our approach is in contrast to earlier modeling frameworks for this MOOC dataset, which fit a different latent variable model for each student separately, treating the students independently, in order to model the learning progress [2]. We quantitatively compare the prediction of student per- in formance under our method with a chain CRF model Table III, in which the chain is over time and the students are treated as independent time sequences similar to [2]. We observe a significant improvement in predicting the stu- dent performance. Similarly, we also demonstrate a strong improvement on Twitter and beach data for predicting the conditional presence of vertices and edges over time. This is especially relevant, since these datasets are highly sparse with a small number of participants at any given time. Moreover, we observe that our method has higher improvement on the Twitter dataset compared to the beach data, since the beach dataset has covariates that are carefully collected by a team of sociologists. Thus, our method is highly effective in predicting multivariate time series across multiple domains, particularly where covariate information is present but limited. A. Summary of Results B. Related Work In this paper we introduce CLTMs and propose a frame- work for learning them efficiently. This framework has the potential to be applied to large scale data sets. We first estimate the latent group structure among the variables, and then learn the parameters of the CLTM, which describe quantitatively how the hidden variables affect the observed outcomes. We then employ CLTM's to efficiently track the evolution of time series. We apply our approach to three challenging real-world datasets involving students' performance in a psychology MOOC, Twitter users' activities and interactions, and wind- surfers' participation in and interactions during activity on a southern California beach. In all these data sets our goal is to predict the dynamics of the users (either the students in the class or the network attendees) for which we need to extract relevant covariates that will be used in CLTM. For the MOOC data, for example, In order to acquire predictive covariates for student prediction we first learn a conditional latent tree model over the knowledge components. Each question answered by any student incorporates a cer- tain knowledge component. By learning the CLTM over the knowledge components, we can automatically find hierarchi- cal groups of concepts that are learnt similarly by students. We demonstrate that the learned tree structure captures in- terpretable groupings. For instance, knowledge components related to different anxiety disorders are grouped together. Note that we only use these labels of knowledge components for validation, and not during the learning phase. We then incorporate these knowledge groupings as covariates in a CLTM used for tracking the learning of individual students over time. In this CLTM over the students, each observed node indicates the performance of one student on questions Previous works on multi-variate time series typically do not consider latent groups, e.g. [10]. This results in too many un- known parameters and results in the problem of overfitting and computational intractability in the high dimensional regime. The alternative is to first learn the groups through standard clustering techniques such as agglomerative clustering [13], and then use them as covariates for prediction. However, this two step process is not optimal for prediction. In contrast, our CLTM is a statistical model which simultaneously learns the groups and their effect on time evolution, leading to efficient performance. Another interesting line of related work considers com- munity models such as stochastic block models and mixed membership models [1], [8], [21]–[23] for modeling the un- known vertex groups. However, these models only consider the edge data and do not incorporate node state information and exogenous factors. In our datasets, we also have node activity information (such as number of tweets by a user), and we exploit this information to learn about the unknown node groups. We then incorporate the group structure for learning the edge dynamics. Further, the aforementioned works mostly assume data samples to be independent and identically distributed (except for [8] or [6]), whereas we consider time varying data. CLTM belongs to the class of Conditional random fields (CRF). Various CRFs have been considered before, e.g. CRFs on linear chains [19], trees [3], [16], grids [14], and so on. However, only a few works address the issue of structure learning of CRFs, e.g. [3], [17], [20]. Moreover, not many publications assume CRFs with latent variables, e.g [16] has latent variables, but with a fixed structure. Our work, on the other hand, does not make such strong assumptions. We learn the latent tree structure through efficient methods and also incorporate covariate effects, leading to highly effective models in practice. II. MODEL Let us denote random variables with y(t) ∈ R where i = 1, 2, . . . , n indicates the index of the random variable and t = 1, 2, . . . , T is the time index. We use the terms "random variable" and "node" interchangeably as the random variables can be represented as nodes in a dependency graph. An example of such a dependency graph is shown in Fig 1. i Each random variable's behavior is dependent upon other random variables' behavior, as well as a set of covariates. Examples of covariates include network users' group mem- berships, seasonal effects (e.g. the day of the week). There are three types of covariates we consider in this paper: the individual covariates which are node specific, e.g. membership of a specific node in an observed group (red nodes in Fig 1); the shared covariates which indicate the dependency among the nodes; and the global covariates which simultaneously affect every node in the conditional latent tree, such as seasonality (the black node in Fig 1). Let x(t) i ∈ R(1×Kn) indicate the (t) set of node specific and global covariates, and x ij ∈ R(1×Ke) indicate the shared covariates. In this case, Kn indicates the number of covariates of y(t) and Ke indicates the number of shared covariates between nodes y(t) and y(t) i i . j A. Conditional Latent Tree Models (CLTM) Our goal is to perform structured prediction when there are temporal dynamics in the data. Consider an online social network such as Twitter as an example. Let the the network users be the random variables whose Tweeting activity is tracked over time. If two users are similar (say, both belong to a subgroup with similar demographic and social charac- teristics), it is more likely for them to have similar activity. Additionally, we claim that the users' attendance behavior depends on their previous activity, the behavior of other users and some relevant covariates. Note that throughout the paper, previous observations are contained in the prediction model as a subset of the covariates. Therefore, we learn a latent tree dependence model over the users conditioned on the covariates and previous observations and we predict users' attendance dynamics according to the learned structure. As another example, we predict the performance of students in a course. Based on the students' performance on their exams throughout the semester we find groups of students who share similar learning behaviors using CLTMs. We will see that finding these similarities and hidden groupings can greatly help in predicting students' learning performance. Let us first look at what the latent tree structure looks like and why we are assuming such a dependence structure. Consider the Twitter network in which yi's are the Twitting activity of network users, or an online education system in which yi's are the performance of the students on various course material such as problems and quizzes. The latent nodes in the tree are denoted by hj where j = 1, 2, . . . , m. They represent hidden groupings in the dependence structure of the random variables yi. Let zk be the union of the observed nodes yi and latent nodes hj where k = 1, 2, . . . , n+m. Let us denote the latent tree by Td = (Zd, Ed) where Zd indicates the node set consisting of all the random variables and Ed denotes the edge set containing the edges of the latent tree. There are two main advantages in making latent tree structural assumptions. Firstly, a latent tree allows for more complex structures of dependence compared to a fully observed tree - specifically, it allows for latent groups of individuals whose behaviors jointly covary. Secondly, inference on it is tractable, and therefore, it will be scalable. Once the dependency structure is achieved, we should specify the generative distribution that the data is drawn from. The distribution of the random variables in CLTM belongs to the exponential family conditioned on observed covariates X. Covariates are observable external factors that affect the dynamics of the data. For example, in the Twitter network, relevant covariates are seasonality, regularity of network users, their popularity, and their previous activity. Fig 1 demonstrates the CLTM structure conditioned on the covariates X. As one can see in the figure, the joint structure of the observed and hidden variables are that of a tree conditioned on the covari- ates. Now let us give more details about the data distribution. Exponential family distributions are a broad family of distributions including the normal, Gamma, Poisson and many other distributions [9]. Conditioned on covariates X, the dis- tribution of Z over tree Td is given in Equation (1). Pr(ZX, θ)=exp Xk∈Zd φk(X, θ)zk+Xkl∈Ed φkl(X, θ)zkzl−A(X, θ)!, (1) where A(X, θ) is the term that normalizes the distribution, also known as the log partition function. φk(X, θ) and φkl(X, θ) indicate the node and edge potentials of the exponential family distribution, respectively. Let's assume for the sake of simplicity that the potentials are linear functions of the covariates and previous observation as shown below. φk(X, θ) = c0 + c1x1,k + ... + cKnxP,k, φkl(X, θ) = e0 + e1x1,kl... + eKe xP,kl, (2) (3) Learning the graphical model involves two steps: learning the dependence structure over the nodes, and estimating the probability distribution the data is generated from. In the following paragraphs we provide detailed description of these two steps. The details of estimating the distribution is presented in Section III-B. It should be noted that the random variables in this model can either be discrete or continuous and we will cover both variables in the structure learning and parameter estimation sections. B. Exploiting Inferred Hidden Groups A problem of frequent current interest is that of modeling the dynamics of data on social interactions, as e.g. occur in online social networks. E.g., in the context of the Twitter network a social tie (an edge) can represent any form of communication between the users while they are active. We learn these dynamics by using the information from the learnt CLTM model for node activity. It is reasonable to claim that an edge cannot be formed unless both parties that form it are xg h1 h2 y1 y2 y3 y4 available approaches, we build upon RG and LocalCLGrouping [5] with provable computational efficiency guarantees. These algorithms are based on a measure of statistical additive tree distance metric d (a.k.a information distance) which is given below for discrete random variables: xh1 x1 x2 x3 x4 xh2 dij := − log , (6) det J(yi, yj) pdet M(yi) det M(yj) where J(yi, yj) is the joint probability matrix between yi and yj and M(yi) is the diagonal marginal probability matrix of node yi. In practice, we employ empirical estimates of J(yi, yj), M(yi) and M(yj) based on sampled data. For con- tinuous Gaussian random variables the information distances are the log of their correlation coefficient: dij := − log . (7) Cov(yi, yj) pVar(xi) Var(xj ) The distance measure given in Equations (6) and (7) are not valid for conditional settings, which is the case in our study. However, since the tree structure is fixed through time samples, we can define the notion of conditional distance given in Equation (8) as the weighted average of all the individual distances given the covariates. [dijX] := KnXk=1 wk,ij dk,ij , (8) where wk,ij's are the empirical probability matrices of covari- ate pairs (Xk,i, Xk,j), such thatPstates wk,ij = 1, Kn is the total number of observed covariates for each node, i.e.: wk,ij = Pr(xk,i, xk,j ). (9) For instance, if the covariates xi and xj are binary random variables then their joint has 4 possible states and therefore wk,ij is a 4 × 1 vector whose entries sum to one. Individual distances dk,ij for discrete and continuous Gaus- sian random variables are given in Equations (10) and (11), respectively. It is worth noting that the additive property of the distance measure will be preserved, due to the fact that the tree is fixed over time and each individual's distance is additive over the tree. Fig. 1: Toy example of the underlying structure over the random variables. Blue nodes are observable variables, blank nodes are hidden variables, red nodes denote the individual covariates and the black node denotes the global covariate. As shown in the figure, the dependence structure of the random variables is a tree conditioned on covariates. present in the network. In that case, if we correctly predict the active users in the network, our chances of predicting edge dynamics increase. Therefore, conditioned on the model learned for the users we predict users' interaction patterns by regressing on a set of relevant edge covariates and the inferred state of the hidden variables from the CLTM model. Let W represent the set of edges (social ties), and wij denote the presence/absence of an edge between users i and j. Intuitively, by regressing on the inferred hidden states, we can incorporate the latent group dynamics into prediction of edges. Assuming independence between the edges, the generative model of the edges given user activity, the inferred state of the hidden variables obtained from the CLTM model, and relevant edge covariates X is: (4) Pr(W Z, X) = Y(i,j) B(cid:0)wij(cid:12)(cid:12)logit−1 (ξ(Z, X))(cid:1) , where ξ(Z, X) is a linear function of the the edge covariates X, consisting of past network information, current node states Y and inferred states of the hidden variables of the CLTM as shown in Equation (5). B is the Bernoulli distribution and logit−1 is the logistic function. Note that re-use of variable X for the edge covariates is due to notational simplicity and in practice, the edge and node covariates are not the same. X (t) k,ij in the equation below denotes the kth covariate for the edge formed between nodes i and j, at time point t. ξ(Z, X) = d0 + d1X (t) 1,ij + · · · + dKec X (t) Kec,ij + dnZ. (5) III. MODEL ESTIMATION For discrete variables we have: In order to be able to do prediction, we first estimate the underlying model given some observations. Model estimation can be divided into two general steps: structure learning and parameter estimation. For structure learning, the target struc- ture is the structure of a latent tree that will be learned using a notion of information distances efficiently. For parameter estimation, we solve the exponential family distribution defined in Equation (1) using maximum likelihood. EM is used in the parameter estimation step as latent nodes introduced in the tree by structure learning step are not observed. dk,ij := − log( J(yi, yjxk,i, xk,j ) pM(yixk,i, xk,j)M(yjxk,i, xk,j ) ). (10) This means that if the covariates are binary then dk,ij will have four states of "00", "01", "10" and "11" for the (xk,i, xk,j ) pair. We then weight each state by the empirical probability state of each covariate pair and average over all covariate pairs and all kn covariates. This conditional distance measure could be used in, LocalCLGrouping algorithms [5] to learn latent graph structure from data. A. Structure Learning For continuous variables we have: A large number of scalable structure learning algorithms for latent tree modeling have been discovered by the phylo- genetic community on learning latent tree models. Among the dk,i,j := − log( E(yiyjxk,i, xk,j ) i xk,i, xk,j )E(y2 j xk,i, xk,j ) qE(y2 ). (11) B. Parameter Estimation Using EM Once we get the latent tree structure using CLGrouping, we use maximum likelihood to estimate the parameters of the data distribution given in Equation (1) based on the structure. We use Expectation Maximization (EM) to maximize the likelihood function due to the latent node in the structure. EM is an iterative algorithm that iterates between the two so-called E-step and M-step. It maximizes the lower bound of the likelihood function in each iteration based on the parameters estimated in the previous iteration. The lower bound is the expected complete data log likelihood function which is presented in Equation 13. In order to give a sketch of the EM algorithm formulation, we first present the log likelihood function over the learned latent tree Td = (Zd, Ed): TXt=1(cid:16)A(θ, X (t))(cid:17)+ k ! + φk(X(t), θ)z(t) ℓ(θX, Z) = − TXt=1 Xk∈Zd TXt=1 Xkl∈Ed φkl(X(t), θ)z(t) k z(t) l ! (12) Variable Z is a union of the observed nodes Y and unobserved nodes H. Therefore, we cannot maximize the above quantity directly. In order to achieve maximum likelihood we compute the expected complete data log likelihood function given below: E HX,Y(cid:0)ℓ(θX, Z)(cid:1) = TXt=1 Xkl∈Ed φkl(X (t), θ)E φk(X (t))E TXt=1 Xk∈Zd HX (t) ,Y (t) (zkzl)! − HX (t) ,Y (t) (zk)!+ TXt=1(cid:16)A(X (t), θ)(cid:17). (13) HX,Y is computed from the E-step and then the M-step E maximizes Equation (13) through gradient descent. IV. EXPERIMENTS AND RESULTS In order to show the capabilities of our CLTM method, we use 3 different real world datasets. The datasets come from two categories, namely educational data and network data. The educational data is a Massive Online Learning Course (MOOC) dataset [12] from an online course on psychology offered in Spring 2013. The Network data consists of user interactions and attendance in two social networks. One is an online social media of Twitter and the other one is a network of windsurfers that surf on a beach in Southern California. It should be noted that acquiring large scale dynamic data with long enough time duration that has a reasonable density is a challenging task and most of the available data sets have a very short time duration. For performance evaluation, we qualitatively observe the estimated tree structures for educational data as the nodes are labeled and can be interpreted. Quantitatively we carry out cross-validation. We learn the model based on the training data and predict nodes/edges evolutions on the test data. A set of scores, which will be defined in the following, are used for performance evaluation. We compare our CLTM model with the baseline Chain CRF (CCRF) model in all the experiments in which the chain is over time. We use the same set of covariates for CLTM and CRF for a fair comparison Prediction Scores: We use the covariates and the es- timated parameters of the model to perform one-step-ahead prediction of the data at each time point. At each time point, we take the empirical mean of M samples we predict from the estimated model and compare the samples to the ground truth (test data). Repeatedly we carry this out at each time point t = 1, . . . , T . We define the following measures to assess the perfor- mance of the algorithm. 1) CP: the conditional presence (recall) which measures the accuracy of predicting a node as active given that the node is indeed active (encoded as 1). 2) CA: the conditional absence, which computes the accu- racy of predicting a node's absence (encoded as 0). 3) EP: conditional edge presence (recall), where edge indi- cates a social tie which is oftentimes nodes' interactions. Presence is encoded as 1. 4) EA: the conditional edge absence. Absence is encoded as 0. In the node prediction problem, it is challenging to predict CP since the data is highly sparse. Performing well in predicting rare appearances of the data is important. The prediction accuracy is defined as the percentage of nodes predicted correctly out of the n observed nodes. In the edge prediction, especially in the case of network data where we want to also track social tie dynamics, we evaluate the prediction accuracy defined as the percentage of edges predicted correctly out of the e possible edges. At the same time, the prediction of absence should not be degraded significantly. i Recall that y(t) is observed node i and w(t) ij is the observed social tie between nodes i and j at time point t = 1, . . . , T . M is the number of predictions drawn from the estimated model. ij,k be the kth edge prediction between nodes i and j at time point t. Let y(t) pred denote the predicted node set at time point t. We define the prediction scores as: i,k be our kth prediction of node i and bw(t) Let by(t) (14) (15) (16) (17) ij,k = w(t) ij w(t) ij = 1), ij,k = w(t) ij w(t) ij = 0), i,k = 1y(t) i = 1), i,k = 0y(t) i = 0), CP(t) := CA(t) := EP(t) := EA(t) := 1 nM 1 nM 1 eM 1 eM nXi=1 MXk=1 I(by(t) nXi=1 MXk=1 I(by(t) MXk=1 Xi,j∈y(t) I(bw(t) MXk=1 Xi,j∈y I(bw(t) (t) pred pred where n is the total number of observed nodes, and e is the total number of possible edges. I(.) is the indicator function who outputs 1 if its input is true. 50 100 150 200 x e d n i t n e d u t S 10 20 30 Time index 40 50 100 150 x e d n i 200 x e t r e 300V 250 50 60 70 80 5 10 Time index 15 (a) Education data (b) Twitter data 10 20 30 40 50 60 70 80 90 x e d n i x e t r e V 20 25 5 20 25 30 15 10 Time index (c) Beach data Fig. 2: Vertex activities in the datasets. White in education data is correct answer and black is incorrect answer and no activity. In Twitter and beach data, white is active and black is inactive. In addition to the above metrics, we introduce two other measures called relative difference of average, RDA, and rela- tive difference of median, RDM, that indicate the average and median of the relative improvement of CLTM compared to the baseline model consisting of Chain CRF (CCRF), respectively. RDA := PT t=1 CP(t)CLT M −PT t=1 CP(t)CCRF t=1 CP(t)CCRF , (18) PT RDM := mediant(CP(t)CLT M ) − mediant(CP(t)CCRF ) mediant(CP(t)CCRF ) , (19) The higher the values of RDA and RDM are, the better our performance is compared to Chain CRF. A. Educational Data The data, gathered from a psychology course in the Stan- ford Open Learning Library1, records students' problem solv- ing outcomes, which are grouped as "correct" and "incorrect". The problems that the students answer come in 226 knowledge components (KCs). These knowledge components refer to the different concepts covered in the class throughout the semester. The multivariate high-dimensional time series data spans 92 days and involves 5,615 students with a total number of 695 problems (2,035 steps). Each problem consists of different steps/stages. There are a total number of 2,493,612 records of students' interactions, which are student's attempts to solve problems, with the server. The course material and problems can be accessed in any order throughout the course. Students' learning behavior and performance are tracked: correct answers are encoded as 1s and the incorrect ones 0s. The ultimate goal is to track the learning of students and find similar groups of students that behave similarly in terms of learning. First we choose a subset of the students with 244 members. We have two goals for prediction: (1) to learn a latent tree model over the KCs and (2) to predict student learning using KCs as covariates. We first learn a latent tree structure over the KC model that helps us cluster the concepts 2. Then we use these clusters of KC's as relevant covariates to learn a CLTM model for the students' learning behaviors. This process is shown in Figure 3, where figure (a) shows the latent tree that clusters the KC's, ki, and figure (b) indicates the CLTM structure whose covariates are the clusters of the KC's 1available on CMU datashop [12] 2The cluster is achieved on the learnt latent tree using standard graph k1 k2 g1 g2 h2 h1 k3 k4 (a) xg h3 xh3 (b) s1 x1 s2 x2 Fig. 3: (a) Presentation of knowledge component latent tree result. In this example 2 groups g1 and g2 are recovered. (b) Student latent tree structure learning using KC latent tree's grouping as covariates. If student s1 answers problems from knowledge component k1, then s1's node specific covariate x1 takes value according to k1's grouping results from (a), which is g1. xg is the global covariate. extracted from figure (a). The ultimate goal is to track the learning of students and find groups of students that behave similarly in terms of learning. a) Latent Tree Models for Knowledge Components: The 226 knowledge components have human labels which we use for qualitative interpretation of the learned structure (see Figure 4(a) for subset of latent tree learnt, detailed interpretation is in the latter paragraph). The nodes in the learned structure are the KCs and the edges indicate the co- occurrence of the KC pairs in a day for the same student. Using daily aggregated time points, we consider all students' total numbers of correct and incorrect answers for each of the 226 KCs within a day. The counts are transformed to a ratio by normalizing with the total number of problem solved and are then transformed to approximate Gaussian by taking the square root of the ratio [4]. The covariates that we use for learning this structure are some attributes of the data, such as seasonality and previous time points' aggregated outcomes on the KC. Hierarchical clustering is realized on the knowledge com- ponents. The complete learned structure will not fit into the page limits of the paper, but is available online for an interested reader to explore 3 We demonstrate two parts of the learned structure in Figure 4. The blank nodes demonstrate the hidden variables learnt, whereas the colored nodes demonstrate the knowledge components. Taking a closer look at Figure 4 we can see that knowledge components related to relationships and happiness (red), personality(black), sexual attractions(purple), 3Link to the demos will be released in the camera ready version to preserve partitioning algorithms [18] anonymity of the authors eating disorders(golden), and anxiety(blue) are clustered to- gether. Thus, we find that our recovered latent tree has consid- erable face validity with respect to known relationships among topics. Note that none of these labels are input to algorithm, and we require no labels in our unsupervised algorithm. b) Predicting Student Learning using learnt groups of Knowledge Components as Covariates: Now that we have the clusters each KC falls into, we use them as covariates along with seasonal information and past observations of the network to track student learning. A subset of students who loyally stayed through the semester (244 members) was selected. The data is again binned daily and each sample is the ratio of correctly answered problems (aggregating over all KCs) over the total number of problems answered for a student within a day. We threshold the values to make the data binary. The extracted samples are shown in Figure 2a where the horizontal axis indicates time and the vertical axis indicates the students' attempts to answer questions. TABLE I: Prediction scores for educational data. CP and CA and defined in Equation (14-15). RDA and RDM are defined in Equation (18) and (19). RDA RDM CP (train) 2.6% 2.68% CP (test) 52.96% 56.37% CA (train) CA (test) 1.66% 1.66% 2.01% 1.99% Educational data covariate coefficients for students is shown in Figure 5. As illustrated, cluster 3 which is KC groups of "active early school's contributions to psychology" and "physical sci contributions to psychology" is the most relevant covariate with the highest weight, and smart or hard working students are relevant through those problems. Cluster 9 and 10 which are groups of KCs on "apply important questions", "goals psychology real world" and "philosophy contributions to psychology" are also highly relevant covariates. However, covariates such as KC's on "brain neuroplasticity", "methods studying the brain" and "research validity bias ", indicated as cluster 7 in the figure are less relevant in terms of distinguishing student's ability to answer questions in those category correctly. It is also interesting to notice that Sunday and Monday happens to be the time that students are most reluctant to work during the week. Note that the coefficients for seasonality are negative, however this does not imply that the data has negative correlation with seasonality. The reason is that these coefficients are approximately equal, and since at each time point only one of these variables are on, we think of them as a bias term. In other words, seasonality is down- weighting other covariates' effects. Prediction accuracy curves vs. time, indicating one-step- ahead prediction is presented in Figure 6. As it is depicted, our algorithm performs significantly better than Chain CRF in the test dataset. Finally, in Figure 7, we demonstrate our ability to automat- ically find students of similar learning abilities and track their learning efficiently over time. Among the extracted student groups we choose a group of "strong" learners, who accurately answered questions over the time, and "weak" ones who were mostly inaccurate in their answers (or inactive and did not answer any questions). We select the group of "strong" students who were 1.15 times the average overall performance (over the entire period), and in addition, their neighbors in the conditional latent tree whose information distance is less than the mean distance in the tree. In total, we obtain 21 students for this group. Similarly, for the "weak" student group, we consider students who are less than 0.85 times the average performance and also their neighbors in the tree, as described before. In total, we obtain 26 students for this group. We plot the actual performance of these two groups on training and test time periods, as well our predicted performance and the Chain CRF's predictive performance. We see that we closely track the actual performances of these two groups. Also, Chain CRF suffers severely from overfitting as illustrated in this figure. Note that the actual performances of the two groups are significantly different, with the stronger group having much better performance compared to the weaker one. Thus, our method can automatically find groups of students with similar learning behavior. This can be valuable informa- tion for instructors, since they can target these different groups and provide personalized attention of different forms. B. Network Data This data is gathered from two social networks of beach goers and Twitter users. In Section IV-B1 we present some statistics of the data and give an overview of both datasets. In Section IV-B2 we describe the Twitter data and presents its results and compare it to the baseline and in Section IV-B3 we talk about the beach dataset and present its results. 1) Network Data Description: The vertex activities for the network datasets are shown in Figures 2b and 2c. The horizontal axis indicates time index and the vertical axis indicates vertex index. White represents presence and black represents absence. Both sets of data have similar covariates: we use the previous state of the vertices as well as the number of triads (triplets of nodes which interact with each other) they were engaged in, the previous day as covariates. We also have a covariate that indicates whether the attendee is a regular participant in community activities at the beach, as assessed ethnographically over a period of several months prior to the data collection window. The effect of daily seasonality is also captured by a set of daily fixed effects. We allow for each node to have its own bias indicating that different nodes have different attendance tendency. The positive bias indicates a regular surfer in the beach goers or a regular user among the Twitter users. The negative bias indicates an irregular surfer or user. Note that in the case of Twitter data, a social tie is defined as direct messaging in Tweets and for the Beach data, a social tie indicates the interaction of surfers while they are at the beach. An overview of specifications of dataset is given in Table II. Note that AV and AE denote the average node and edge presence and are indications of the sparsity of the data. TABLE II: Data specification and number of used covariates. NN: size of the vertex set, AV: Average Vertex appearance, AE: Average Edge appearance NC: number of node covariates and EC: number of covariates for predicting edges. Data Education Twitter Beach NN 244 333 94 AV 37.17% 8.49% 16.66% AE N/A 0.036% 0.644% NC 29 9 11 EC N/A 36 43 concepts humanistic personality anxiety dis gad anxiety dis ocd optimism self efficacy hardiness relationships support happiness relationship money happiness trait theories personality inventories tests disorders critique approaches personality arousal attraction drives goals homeostasis intrinsic extrinsic eating disorders affective forecasting sexual behavior orientation physiology hunger dsm mental disorder anxiety dis panic anxiety dis phobias future causes anxiety dis nature causes anxiety dis groupthink concepts conditions anxiety dis ptsd schizophrenia symptoms schizophrenia causes Fig. 4: Subgroups of the estimated knowledge component latent tree. Nodes are colored by the topics of knowledges components. The red nodes talk about relationships and happiness, the black nodes are personality related, the purple nodes are about sexual attractions, and the golden nodes focus on the eating disorders. On the right subgroup, we see a huge cluster of anxiety related concepts, from anxiety disorder all the way to serious schizophrenia symptoms. 10 8 6 4 2 0 −2 −4 s t n e i c fi f e o C e t a i r a v o C 1 0.9 0.8 Clust1 ... ... ... ... ... ... ... ... Clust10 Mon Tue Wed Thu Fri Sat Sun Prev ... History2 ... ... ... ... ... ... ... History10 Fig. 5: Covariate coefficients/weights learnt for student learning prediction in education data. 1 0.99 0.98 0.97 y c a r u c c A 0.7 0.6 0.5 0.96 y c a r u c c A 0.95 0.94 0.4 0.3 CLTM CCRF 1 1 2 2 3 4 3 5 4 6 7 5 8 6 9 10 7 17 12 18 13 19 14 20 15 16 17 18 19 20 0.93 0.92 0.91 CLTM CCRF 1 1 2 2 3 4 3 5 4 6 7 5 8 6 9 10 11 12 13 14 15 16 17 18 19 20 7 14 10 11 12 13 9 8 Time points 15 16 17 18 19 20 11 8 9 13 12 Time points 14 10 11 15 16 (a) Conditional presence accuracy boxplots for education data on test set (b) Conditional absence accuracy boxplots for education data on test set Fig. 6: conditional presence and absence boxplots vs. time for education test data TABLE III: Prediction scores for both network data. Condi- tional presence (CP), conditional edge presence (EP), condi- tional absence (CA) and conditional edge absence (EA) are defined in Equation (14-17). Relative difference of average (RDA) and relative difference of median (RDM) are defined in Equation (18) and (19). Dataset Twitter Twitter Beach Beach CP EP CA EA 37.66% 42.31% 10.61% 14.10% 243.73% 565.98% 60.66% 60.81% -2.45% -2.85% -1.98% -2.00% -0.30% -0.33% -0.14% -0.19% RDA RDM RDA RDM 2) Twitter Network: We have collected this dataset by observing the tweeting activity of 333 individuals participating in a discussion on an emergency management topic #smemchat for a period of 6 months 4. The observation period starts from Dec 1st 2013 to Apr 29th 2014 We have a total number of 2313 snapshots of the network which are binned into 26 weekly bins. The vertex set consists of all the nodes that participated in the topic during the observation period and vertex presence is indicated by status updates. Vertex activity peaks on Fridays. Interactions are defined as direct messages among the users, therefore the network is very sparse in terms of user interactions. A user in the Twitter network is defined as a "regular" if he or she appears on the network more frequently than a specified threshold A popular user is one whose number of followers is greater than the median of the number of followers of all users. A user is fav if their number of favorites is greater than the median of the number of favorites of all the network attendees. Other covariates remain the same as discussed in the data overview. 4We refrain from providing the link to the data to preserve anonymity The weights learned for the covariates described is shown 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 e c n a m r o f r e p t n e d u t s CCRF predictions CLTM predictions actual 0 0 10 20 Train samples 30 40 50 60 70 80 Test samples (a) Group of "strong" learners 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 e c n a m r o f r e p t n e d u t s 0 0 10 20 30 Train samples 40 50 80 CCRF predictions CLTM predictions actual 60 70 Test samples (b) Group of "weak" learners Fig. 7: Performance of group of "strong" and "weak" learners over the semester. First 60 time points are training samples and rest are test. We demonstrate actual performance in answering questions as well as the predictions from the learnt CLTM and CCRF. in Figure 8a. As illustrated, regularity of the user and its past time activity are the most relevant covariates with the highest weights. Seasonality covariates are the week number in each month. As expected different weeks within each month behave approximately similar. Also, as it was the case with Educa- tional data, seasonality covariates are down-weighting the other covariates' effects rather than having negative correlation with data. As mentioned in Section II-B, we are also interested in tracking social interaction dynamics conditioned on the predicted node state of the network using the inferred state of the hidden variables in the CLTM model. The idea is that an edge cannot form unless both nodes that form it are present. Following the same reasoning for prediction, we limit edge prediction to the predicted node set; which drastically reduces the sparsity of the edge set. The covariates used for edge prediction are seasonality effects, previous state of the network, number of present nodes in the previous day, number of K-cycle structures [15], the presence of the edge in the previous day, whether the edge is between regular-regular, regular-irregular or irregular-irregular network users. The co- efficients learned for these covariates are shown in Figure 9a. We find that regular/regular interactions (interactions between regular users) have a high weight, whereas the weight of an irregular/irregular interaction is very low indicating that regular nodes are more likely to talk to one another compared to irregular nodes. Also as expected, regular/irregular interactions are somewhere in between the two. Another interesting point is that if one of the nodes that form a specific edge are a frequent and regular attendee of the network, they will have a very important role in prediction. Previous time state of the network is also another thing that highly affects prediction. Figure 9b shows the learnt weights for the covariates which consist of the inferred hidden variables from the vertex conditional latent tree model. In other words, after the CLTM is learnt over the vertices, the configuration of hidden nodes is inferred through belief propagation. These inferred values are then incorporated as covariates into the edge model as follows: for predicting each edge, we incorporate the configuration of hidden variables which are parents of the endpoints of the corresponding vertices that form the edge. In Figure 9b, we see that different hidden nodes affect the presence of edges to different extents, thus indicating that different groups have varying tendencies for forming edges. 10a, Prediction accuracy curves vs. time, indicating one-step- ahead prediction for both node prediction and edge prediction are also presented in Figure 10, respectively. As it is depicted in the Figure improved vertex prediction accuracy boosts edge prediction performance, since edge prediction is conditioned on the predicted node set. Incorporating the inferred state of the hidden variables of the CLTM model is another important factor that increases prediction accuracy compared to the baseline Chain CRF without the inferred states. As illustrated in Figure 10b, CLTM improves CP while maintaining a good CA, resulting in a 243.73% improvement in average EP. 3) Beach Network: This data contains a dynamically evolv- ing network of interpersonal communications among individ- uals congregating on a beach in Southern California observed over a one-month period [7]. The vertex set in this network is the windsurfers appearance on the beach in this 31 day period and the edge set is composed of their interpersonal communications recorded in the data set. The network was tracked two times a day, for 31 days from Aug 28, 1986 to Sept 27, 1987 by Freeman et. al. There is a total number of 94 windsurfers who are divided into two groups of regulars (with 54 members) and irregulars (with 41 members). The groups of regulars is further categorized into two groups of "Group 1" with 22 members, "Group 2" with 21 members, leaving 11 individuals in this category as ungrouped. Vertex appearance on the beach ranges from 3 to 37 in the 31 day tracking period. The number of communication ties per day ranged from 0 to 96 in this dataset. The covariates used by the vertex model are the regularity effect, group terms and all other covariates described in the network data description. The covariate weights learned by the algorithm is illustrated in Figure 8b. The highest weight is given to the previous vertex state and regularity. The same discussion about the effect of seasonality to the data holds for the Beach data as well. But here we can see that Saturday has a slightly higher weight than the rest of seasonality covariates, and this indicates that Saturday down-weights the other parameters less than the other days, which in turn means that it is more likely that people come to the beach if it is a Saturday. V. CONCLUSION In this paper we propose a framework for modeling and tracking high-dimensional temporal data via conditional ran- dom fields. An approximation of latent tree structure in the conditional random field allows for efficient inference. This is a step forward towards understanding the high-dimensional time series with covariate effects. The success application of 3 2 1 0 −1 −2 −3 −4 −5 s t n e i c fi f e o C e t a i r a v o C Regularity Popularity Fav Week 1 Week 2 Week 3 Week 4 Prev time Triad count 1 0.5 0 −0.5 −1 −1.5 −2 −2.5 s t n e i c fi f e o C e t a i r a v o C −3 Group Reg Mon Tue Wed Thur Fri Sat Sun Prev Triads (a) Twitter data covariate coefficients (b) Beach data covariate coefficients Fig. 8: Node covariate weights/coefficients learnt for predicting node participation in Twitter and beach data. 2 1.5 1 0.5 0 −0.5 −1 −1.5 0 s t n e i c fi f e o C e t a i r a v o C y c a r u c c A 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 bias rg/rg irg/irg rg/irg rg&frq #of ppl lag kCycles Week1 Week2 Week3 Week4 (a) Coefficients of covariates for edge prediction 2 1 0 −1 −2 −3 0 s a i B c fi i c e p S e d o N 5 Hidden node index 10 15 20 25 (b) Coefficients of covariates based on inferred hidden states of the vertex CLTM, used for edge prediction Fig. 9: Learnt coefficients for various covariates for edge prediction in Twitter data CLTM CP CCRF CP CLTM CA CCRF CA y c a r u c c A 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 CLTM EP CCRF EP CLTM EA CCRF EA 0 0 5 Time Points 10 15 20 25 0 0 5 Time Points 10 15 20 25 (a) Vertex prediction accuracy (b) edge prediction accuracy Fig. 10: Vertex and edge prediction accuracy for the Twitter dataset our proposed method to educational data and network data reveals potential in applying the method to a wider class of problems. ACKNOWLEDGEMENTS F. Arabshahi and F. Huang are supported by NSF BIG- DATA grant no. IIS-1251267. F. Arabshahi was also partially supported by the UCI Data Science Initiative summer fel- lowship. A. Anandkumar is supported in part by Microsoft Faculty Fellowship, NSF Career award CCF-1254106, ONR Award N00014-14-1-0665, ARO YIP Award W911NF-13-1- 0084 and AFOSR YIP FA9550-15-1-0221. C. T. Butts and S. M. Fitzhugh are supported in part by NSF grants OIA- 1028394, CMMI-1031853 and IIS-1251267 and Army Re- search Office award ARO-W911NF-14-1-0552. REFERENCES [1] A. Anandkumar, R. Ge, D. Hsu, and S. M. Kakade. A tensor spectral approach to learning mixed membership community models. arXiv preprint arXiv:1302.2684, 2013. [2] N. Bier, S. Lip, R. Strader, C. Thille, and D. Zimmaro. An approach to knowledge component/skill modeling in online courses. Open Learning, 2014. J. K. Bradley and C. Guestrin. Learning tree conditional random fields. In International Conference on Machine Learning (ICML 2010), Haifa, Israel, June 2010. [3] [4] L. D. Brown. In-season prediction of batting averages: A field test of empirical bayes and bayes methodologies. The Annals of Applied Statistics, pages 113–152, 2008. [5] M. J. Choi, V. Y. Tan, A. Anandkumar, and A. S. Willsky. Learning The Journal of Machine Learning latent tree graphical models. Research, 12:1771–1812, 2011. J. R. Foulds, C. DuBois, A. U. Asuncion, C. T. Butts, and P. Smyth. A dynamic relational infinite feature model for longitudinal social networks. In International Conference on Artificial Intelligence and Statistics, pages 287–295, 2011. [6] [7] L. C. Freeman, S. C. Freeman, and A. G. Michaelson. On human social intelligence. Journal of Social and Biological Structures, 11(4):415– 425, 1988. [8] M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, and W. A. Wallace. Extracting hidden groups and their structure from streaming interaction data. 2015. [9] R. D. Gupta and D. Kundu. Exponentiated exponential family: an alternative to gamma and weibull distributions. Biometrical journal, 43(1):117–130, 2001. J. D. Hamilton. Time series analysis, volume 2. Princeton university press Princeton, 1994. [10] [11] S. Hanneke, W. Fu, and E. P. Xing. Discrete temporal models of social networks. Electronic Journal of Statistics, 4:585–605, 2010. [12] K. R. Koedinger, R. S. Baker, K. Cunningham, A. Skogsholm, B. Leber, and J. Stamper. A data repository for the edm community: The pslc datashop. Handbook of educational data mining, 43, 2010. [13] A. Krishnamurthy, S. Balakrishnan, M. Xu, and A. Singh. Effi- cient active algorithms for hierarchical clustering. arXiv:1206.4672, 2012. arXiv preprint [14] S. Kumar and M. Hebert. Discriminative fields for modeling spatial dependencies in natural images. In In NIPS. MIT Press, 2003. [15] R. M. May et al. Simple mathematical models with very complicated dynamics. Nature, 261(5560):459–467, 1976. [16] A. Quattoni, S. Wang, L.-P. Morency, M. Collins, and T. Darrell. Hidden IEEE Transactions on Pattern Analysis & conditional random fields. Machine Intelligence, (10):1848–1852, 2007. [17] M. Schmidt, K. Murphy, G. Fung, and R. Rosales. Structure learning in random fields for heart motion abnormality detection. In In CVPR, 2008. [18] A. Sen, H. Deng, and S. Guha. On a graph partition problem with application to vlsi layout. Information processing letters, 43(2):87–94, 1992. [19] F. Sha and F. Pereira. Shallow parsing with conditional random fields. pages 213–220, 2003. [20] A. Torralba, K. P. Murphy, and W. T. Freeman. Contextual models for object detection using boosted random fields. In In NIPS, 2004. [21] A. White and T. B. Murphy. Mixed-membership of experts stochastic blockmodel. arXiv preprint arXiv:1404.0221, 2014. [22] E. P. Xing, W. Fu, and L. Song. A state-space mixed membership blockmodel for dynamic network tomography. The Annals of Applied Statistics, 4(2):535–566, 2010. J. Yang, J. McAuley, and J. Leskovec. Community detection in networks with node attributes. arXiv preprint arXiv:1401.7267, 2014. [23]
1311.5978
1
1311
2013-11-23T09:07:11
Event Evolution Tracking from Streaming Social Posts
[ "cs.SI", "physics.soc-ph" ]
Online social post streams such as Twitter timelines and forum discussions have emerged as important channels for information dissemination. They are noisy, informal, and surge quickly. Real life events, which may happen and evolve every minute, are perceived and circulated in post streams by social users. Intuitively, an event can be viewed as a dense cluster of posts with a life cycle sharing the same descriptive words. There are many previous works on event detection from social streams. However, there has been surprisingly little work on tracking the evolution patterns of events, e.g., birth/death, growth/decay, merge/split, which we address in this paper. To define a tracking scope, we use a sliding time window, where old posts disappear and new posts appear at each moment. Following that, we model a social post stream as an evolving network, where each social post is a node, and edges between posts are constructed when the post similarity is above a threshold. We propose a framework which summarizes the information in the stream within the current time window as a ``sketch graph'' composed of ``core'' posts. We develop incremental update algorithms to handle highly dynamic social streams and track event evolution patterns in real time. Moreover, we visualize events as word clouds to aid human perception. Our evaluation on a real data set consisting of 5.2 million posts demonstrates that our method can effectively track event dynamics in the whole life cycle from very large volumes of social streams on the fly.
cs.SI
cs
Event Evolution Tracking from Streaming Social Posts Pei Lee University of British Columbia Vancouver, BC, Canada [email protected] Laks V.S. Lakshmanan University of British Columbia Vancouver, BC, Canada [email protected] Evangelos Milios Dalhousie University Halifax, NS, Canada [email protected] 3 1 0 2 v o N 3 2 ] I S . s c [ 1 v 8 7 9 5 . 1 1 3 1 : v i X r a ABSTRACT Online social post streams such as Twitter timelines and forum dis- cussions have emerged as important channels for information dis- semination. They are noisy, informal, and surge quickly. Real life events, which may happen and evolve every minute, are per- ceived and circulated in post streams by social users. Intuitively, an event can be viewed as a dense cluster of posts with a life cy- cle sharing the same descriptive words. There are many previous works on event detection from social streams. However, there has been surprisingly little work on tracking the evolution patterns of events, e.g., birth/death, growth/decay, merge/split, which we ad- dress in this paper. To define a tracking scope, we use a sliding time window, where old posts disappear and new posts appear at each moment. Following that, we model a social post stream as an evolving network, where each social post is a node, and edges between posts are constructed when the post similarity is above a threshold. We propose a framework which summarizes the infor- mation in the stream within the current time window as a "sketch graph" composed of "core" posts. We develop incremental update algorithms to handle highly dynamic social streams and track event evolution patterns in real time. Moreover, we visualize events as word clouds to aid human perception. Our evaluation on a real data set consisting of 5.2 million posts demonstrates that our method can effectively track event dynamics in the whole life cycle from very large volumes of social streams on the fly. 1. INTRODUCTION In the current social web age, people easily feel overwhelmed by the information deluge coming from post streams which flow in from channels like Twitter, Facebook, forums, Blog websites and email-lists. As of 2009, it was reported [1], e.g., that each Twitter user follows 126 users on average, and on each day, the received social streaming posts will cost users considerable time to read, only to discover a small interesting part. This is a huge overhead that users pay in order to find a small amount of interesting infor- mation. There is thus an urgent need to provide users with tools which can automatically extract and summarize significant infor- mation from highly dynamic social streams, e.g., report emerging bursty events, or track the evolution of a specific event in a given time span. There are many previous studies [19, 22, 24, 25, 12, 7] on detecting new emerging events from text streams; they serve the need for answering the query "what's happening?" over so- cial streams. However, in many scenarios, users may want to know more details about an event and may like to issue advanced queries like "how're things going?". For example, for the event "SOPA (Stop Online Piracy Act) protest" happening in January 2012, ex- isting event detection approaches can discover bursty activities at each moment, but cannot answer queries like "how SOPA protest has evolved in the past few days?". An ideal output to such an evolution query would be a "panoramic view" of the event his- tory, which improves user experience. In this work, we consider this kind of queries as an instance of the event evolution tracking problem, which aims to track the event evolutionary dynamics at each moment from social streams. Typical event evolution patterns include emerging (birth) or disappearing (death), inflating (growth) or shrinking (decay), and merging or splitting of events. Event de- tection can be viewed as a subproblem of event evolution tracking. We try to solve the event evolution tracking problem in the paper. There are several major challenges in the tracking of event evo- lution. The first challenge is the effective organization of noisy social post streams into a meaningful structure. Social posts such as tweets are usually written in an informal way, with lots of ab- breviations, misspellings and grammatical errors. Even worse, a correctly written post may have no significance and be just noise. Recent works on event detection from Twitter [28, 22] recognize and handle noise in post streams in a limited and ad hoc manner but do not handle noise in a systematic formal framework. The second challenge is how to track and express the event evolution behaviors precisely and incrementally. Most related work reports event ac- tivity by volume on the time dimension [22, 19]. While certainly useful, this cannot show the evolution behaviors about how events are split or merged, for instance. The third challenge is the sum- mary and annotation of events. Since an event may easily contain thousands of posts, it is important to summarize and annotate it in order to facilitate human perception. Recent related works [22, 19, 28] typically show users just a list of posts ranked by importance or time freshness, which falls short of addressing this challenge. To handle the above mentioned challenges, we first model so- cial streams as an evolving post network, and then propose a sketch graph-based framework to track the evolution of events in the post network (Section 4.1). Intuitively, a sketch graph can be viewed as a compact summary of the original post network. The sketch graph only contains core posts from the post network, where core posts are defined as posts that play a central role in the network. Noise posts will be directly pruned by the sketch graph. As we will discuss in Section 5, evolution behaviors can be effectively and in- (a) The sketch-based framework (b) Event evolution tracking Figure 1: (a) Post network captures the correlation between posts in the time window at each moment, and evolves as time rolls on. Core nodes and core edges are bolded. (b) From moment t to t + 1, typical event evolution behaviors include birth or death, growth or decay, merging or splitting of events. Each event is annotated by a topical word cloud. crementally expressed based on a group of primitive operations in the sketch graph. Technically, we define an event as a cluster in the post network, and then summarize and annotate each event by top- ical word-clouds. We show an overview of major steps for event tracking from social streams in Figure 1. Note that as time rolls on, the post network, events and their annotations will be updated incrementally at each moment. We notice that at a high level, our definition seemingly resem- bles previous work on density-based clustering over streaming data, e.g., DenStream in [9] and cluster maintenance in [2] and [5]. How- ever, there are several major differences. First, our approach works on an evolving graph structure and provides users the flexibility in choosing the scope for tracking and monitoring new events by means of a fading time window, while the existing work doesn't provide a tracking scope. Second, the existing work can only pro- cess the adding of nodes/edges one by one, while our approach can handle adding, deleting and fading of nodes subgraph by subgraph. This is an important requirement for dealing with the high through- put rate of online post streams. Third, the focus of our approach is tracking and analyzing the evolution dynamics in the whole life cycle of events. By contrast, they focus on the maintenance of clus- ters, which is only a sub-task in our problem. Finally, to compare with traditional topic tracking on news arti- cle streams, we note that this problem is usually formulated as a classification problem [4]: when a new story arrives, compare it with topic features in the training set and if it matches sufficiently, declare it to be on a topic. Commonly used techniques include de- cision trees and k-NN [29]. This approach assumes that topics are predefined before tracking. Thus, we cannot simply apply topic tracking techniques to event tracking in social streams, since future events are unknown and may not conform to any previously known topics. Moreover, traditional topic tracking has difficulties in track- ing the composite behaviors such as merging and splitting, which are definitely a key aspect of event evolution. In summary, the main problem we study in this paper is captured by the following questions: how to efficiently track the evolution behavior of social post streams such as Twitter, which are noisy and highly dynamic? how to do this incrementally? what is an effective way to express evolution behavior of events? In this paper, we develop a framework and algorithms to answer all these questions. Our main contributions are the following: • We design an effective approach to extract and organize mean- • We filter noisy posts by introducing sketch graph (Section 4.1)), based on which we define a group of primitive opera- tions and express evolution behaviors with respect to graphs and events using these primitive operations (Section 5); ingful information from noisy social streams (Section 3); S(p1, p2) SF (p1, p2) (δ1, ε0, ε1) Gt(Vt, Et) Gt(Vt, Et) wt(p) N (p) C, St C, St Nc(p) E,(cid:101)St A the content similarity between p1 and p2 the fading similarity between p1 and p2 density factors for core post, edge and core edge the weight of post p at time moment t the sketch graph of the post network at moment t the post network at moment t the neighbor set of p in Gt a component, a component set at moment t a cluster, a cluster set at moment t the set of clusters where p's neighboring core posts belong an event, an event set at moment t the annotation for an event Table 1: Notation. • We propose efficient algorithms cTrack and eTrack to track the evolution of clusters and events accurately and incremen- tally, superior in both quality and performance to existing ap- proaches that find the evolution patterns by matching events in consecutive time moments (Section 6). • Our evaluation on a large real data set demonstrates that our method can effectively track all six kinds of event evolution behaviors from highly dynamic social post streams in a scal- able manner (Section 7). More related work is discussed in Section 2. We summarize the paper and discuss extensions in Section 8. For convenience, we summarize the major notations used in the paper, in Table 1. 2. RELATED WORK Work related to this paper mainly falls in one of these categories. Topic/Event/Community detection and tracking. Most previous works detect events by discovering topic bursts from a document stream. Their major techniques are either detecting the frequency peaks of event-indicating phrases over time in a histogram, or mon- itoring the formation of a cluster from a structure perspective. A feature-pivot clustering is proposed in [12] to detect bursty events from text streams. Sarma et al. [25] design efficient algorithms to discover events from a large graph of dynamic relationships. Jin et al. [15] present Topic Initiator Detection (TID) to automatically find which web document initiated the topic on the Web. Louvain method [8], based on modularity optimization, is the state-of-the- art community detection approach which outperforms others. How- ever, Louvain method cannot not resist massive noise. None of the above works address the event evolution tracking problem. There is less work on evolution tracking. An event-based charac- terization of behavioral patterns for communities in temporal inter- action graphs is presented in [6]. A framework for tracking short, distinctive phrases (called "memes") that travel relatively intact Time WindowFrequencySocial StreamsPost Network, Sketch GraphExtractMoment tE2E3E4E3Moment t+1E1E5MergeGrowBorn through on-line text was developed in [19]. Unlike these works, we focus on the tracking of real world event-specific evolution pat- terns from social streams. Social Stream Mining. Weng et al. [28] build signals for individ- ual words and apply wavelet analysis on the frequency of words to detect events from Twitter. Twitinfo [22] detects events by keyword peaks and represents an event it discovers from Twitter by a time- line of related tweets. Recently, Agarwal et al. [2] discover events that are unraveling in microblog streams, by modeling events as dense clusters in highly dynamic graphs. Angel et al. [5] study the efficient maintenance of dense subgraphs under streaming edge weight updates. Both [2] and [5] model the social stream as an evolving entity graph, but suffer from the drawback that post at- tributes like time and author cannot be reflected. Another draw- back of [2] and [5] is that they can only handle edge-by-edge up- dates, but cannot handle subgraph-by-subgraph bulk updates. Both drawbacks are solved in our paper. Clustering and Evolving Graphs. In this paper, we summarize an original post network into a sketch graph based on density parame- ters. Compared with partitioning-based approaches (e.g., K-Means [14]) and hierarchical approaches (e.g., BIRCH [14]), density-based clustering (e.g., DBSCAN [14]) is effective in finding arbitrary- shaped clusters, and is robust to noise. The main challenge is to ap- ply density-based clustering on fast evolving post networks. CluS- tream [3] is a framework that divides the clustering process into an online component which periodically generates detailed summary statistics for nodes and an offline component which uses only the summary statistics for clustering. However, CluStream is based on K-Means only. DenStream [9] presents a new approach for discov- ering clusters in an evolving data stream by extending DBSCAN. This work is related to us in that both employ density based clus- tering. The differences between our approach and DenStream were discussed in detail in the introduction. Subsequently, DStream [10] uses an online component which maps each input data record into a grid and an offline component which generates grid clusters based on the density. Another related work is by Kim et al. [16], which first clusters individual snapshots into quasi-cliques and then maps them over time by looking at the density of bipartite graphs be- tween quasi-cliques in adjacent snapshots. Although [16] can han- dle birth, growth, decay and death of clusters, the splitting and merging behaviors are not supported. In contrast, our approach is totally incremental and is able to track composite behaviors like merging and splitting in real time. 3. POST NETWORK CONSTRUCTION In this section, we describe how we construct a post network from a social post stream. The main challenge is detecting similar- ity between streaming posts efficiently and accurately, taking the time of the posts into account. We use a notion of fading similarity (Section 3.2) and propose a technique called linkage search to effi- ciently detect posts similar to a post as it streams in (Section 3.3). 3.1 Social Stream Preprocessing Social posts such as tweets are usually written in an informal way. Our aim is to design a processing strategy that can quickly judge what a post talks about and is robust enough to the informal writing style. In particular, we focus on the entity words contained in a post, since entities depict the topic. For example, given a tweet "iPad 3 battery pointing to thinner, lighter tablet?", the entities are "iPad", "battery" and "tablet". However, traditional Named En- tity Recognition tools [23] only support a narrow range of entities like Locations, Persons and Organizations. NLP parser based ap- proaches [17] are not appropriate due to the informal writing style of posts and the need for high processing speed. Also, simply treat- ing each post text as a bag of words [21] will lead to loss of accu- racy, since different words have different weights in deciding the topic of a post. To broaden the applicability, we treat each noun in the post text as a candidate entity. Technically, we obtain nouns from a post text using a Part-Of-Speech Tagger1, and if a noun is plural (POS tag "NNS" or "NNPS"), we obtain the prototype of this noun using WordNet stemmer2. In practice, we find this prepro- cessing technique to be robust and efficient. In the Twitter dataset we used in our experiments (see Section 7), each tweet contains 4.9 entities on an average. We formally define a social post as follows. DEFINITION 1. (Post). A post p is a triple (L, τ, u), where L is the list of entities in the post, τ is the time stamp of the post, and u is the user who posted it. We let pL denote L in the post p for simplicity, and analogously for pτ and pu. We use pL to denote the number of entities in p. 3.2 Fading Similarity Post similarity is the most crucial criterion in correlating posts of the same event together. Traditional similarity measures such as TF-IDF based cosine similarity, Jaccard Coefficient and Pearson Correlation [21] only consider the post content. However, clearly time dimension should play an important role in determining post similarity, since posts created closer together in time are more likely to discuss the same event than posts created at very different mo- ments. We introduce the notion of fading similarity to capture both content similarity and time proximity. Formally, we define the fad- ing similarity between a pair of posts pi and pj as SF (pi, pj ) = S(pL D(pτ i , pL j ) i − pτ j ) (1) i , pL i and pL i − pτ j ) = e j to the interval [0, 1], and D(pτ j ) ≥ 1. For example, S(pL i , pL j )/(pL i ∩ pL i −pτ pτ j ) is a set-based similarity measure that maps the where S(pL i − similarity between pL j ) is a distance measure that is monotonically increasing with pτ j and D(pτ i − pτ pτ j ) may be i ∪ pL j ), j ) = (pL the Jaccard coefficient with S(pL i , pL i − pτ j ) may be D(pτ i − pτ and D(pτ j . We will compare different measures in experiments. It is known that nouns are usually more topic relevant than verbs, adjectives, etc [20]. Consequently, entity-based similarity of posts is more appropri- ate than similarity based on all words. Besides, it has the advan- tage of smaller computational overhead. It is trivial to see that 0 ≤ SF (pi, pj) ≤ 1 and that SF (pi, pj) is symmetric. 3.3 Post Network and Linkage Search To find the implicit correlation between posts as they stream in, we build a post network based on the following rule: if the fading similarity between two posts is higher than a given threshold ε0, we create an edge between them. More formally: DEFINITION 2. (Post Network). The snapshot of post network at moment t is defined as a graph Gt(Vt,Et), where each node p ∈ Vt is a post, and an edge (pi, pj) ∈ Et is constructed iff SF (pi, pj) ≥ ε0, where 0 < ε0 < 1 is a given parameter. We monitor social streams using a fading time window, which will be introduced explicitly in Section 5.3. For now, imagine a time window of observation and consider the post network at the beginning of the time window. As we move forward in time, new 1POS Tagger, http://nlp.stanford.edu/software/tagger.shtml 2JWI WordNet Stemmer, http://projects.csail.mit.edu/jwi/ Figure 2: The functional relationships between different types of objects defined in this paper. Refer to Table 1 for notations. posts flow in and old posts fade out and Gt(Vt,Et) is dynami- cally updated at each moment, with new nodes/edges added and old nodes/edges removed. Removing a node and associated edges from Gt(Vt,Et) is an easy operation, so let us investigate the case when a node is added. When a new post p flows in, we need to con- struct the linkage (i.e., edges) between p and nodes in Vt, following Definition 2. In a real scenario, since the number of nodes Vt can easily go up to millions, it is impractical to compare p with every node in Vt to verify the satisfaction of Definition 2. Below, we pro- pose Linkage Search to identify the neighbors of p accurately by accessing only a small subset of nodes in Vt. Linkage Search. Let N (p) denote the set of neighbors of p that satisfy Definition 2. The problem of linkage search is finding N (p) accurately by accessing only a small node set N (cid:48), where N (p) ⊆ N (cid:48) ⊂ Vt and N (cid:48) (cid:28) Vt. To solve this problem, first we con- struct a post-entity bipartite graph, and then perform a two-step ran- dom walk process on this bipartite graph and use the hitting counts. The main idea of linkage search is to let a random surfer start from post node p and walk to any entity node in pL on the first step, and continue to walk back to post nodes except p on the second step. All the post nodes visited on the second step form a set N (cid:48). For any node q ∈ N (cid:48), q can be hit multiple times from different entities and the total hitting count H(p, q) can be aggregated. Assuming the measure of S(pL, qL) in Eq. (1) is Jaccard coefficient, we can verify the linkage between p and q by checking the condition ≥ ε0 (pL + qL − H(p, q)) D(pτ − qτ) H(p, q) SF (p, q) = (2) Linkage search supports the construction of a post network on It is easy to see that for post q (cid:54)∈ N (cid:48), SF (p, q) = 0. the fly. Thus, we do not need to access posts that are not in N (cid:48). Since a post like tweet usually connects to very few entities, N (cid:48) (cid:28) Vt generally holds, thus making linkage search very efficient. Suppose the average number of entities in each post is d1 and the average number of posts mentioning each entity is d2. Then linkage search can find the neighbor set of a given post in time O(d1d2). 4. SKETCH-BASED SUMMARIZATION Here we first introduce the notion of sketch graph based on den- sity parameters, and define events in the post network based on components of the sketch graph. The relationships between differ- ent types of objects defined in this paper are illustrated in Figure 2. As an example to explain this figure, the arrow from Gt to Gt labeled Ske means Gt = Ske(Gt). See Table 1 for notations. 4.1 Sketch Graphs Many posts tend to be just noise so it is essential to identify those posts that play a central role in describing events. We formally capture them using the notion of core posts. On web link graphs, there is a lot of research on node authority ranking, e.g., HITS and PageRank [21]. However, most of these methods are iterative and not applicable to one-scan computation on streaming data. In this paper, we introduce a sketch graph Gt(Vt, Et) of post network Gt(Vt,Et) based on density parameters (δ1, ε0, ε1), where ε1 ≥ ε0. In density-based clustering , δ1 (a.k.a. M inP ts in DB- SCAN [11]) is the minimum number of nodes in an ε0-neighborhood, required to form a cluster. In the post network, we consider δ1 to be the threshold to judge whether a post is important and sim- ilarly ε1 is a threshold for core edges. The reason we choose density-based clustering is that, compared with partitioning-based approaches (e.g., K-Means [14]) and hierarchical approaches (e.g., BIRCH [14]), density-based clustering (e.g., DBSCAN) defines clusters as areas of higher density than the remainder of the data set, which is effective in finding arbitrary-shaped clusters and is ro- bust to noise. We adapt the concepts from density-based clustering and define the post weights as follows. DEFINITION 3. (Post Weight). Given a post p = (L, τ, a) in Gt(Vt,Et) and its neighbor set N (p), the weight of p at moment t, t ≥ pτ , is defined as (cid:88) q∈N (p) wt(p) = 1 D(t − pτ) SF (p, q) (3) Notice, post weight decays as time moves forward, although the neighbor set N (p) may change. Thus, post weights need to be con- tinuously updated. In practice, we only store the sum(cid:80) with p to avoid frequent updates and compute wt(p) on demand when we need to judge the importance of a post. Based on post weight, we distinguish nodes in Gt(Vt,Et) into three types, as de- fined below. q∈N (p) SF (p, q) DEFINITION 4. (Node Types). • A post p is a core post if wt(p) ≥ δ1; • It is a border post if wt(p) < δ1 but there exists at least one • It is a noise post if it is neither core nor border, i.e., wt(p) < core post q ∈ N (p); δ1 and there is no core post in N (p). Intuitively, a post is a core post if it shares enough common en- tities with many other posts. Neighbors of a core post are at least border posts, if not core posts themselves. In density-based clus- tering, core posts play a central role: if a core post p is found to be a part of a cluster C, its neighboring (border or core) posts will also be a part of C. Analogouly to the notion of core posts, we use the threshold δ1 to define core edges. An edge (p, q) is a core edge if SF (p, q) ≥ ε1, where ε1 ≥ ε0. Notice that a core edge may connect non-core nodes. Core posts connected by core edges will build a summary of Gt(Vt,Et), that we call the sketch graph (See Figure 2). DEFINITION 5. (Sketch Graph). Given post network Gt(Vt,Et) and density parameters (δ1, ε0, ε1), we define the sketch graph of Gt as the subgraph induced by its core posts and core edges. More precisely, the sketch graph Gt(Vt, Et) satisfies the condition that each node p ∈ Vt is a core post and each edge (p, q) ∈ Et is a core edge. We write Gt = Ske(Gt). Intuitively, all important nodes in Gt(Vt,Et) and their relation- ships are retained in Gt(Vt, Et). Empirically, we found that ad- justing the granularity of (δ1, ε0, ε1) to make the size Vt roughly equal to 20% of Vt leads to a good balance between the quality of the sketch graph in terms of the information retained and its space complexity. The tuning detail can be found in Section 7.1. 4.2 Event Identification and Annotation We define events based on post clusters. Recall that if two core posts are connected by core edges, they should belong to the same t(cid:31)tGtStSSkeCluCCSkeGenSkeGen(cid:143)(cid:143)tS(cid:4)EAAnn(cid:32) cluster. It implies all core posts in cluster C form a connected com- ponent C in Gt(Vt, Et) and we write C = Ske(C). Let St denote the set of connected components in Gt. Notice that St and Gt have the same node set and the same structure, so we write St = Gt for simplicity. To generate clusters based on the sketch graph dis- cussed above, we can start from a connected component C ∈ St to build a cluster C. See Figure 2 for the functional relationships between different types of objects. We define cluster C as follows. DEFINITION 6. (Cluster). Given Gt(Vt,Et) and the correspond- ing sketch graph Gt(Vt, Et), a cluster C of Gt is a set of core posts and border posts generated from a connected component C in Gt(Vt, Et), written as C = Gen(C), and defined as follows: • All posts in the component C form the core posts of C. • For every core post in C, all its neighboring border posts in Gt form the border posts in C. A core post only appears in one cluster (by definition). If a bor- der post is associated with multiple core posts in different clusters, this border post will appear in multiple clusters. Events are defined based on clusters in Gt. However, not every cluster can form an event; we treat clusters with a very small size as outliers, since they do not gain wide popularity at the current moment. We use E and O to denote an event and an outlier respectively. DEFINITION 7. (Event). Given a cluster C, the following func- tion distinguishes between an event and an outlier. (cid:26)true, if C ≥ ϕ false, otherwise (4) Event(C) = where ϕ is a size threshold. We empirically set ϕ = 10 for event identification. Note that outliers are different from noise; noise is associated at the level of posts, as opposed to clusters. Besides, an outlier at the current moment may grow into an event in the future, and an event may also degrade into an outlier as time passes. Entity Annotation. Considering the huge volume of posts in an event, it is important to summarize and present a post cluster as a conceptual event to aid human perception. In related work, Twit- info [22] represents an event it discovers from Twitter by a time- line of tweets. Although the tweet activity by volume over time is shown, it is tedious for users to read tweets one-by-one to figure out the event detail. In this paper, we summarize a snapshot of an event by a word cloud [13]. The font size of a word in the cloud indicates its popularity. Compared with Twitinfo, a word cloud provides a summary of the event at a glance and is much easier for a human to perceive. Technically, given an event E, the annotation A for E, computed as A = Ann(E), is a set of entities with popularity score, expressed as A = {(e1, Pe1 ), (e2, Pe2 ),···}. We take entities as the word candidates in the cloud. Intuitively, an entity e is popular in an event if many important posts in this event contain e in their entity list. Formally, the relationship be- tween posts and entities can be modeled as a bipartite graph. Recall that the HITS algorithm [18] computes the hub score and authority score by mutual reinforcement: the hub score Hi of a node i is de- cided by the sum of authority scores of all nodes pointed by i, and simultaneously, the authority score Aj of a node j is decided by the sum of hub scores of all nodes pointing to j. Inspired by HITS, we let the post weight obtained from the post network be the initial hub score of posts, and then the authority scores of entities can be com- puted by one iteration: A = M TH, where M is an adjacency ma- trix between posts and entities in an event, A = [Pe1 , Pe2 ,··· ]T is a vector of entity authorities and H = [wt(p1), wt(p2),··· ]T is a vector of post weights. 5. TRACKING EVENT EVOLUTION In this section, we discuss the evolution of sketch graph and events and develop primitive operations, which form the theoret- ical basis for our algorithms in Section 6. We introduce the fading time window to serve as a monitor on social streams. Formally, the problem we try to solve in this paper is shown below. PROBLEM 1. Given an evolving post network sequence G = {G1,G2,···}, the event evolution tracking problem is to generate an event set (cid:101)Si at each moment i, and discover all the evolution behaviors between events in (cid:101)Si and (cid:101)Si+1, i = 1, 2,··· . 5.1 Incremental Tracking Framework The traditional approach taken for tracking evolving network re- lated problems [4, 16] is illustrated in Figure 3(a). Given a post (marked as step 1(cid:13) in the figure). The network evolves from Gt to Gt+1 at the next moment (step 2(cid:13)). Again, the events associ- ated with Gt+1 are identified from scratch (step 3(cid:13)). Finally, the network Gt at time t, identify the event set (cid:101)St associated with Gt correspondence between event sets (cid:101)St and (cid:101)St+1 is determined to extract the evolution behaviors of events from time t to t + 1 (step 4(cid:13)). This traditional approach has two major shortcomings. Firstly, repeated extraction of events from post networks from scratch is an expensive operation. Similarly, tracing the correspondence be- tween event sets at successive moments is also expensive. Sec- ondly, this step of tracing correspondence, since it is done after the two event sets are generated, may lead to loss of accuracy. The method we propose is incremental tracking of event evolution. It corresponds to step 5(cid:13) in the figure. More precisely, for the very first snapshot of the post network, say G0, our approach will gen- applied again. In the steady state, we apply step 5(cid:13), i.e., we incre- erate the corresponding event set (cid:101)S0. After this, this step is never mentally derive (cid:101)St+1 from (cid:101)St. Our experiments show that our in- cremental tracking approach outperforms the traditional baselines both in quality and in performance. 5.2 Evolution Operators We analyze the evolutionary process of events at each moment and abstract them into five primitive operators: +, −, (cid:12), ↑, ↓. We classify the operators based on the objects they manipulate: nodes or clusters. Note that both events and outliers are clusters. The following operators manipulate nodes in a post network. DEFINITION 8. (Node Operations). • Gt +p: add a new post p into Gt(Vt,Et) where p (cid:54)∈ Vt. All the new edges associated with p will be constructed automatically by linkage search; • Gt − p: delete a post p from Gt(Vt,Et) where p ∈ Vt. All the existing edges associated with p will be automatically re- moved from Et. • (cid:12)(Gt): update the weight of posts in Gt. Typically, the adding/deleting of a post will trigger the updating of post weights. For convenience, we define two composite opera- tors on post networks. DEFINITION 9. (Composite Operators). • Gt ⊕ p = (cid:12)(Gt + p): add a post p into Gt(Vt,Et) where p (cid:54)∈ Vt and update the weight of posts in Vt; • Gt (cid:9) p = (cid:12)(Gt − p): delete a post p from Gt(Vt,Et) where p ∈ Vt and update the weight of posts in Vt. The following operators manipulate clusters: DEFINITION 10. (Cluster Operations). • St + C: add cluster C to the cluster set St; Figure 3: (a) Illustration of traditional approach vs. incre- mental approach to evolution tracking. Steps on edges are de- scribed in Section 5.1. (b) An illustration of the fading time window from time t to t + 1, where post weights fade w.r.t. the end of time window. Gt will be updated by deleting subgraph Go and adding subgraph Gn. • St − C: remove cluster C from the cluster set St; • ↑ (C, p): increase the size of C by adding a new post p; • ↓ (C, p): decrease the size of C by removing an old post p. Each operator defined above on a single object can be extended to a set of objects, i.e., for a node set X = {p1, p2,··· , pn}, Gt + X = Gt + p1 + p2 + ··· + pn. This is well defined since + is associative and commutative. We use the left-associative convention for '−': that is, we write A− B− C means (A− B)− C. In particular, we write A− B + C to mean (A − B) + C and the order in which posts in a set are added/deleted to Gt does not matter. These operators will be used later in the formal description of the evolution procedures. Figure 4(a) depicts the role played by the primitive operators in the event evolution tracking, end to end, from the post network onward. 5.3 Fading Time Window Fading (or decay) and sliding time window are two common ag- gregation schemes used in time-evolving graphs [9]. Fading scheme puts a higher emphasis on newer posts, and this characteristic has been captured by fading similarity in Eq. (1). Sliding time window scheme (posts are first-in, first-out) is essential because older posts are less important and it is not necessary to retain all the posts in the history. Since events evolve quickly, even inside a given time win- dow, it is important to highlight new posts and degrade old posts using the fading scheme. Thus, we combine these two schemes and introduce a fading time window, as illustrated in Figure 3(b). In practice, users can specify the length of the time window to ad- just the scope of monitoring. Users can also choose different fading functions to penalize old posts and highlight new posts in different ways. Let ∆t denote the interval between moments. For simplicity, we abbreviate the moment (t + i · ∆t) as (t + i). When the time window slides from moment t to t + 1, the post network Gt(Vt,Et) will be updated to be Gt+1(Vt+1,Et+1). Suppose Go(Vo,Eo) is the old subgraph (of Gt) that lapses at moment t + 1 and Gn(Vn,En) is the new subgraph (of Gt+1) that appears (see Figure 3(b)). Clearly, (5) Let Len be the length of the time window. We assume Len > 2∆t, which will make Vo ∩ Vn = ∅. This assumption usually holds in real applications, e.g., we set Len to 1 week and ∆t to 1 day. The following claim shows different ways to compute the overlapping part in Gt+1 and Gt. Gt+1 = Gt − Go + Gn CLAIM 1. Gt+1 − Gn = Gt − Go = Gt+1 (cid:9) Gn = Gt (cid:9) Go Proof Sketch: From Eq. (5) we know Gt+1 − Gn = Gt − Go. At the post network level, post weight is orthogonal to node/edge sets, so we have Gt (cid:9) Go = Gt − Go and Gt+1 (cid:9) Gn = Gt+1 − Gn. 2 5.4 Sketch Graph Evolution The updating of sketch graphs from Gt to Gt+1 is the core task in event evolution tracking. We already know from Claim 1 that Gt+1−Gn = Gt−Go at the post network level. This is the overlap- ping part between Gt and Gt+1. However, at the sketch graph level, Ske(Gt+1−Gn) (cid:54)= Ske(Gt−Go): some core posts in Gt−Go may no longer be core posts due to the removal of edges incident with nodes in Go or simply due to the passing of time; some non-core posts may become core posts because of the adding of edges with nodes in Gn. To measure the changes in the overlapping part, we define the following three components. • S−: components of core posts in Gt − Go that become non- DEFINITION 11. (Updated Components in Overlap). • S+: components of non-core posts in Gt − Go that become core posts in Gt+1 − Gn due to the adding of Gn, i.e., S+ = Ske(Gt+1 − Gn) − Ske(Gt+1 (cid:9) Gn) core posts in Gt+1 − Gn due to the removing of Go, i.e., S− = Ske(Gt − Go) − Ske(Gt (cid:9) Go) core posts in Gt+1 − Gn due to the passing of time, i.e., S(cid:12) = Ske(Gt (cid:9) Go) − Ske(Gt+1 (cid:9) Gn) • S(cid:12): components of core posts in Gt − Go that become non- Based on Definition 11, Theorem 1 shows how the overlapping parts in Gt and Gt+1 differ at the sketch graph level. THEOREM 1. From moment t to t+1, the changes of core posts in the overlapping part, i.e., Gt+1−Gn (equivalently, Gt−Go), can be updated using the components S+, S− and S(cid:12). That is, Ske(Gt+1 − Gn) − Ske(Gt − Go) = S+ − S− − S(cid:12) (6) Proof Sketch: S+ − S− − S(cid:12) = Ske(Gt+1 −Gn)− Ske(Gt+1 (cid:9) Gn) − (Ske(Gt − Go) − Ske(Gt (cid:9) Go)) − (Ske(Gt (cid:9) Go) − Ske(Gt+1 (cid:9) Gn)) = Ske(Gt+1 − Gn) − Ske(Gt − Go). 2 The following theorem shows the iterative and incremental up- dating of sketch graphs from moment t to t + 1. THEOREM 2. From moment t to t + 1, the sketch graph evolves by removing core posts in Go, adding core posts in Gn and updating core posts in the overlapping part. That is St+1 = Gt+1 = St − So − S− − S(cid:12) + Sn + S+ (7) Proof Sketch: S+ − S− − S(cid:12) = Ske(Gt+1 −Gn)− Ske(Gt+1 (cid:9) Gn) − (Ske(Gt − Go) − Ske(Gt (cid:9) Go)) − (Ske(Gt (cid:9) Go) − Ske(Gt+1 (cid:9) Gn)) = Ske(Gt+1 − Gn) − Ske(Gt − Go). 2 Theorem 2 indicates that we can incrementally maintain St+1 from St. Since we define events based on connected components in a sketch graph, this incremental updating of sketch graphs benefits incremental computation of event evolution essentially. 5.5 Event Evolution Let Clu(Gt) denote the clustering operation on post network Gt. The clustering will shift and reorder the nodes in Vt by group- ing nodes that belong to the same cluster together. We use St = Clu(Gt) to represent the set of clusters obtained from Gt. Notice that noise posts in Gt do not appear in any cluster, so the num- ber of posts in St is typically smaller than Vt. Similarly, we let Clu(Gn) = Sn and Clu(Go) = So be the cluster sets on the graphs Gn and Go. Cluster Evolution. Based on Definition 6, a cluster at moment t is generated from a component in St. We can apply the Gen function on sketch graphs to get the iterative computation of clusters. tS1tSTime DimensionUser Space1ttonLen1totntt1t①②③④(a)(b)⑤ (a) Nc(p) 1 Add a core post p Delete a core post p − ↓ ≥ 2 0 + ↑ M erge Split (b) Figure 4: (a) The relationships between primitives and evolu- tions. Each box represents an evolution object and the arrows between them describe inputs/outputs. (b) The evolutionary be- havior table for clusters when adding or deleting a core post p. COROLLARY 1. From moment t to t + 1, the set of clusters can be incrementally updated by the iterative computation St+1 = Clu(Gt+1) = St − So − S− − S(cid:12) + Sn + S+ (8) Proof Sketch: Since the generation of any two clusters from two different components is independent, by applying Gen function on both sides of Eq. (7) we get the iterative computation of clusters.2 The basic operations underlying Eq. (8) are the cases when St is modified by the addition or deletion of a cluster that includes only one post. In the following, we analyze and show the evolution of clusters by adding a post pn or deleting a post po. Let Nc(pn) denote the set of clusters where pn's neighboring core posts belong before pn is added, and let Nc(po) denote the set of clusters where po's neighboring core posts belong after po is removed. It should be noted that Nc(p) = 0 means p has no neighboring core posts. Notice that M erge and Split are composite operations and can be composed by a series of cluster primitive operations. The evolution behaviors of clusters is shown in Figure 4(b) and explained below. (a) Addition: St + {pn} If pn is a noise post after being added into Gt, ignore pn. If pn is a border post, add pn to each cluster in Nc(pn). Else, pn is a core post and we do the following: • If Nc(pn) = 0: +C and C = {pn} ∪ N (pn); • If Nc(pn) = 1: ↑ (C,{pn} ∪ N (pn)); • If Nc(pn) ≥ 2: M erge = +C −(cid:80) Nc(pn) ∪ {pn} ∪ N (pn). C(cid:48)∈Nc(pn) C(cid:48) and C = (b) Deletion: St − {po} If po is a noise post before being deleted from Gt, ignore po. If po is a border post, delete po from each cluster in Nc(po). Else, po is a core post and we do the following: • If Nc(po) = 0: −C where po ∈ C; • If Nc(po) = 1: ↓ (C,{po} ∪ N (po)); • If Nc(po) ≥ 2: Split = −C +(cid:80) C(cid:48)∈Nc(po) C(cid:48), po ∈ C. Using commutativity and associativity of operator '+' and the left-associative convention for operator '−', we can rewrite the ex- pression St − p1 + p2 − p3 as St − (p3 + p1) + p2. While both expressions are equivalent, in terms of the total number of primi- tive cluster operations, different ordering of cluster sequences may have different performance. In the following, we show a theorem to indicate how to reduce the number of primitive cluster operations by reordering. As an example, St + p1 − p2 + p3 − p4 can be reordered as St − (p2 + p4) + (p1 + p3) to reduce the number of primitive operations during cluster evolution. THEOREM 3. Suppose posts have an equal probability to join any cluster. Given an initial set of clusters and an arbitrary se- quence of node addition and deletions, the number of cluster prim- itive operations can be reduced by performing all the deletions first. Proof Sketch: Since posts have equal probability to join clusters, a smaller N (p) (i.e., the #edges of p) indicates a smaller num- ber of neighboring clusters. Clearly, if the deletions are performed first, we can save time because there will be no edges between the deleted nodes and added nodes. Otherwise, the edges between the deleted nodes and added nodes need to be constructed first and re- moved later, which implies a higher N (p) in computation. 2 The Evolution of Events and Outliers. Recall, at any moment, an outlier may grow into an event and an event may degrade into an outlier. Based on Definition 7, the evolution procedures of events and outliers follow the evolution of clusters. That is, the addition of a new event or outlier as well as the deletion of an existing event or outlier is exactly the same as for a cluster. The only difference is that the Event function is applied to check whether the cluster added/deleted is an event or an outlier. When the size of a cluster increases (as with ↑ (C, p)) it may correspond to an outlier/event growing into a larger outlier/event, or to an outlier growing in size, exceeding the threshold ϕ and turning into an event. Similarly, when a cluster shrinks (as with ↓ (C, p)) it may be an outlier/event becoming a smaller outlier/event or an event becoming smaller than the threshold and turning into an outlier. 6. INCREMENTAL ALGORITHMS The approach of decomposing an evolving graph into a series of snapshots for each moment is a traditional way to tackle evolving graph related problems [6, 16]. However, this traditional approach suffers from both quality and performance, since events are gen- erated from scratch and are matched heuristically. To overcome these challenges, we propose an incremental tracking framework, as introduced in Section 5.1 and illustrated in Figure 3(a). In this section, we leverage our primitive operators for evolution tracking by proposing Algorithms cTrack and eTrack to track the evolution of clusters and events respectively. The observation is that at each moment Vo + Vn (cid:28) Vt, where Vo and Vn are the set of old and new posts between moments t and t + 1. So we can save a lot of computation by adjusting clusters and events incrementally, rather than generating them from scratch. Bulk Updating. Traditional incremental computation on evolving graphs usually treats the addition/deletion of nodes or edges one by one [10, 27]. In Section 5.5, we discussed the updating of St by adding or deleting a single post. However, in a real scenario, since social posts arrive at a high speed, the post-by-post incremental updating will lead to poor performance. In this section, we speed up the incremental computation of St by bulk updating. We define a bulk as a cluster of posts and "lift" the one-by-one updating of St to bulk updating. Recall that Sn and So denote the set of clusters in the graph Gn = Gt+1 − Gt and Go = Gt − Gt+1 respectively. Specifically, given a cluster Cn ∈ Sn, let Nc(Cn) denote the set of clusters in Gt where neighboring core posts of nodes in Cn belong, i.e., Nc(Cn) = ∪pn∈Cn Nc(pn). Analogously, given Co ∈ So, we let Nc(Co) = ∪po∈Co Nc(po). Clearly, updating St with a single node {p} is a special case of bulk updating. cTrack. The steps for incremental tracking of cluster evolution (cTrack) are summarized in Algorithm 1. cTrack follows the it- erative computation in Eq. (8) and sequence order in Theorem 3, that is St+1 = St − So − S− − S(cid:12) + Sn + S+. As analyzed in Section 5.5, each bulk addition and bulk deletion has three possible Post NetworkCluOutliersEventEventsEventClustersAddDeleteAddDeletemutual transformation Algorithm 1: cTrack Input: St, So, Sn, S−, S+, S(cid:12) Output: St+1 // Delete So ∪ S− 1 St+1 = St; 2 for each cluster Co in So ∪ S− ∪ S(cid:12) do Co = Ske(Co); Nc(Co) = ∪po∈Co if Nc(Co) = 0 then Nc(po); remove cluster Co from St+1; else if Nc(Co) = 1 then delete Co from cluster C(cid:48) where C(cid:48) ∈ Nc(Co); else remove the cluster that Co belongs to from St+1; for each cluster C(cid:48) ∈ Nc(Co) do assign a new cluster id for C(cid:48); add C(cid:48) into St+1; // Add Sn ∪ S+ 14 for each cluster Cn in Sn ∪ S+ do Cn = Ske(Cn); Nc(Cn) = ∪pn∈Cn if Nc(Cn) = 0 then Nc(pn); 3 4 5 6 7 8 9 10 11 12 13 15 16 17 18 19 20 21 22 23 24 25 26 27 assign a new cluster id for Cn and add C to St+1; else if Nc(Cn) = 1 then add Cn into cluster C(cid:48) where C(cid:48) ∈ Nc(Cn); else assign a new cluster id for Cn; for each cluster C(cid:48) ∈ Nc(Cn) do Cn = Cn ∪ C(cid:48); remove C(cid:48) from St+1; Cn = Cn ∪ Cn; add Cn into St+1; 28 return St+1; evolutionary behaviors, decided by the size of Nc(C). Lines 3-13 deal with deleting a bulk Co, where {−, ↓, Split} patterns are han- dled. Lines 15-27 deal with adding a bulk Cn and handle {+, ↑, M erge} patterns. The time complexity of cTrack is linear in the total number of bulk updates. eTrack. Algorithm eTrack works on top of cTrack. We summa- rize the steps for incremental event tracking (eTrack) in Algorithm 2. Based on cTrack, eTrack monitors the changes in the cluster set effected by cTrack at each moment. If the cluster is not changed, eTrack will take no action; otherwise, eTrack will judge the corre- sponding cases and invoke Event function to handle the event evo- lution behaviors (Lines 4-13). Notice that in Lines 5-9, if a cluster C in Si has ClusterId id, we use the convention that Si(id) = C, and Si(id) = ∅ means there is no cluster in Si with ClusterId id. Especially, lines 7-9 mean an event in Si evolves into an event in Si+1 by deleting the part Si(id) − Si+1(id) first and adding the part Si+1(id) − Si(id) later. 7. EXPERIMENTS In this section, we first "tune" the construction of post network and sketch graph to find the best selection of fading similarity mea- sures and density parameters. Then, we test the quality and perfor- mance of event evolution tracking algorithms on two social streams: Tech-Lite and Tech-Full that we crawled from Twitter. We have designed two types of baseline algorithms for event detection and evolution tracking. Our event detection baseline covers the major Algorithm 2: eTrack Input: G = {G1, G2, · · · , Gn}, S1 Output: Event evolution behaviors obtain So, Sn, S−, S+ from Gi+1 − Gi; Si+1 =cTrack (Si, So, Sn, S−, S+, S(cid:12)); for each cluster C ∈ Si+1 do 1 for i from 1 to n − 1 do 2 3 4 5 6 7 8 9 id = ClusterId(C); if Si(id) (cid:54)= ∅ then output ↓ (C, Si(id) − Si+1(id)); output ↑ (C, Si+1(id) − Si(id)); Event(C); 10 11 12 13 else Event(+C); for each cluster C ∈ Si do id = ClusterId(C); if Si+1(id) = ∅ then Event(−C); Figure 5: Graph schemas of (a) post network and (b) sketch graph. Rectangles represent nodes and ellipses represent at- tributes. "Sim" means similarity edges between posts and "CoreSim" means core edges. "Weight" is the post weight. "ExpTime" is the time when a core post expires due to time passing. "Count" is the number of core posts in a component. techniques reported in [19, 22, 24, 25]. Our tracking baseline sum- marizes the state of the art algorithms reported in [6, 16]. All ex- periments are conducted on a computer with Intel 2.66 GHz CPU, 4 GB RAM, running 64-bit Windows 7. All algorithms are imple- mented in Java. We use a graph database called Neo4J3 to store and manipulate the post network and sketch graph. Datasets. All datasets are crawled from Twitter.com via Twitter API. Although our event tracking algorithm works regardless of the domain, we make the data set domain specific in order to fa- cilitate evaluation of the generated results. We built a technology domain dataset called Tech-Lite by aggregating all the timelines of users listed in Technology category of "Who to follow"4 and their retweeted users. Tech-Lite has 352,328 tweets, 1402 users and the streaming rate is about 11700 tweets/day. Based on the intuition that users followed by users in Technology category are most likely also in the technology domain, we obtained a larger technology so- cial stream called Tech-Full by collecting all the timelines of users that are followed by users in Technology category. Tech-Full has 5,196,086 tweets, created by 224,242 users, whose streaming rate is about 7216 tweets/hour. Both timelines in Tech-Lite and Tech-Full include retweets and have a time span from Jan. 1 to Feb. 1, 2012. Since Tech-Lite is a sampled subset of Tech-Full, the parameters learned from Tech-Lite generally apply to Tech-Full. Graph Storage Schema. Neo4J provides convenience in manag- ing a large and fast-evolving data structure that represents a post network and sketch graph. A database in Neo4J is based on the 3http://neo4j.org/ 4http://twitter.com/who to follow/interests PostIDTimeWeightEntityIDSimCorePostCoreSimIDExpTimeComponentIDCount(a)(b) Figure 6: The changing trends of the number of core posts, core edges and events when increasing δ1 = ε1 from 0.3 to 0.8. We set δ1 = ε1 = 0.3 as the 100% basis and keep ε0 = 0.2. attributed graph model [26], where each node/edge can be associ- ated with multiple attributes in the form of key-value pairs. Graph schemas of the post network and sketch graph are shown in Fig- ure 5 (a) and (b) respectively. Indices are created on attributes to support fast exact queries and range queries of nodes. 7.1 Tuning Post Network and Sketch Graph The quality of post network and sketch graph construction will determine the quality of event generation. Recall from Section 3 that the following factors influence the construction of post net- works and sketch graphs: (1) entity extraction from post contents; (2) similarity/distance measures between posts; and (3) density pa- rameters for the generation of core posts and core edges. We mea- sure the influence of each factor below to make informed choices. Post Content Preprocessing. As described in Section 3, we ex- tract entities from posts by Stanford POS tagger. One alternative approach to entity extraction is using hashtags. However, only 11% of the tweets in our dataset have hashtags. This will result in lots of posts in the dataset having no similarity score between them. Another approach is simply tokenizing tweets into unigrams and treating unigrams as entities, and we call it the "Unigrams" ap- proach. This approach is based on the state of art method for event detection as discussed in [22]. Table 2(a) shows the comparison of the three entity extraction approaches in the first time window of the Tech-Full social stream. If we use "Unigrams", obviously the number of entities is larger than other two approaches, but the number of edges between posts tends to be smaller, because tweets written by different users usually share very few common words even when they talk about the same event. The "Hashtags" ap- proach also produces a smaller number of edges, core posts and events, since it generates a much sparser post network. Overall, the "POS-Tagger" approach can discover more similarity relationships between posts and produce more core posts and events given the same social stream and parameter setting. Similarity/Distance Measures. Many set-based similarity mea- sures such as Jaccard coefficient [21] can be used to compute the similarity S(pL j ) between posts. Since entity frequency is usu- ally 1 in a tweet, measures such as Cosine similarity and Pearson correlation [21] will degenerate to a form very similar to Jaccard, so we use Jaccard. The distance function D(pτ j ) along time di- mension determines how similarity to older posts is penalized, with respect to recent posts. We compared three different distance func- j ) = tions: (1) reciprocal fading ("Reci-Fading") with D(pτ i − pτ i − i − pτ j + 1, (2) exponential fading ("Exp-Fading") with D(pτ pτ i − j ) = e j and (3) no fading ("No-Fading") with D(pτ pτ pτ j ) = 1. For any posts pi, pj, clearly e j + 1 ≥ pτ 1. Since a time window usually contains many moments, Exp- Fading penalizes the posts in the old part of time window severely (see Table 2(b)): the number of core posts and events generated by Exp-Fading is much lower than by other approaches. Since No- j ≥ pτ i − pτ i − pτ i , pL i −pτ i −pτ pτ (a) Results of different entity extraction approaches. Methods Hashtags Unigrams POS-Tagger #edges 182905 142468 357132 28964 46783 47808 6232 15070 21509 #coreedges #coreposts 196 430 470 #events (b) Results of different distance functions. Methods No-Fading Exp-Fading Reci-Fading #edges 1159364 327390 357132 #coreposts 57291 7655 21509 #coreedges 32875 46075 47808 #events 510 148 470 (c) Precision and recall of top 50 events. Precision Recall (major events) (major events) Methods HashtagPeaks UnigramPeaks Louvain eTrack 0.40 0.45 0.60 0.80 Precision (G-Trends) 0.25 0.20 0.75 0.95 0.30 0.40 0.55 0.80 Table 2: (a) and (b) are in the first time window of Tech- Lite with 75,849 posts in one week. Density parameters (δ1, ε0, ε1) = (0.5, 0.2, 0.5) for core posts and threshold ϕ = 10 for event identification. (c) shows the precision and recall of top 20 events generated by Baseline 1a, 1b, Louvain and eTrack. Figure 7: Examples of Google Trends peaks in January 2012. We validate the events generated by cTrack by checking the existence of volume peaks at a nearby time moment in Google Trends. Although these peaks can detect bursty events, Google Trends cannot discover the merging/splitting patterns. Fading does not penalize old posts in the time window, too many edges and core posts will be generated without considering recency. Reci-Fading is in between, which is a more gradual penalty func- tion than Exp-Fading and we use it by default. Density Parameters. The density parameters (δ1, ε0, ε1) control the construction of the sketch graph. Clearly, the higher the den- sity parameters, the smaller and sparser the sketch graph. Figure 6 shows the number of core posts, core edges and events as a percent- age of the numbers for δ1 = ε1 = 0.3, as δ1 = ε1 increases from 0.3 to 0.8. Results are obtained from the first time window of the Tech-Lite social stream. We can see the rate of decrease of #events is higher than the rates of #core posts and #core edges, because events are less likely to form in sparser sketch graphs. More small events can be detected by lower density parameters, but the com- putational cost will increase because of larger and denser sketch graphs. However, for big events, they are not very sensitive to these density parameters. We set δ1 = ε1 = 0.5 as a trade-off between the compactness of events and complexity. 7.2 Event Evolution Tracking 01020304050607080901000.30.40.50.60.70.8Percentage (%) Density Parameters # core posts# core edges# eventsJan 15, 2012Jan 22, 2012Jan 29, 2012SOPA WikipediaSOPA FacebookSOPA MegauploadApple iBooks Figure 8: Lists of top 10 events detected from Twitter Technology streams in January 2012 by baseline HashtagPeaks, UnigramPeaks, Louvain and our approach eTrack. To adapt for event detection, Louvain method defines events by post communities. We annotate events generated by both Louvain and eTrack by highly frequent entities. eTrack also shows the birthday of events. Ground truth. To generate the ground truth, we crawl news ar- ticles in January 2012 from famous technology websites such as TechCrunch, Wired, CNET, etc, without looking at tweets. Then we treat the titles of news as posts and apply our event tracking algorithm to extract event evolution patterns. Finally, a total of 20 major events with life cycles are identified as ground truth. Typical events include "happy new year", "CES 2012", "jerry yang yahoo resignation", "sopa wikipedia blackout", etc. To find more noticeable events in the technology news domain, we use Google Trends for Search5, which shows the traffic trends of keywords that appeared in Google Search along the time dimen- sion. If an event-indicating phrase has a volume peak in Google Trends at a specific time, it means this event is sufficiently vali- dated by the real world. We validate the correctness of an event Ei generated by our approach by the following process: we pick the top 3 entities of Ei ranked by frequency in Ei and search them in Google Trends, and if the traffic trend of these top entities has a distinct peak at a nearby time to Ei, we consider that Ei corre- sponds to a real world event widely witnessed by the public. Four examples of Google Trends peaks are shown in Figure 7. Baseline 1: Peak-Detection. In recent works [19, 22, 24, 25], events are generally detected as volume peaks of phrases over time in social streams. These approaches share the same spirit that ag- gregates the frequency of event-indicating phrases at each moment to build a histogram and generates events by detecting volume peaks in the histogram. We design two variants of Peak-Detection to cap- ture the major techniques used by these state-of-the-art approaches. • Baseline 1a: HashtagPeaks: aggregates frequent hashtags; • Baseline 1b: UnigramPeaks: aggregates frequent unigrams. Notice, both baselines above are for event detection only. Lists of the top 10 events detected by HashtagPeaks and Unigram- Peaks are presented in Figure 8 (first two columns). Hashtags are employed by twitter users as a manual way to indicate an event, but it requires manual assignation by a human. Some highly fre- quent hashtags like "#opengov" and "#opendata" are not designed for event indication, hurting the precision. UnigramPeaks uses the entities extracted from the social stream preprocessing stage, which has a better quality than HashtagPeaks. However, both of them are limited in their representation of events, because the internal structure of events is missing. Besides, although these peaks can detect bursty words, they cannot discover evolution patterns such as the merging/splitting of events. For example, in Figure 7, there is no way to know "Apple announced iBooks" is an event split from the big event "SOPA" earlier, as illustrated in detail in Figure 9(b). 5http://www.google.com/trends/ Baseline 2: Community Detection. A community in a large net- work refers to a structure of nodes with dense connections inter- nally and sparse connections between communities. It is possible to define an event as a community of posts. Louvain method [8], based on modularity optimization, is the state-of-the-art approach which outperforms other known community detection methods in terms of performance. We design a baseline called "Louvain" to detect events defined as post communities. The top 10 events generated by Louvain are shown in Figure 8. As we can see, not every result is meaningful in Louvain method. For example, "Apple iphone ipad" and "Internet people time" are too vague to correspond to any concrete real events. The reason is, although Louvain method can make sure every community has relatively dense internal and sparse external connections, it cannot guarantee that every node in the community is important and has a sufficiently high connectivity with other nodes in the same com- munity. It is highly possible that a low-degree node belongs to a community only because it has zero connectivity with other com- munities. Furthermore, noise posts are quite prevalent in Twitter and they negatively impact Louvain method. Baseline 3: Pattern-Matching. We design a baseline to track the evolution patterns of events between snapshots. In graph mining, the "divide-and-conquer" approach of decomposing the evolving graph into a series of snapshot graphs at each moment is a tradi- tional way to tackle evolving graph related problems [6, 16]. As an example, Kim et al. [16] first cluster individual snapshots into quasi-cliques and then map them in adjacent snapshots over time. Inspired by this approach, we design a baseline for event evolution tracking, which detects events from each snapshot of post network independently, and then characterizes the evolution of these events at consecutive moments, by identifying certain heuristic patterns: where Et and Et+1 are any two events detected at moment t and t+ 1 respectively, κ% is the minimal commonality to say Et and Et+1 are snapshots of the same event. A higher κ% will result in a higher precision but a lower recall of the evolution tracking. Empirically we found that we needed to set κ% = 90% to guarantee the quality. It is worth noting that this baseline generates the same events as eTrack, but with a non-incremental evolution tracking approach. Precision and Recall. To measure the quality of event detection, we use HashtagPeaks, UnigramPeaks and Louvain as base- lines to compare with our Algorithm eTrack. It is worth noting that Baseline 3 is designed for the tracking of event evolution dy- namics between moments, so we omit it here. We compare the • If • If Et∩Et+1 Et∪Et+1 ≥ κ% and Et ≤ Et+1, Et+1 =↑ Et; Et∩Et+1 Et∪Et+1 ≥ κ% and Et > Et+1, Et+1 =↓ Et. Rank HashtagPeaks UnigramPeaks Louvain eTrack 1 #CES google Apple iphone ipad CES conference (Jan 8) 2 #SOPA ces CES ultrabook tablet SOPA PIPA (Jan 17) 3 #EngadgetCES apple Google search privacy Hug new year (Jan 1) 4 #opengov video Week's Android games RIM new CEO (Jan 22) 5 #gov20 sopa Kindle Netflix app Yahoo jerry yang resignation (Jan 17) 6 #CES2012 twitter Internet people time Samsung Galaxy Nexus (Jan 10) 7 #PIPA year Hope weekend Apple iBooks (Jan 19) 8 #opendata facebook SOPA Megaupload Facebook IPO News (Jan 27) 9 #StartupAmerica app SOPA PIPA Wikipedia Martin Luther King Day (Jan 15) 10 #win7tech iphone Facebook IPO Tim Cook Apple stock (Jan 10) (a) The life cycle of "CES Conference" (b) The merging and splitting of "SOPA" and "Apple" Figure 9: Tracking the evolution of events by eTrack and baselines. At each moment, an event is annotated by a word cloud. Baselines 1 and 2 only works for the detection of new emerging events, and is not applicable for the tracking of merging and splitting dynamics. The evolution trajectories of eTrack and Baseline 3 are depicted by solid and hollow arrows respectively. precision and recall of top 20 events generated by baselines and eTrack and show the results in Table 2(c). On the ground truth of 20 major events obtained from news articles in technology web- sites, HashtagPeaks and UnigramPeaks have rather low preci- sion and recall scores, because of their poor ability in capturing event bursts. Notice that the precision and recall may be not equal even the sizes of extracted events and ground truth are equal, be- cause multiple extracted events may correspond to the same event in ground truth. eTrack outperforms the baselines in both preci- sion and recall. Since there are many events discussed in the social media but not very noticeable in news websites, we also validate the precision of the generated events using Google Trends. As we can see, HashtagPeaks and UnigramPeaks don't gain too much in Google Trends validation, since the words they generate are less informative and not very event-indicating. eTrack gains a precision of 95% in Google Trends, where the only failed result is "Samsung galaxy nexus", whose volume is steadily high without obvious peaks in Google Trends. The reason may be social stream is more dynamic. Louvain is worse than eTrack. The results show eTrack is significantly better than other baselines in quality. Life Cycle of Event Evolution. Our approach is capable of track- ing the whole life cycle of an event: from birth, growth, decay to death. We illustrate this using the example of "CES 2012", a ma- jor consumer electronics show held in Las Vegas from January 10 to 13. As early as Jan 6, our approach has already detected some discussions about CES and generated an event about CES. Figure 9(a) shows the major snapshots of this event, from Jan 8 to Jan 14. As we can see, on Jan 8, most people talked about "CES predic- tion", and on Jan 9, the highlighted topic was "CES tomorrow" and some hearsays about "ultrabook" which would be shown in CES. After the actual event happened on Jan 10, we can see the event grew distinctly bigger, and lots of products, news and messages are spreading over the social network, and this situation continues until Jan 13, which is the last day of CES. Afterwards, the discussions become weaker and continue until Jan 14, when "CES" was not the biggest mention on that day but still existed in some discus- sions. Compared with our approach, Baselines 1 and 2 can detect the emerging of "CES" with a frequency count at each moment, but no trajectory is generated. Baseline 3 can track a very coarse tra- jectory of this event, i.e., from Jan 10 to Jan 12. The reason is, if an (a) Varying time window (b) Varying step length Figure 10: The running time on two datasets as the adjusting of the time window length and step length. event changes rapidly and many posts at consecutive moments can- not be associated with each other, Baseline 3 will fail to track the evolution. Since in social streams the posts usually surge quickly, our approach is superior over the baselines. Event Merging & Splitting. Figure 9(b) illustrates an example of event merging and splitting generated by Algorithm eTrack. eTrack detected the event of SOPA (Stop Online Piracy Act) and Wikipedia on Jan 16, because on that day Wikipedia announced the blackout on Wednesday (Jan 18) to protest SOPA. This event grew distinctly on Jan 17 and Jan 18, by inducing more people in the so- cial network to discuss about this topic. At the same time, there was another event detected on Jan 18, discussing Apple's prod- ucts. On Jan 19, actually the SOPA event and Apple event were merged, because Apple joined the SOPA protest and lots of Apple products such as iBooks in education are actually directly related to SOPA. This event evolved on Jan 20, by adding more discus- sions about iBooks 2. Apple iBooks 2 was actually unveiled in Jan 21, while this new product gained lots of attention, people who talked about iBooks did not talk about SOPA anymore. Thus, on Jan 21, the SOPA-Apple event was split into two events, which would evolve independently afterwards. Unfortunately, the above merging and splitting process cannot be tracked by any of the base- lines, which output some independent events. The reason for Base- line 3 is, given the ground truth Et+1 = Et1 + Et2, i.e., Et1 and Et2∩Et+1 Et2∪Et+1 ≥ κ% is Et2 merged into Et+1, most likely invalid, so the ground truth cannot be tracked. Et1∩Et+1 Et1∪Et+1 ≥ κ% or Jan 8, 2012 CES prediction Jan 9, 2012 CES tomorrowblogs, etc Jan 10, 2012 CES conference news press, etc Jan 11, 2012 CES video, press, blogs, photo, events, etc Jan 12, 2012 CES video, gadgets, etc Jan 13, 2012 CES video, award, etc growgrow grow decaydecaydecay Jan 14, 2012 CES last day grow Jan 16, 2012 SOPA Wikipedia Protest Jan 16, 2012 SOPA Wikipedia blackout Jan 18, 2012 SOPA PIPA protest Jan 18, 2012 Apple products Jan 19, 2012 SOPA PIPA protest and Apple iBooksJan 20, 2012 SOPA PIPA protest and Apple iBooksJan 21, 2012 SOPA PIPA protest Jan 21, 2012 Apple iBooks grow mergemergedecay split split02468101214161812345678910Running Time (min) Time window length (·Δt) eTrack: Tech-FulleTrack: Tech-Lite02468101214161812345Running Time (min) Step length (·Δt) eTrack: Tech-FulleTrack: Tech-LiteBaseline 3: Tech-FullBaseline 3: Tech-Lite 7.3 Running Time We measure how the baseline and eTrack scale w.r.t. both the varying time window width and the step length. We use both Tech- Lite and Tech-Full streams, and set the time step interval ∆t = 1 day for Tech-Lite, ∆t = 1 hour for Tech-Full to track events on different time granularity. The streaming post rates for Tech-Lite and Tech-Full are 11700/day and 7126/hour respectively. Figure 10(a) shows the running time of eTrack when we increase the time window length, and we can see for a time window of 10∆t hours in Tech-Full, our approach can finish the post preprocessing, post network construction and event tracking in just 3 minutes. A key observation is that the running time of eTrack does not depend on the overall size of the dataset. Rather, it depends on the streaming speed of posts in ∆t. Figure 10(b) shows if we fix the time win- dow length as 10∆t and increase the step length of the sliding time window, the running time of eTrack grows nearly linearly. Com- pared with our incremental computation, Baseline 3 has to process posts in the whole time window from scratch at each moment, so the running time will be steadily high. If the step length is larger than 4∆t in TechFull, eTrack does not have an advantage in run- ning time compared with Baseline 3, because a large part of post network is updated at each moment. However, this extreme case is rare. Since in a real scenario, the step length is much smaller than the time window length, our approach shows much better efficiency than the baseline approach. 8. CONCLUSION Our main goal in this paper is to track the evolution of events over social streams such as Twitter. To that end, we extract mean- ingful information from noisy post streams and organize it into an evolving network of posts under a sliding time window. We model events as sufficiently large clusters of posts sharing the same top- ics, and propose a framework to describe event evolution behaviors using a set of primitive operations. Unlike previous approaches, our evolution tracking algorithm eTrack performs incremental up- dates and efficiently tracks event evolution patterns in real time. We experimentally demonstrate the performance and quality of our algorithm over two real data sets crawled from Twitter. As a natu- ral progression, in the future, it would be interesting to investigate the tracking of evolution of social emotions on products, with its obvious application for business intelligence. 9. REFERENCES [1] The guardian: Average twitter user has 126 followers. http://www.guardian.co.uk/technology/blog/2009 /jun/29/twitter-users-average-api-traffic. [2] M. K. Agarwal, K. Ramamritham, and M. Bhide. Real time discovery of dense clusters in highly dynamic graphs: Identifying real world events in highly dynamic environments. PVLDB, 5(10):980–991, 2012. [3] C. C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework for clustering evolving data streams. In VLDB, pages 81–92, 2003. [4] J. Allan, editor. Topic detection and tracking: event-based information organization. Kluwer Academic Publishers, 2002. [5] A. Angel, N. Koudas, N. Sarkas, and D. Srivastava. Dense subgraph maintenance under streaming edge weight updates for real-time story identification. PVLDB, 5(6):574–585, 2012. [6] S. Asur, S. Parthasarathy, and D. Ucar. An event-based framework for characterizing the evolutionary behavior of interaction graphs. In KDD, pages 913–921, 2007. [7] H. Becker, M. Naaman, and L. Gravano. Learning similarity metrics for event identification in social media. In WSDM, pages 291–300, 2010. [8] V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. J. Stat. Mech., P10008, 2008. [9] F. Cao, M. Ester, W. Qian, and A. Zhou. Density-based clustering over an evolving data stream with noise. In SDM, 2006. [10] Y. Chen and L. Tu. Density-based clustering for real-time stream data. In KDD, pages 133–142, 2007. [11] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, pages 226–231, 1996. [12] G. P. C. Fung, J. X. Yu, P. S. Yu, and H. Lu. Parameter free bursty events detection in text streams. In VLDB, pages 181–192, 2005. [13] M. Halvey and M. T. Keane. An assessment of tag presentation techniques. In WWW, pages 1313–1314, 2007. [14] J. Han, M. Kamber, and J. Pei. Data Mining: Concepts and Techniques. Morgan Kaufmann, 2011. [15] X. Jin, W. S. Spangler, R. Ma, and J. Han. Topic initiator detection on the world wide web. In WWW, pages 481–490, 2010. [16] M.-S. Kim and J. Han. A particle-and-density based evolutionary clustering method for dynamic networks. PVLDB, 2(1):622–633, 2009. [17] D. Klein and C. D. Manning. Accurate unlexicalized parsing. In ACL, pages 423–430, 2003. [18] J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604–632, 1999. [19] J. Leskovec, L. Backstrom, and J. M. Kleinberg. Meme-tracking and the dynamics of the news cycle. In KDD, pages 497–506, 2009. [20] B. Liu, C. W. Chin, and H. T. Ng. Mining topic-specific concepts and definitions on the web. In WWW, pages 251–260, 2003. [21] C. D. Manning, P. Raghavan, and H. Schuetze. Introduction to Information Retrieval. Cambridge University Press, 2008. [22] A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller. Twitinfo: aggregating and visualizing microblogs for event exploration. In CHI, pages 227–236, 2011. [23] D. Nadeau and S. Sekine. A survey of named entity recognition and classification. Lingvisticae Investigationes, 30(1):3–26, 2007. [24] T. Sakaki, M. Okazaki, and Y. Matsuo. Earthquake shakes twitter users: real-time event detection by social sensors. In WWW, pages 851–860, 2010. [25] A. D. Sarma, A. Jain, and C. Yu. Dynamic relationship and event discovery. In WSDM, pages 207–216, 2011. [26] S. Srinivasa. Data, storage and index models for graph databases. In Graph Data Management, pages 47–70. 2011. [27] L. Wan, W. K. Ng, X. H. Dang, P. S. Yu, and K. Zhang. Density-based clustering of data streams at multiple resolutions. TKDD, 3(3), 2009. [28] J. Weng and B.-S. Lee. Event detection in twitter. In ICWSM, 2011. [29] Y. Yang, T. Ault, T. Pierce, and C. W. Lattimer. Improving text categorization methods for event tracking. In SIGIR, pages 65–72, 2000.
1808.02046
1
1808
2018-08-06T18:00:39
Directed Random Geometric Graphs
[ "cs.SI", "cond-mat.dis-nn", "physics.soc-ph" ]
Many real-world networks are intrinsically directed. Such networks include activation of genes, hyperlinks on the internet, and the network of followers on Twitter among many others. The challenge, however, is to create a network model that has many of the properties of real-world networks such as powerlaw degree distributions and the small-world property. To meet these challenges, we introduce the \textit{Directed} Random Geometric Graph (DRGG) model, which is an extension of the random geometric graph model. We prove that it is scale-free with respect to the indegree distribution, has binomial outdegree distribution, has a high clustering coefficient, has few edges and is likely small-world. These are some of the main features of aforementioned real world networks. We empirically observe that word association networks have many of the theoretical properties of the DRGG model.
cs.SI
cs
Directed Random Geometric Graphs Jesse Michel,1 Sushruth Reddy,1 Rikhav Shah,1 Sandeep Silwal,1 and Ramis Movassagh2, ∗ 1Massachusetts Institute of Technology, Cambridge MA, 02139 2IBM Research, MIT-IBM AI Lab, Cambridge MA, 02142 (Dated: August 8, 2018) Many real-world networks are intrinsically directed. Such networks include activation of genes, hyperlinks on the internet, and the network of followers on Twitter among many others [1 -- 3]. The challenge, however, is to create a network model that has many of the properties of real-world networks such as powerlaw degree distributions and the small-world property [4, 5]. To meet these challenges, we introduce the Directed Random Geometric Graph (DRGG) model, which is an extension of the random geometric graph model. We prove that it is scale-free with respect to the indegree distribution, has binomial outdegree distribution, has a high clustering coefficient, has few edges and is likely small-world. These are some of the main features of aforementioned real world networks. We empirically observe that word association networks have many of the theoretical properties of the DRGG model. Contents I. Introduction II. Previous work III. Directed Random Geometric Graph (DRGG) Model IV. Mathematical results A. Degree distributions B. Clustering Coefficient of G(n, α, d) C. Undirected edges and graph Limits D. Diameter V. An Application to real world networks A. Degree Distribution B. Other Graph Statistics C. Analysis of Hubs VI. Conclusions and Future Work VII. Acknowledgements VIII. Appendix A. Proof of Theorem 2 1. Upper Bound Calculation 2. Lower Bound Calculation B. Proof of Theorem 3 1. Computing the expectation 2. Computing the integral expression for Cin for odd d C. Analysis of Hubs References 2 2 3 4 4 6 9 10 11 12 12 13 13 14 14 14 15 15 16 16 17 18 18 8 1 0 2 g u A 6 ] I S . s c [ 1 v 6 4 0 2 0 . 8 0 8 1 : v i X r a I. INTRODUCTION 2 The widespread availability of rich data on complex networks has spurred mathematical research into the prop- erties of such networks. Researchers frequently use random graphs to model real networks [1, 3, 5 -- 9]. There are many properties of real networks that appear in a diverse set of fields. The most prevalent of these properties are the following: Scale-free: the distribution of the degrees of nodes is given by a power law, i.e. P[degree of v = k] ∼ k−γ [7]. In general, power-laws frequently occur in systems where 'rich' items become richer, though there are many potential explanations [2, 7]. For networks, this means that nodes with high degree are more likely to attract connections from additional nodes added to the network. This frequently occurs when the degree is a rough measure of popularity, for example, websites that are linked to by a lot of other websites are seen as credible, so are linked to by more websites [10]. In directed graphs, the indegree and outdegree distributions can be examined separately. Networks can exhibit a power law indegree distribution but a skinny tail (e.g. Gaussian) outdegree distribution [11]. Few-edges: Networks are usually quite sparse [12]. Every node has a small expected degree that doesn't increase much as the number of nodes scales. For example, if Twitter doubles its number of users, it's unlikely that the average user would increase the number of users they follow by any constant factor. Real networks tend to have (cid:101)O(n) edges 1. Small-world: Most nodes are connected via a relatively short number of hops in the graph [13, 14]. Specifically, the expected length of the shortest path between two randomly selected points is O(log n). This property is related to the diameter, which is the longest shortest path in the graph. Clearly, the diameter is an upper bound on the expected length of a shortest path. Clustering: The clustering coefficient is the average likelihood that given a node, a randomly selected pair of its neighbors will be connected via a single edge. Intuitively, agents tend to make connections with those they are already 'close' to. We can write an expression for the clustering coefficient, P[v (cid:32) wu (cid:32) v, u (cid:32) w], 1 n ∑ u where v (cid:32) w is the event that there is a directed edge from v to w. This paper finds a class of random graphs which satisfies all four of these key properties. II. PREVIOUS WORK We briefly describe classes of random graphs that have attracted much mathematical attention. Perhaps the most prominent are Erdos-Renyi random graphs, denoted G(n, p). It is natural to extend this model to the directed case by including the directed edges (v, u) and (u, v) independently with probability p. Erdos-Renyi graphs are tractable and small-world but are not scale-free. Another well-known network with heavy-tailed power law node degree distributions is the preferential attach- ment model. While this model exhibits the desired power law distribution for degrees and is mathematically tractable, this model lacks certain key properties of some real world networks such as a realistic clustering coef- ficient, which measures the commonality of small communities [15, 16]. Random geometric graphs (RGG) are another class of random graphs that have become more popular in recent years due to their simple formulation [17]. In the simple RGG model, one uniformly distributes n points over some space (often taken to be the unit d−dimensional cube or torus), and takes them to be the vertices of a random graph. One connects any pair of vertices with distance less than a fixed R. Intuitively nodes which are closer are more connected, which is a desired feature of some real world networks. Much is known about this class of graphs, such as the sizes of connected components and the minimum value of R which results in a connected graph [18]. These types of random graphs are commonly used to model radio broadcasting towers and there has been much work on distributed algorithms on these models (see [8, 9]). Some variations on the basic RGG model have also been studied. One variant, termed the k-nearest neighbor model, samples points as in the basic RGG model but only connects each 1 (cid:101)O(n) = O(n poly(log n)) point to its k nearest neighbors [19]. Another variant generalizes the RGG model by sampling points as before, but connecting nodes with a probability dependent on their distance [20]. III. DIRECTED RANDOM GEOMETRIC GRAPH (DRGG) MODEL Consider n points (nodes/vertices) uniformly distributed on a d-dimensional cube [0, L]d. To make the model fully translation-invariant, we impose periodic boundary conditions, that is, for any i, (x1,· · · , xi−1, xi + L, xi+1,· · · , xd) = (x1,· · · , xi−1, xi, xi+1,· · · , xd). 3 This is equivalent considering points on a d-dimensional torus. For simplicity, below we take the unit cube (i.e., set L = 1), but our results can be extended to a general L. Each point v is assigned a radius rv distributed according to a Pareto distribution [21], (cid:40) f (r) = η/rα 0 r0 ≤ r ≤ 1/2 otherwise , where α > d + 1 is a parameter of the graph and r0 is the minimum allowed radius, chosen based on n so that the resulting graph is almost surely connected [18], (cid:18) log n (cid:19)1/d Vd n r0 = . where Vd be the volume of the unit ball in d-dimensions (i.e. v1 = 2, v2 = π, v3 = 4π/3). r ≤ 1/2 ensures that balls of selected radii do not intersect themselves. η is the normalizing factor that ensures(cid:82) 1/2 f (r)dr = 1: r0 (α − 1)rα−1 1 − (2r0)α−1 . 0 η = We refer to the ball of radius rv centered at v as "v's circle" and denote the distance on the torus between v and u as d(u, v) = d(v, u). The directed edges are added as follows. Add a directed edge from u to v (denoted by u (cid:32) v) if u is in v's circle (i.e. d(v, u) ≤ rv). Intuitively, rv is a measure of the popularity of v. If v is unpopular, then only nodes close by will connect; conversely very popular nodes attract the attention of nodes that are far away. Lastly, since we want to model real-world networks, we can think of d as being a small integer, such as 1 ≤ d ≤ 5. See Figures (1) and (2) for reference. v r v u Figure 1: Illustration of u (cid:32) v: There is a directed edge from vertex u to vertex v since u lies inside v's circle of radius rv. There is no directed edge from v to u since v lies outside of u's circle. We refer to this as the Directed Random Geometric Graph (DRGG) model, denoted by G(n, α, d). In summary the notation is: • G(n, α, d) is a DRGG where n is the number of nodes and d is the dimension of the space. • f (r) = η/rα probability density function for the selection of radii. 4 Figure 2: Left: Vertices with their respective circles plotted in the same color. Right: The corresponding DRGG. • [r0, 1/2] is the support of f (r). IV. MATHEMATICAL RESULTS For any class of random graphs, there are a variety of properties of theoretical and practical interests as outlined in the introduction. In this section, we prove that the indegree distribution of DRGGs is given by a power law with parameter α−1 n ) where n is the number of vertices. We also show that the total number of edges in DRGGs is Θ(n log n) and show that the clustering coefficient of DRGGs approaches a constant as n → ∞. Finally, we show how the standard geometric random graphs can be thought of as a graph limit of the DRGG model. We end with a conjecture about the diameter of DRGGs. d + 1 while the outdegree distribution is a binomial with parameter Θ( log n A. Degree distributions As explained in Section I, motivated by real-world networks, we want a graph model whose indegree distribution follows a power law, and whose outdegree distribution decays exponentially. Here we prove that indeed in DRGG, the indegrees follow a power law distribution, and outdegrees a binomial distribution. Theorem 1. Let δin(k) and δout(k) be the density function for the indegree and outdegree of the random graph G(n, α, d) respectively. Then, asymptotically as n → ∞, for fixed d, α > d + 1, and α−1 d (cid:28) k (cid:28) n and d −1 δin(k) ∝ k− α−1 (cid:19) (cid:18)n − 1 zk(1 − z)n−1−k δout(k) = k (1) (2) where z = Θ(log n/n). Proof. We first prove the indegree case. Consider the probability that a vertex v has indegree k. For this to happen, there must be exactly k other vertices in v's circle (of radius rv). The probability of this is (cid:90) 1/2 (cid:18)n (cid:19)(cid:90) 1/2 k r0 (3) Since the points are distributed uniformly on the plane, P[δin(v) = k rv = r] is the binomial random variable that describes the probability of exactly k points lying within the volume of the d-dimensional sphere. This gives P[δin(v) = k] = r0 P[rv = r] P[δin(v) = k rv = r] dr. P[δin(v) = k] = η (Vdrd)k(1 − Vdrd)n−k dr. 1 rα (4) Making the substitution u = Vdrd gives us P[δin(v) = k] = (cid:18)n (cid:19) k η d α−1 V d d (cid:90) Vd/2d Vdrd 0 uk−1− α−1 d (1 − u)n−k du. 5 (5) We let β = α−1 d for convenience and express the integrand in terms of the exponential function obtaining (cid:20) (cid:19) (cid:90) Vd/2d (cid:18) k − β − 1 (cid:18)n k n ) ln(1 − u) so that the integrand is of the form en f (u). Treating n as the large part ln u + (1 − k n ) ln(1 − u) (cid:19)(cid:21) V β d Vdmd exp n du. n P[δin(v) = k] = η d ln u + (1 − k Now let f (u) = k−β−1 and setting f (cid:48)(u) = 0, the saddle point is usp = k−β−1 n n−β−1 and Note that for large n, f (cid:48)(cid:48)(usp) approaches a negative constant. The steepest descent method gives (see [22]) f (cid:48)(cid:48)(usp) = − . (n − β − 1)3 (cid:115) n(k − β − 1)(n − k) (cid:19) d en f (usp) V β (cid:18)n k 2π n f (cid:48)(cid:48)(usp) , P[δin(v) = k] ≈ η d (cid:19) (cid:18)n √ (6) (7) which after inserting f (usp) and f (cid:48)(cid:48)(usp) reads P[δin(v) = k] ≈ η d V β d k 2π(k − β − 1)k−β−1/2(n − k)n−k+1/2 (n − β − 1)n−β+1/2 . In fact, as n → ∞, the two sides of Eq. (6) become asymptotically equivalent [23]. As show in figure 3, the steepest descent result gives an excellent approximation. One can ignore the term η d since it do not depend on k so they only contribute to the normalizing constant for δin. We now show that for large n, Eq. (7) gives rise to a power law in k. Using Stirling's approximation one obtains (cid:19)β+1 ≤ (cid:18)n (cid:19) (k − β − 1)k−β−1/2(n − k)n−k+1/2 k (n − β − 1)n−β+1/2 (cid:16) n (cid:17)β+1 . ≤ √ 1 2π (n − β − 1) k (cid:18) √ 1 2π (n − β − 1) n k − β − 1 Ignoring factors that do not depend on k, we see that P[δin(v) = k] ∝ k−β−1 as desired. vertices. Now consider any other vertex u (cid:54)= v. The probability that v lies inside u(cid:48)s circle is given by We now analyze the outdegree case. Consider a vertex v. v has outdegree k if it lies in exactly k circles of other (cid:90) 1/2 r0 z = P[v in u(cid:48)s ballru = r] P[ru = r] dr, where P[v in u(cid:48)s ballru = r] = Vdrd and P[ru = r] = η/rα. Note that z does not depend on v or u. Since the radii of all circles are picked independently, it follows that the probability that the outdegree of vertex v is k is (n−1 k )zk(1− z)n−k. One can calculate z exactly to be Defining α = βd + 1 for β > 1 the above expression reads (cid:90) 1/2 r0 z = (cid:18) 1 2d−α+1 − rd−α+1 0 (cid:19) . ηVd η rα Vd rd dr = d − α + 1 (cid:32) z = βVd β − 1 0 2−d − 2−βdrd rβd 0 − 2−βd rβd 0 (cid:33) . Using Taylor expansion, and recalling that β = α−1 z = and we are done. d and 1 (cid:29) z, the equation above reduces to (cid:19) log n (cid:18) log n (cid:19)β−1 (cid:18) α − 1 α − 1 − d + O n n 6 Figure 3: Illustration of the approximation of Eq. (7) for 100, and 500 vertices for G(n, α, d). The approximation is very accurate for both cases. For 100 nodes we see that the fit is tight except at the head and tail, which aligns with the fact that steepest descent makes a Gaussian approximation. We see a tighter fit for n = 500, which aligns with the asymptotic nature of our approximation in 1. A heavy tail distribution can also be seen which numerically confirms the results proven in 1. Corollary 1. The expected number of edges in G(n, α, d) is Θ(n log n). Proof. To find the total number of edges, it suffices to count all the outdegrees edges. Since there are n − 1 nodes that v can connect to with independent probabilities, Theorem 1 implies that the expected outdegree of any vertex is Θ(log n). Hence, the total number of edges is Θ(n log n). B. Clustering Coefficient of G(n, α, d) The clustering coefficient of G(n, α, d) is discussed in this section. This metric is important because it measures the propensity of nodes with common neighbors to themselves be connected [4, 24, 25]. Hence, real world networks often exhibit large clustering coefficients. We being by showing that G(n, α, d) is rich in triangles, namely, G(n, α, d) has Θ(n log2(n)) triangles. Triangles are important because they are a measure of connectivity and contribute to the clustering coefficient that will be discussed later in this section. In addition, counting the total number of triangles in a network is itself a well-studied problem [26]. In a directed graph, there are fundamentally two types of triangles: Type 1 and Type 2 triangles. These triangles are shown in Figure (4). Due to the geometric nature of G(n, α, d), it w v w v u u Figure 4: A type 1 triangle on the left and a type 2 triangle on the right. turns out that we do not need to account for both types of triangles. Say that vertices u, v, w form a type 1 or 2 triangle if the edge relationships between u, v and w match Figure (4). Note that we say v (cid:32) w if there is a directed edge from v to w. 7 Lemma 1. If vertices u, v and w form a type 2 triangle in G(n, α, d), then they also form a type 1 triangle. Proof. We note that if u, v and w form a type 2 triangle then d(w, v) ≤ rw, d(v, u) ≤ rv, d(u, w) ≤ ru. Without loss of generality, suppose that rv is the minimum radius: rv = min(ru, rv, rw). Then, we have rv ≤ ru so it follows that d(v, u) ≤ rv ≤ ru. Hence, there must also be a directed edge from v to u. That is, u, v and w also form a type 1 triangle, as desired. Note that type 1 triangles measure the following phenomenon in real networks: If two people follow the same person, what is the probability that one follows the other? Indeed, in real world networks, the number of triangles is 'large', which indicates that models such as preferential attachment do not accurately model real world networks [4]. However, the total number of triangles of type 1 in G(n, α, d) is quite 'large.' Theorem 2. The expected number of directed, acyclic (type 1) triangles in a graph, S, for S = {u, v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w}, is E[S] = Θ(n log2(n)) as n → ∞ for fixed α, d under the constraint that α > 2d. Proof. We give an abridged version of the proof. Please see the appendix for full details. Throughout the proof, P[·] denotes the probability of an event while p(·) denotes the probability density of a random variable. By linearity of expectation, E[S] = n(n − 1)(n − 2) P(v (cid:32) u, w (cid:32) u, v (cid:32) w) for randomly selected vertices u, v, w. Without loss of generality, we may take u to be located at the origin. Then condition on the locations of v and w, denoted by xv and xw, as well as the radii of circles centered at u and w, denoted by ru and rw. It is clear that the radii of circles corresponding to u and w, along with the locations of v and w are independent. Additionally, edges are conditionally independent given these radii and their locations. The probability density of the points xv and xw is 1 since v, w are chosen uniformly over the unit torus: i.e. p(xv) = p(xw) = 1. Furthermore, P[v (cid:32) uxv, ru] = 1[d(xv, 0) < ru], as we draw an edge from v to u if and only if xv is inside the circle of radius ru centered at u (the origin). Similarly, P[w (cid:32) uxw, ru] = 1[d(xw, 0) < ru]. Finally, we have that P[v (cid:32) wxw, xv, rw] = 1[d(xv, xw) < rw], as we draw an edge from v to w if and only if the distance between their coordinates is less than the radius of w's circle. Note that 1[d(xv, xw) < rw] ≤ 1 is always true. Using these ideas, we arrive at the following inequality P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤ V2 d η r2d−α u = V2 d η (cid:90) 1 2 r0 (cid:34) r2d−α+1 u 2d − α + 1 (cid:35) 1 2 . r0 As n becomes large, for any fixed d we have that r0 goes to 0. This then implies (for α > 2d) that the dominant term in the above (and a valid, asymptotically tight upper bound) is: r2d−α+1 α − 2d − 1 0 V2 d η = C1 log2(n) n2 where C1 is some constant independent of n. Using similar reasoning as above, we can get a lower bound on P[v (cid:32) u, w (cid:32) u, v (cid:32) w]. Specifically, in the appendix, it is shown that (cid:34) P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2 = V2 d η2 α − 1 2−α r2d−2α−2 α − d − 1 0 (cid:90) 1 4 (cid:18) (2ru)1−α − (1/2)1−α (cid:19) 1 − (4r0)α−1−2d(cid:17)(cid:35) (cid:16) . (cid:16) drur2d−α u d η2 1 − (4r0)2(α+1)−2d(cid:17) − 2α−1 r2d−α+1 α − 1 r0 0 α − 2d − 1 For fixed d, as n goes to infinity, r0 goes to 0, so that the leading order term here is the one containing the factor r2d−2α−2 0 (as α > 2d > d − 1). Thus, we have the lower bound P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − ) log2(n) n2 8 for any  > 0, for large enough n. This proves that, for fixed α, d: C1 log2(n) n2 ≥ P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − ) log2(n) n2 . Multiplying by n(n − 1)(n − 2), we get: C1n log2(n) ≥ E[S] ≥ (C2 − )n log2(n) for any , given that n is sufficiently large. This proves that E[S] ∈ Θ(n log2(n)), as desired. We now turn to the clustering coefficient. For a directed graph, there exist many different possible definitions of the clustering coefficient [24, 25]. One natural choice is Cin, which is defined as: Cin = 1 V ∑ v∈V cv where cu is the local clustering coefficient for vertex u and is defined as: cu = {v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w} du(du − 1) where du is the degree of vertex u. In this section, we find the asymptotic expectation value of this clustering coefficient as n → ∞, and show it approaches a constant (dependent on d and α). Note that the expectation is over all possible generated graphs. This is in contrast to other random graph models such as Erdos-Renyi random graphs and preferential attachment graphs where the clustering coefficient are very small or approach 0 as n → ∞ [16, 27]. We then examine the case α → ∞, and show that it matches results from the random geometric graph model with radius r0. This is in line with the correspondence outlined in the previous section, as in this limit, all edges become undirected and the radius concentrates at r0, as in the case of random geometric graphs. Our main theorem is as follows: Theorem 3. As n → ∞ for fixed d, α satisfying α > 2d + 1, the expectation of the clustering coefficient approaches a constant which is independent of n (the number of vertices). For odd d, the constant can be calculated exactly: 1 (α − 1)2 − d2 − d 22k+1(2k + d + 1) 1 (α − 1)2 − (2k + d + 1)2 (cid:18) (cid:19)(cid:21) . Proof. We give an abridged proof. Please see the appendix for full details. By linearity of expectation (where the expectation is over all possible DRGG), E[Cin] = E[cu] for a randomly selected vertex u. Moreover, (α − 1)2 d!! (d − 1)!! d−1 2∑ k=0 (−1)k 2k + 1 (cid:18) d−1 (cid:19)(cid:20) 2 k (cid:20){v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w} (cid:21) du(du − 1) E[cu] = E = ∑ k P(du = k) E[{v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w}du = k] k(k − 1) from the law of iterated expectation. Furthermore, E[{v, w : v (cid:32) u, w (cid:32) u, v (cid:32) w} du = k] = k(k − 1)P(v (cid:32) wv (cid:32) u, w (cid:32) u, du = k) by linearity of expectation. Then, we can substitute this expression into the sum given for E[cu]: P[du = k]P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k]. After some computation, detailed in the Appendix, one obtains: k E[Cin] = ∑ (cid:90) (cid:90) E[Cin] = dru p(ru) drw p(rw) (cid:90) (cid:90) ddxv xv<ru ddxw xw<ru 1[xv − xw < rw] V2 d r2d u . For odd d, we can compute this explicitly (work detailed in the Appendix): E[Cin] = dd!! (d − 1)!! d−1 2∑ k=0 (−1)k 2k + 1 (cid:18) d−1 (cid:19)(cid:18) 1 2 k (α − 1)2 (α − 1)2 − d2 − 1 22k+1(2k + d + 1) (α − 1)2 (α − 1)2 − (2k + d + 1)2 d 9 (cid:19) . (8) For even d, we cannot get nice closed forms since the density function of two randomly chosen points does not have a nice form like the one that exists for odd d. However, we can perform asymptotic analysis and show that the clustering coefficient also approaches a constant as n → ∞ for even d as well. Remark 1. Note that from the expression in Eq. (8), it is clear that our value of E[Cin] is a constant independent of n. This is different than other standard models such as the Erdos-Renyi random graphs which are known to have low clustering coefficient [27] and the preferential attachment model which have the property that the clustering coefficient approaches 0 as n → ∞ [16]. It is interesting to take the limit as α → ∞ in Eq.(8) which gives: (cid:18) d−1 lim α→∞ E[Cin] = dd!! (d − 1)!! d−1 2∑ k=0 (−1)k 2k + 1 (cid:19)(cid:18) 1 d (cid:19) . − 1 22k+1(2k + d + 1) 2 k This limit matches the known clustering coefficient derived by Dall and Christensen of the standard RGG model [17]. This is not surprising since taking α → ∞ in G(n, α, d) results in the standard RGG model, as explored in the next section. The clustering coefficient for various odd dimensions along with their values as α → ∞ is shown in in Table III in the appendix. C. Undirected edges and graph Limits In this section, we prove a lemma which shows that, given the existence of an edge, there is an asymptotically constant probability of an edge in the opposite direction. This shows that we have a positive fraction of what we have termed 'undirected edges.' Lemma 2. For fixed α, d, and for any randomly selected vertices u, v, as n → ∞, we have that P[u (cid:32) vv (cid:32) u] → 2β−2 2β−1 where β = α−1 d . Proof. The conditional probability can be written as P[u(cid:32)v,v(cid:32)u] P[v(cid:32)u] separately. As before, we can without loss of generality situate u at the origin. Then, . We now compute the numerator and denominator P[u (cid:32) v, v (cid:32) u] = dru ddxv [0,1]d drvP[u (cid:32) v, v (cid:32) uru, xv, rv] · p(ru, xv, rv). (cid:90) (cid:90) 1 2 r0 (cid:90) 1 2 r0 Since u, v share an undirected edge if and only if their separation is less than the radii of both of their circles, we have P[u (cid:32) v, v (cid:32) uru, xv, rv] = 1[d(xv, 0) < ru]1[d(xv, 0) < rv] Moreover, p(ru, xv, rv) = p(ru)p(xv)p(rv) as each of these 3 quantities is chosen independently. Then, the integral is rewritten: The integrand only depends on the norm of xv; we use spherical coordinates to write it as: (cid:90) ddxv xv< 1 2 (cid:90) 1 xv dru p(ru) 2 (cid:90) 2 (cid:90) 1 xv drv p(rv) = (cid:90) 1 2 rd−1P[ru > r]P[rv > r]dr Sd−1 0 ddxvP[ru > xv]P[rv > xv]. xv< 1 2 where Sd−1 = 2πd/2 Γ( d 2 ) . We can split this integral into portions that go from 0 to r0, where P[ru > r] and P[ru > r] each evaluate to 1, and a portion going from r0 to 1 2. By direct computation and for b ≥ r0, one obtains 10 and we have b We are interested in the behavior of this integral as n → ∞, or equivalently r0 → 0. Therefore, for sufficiently large n, (cid:90) 1 2 drp(r) = η α − 1 (cid:34) , (cid:19) (cid:18) 1 bα−1 − 2α−1 (cid:18) 1 (cid:90) 1 rα−1 − 2α−1 rd−1 2 r0 (cid:19)2 (cid:35) dr . P[u (cid:32) v, v (cid:32) u] = Sd−1 rd 0 d + η2 (α − 1)2 (cid:90) 1/2 r0 rd−1 (cid:18) 1 rα−1 − 2α−1 (cid:19) dr = rd−2α+2 2α − d − 2 0 ) + C 0 + O(rd−α+1 (cid:33) rd 0 d + rd 0 2α − d − 2 + O(rd+α−1 ). 0 P[u (cid:32) v, v (cid:32) u] = Sd−1 (cid:90) 1 P[v (cid:32) u] = (cid:32) 2 r0 for some constant C. Using the Taylor expansion of η around 0 and noting that α > d + 1 (see III), we get For the denominator of the conditional probability, assuming that u is located at the origin, we compute Note that P[v (cid:32) uru] = P[xv < ru] = Vdrd (cid:90) 1 u. Hence, P[v (cid:32) u] = Vdη r−α+d dr = Vdrd 2 r0 + O(rα−1 ). 0 Dividing P[u (cid:32) v, v (cid:32) u] by P[v (cid:32) u] and using the fact that r0 → 0, we get that (cid:18) α − 1 dru p(ru)P[v (cid:32) uru]. (cid:19) (cid:19) α − d − 1 α − d − 1 1 0 + 2α − d − 2 α − 1 (cid:18) 1 d 2β − 2 2β − 1 , = n→∞ P[u (cid:32) vv (cid:32) u] = lim Sd−1 Vd since Sd−1 Vd = d where β = α−1 d . Remark 2. We can use Lemma 2 to understand the limiting behavior of G(n, α, d) for fixed n and d and as α → ∞. In this case, the probability density function for the radii of the vertices converges to a delta distribution at the minimum radius r0. However, we can actually say something stronger. In the α → ∞ case, G(n, α, d) actually converges to a standard undirected random geometric graph with fixed radius r0. Note that r0 is the sharp connectivity threshold for undirected random geometric graphs with fixed radius. To show this, note that the asymptotics we arrived at P[u (cid:32) vv (cid:32) u] are also valid for fixed n and d and α → ∞ since the r0 term still dominates. Thus, α→∞ P[u (cid:32) vv (cid:32) u] = lim Sd−1 dVd = 1. This proves the following corollary. Corollary 2. For fixed n and d, limα→∞ G(n, α, d) converges to the standard random geometric graph model (RGG). The diameter of a graph is defined as the longest path among the set of shortest paths over all pairs of vertices. In our case, we are only concerned with directed paths. Similar to the clustering coefficient, the diameter of a graph is D. Diameter a measure of connectivity. It is common for real-world networks to have a small diameter, as can be seen from the popular 'six-degrees of separation' phenomenon. Based on numerical results, we conjecture that the diameter of the DRGG model is O(log n). It appears that the 'fat tail' property of the radii distribution contributes to the significant reduction in the diameter of the DRGG model. However, even though we are not able to prove our conjecture for the diameter, it is still possible to prove a related result which hints that the diameter is indeed O(log n). Lemma 3. Let α and d be fixed in G(n, α, d). Pick two vertices u and v uniformly at random in G(n, α, d). Let ak denote the number of directed paths of length k from u to v. If k ≥ log n log log n , then E[ak] ≥ 1. 11 Proof. First consider three vertices w1, w2 and w3 chosen uniformly at random. If there is a directed edge from w1 to w2, then this does not affect the probability of an edge from w2 to w3. This is because once the locations of w1 and w2 are fixed, the location of w3 is still uniform, and having an edge from w2 to w3 only depends on the location of w3. Thus, given a length k directed path from u to v, the edges of this path are independent of one another. Hence, if ak denotes the expected number of directed paths of length k form u to v, we have E[ak] = zk(k − 1)! (9) (cid:19) (cid:18)n − 2 k − 1 where z is the probability of an edge in G(n, α, d) which is given by C log n large, shifting k → k + 1, and using (n n k) ≥ nk kk , we have E[ak] ≥ √ 2πk (cid:18) C log n (cid:19)k C log n e n (Theorem 1) where C = α−1 α−1−d . Taking n . Hence, it suffices to find a k such that ( log n Rearranging, we see that k ≥ log n k = log n log log n is at least e )k ≥ n. This is equivalent to finding a k such that k log log n − k ≥ log n. log log n works for large n, as desired. Therefore, the expected number of paths of length √ E[ak] ≥ C 2πk log k ≥ 1. Remark 3. In fact we can take the log of the expression in Eq. (9), it can be shown that k = Ω(cid:16) log n (cid:17) is the threshold log log n for the expected number of paths being asymptotically greater than 1. The above lemma tells us that we can expect to find a short path between any two vertices. However, this result is still far from establishing bounds on the diameter or even the length of the shortest path between two vertices chosen uniformly at random. We end this section with the conjecture. Conjecture 1. Let α and d be fixed in G(n, α, d). The length of the diameter of G(n, α, d) is O(log n). V. AN APPLICATION TO REAL WORLD NETWORKS We tested our model on a variety of real world networks. Our code is available at https://github.com/ martinjm97/DRGG. Interestingly, we empirically observed that networks created through word association resulted in networks that had binomial outdegree distribution and power law indegree distribution. An example of this is the University of South Florida Word Association Network. To create this network, researchers asked participants to write the first word that came to mind that was meaningfully related or strongly associated to words that were presented to them. Then a directed edge was drawn between the word said by the participant and the word that was presented to them. This network has approximately 104 vertices and 7.2 × 104 edges. For more information about this network, see [28]. In this section we investigate this network and see how its properties compare to that of the DRGG model. A. Degree Distribution 12 We begin by exploring how the indegree and outdegree distributions for the word association networks compare to the predictions of DRGG. The outdegree and indegree distributions of the network along with the best fits accord- ing to DRGG are shown in Figure 5. Note that for degree distributions, DRGG essentially has one free parameter, namely β = α−1 d . Therefore, we fit both the outdegree and indegree distributions using β. As shown in Figure 5, DRGG is a close fit, especially considering that there was only one free parameter to tune. We discovered that the value of β = 7/3 ≈ 2.33 (α = 8, d = 3) resulted in the best fit. (a) Outdegree Distribution (b) Indegree Distribution Figure 5: Fit for outdegree and indegree distributions for the word association network. β for both fits was β = 7/3 ≈ 2.33. The outdegree distribution on the left also has error bars of approximately two standards of deviation (we estimate one standard deviation of a bin by the square root of the number of items that fall in the bin). B. Other Graph Statistics It is interesting to investigate how other statistics quantities compare to the values predicted by DRGG. In this section we use the model parameters of α = 8, d = 3 to fit the degree distributions. We compared the average clustering coefficient (the clustering coefficient averaged over all nodes), the diameter, and the average path length. The average clustering coefficient gives information about how tightly-knit small communities are in the graph [14]. Likewise, diameter and average path length provides insight into how closely the simulation models the real-world data. The comparison between our model predictions and actual real data values are shown in Table I. Note that the average clustering coefficient is noticeably lower in our model predictions than in the actual data. This suggests that the word association data set has a stronger clique behavior than our model. Overall, the empirical degree distributions and the empirical graph statistics do not quite match the predictions given by DRGG. This may be explained by the fact our results are asymptotic in n and the network we studied only has 104 vertices. Simulation Real Data Avg. Clustering Coefficient Diameter Avg. Path Length 0.512 ± 10−2 9.67 ± 0.94 5.149 ± 0.65 0.119 7 4 Table I: The results we averaged over 100 simulations of DRGG and were computed on the undirected version of the graph i.e., the directed edges were made by bidirectional (undirected). This was done for computational simplicity. Since the DRGG model is strongly connected, this should not have a large impact on the results. The same procedure was applied to the real data set. Finally, we only used the giant component in the real data set to calculate these statistics. The mean values for the three graph statistics along with two standard deviations of error are displayed. C. Analysis of Hubs 13 We analyze the words in the 'hubs' of the word association network [28]. By hubs, we specifically mean words that have a high indegree and represent the tail-end of the power law indegree distribution. The 20 words with the largest indegrees are shown in Table II. A lot of these hub words are emotional words such as Love, Good, Bad, Pain, and Happy. In addition, the hubs also include words that are ubiquitous in everyday life, such as money, water, car, work, and people. Further analysis was performed on the largest 50 hubs to understand their significance in relation to the remainder of the graph. One way of understanding the relationships between nodes in the graph is to look at their semantic similarity, or closeness in meaning. Several metrics have been proposed to quantify semantic similarity in words. We used two, based on the WordNet database and Word2Vec model. The WordNet database contains a hand-catalogued tree-like hierarchy of words. Given a word at node n, hypernyms (words with broader meanings) are located higher in the tree relative to n, while hyponyms (words with more specific meanings) are located lower in the tree. Two words can be judged to be similar in meaning if they are close together in the graph induced by these word relation- ships [29]. One particular such measure of similarity is Wu-Palmer similarity: Similarity score(w1, w2) = 2 · depth(least common ancestor(w1, w2) depth(w1) + depth(w2) . The Wu-Palmer similarity always lies between 0 and 1, and is higher if the words are closer in semantic similarity [30]. We found that the average similarity between a hub and its neighbors is 0.359, the average similarity between an arbitrary node in the graph and its neighbors is 0.354, and that the average similarity between two arbitrarily selected nodes in the graph is 0.241. The average similarity between hubs is 0.263. Thus, according to this similarity metric, hubs are on average slightly closer to their neighbors than other nodes. As expected, randomly chosen nodes have lower similarity as they may not be related, while nodes that are connected would be expected to have higher similarity. Hubs are also not very closely related: they are thus all common yet distinct words that serve as distinct "sinks" in the word graph. To confirm this trend, we compared these results to those obtained from a different similarity metric. The Word2Vec model maps different words to continuous vector representations of a desired dimension. For more in- formation, see the appendix. Similarity between vectors is then supposed to capture semantic similarity: indeed, relationships such as King − Man + Woman = Queen seem to approximately hold between the vectors representing these respective words. We found that the average dot product similarity between a hub and its neighbors is 0.452, the average similarity between an arbitrary node and its neighbors is 0.422, and the average similarity between ran- domly selected nodes is 0.338. The average similarity between different hubs is 0.415. Thus, as before, hubs are on average slightly more similar to neighbors than arbitrarily chosen nodes, and much more similar than random words are to each other. Interestingly, this metric describes hubs as fairly similar to each other- this might be an artifact of this metric, as all hubs describe fairly common words that might appear together often in many text corpora. We also used a library named TextBlob to perform sentiment analysis to determine whether hubs expressed sig- nificantly different emotions than arbitrary nodes in the graph. For more information about TextBlob, please see the appendix. Phrases can be constructed by concatenating words in the association network with their neighbors. TextBlob was used to analyze these phrases. Phrases that contain hub words have an average polarity of 0.0970 and subjectivity of 0.553, with variances of 0.0731 and 0.0752 respectively. Phrases made from arbitrary graph nodes have an average polarity of 0.00511 and subjectivity of 0.532, with variances of 0.0982 and 0.0611 respectively. Thus, hubs tend to be slightly more "positive" than "negative", and slightly more "subjective" than "objective" compared to the average node in the graph, but these differences are on the order of the variances in these numbers. It thus seems that hubs are generally fairly neutral. In summary, it seems that hubs are distinguished by the fact that they are short words that are easily memo- rable. This explains why they have high indegree: people have an easy time remembering them, regardless of their semantic content. VI. CONCLUSIONS AND FUTURE WORK We have introduced a new model of random graphs, the Directed Random Geometric Graph (DRGG) model that has the property of being scale free in its indegree distribution, has few edges, and has a high clustering coefficient. Food: 324 Money: 302 Water: 276 Good: 255 Bad: 229 Work: 195 House: 185 School: 183 Love: 181 Man: 171 Paper: 163 Pain: 158 Animal: 156 People: 154 Fun: 151 Book: 149 Clothes: 147 Happy: 145 Hard: 144 Car: 259 14 Table II: Words with the largest indegrees in the word association network. The respective indegrees are shown next to the words. Furthermore, we have displayed that this model can be applied to real world networks such as word association networks. Future work includes further theoretical investigation of the DRGG model, such as proving Conjecture 1 which states that the diameter of G(n, α, d) is O(log n). A potential future application of DRGGs is to model power grid networks. Power grids are comprised of different types of nodes such as generators and transformers. Edges are directed because some nodes produce energy, others transfer energy, and yet others use up energy. Therefore, relationship among the nodes is asymmetrical. This matches the asymmetric indegrees and outdegrees of our model. Furthermore, similar to our model, connections are highly correlated with distance, since nodes that are far apart will be impractical to connect. However, a challenge for this analysis is the lack of directed data that is available, although there has been some recent progress to construct such a network by pulling data from multiple sources [31]. We envision the analysis of directed power grid networks as a direction for future research with potential for broad applicability. In addition, we hope to see further applications of the DRGG model to other real world networks. VII. ACKNOWLEDGEMENTS Jesse Michel, Sushruth Reddy, Rikhav Shah, and Sandeep Silwal would like to thank IBM Research for the oppor- tunity to do an internship at the MIT-IBM AI lab in Cambridge MA in the winter of 2018, which was awarded to them for winning the 2017 HackMIT competition. They would also like to thank Ramis Movassagh for mentoring them during this period. VIII. APPENDIX A. Proof of Theorem 2 Proof. Throughout the proof, P[·] denotes a probability while p(·) denotes a probability density. By linearity of expectation, we can write E[S] = n(n − 1)(n − 2) P(v (cid:32) u, w (cid:32) u, v (cid:32) w) for randomly selected vertices u, v, w. Without loss of generality, as we are working on a torus, we may take u to be located at (0, 0,· · · , 0). We can then condition on the locations of v and w, which we denote xv and xw, as well as the radii of circles centered at u and w, which we denote ru and rw, respectively, to obtain: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] = dru drw ddxv [0,1]d ddxw P[v (cid:32) u, w (cid:32) u, v (cid:32) wru, rw, xv, xw] p(ru, rw, xv, xw). [0,1]d We now note that the radii of circles corresponding to u and w, along with the locations of v and w are independent. Additionally, edges are conditionally independent given these radii and locations. Then, we may rewrite the above probability as: dru drw ddxv [0,1]d ddxwP[v (cid:32) uxv, ru] P[w (cid:32) uxw, ru] P[v (cid:32) wxw, xv, rw] p(ru) p(rw) p(xv) p(xw). [0,1]d Note firstly that the probability density of the points xv and xw is 1 since v, w are chosen uniformly from the unit torus which means p(xv) = p(xw) = 1. Furthermore, P[v (cid:32) uxv, ru] = 1[d(xv, 0) < ru], as we draw an edge from v to u if and only if xv is inside the circle of radius ru centered at u (the origin). Similarly, P[w (cid:32) uxw, ru] = 1[d(xw, 0) < ru]. Finally, we have that P[v (cid:32) wxw, xv, rw] = 1[d(xv, xw) < rw], as we draw an edge from v to w if and only if the (cid:90) (cid:90) 1 2 r0 (cid:90) (cid:90) 1 2 r0 (cid:90) (cid:90) 1 2 r0 (cid:90) 1 2 r0 (cid:90) distance between their coordinates is less than the radius of w's circle. Substituting, we obtain: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] = dru p(ru) drw p(rw) ddxv d(xv,0)<ru ddxw1[d(xv, xw) < rw]. d(xw,0)<ru (cid:90) 1 2 r0 (cid:90) 1 2 r0 (cid:90) (cid:90) We now upper and lower bound this expression in order to show that it is of order Θ(n log2(n)). We first prove an upper bound. 1. Upper Bound Calculation 15 Note that 1[d(xv, xw) < rw] ≤ 1 is always true, and so our probability satisfies: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤ dru p(ru) drw p(rw) ddxv d(xv,0)<ru (cid:90) (cid:90) ddxw 1. d(xw,0)<ru (cid:90) 1 2 r0 Now, the last two integrals individually evaluate to the volume of the d-dimensional ball with radius ru. Further- more, the integral over rw evaluates to 1, as p(rw) is a normalized probability density function. The remaining integral can be evaluated as follows: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≤ V2 d η r2d−α u = V2 d η (cid:34) r2d−α+1 u 2d − α + 1 (cid:35) 1 2 . r0 (cid:90) 1 2 r0 (cid:90) 1 2 r0 As n becomes large, for any fixed d we have that r0 goes to 0. This then implies (for α > 2d) that the dominant term in the above (and a valid upper bound) is: where C1 is some constant independent of n. r2d−α+1 α − 2d − 1 0 V2 d η = C1 log2(n) n2 2. Lower Bound Calculation We now show a lower bound on the integral expression. We claim that: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ dru p(ru) drw p(rw) ddxv d(xv,0)<ru (cid:90) 1 2 r0 (cid:90) 1 2 r0 (cid:90) (cid:90) ddxw1[rw > 2ru] d(xw,0)<ru This is because for choices of rw, ru such that rw > 2ru, we have d(xv, xw) ≤ d(xv, 0) + d(xw, 0) ≤ 2ru ≤ rw by the triangle inequality. Then, this integrand is always nonnegative and is identical to the original integrand when it is nonzero. This integral is then a lower bound on the original, as desired. Now, the integrals over xv, xw can be done as before to give: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2 d drur2d u p(ru) drw p(rw)1[rw > 2ru] We can eliminate the indicator function by rewriting the bounds as: P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2 d drur2d u p(ru) (cid:90) 1 2 r0 (cid:90) 1 2 r0 (cid:90) 1 4 r0 (cid:90) 1 2 2ru drw p(rw) Doing the integral over rw, this becomes: (cid:34) P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ V2 = V2 d η2 α − 1 2−α r2d−2α−2 α − d − 1 0 (cid:90) 1 4 (cid:18) (2ru)1−α − (1/2)1−α (cid:19) 1 − (4r0)α−1−2d(cid:17)(cid:35) (cid:16) (cid:16) drur2d−α u d η2 1 − (4r0)2(α+1)−2d(cid:17) − 2α−1 r2d−α+1 α − 1 r0 0 α − 2d − 1 16 . Note that for fixed d, as n goes to infinity, r0 goes to 0, so that the leading order term here is the one containing the factor r2d−2α−2 (as α > 2d > d − 1). Thus, we have the lower bound 0 P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − ) log2(n) n2 for any  > 0, for large enough n. This then proves that, for fixed α, d, that: C1 log2(n) n2 ≥ P[v (cid:32) u, w (cid:32) u, v (cid:32) w] ≥ (C2 − ) log2(n) n2 Multiplying by n(n − 1)(n − 2), we get: for any , given that n is sufficiently large. This then proves that E[S] ∈ Θ(n log2(n)), as desired. C1n log2(n) ≥ E[S] ≥ (C2 − )n log2(n) B. Proof of Theorem 3 1. Computing the expectation Proof. Now, note that P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k, ru, rw, xv, xw] = P[v (cid:32) wxv, xw, rw] = 1[xv − xw < rw] (i.e. v's lying in w's circle is independent of all variables but for the positions of v, w and w's radius). Furthermore, p(ru, rw, xv, xwv (cid:32) u, w (cid:32) u, du = k) = p(rw)p(ru, xv, xwv (cid:32) u, w (cid:32) u, du = k), from the conditional independence of rw, as none of the other variables being considered involve edges pointing to w. Furthermore, this equals p(rw)p(ruv (cid:32) u, w (cid:32) u, du = k)p(xv, xwru, v (cid:32) u, w (cid:32) u), by the chain rule of probability. Note that p(ruv (cid:32) u, w (cid:32) u, du = k) = p(rudu = k) as ru is independent of the fact that two things lie within u's circle given the indegree of u. Furthermore, note that p(xv, xwru, v (cid:32) u, w (cid:32) u) = P[v (cid:32) u, w (cid:32) u, xv, xwru]p(xv, xwru) P[v (cid:32) u, w (cid:32) uru] by Bayes' Rule. Note that p(xv, xwru) = p(xv)p(xw) = 1, that P[v (cid:32) u, w (cid:32) uru] = (Vdrd u)2, and that P[v (cid:32) u, w (cid:32) uru, xv, xw] = 1[xw < ru]1[xv < ru]. Now, we decompose the conditional probability above as: (cid:90) P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k] = (cid:90) (cid:90) (cid:90) ddxv dru drv ddxwP[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k, ru, rw, xv, xw]p(ru, rw, xv, xwv (cid:32) u, w (cid:32) u, du = k). Then, our integral becomes: P[v (cid:32) wv (cid:32) u, w (cid:32) u, du = k] = (cid:90) dru p(rudu = k) (cid:90) (cid:90) drw p(rw) (cid:90) ddxv xv<ru ddxw xw<ru 1[xv − xw < rw] V2 d r2d u 17 . Substituting these results back into the original expression, we get the desired result in the main body of the paper. 2. Computing the integral expression for Cin for odd d Proof. Note that the inner 2 integrals give the probability that 2 points randomly chosen in a sphere of radius ru are less than rw apart. The answer to this question can be derived from a result that can be found in [32]. Namely, for odd d, the probability distribution function for the distance between two points being exactly r apart in a ball of radius R is: P(r) = drd−1 Rd d!! (d − 1)!! d−1 2∑ k=0 (−1)k 2k + 1 (cid:18) d−1 (cid:19)(cid:18) 2 k 1 −(cid:16) r 2R (cid:17)2k+1(cid:19) . (The even case is much harder to work with and does not result in a nice closed form. Thus, we will only work with the odd d case). The cumulative distribution function is then (for odd d): D(r) = dd!! (d − 1)!! d−1 2∑ k=0 (−1)k 2k + 1 (cid:18) d−1 (cid:19)(cid:18) 1 2 k d (cid:90) dru p(ru) drw p(rw) (cid:19)m (cid:18) rw ru η2r2−2α 0 = (1 − α)2 − m2 (cid:16) r (cid:17)d − (cid:34)(cid:32) R 1 − (cid:18) 1 2r0 22k+1(2k + d + 1) 1 (cid:16) r (cid:19)m−α+1(cid:33)(cid:32) R 1 − (cid:17)2k+d+1(cid:19) . (cid:19)−m−α+1(cid:33)(cid:35) (cid:18) 1 2r0 Then, when we substitute back into the integral, we wish to compute integrals of the form: (cid:90) (cid:90) where m is an arbitrary integer. Note that since m ≤ (d − 1)/2, and α > 2d + 1, we have that ±m − α + 1 < 0. Then, as n → ∞ (and, thus, as r0 → 0), the terms in parentheses both go to 1, so that the dominant term is proportional to r2−2α . We then get: 0 (cid:90) (cid:18) rw (cid:19)m ≈ (α − 1)2 − m2 . Putting this all back together again, we get the final expression in the main body of the paper. drw p(rw) dru p(ru) ru η2 (1 − α)2 − m2 r2−2α 0 → (α − 1)2 d 1 3 5 E[Cin] (cid:16) 4 (α−1)2 4 α2−2α + 1−α2−2α+1 (cid:17) 3(α−1)2(5α4−20α3+9α2+22α−72) 32(α2−2α−8)(α2−2α−5)(α2−2α−3) (α−1)2(159α6−954α5+5364α4−15096α3−73679α2+175006α+392040) 512(α2−2α−24)(α2−2α−9)(α2−2α−7)(α2−2α−5) limα→∞ E[Cin] 3 4 15 32 159 512 Table III: Values of E[Cin] for various odd dimensions. The limiting value as α → ∞ is also shown. We only have values for odd d since we could not calculate a closed form expression for the probability of the distance between two randomly chosen points being exactly r apart in a ball of radius R. 18 C. Analysis of Hubs The mapping utilized by Word2Vec is obtained by training a neural net. Specifically, the vectors are the solutions of an optimization problem which roughly attempts to maximize the dot products of vectors corresponding to words that are located close to each other in some text corpus. Ideally, words that are located close to each other often have similar meaning, and thus higher dot products, giving some indication of semantic similarity [33]. For the purposes of these experiments, we used a set of word vectors that were pre-trained on Google News articles. TextBlob uses a probabilistic model, tending to classify words as positive if they occur in many positive movie reviews, and neg- ative if they occur in low-rated reviews. The library returns polarity and subjectivity values, which measure how negative/positive (on a [−1, 1] scale) and objective/subjective (on a [0, 1] scale) a given phrase is, respectively. ∗ Electronic address: R. Movassagh: [email protected], Rest: [email protected] [1] Bin Zhang and Steve Horvath. A general framework for weighted gene coexpression network analysis. In STATISTICAL APPLICATIONS IN GENETICS AND MOLECULAR BIOLOGY 4: ARTICLE 17, 2005. [2] A. Capocci, V. D. P. Servedio, F. Colaiori, L. S. Buriol, D. Donato, S. Leonardi, and G. Caldarelli. Preferential attachment in the growth of social networks: The internet encyclopedia wikipedia. Phys. Rev. E, 74:036116, Sep 2006. doi: 10.1103/PhysRevE. 74.036116. URL https://link.aps.org/doi/10.1103/PhysRevE.74.036116. [3] D. Ediger, K. Jiang, J. Riedy, D. A. Bader, and C. Corley. Massive social network analysis: Mining twitter for social good. In 2010 39th International Conference on Parallel Processing, pages 583 -- 593, Sept 2010. doi: 10.1109/ICPP.2010.66. [4] M. Kaiser and C. C. Hilgetag. Spatial growth of real-world networks. Phys. Rev. E , 69(3):036103, March 2004. doi: 10.1103/ PhysRevE.69.036103. [5] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang. Complex networks: Structure and dynamics. Physics ISSN 0370-1573. doi: https://doi.org/10.1016/j.physrep.2005.10.009. URL http://www. Reports, 424(4):175 -- 308, 2006. sciencedirect.com/science/article/pii/S037015730500462X. [6] S. Tanimoto. Power laws of the in-degree and out-degree distributions of complex networks. ArXiv e-prints, December 2009. [7] Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. ISSN 0036-8075. doi: 10.1126/science.286.5439.509. URL http://science.sciencemag.org/content/286/5439/509. [8] Robert Elsasser, Leszek Gasieniec, and Thomas Sauerwald. On radio broadcasting in random geometric graphs. International Symposium on Distributed Computing, 5218:212 -- 226, 01 1970. [9] Xingde Jia. Wireless networks and random geometric graphs. In 7th International Symposium on Parallel Architectures, Algo- rithms and Networks, 2004. Proceedings., pages 575 -- 579, May 2004. doi: 10.1109/ISPAN.2004.1300540. [10] Albert-Laszlo Barabasi, Reka Albert, and Hawoong Jeong. Scale-free characteristics of random networks: The topology of the world-wide web, 2000. [11] Stefan Kambiz Behfar, Ekaterina Turkina, Patrick Cohendet, and Thierry Burger-Helmchen. Directed networks different link formation mechanisms causing degree distribution distinction. Physica A: Statistical Mechanics and its Applications, 462(C): 479 -- 491, 2016. URL https://EconPapers.repec.org/RePEc:eee:phsmap:v:462:y:2016:i:c:p:479-491. [12] B. A. Huberman, D. M. Romero, and F. Wu. Social networks that matter: Twitter under the microscope. ArXiv e-prints, December 2008. 9780199206650. e-prints, July 2012. [13] Mark Newman. Networks: An Introduction. Oxford University Press, Inc., New York, NY, USA, 2010. ISBN 0199206651, [14] Duncan Watts and Steven H. Strogatz. Collective dynamics of small world networks. Nature, 393:440 -- 2, 07 1998. [15] N. Durak, A. Pinar, T. G. Kolda, and C. Seshadhri. Degree Relations of Triangles in Real-world Networks and Models. ArXiv [16] B. Bollobas. Mathematical results on scale-free random graphs. In Handbook of Graphs and Networks, pages 1 -- 37. Wiley, 2003. [17] Jesper Dall and Michael Christensen. Random geometric graphs. Phys. Rev. E, 66:016121, Jul 2002. doi: 10.1103/PhysRevE. 66.016121. URL https://link.aps.org/doi/10.1103/PhysRevE.66.016121. [18] M. Bradonjic and W. Perkins. On Sharp Thresholds in Random Geometric Graphs. ArXiv e-prints, August 2013. [19] Paul Balister, Amites Sarkar, and Bela Bollobas. Percolation, Connectivity, Coverage and Colouring of Random Geometric ISBN 978-3-540-69395-6. doi: 10.1007/ Graphs, pages 117 -- 142. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008. 978-3-540-69395-6_2. URL https://doi.org/10.1007/978-3-540-69395-6_2. [20] Carl P. Dettmann and Orestis Georgiou. Random geometric graphs with general connection functions. Phys. Rev. E, 93: 032313, Mar 2016. doi: 10.1103/PhysRevE.93.032313. URL https://link.aps.org/doi/10.1103/PhysRevE.93.032313. [21] Eric W. Weisstein. "pareto distribution." from mathworld -- a wolfram web resource. http://mathworld.wolfram.com/ ParetoDistribution.html, 2018. [22] Richard Chapling. Asymptotic methods, April 2016. [23] A. Erdelyi. Asymptotic Expansions. Dover Books on Mathematics. Dover Publications, 1956. https://books.google.com/books?id=aedk-OHdmNYC. [24] G. Fagiolo. Clustering in complex directed networks. Phys. Rev. E , 76(2):026107, August 2007. doi: 10.1103/PhysRevE.76. 19 ISBN 9780486603186. URL 026107. [25] Benjamin Tabak, Marcelo Takami, J. Rocha, and Daniel Cajueiro. Directed clustering coefficient as a measure of systemic risk in complex banking networks. Working Papers Series 249, Central Bank of Brazil, Research Department, 2011. URL https://EconPapers.repec.org/RePEc:bcb:wpaper:249. [26] Mohammad Al Hasan and Vachik S. Dave. Triangle counting in large networks: a review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, pages e1226 -- n/a, 2017. ISSN 1942-4795. doi: 10.1002/widm.1226. URL http://dx. doi.org/10.1002/widm.1226. e1226. [27] N. Meghanathan. A random network model with high clustering coefficient and variation in node degree. International Conference on Control and Automation (CA), pages 54 -- 57, Nov 2015. doi: 10.1109/CA.2015.20. [28] Schreiber Nelson, McEvoy. The university of south florida word association, rhyme, and word fragment norms. http: In 2015 8th //www.usf.edu/FreeAssociation/, 1998. [29] Christiane Fellbaum. WordNet. Springer, 2010. [30] Zhibiao Wu and Martha Palmer. Verb semantics and lexical selection. CoRR, abs/cmp-lg/9406033, 1994. URL http:// arxiv.org/abs/cmp-lg/9406033. [31] Saleh Soltan, Alexander Loh, and Gil Zussman. A learning-based method for generating synthetic power grids. 2017. [32] S.-J. Tu and E. Fischbach. Random distance distribution for spherical objects: general theory and applications to physics. Journal of Physics A Mathematical General, 35:6557 -- 6570, August 2002. doi: 10.1088/0305-4470/35/31/303. [33] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. Distributed representations of words and phrases and their compositionality. CoRR, abs/1310.4546, 2013. URL http://arxiv.org/abs/1310.4546.
1712.10232
1
1712
2017-12-29T13:56:16
Dependence Structure Analysis Of Meta-level Metrics in YouTube Videos: A Vine Copula Approach
[ "cs.SI" ]
This paper uses vine copula to analyze the multivariate statistical dependence in a massive YouTube dataset consisting of 6 million videos over 25 thousand channels. Specifically we study the statistical dependency of 7 YouTube meta-level metrics: view count, number of likes, number of comments, length of video title, number of subscribers, click rates, and average percentage watching. Dependency parameters such as the Kendall's tau and tail dependence coefficients are computed to evaluate the pair-wise dependence of these meta-level metrics. The vine copula model yields several interesting dependency structures. We show that view count and number of likes' are in the central position of the dependence structure. Conditioned on these two metrics, the other five meta-level metrics are virtually independent of each other. Also, Sports, Gaming, Fashion, Comedy videos have similar dependence structure to each other, while the News category exhibits a strong tail dependence. We also study Granger causality effects and upload dynamics and their impact on view count. Our findings provide a useful understanding of user engagement in YouTube.
cs.SI
cs
Dependence Structure Analysis Of Meta-level Metrics in YouTube Videos: A Vine Copula Approach Vikram Krishnamurthy, Fellow, IEEE Yan Duan 1 7 1 0 2 c e D 9 2 ] I S . s c [ 1 v 2 3 2 0 1 . 2 1 7 1 : v i X r a Abstract-This paper uses vine copula to analyze the multivari- ate statistical dependence in a massive YouTube dataset consisting of 6 million videos over 25 thousand channels. Specifically we study the statistical dependency of 7 YouTube meta-level metrics: view count, number of likes, number of comments, length of video title, number of subscribers, click rates, and average percentage watching. Dependency parameters such as the Kendall's tau and tail dependence coefficients are computed to evaluate the pair- wise dependence of these meta-level metrics. The vine copula model yields several interesting dependency structures. We show that view count and number of likes' are in the central position of the dependence structure. Conditioned on these two metrics, the other five meta-level metrics are virtually independent of each other. Also, Sports, Gaming, Fashion, Comedy videos have similar dependence structure to each other, while the News category exhibits a strong tail dependence. We also study Granger causality effects and upload dynamics and their impact on view count. Our findings provide a useful understanding of user engagement in YouTube. I. INTRODUCTION Since its establishment in 2005, YouTube has over 1 billion registered users, who spend millions of hours and generate billions of views everyday; more than 300 hours of video content are uploaded every minute [1]. While YouTube is a social media site, is is also a social networking site. Classical online social networks (OSNs) are dominated by user-user interactions. However YouTube is unique in that the interaction between users is more sophisticated since it includes video content–that is, the interaction follows: users → content → other users. The interaction between users in the YouTube social net- work is incentivized using the posted videos. These interac- tions include: 1) Commenting on users' videos and commenting on other users comments which is very similar to users interaction on blog posting sites such as Twitter. 2) Subscribing to YouTube channels provides a method of forming relationships between users. 3) Users can directly comment on a YouTube channel. 4) Users can also interact by embedding videos from another users channel directly into their own channel to promote exposure or form communities of users. Vikram Krishnamurthy (corresponding author) is with the School of Elec- trical and Computer Engineering, and Cornell Tech, Cornell University, New York (email: [email protected]). This research was partially supported by an Army Research office grant and the Schmidt Sciences. Yan Duan is with the University of British Columbia, Canada. (email: [email protected]). In this paper we view YouTube as a big-data time series. We statistically analyze a massive YouTube dataset of more than 6 million videos over 25 thousand channels to understand how various YouTube meta-level metrics (such as view count, subscriber count, number of likes, etc) affect each other. YouTube is a useful source of data: with efficient web crawlers, meta-level metrics data such as "number of views" can be collected for millions of videos. Careful analysis of YouTube data can reflect users' preference and lead to useful outcomes in optimal caching [3], recommendation systems [4], [5] and targeted advertising [6]. For example [3] studies how popu- larity prediction of YouTube can be used to design efficient caching algorithms in 5G telecommunication systems. A. Context. Copulas With the rapid growth of YouTube data sets, there is strong motivation for adequately understanding and modeling the dependencies present in the resulting multivariate random processes. The modeling of a multivariate distribution function can be decomposed into considering the marginal distributions and then determining the underlying dependence structure, the so-called copula. One of the most popular copula classes, especially for high- dimensional data, are vine copulas. In this paper we focus on the correlations amongst YouTube video metrics and their dependence relationships, which are determined using vine copula models. Vine copula models [8] have several attractive features: since they do not impose constraints on marginal distributions, they can capture unusual correlations such as extreme co-movements [9]. Furthermore, with vine copula, one can separate the task of estimating marginal distributions from that of estimating dependence between random variables. A short review of bivariate copulas and vine copula model is provided in the Appendix. B. Main Results This paper uses vine copula to determine the multivariate dependency structures in a YouTube dataset consisting of more than 6 million videos over 25 thousand channels. The dataset consists of the daily samples of meta-level video metrics from April, 2007 to May, 2015. Specifically we consider 7 YouTube meta-level metrics: view count, number of likes, number of comments, length of video title, number of subscribers, click rates, and average percentage watching. The vine copula model is useful for visualizing the interde- pendencies of the YouTube metrics across different channels. Also, the Kendall's Tau yields the relative importance of these metrics. Based on the vine copula analysis of the YouTube dataset, we conclude several important facts regarding depen- dence structures (Sec.III-E describes these dependencies in more detail) of YouTube metrics. 1) We found that "number of views"1 and "number of likes" are in the central position of the dependence structure. Conditioned on these two metrics, the other five YouTube metrics are virtually independent of each other (see Figure 2). So for example, conditioned on the number of likes, the number of comments (negative or positive) is statistically independent of the number of subscribers (which at first sight is somewhat counter- intuitive). Surprisingly, this dependency structure is true for all categories of videos that we considered, namely, gaming, sports, fashion and comedy. are large (i.e. positive 2) Regarding the various categories of videos; "News" videos have stronger statistical inter-dependence when their values co- movements), For "Gaming" videos, "annotation clicks rate" is less dependent on number of views compared to other categories, Users watching "Comedy" videos are more likely to give comments. For a video with certain popularity, users are more likely to finish a video in "Fashion" category than in other categories. extreme 3) Finally, given the dependency structure from the vine copula, we dig further into the dynamics of YouTube. We use Granger causality to determine the causal rela- tion between viewcounts and subscribers for channels in YouTube. We also study the upload dynamics of YouTube and find he interesting property that for popular gaming YouTube channels with a dominant upload schedule, deviating from the schedule increases the views and the comment counts of the channel. The vine copula models in this paper are of interest in interactive advertising [2], [7]: based on the meta-level metrics, which channels to advertise on? Also, knowledge of the dependency structure allows YouTube content providers to maximize the number of views. The interaction between users in the YouTube is incentivized using the posted videos. In addition to the social incentives, YouTube also gives monetary incentives to promote users increasing their popularity. As more users view and interact with a users video or channel, YouTube will pay the user proportional to the advertisement exposure on the users channel. Therefore, users not only maximize exposure to increase their social popularity, but also for monetary gain. Finally, in 5G wireless networks [3], adaptive caching of content is crucial: the vine copula gives a tractable model to determine what videos to cache. 2 Pioneering works include: meta-data statistics/social network analysis [11], [12], and proposed methods to improve quality of service (QoS) [13], [14]. For the dependence analysis on video meta-level metrics, earlier works found that YouTube videos have clear small-world characteristics and thus strong correlations with each other, and such knowledge can lead to more efficient video caching and redistribution [12], [15]. However, to our best knowledge, no statistical analysis has been conducted on the dependence among the key YouTube video metrics. This paper is organized as follows. In Sec.III, we discuss the main results of this paper: summary of the YouTube data statistics, details for the four steps of dependence analysis using vine copula, estimated parameters, and interpretations of the results. In Sec.IV, we validate the vine copula model using the White goodness-of-fit test. Finally, Sec.VI offers the concluding remarks. In the Appendix, we review the Sklar's theorem and bivariate Archimedean copulas, which lead to the construction of the vine copula model. II. A SHORT OUTLINE OF VINE COPULAS Since its introduction by Sklar in 1959 [24], copulas are a useful multivariate model in various fields [25], [26], [27]. Definition. A (Borel-measurable) function C : [0, 1]n → [0, 1] is a copula, if the following properties hold: • for each i ∈ {1, 2, ..., n}, C(u) = ui when all compo- nents of u are equal to 1, except the ith item that is equal to ui ∈ [0, 1]. • for all u, v ∈ [0, 1]n such that ∀i ∈ {1, 2, ..., n}, ui ≤ vi, C(u) ≤ C(v) • C is n-decreasing. A fundamental result involving copula is Sklar's Theorem. Sklar's Theorem. Let F ∈ F(F1, ..., Fn) be an n- dimensional cumulative distribution function with continuous marginal distribution functions F1, ...Fn. Then there exists a unique copula C with uniform marginals: C ∈ F(U, ...,U), such that for all x1, ..., xn in (−∞,∞) F (x1, ..., xn) = C(F1(x1), ..., Fn(xn)). (1) Note that copula function C is a [0, 1]n → [0, 1] mapping. Therefore, in copula applications, the raw data is required to be transformed into uniformly distributed data, or the so-called "copula data" by using probability integral transformation (PIT). Sklar's theorem states that as long as one can estimate marginal distributions for metrics of interests, it is possible to find a function (or "copula") to properly model their multivariate distribution. C. Literature Review Copulas are now used in wide range of areas including finance, econometrics, biology and medicine [10]. Research on YouTube video data analysis started as early as 2007. 1The view count is a key metric of the measure of popularity or "user engagement" of a video and the metric by which YouTube pays the content providers Bedford and Cooke [30] proposed the so-called "Regular Vine" (or simply "R-Vine") graphical structure,2 hence the name "vine-copula". "Vine" refers to a nested set of tree structures, where the edges of the ith tree are the nodes of the i + 1th tree. In copula applications, the trees are used to represent the dependence structure of multiple variables: each 2A vine is a graphical tool for labeling constraints in high-dimensional probability distributions. edge represents the bivariate copula connecting one pair of marginals; see appendix for an illustrative example. Formally a regular vine structure is defined as follows (see Appendix for background): Definition. A graphical structure V is a regular vine of m elements if: 1) V = (T1, ..., Tm−1) and all trees are connected 2) The first tree T1 has node set N1 = 1, ..., m and edge set E1; then for the next trees Ti, i ∈ 2, ...m − 1, Ti has the node set Ni = Ei−1 3) Proximity condition: If two nodes are connected by an edge in the i + 1th tree, then the two edges in ith tree corresponding to these two nodes share a node. The following steps (see appendix for details) construct a regular vine copula (R-vine) specification to a dataset: 1) Construct the R-Vine structure by choosing an appropri- ate unconditional and conditional pair of metrics to use for vine copula model. 2) Choose a bivariate copula family for each pair selected 3) Estimate the corresponding parameters for each bivariate in step (1). copula. III. DEPENDENCE STRUCTURE OF YOUTUBE USING VINE COPULA In this section, we use the vine copula model to unravel the dependence structure of a massive YouTube data set. A. YouTube Dataset The dataset contains daily samples of metadata of YouTube videos from April, 2007 to May, 2015, and has a size of around 200 gigabytes. Table I summarizes the dataset. TABLE I: Dataset summary Videos Channels Average number of videos (per channel) 250 Average age of videos Average number of views (per video) 6 million 26 thousand 275 days 10 thousand The data-set comprises seven meta-level metrics and five categories of YouTube videos. The 7 meta-level metrics of YouTube: • Number of views • Number of likes • Number of comments • Video title length • Number of subscribers • Annotation click rates • Average percentage of watching The YouTube videos we consider belong to five categories: • Sports • Fashion • Gaming • Comedy N(cid:88) 3 • News For each category, 6000 samples including data of seven metrics are chosen from the YouTube dataset, which has different number of videos for different categories. For the reader's convenience, the abbreviations of long metrics names are also provided. All of above information is summarized in Table II. Table III conducts a preliminary statistical analysis on the dataset in terms of mean, median, kurtosis and skewness. It can be concluded that apart from "title length" and "average percentage of watching", the other five metrics of YouTube videos have very high kurtosis and skewness, which imply heavy tails and high asymmetry of those distributions. There- fore, these five metrics of YouTube videos are not normally distributed. It is this property that motivates the use of vine copula: the vine copula does not require the marginals to be normally distributed, it serves as a useful multivariate model for the dependence analysis of YouTube dataset. B. Modelling Marginal Distributions The marginal empirical distribution of each YouTube metric can be estimated from the data: F N (x) = 1 N + 1 i=1 I(Xi ≤ x). (2) where N is the number of data samples, Xi is the ith data point, while I(·) is the indicator function. The probability integral transform (PIT) is then applied to the estimated marginal distribution to obtain uniformly distributed samples in [0,1], which is referred as "copula data" and required by the vine copula model. In order to test whether the copula data is uniformly distributed in [0, 1], the Kolmogorov-Smirnov statistic [16] is used to do the goodness-of-fit test (i.e. how close the transformed copula data is to the reference uniform distribution) [17]. The high p-values in Table IV indicate that the copula data generated from PIT is uniformly distributed. C. Measure of Dependence For each pair-copula, instead of the classical correlation coefficient, the Kendall rank correlation coefficient (all called Kendall's tau) [18] is a useful measure of dependence. The classical correlation coefficient for two random variables X, Y : ρX,Y = E[(X−µX )(Y −µY )] only detects linear dependencies, and it is not preserved by copulas. Therefore is not considered. Unlike the classical correlation coefficient, the Kendall's tau3 is preserved by copulas [19]. (cid:1) = 21 pairs of metrics in total; an estimate metrics, there are(cid:0)7 Given a dataset with N observations and seven meta-level σX σY of dependency for kth pair of metrics (X, Y ) is obtained by the empirical Kendall's tau coefficient: 2 N − Bk Ak N (N − 1)/2 3Kendall's tau is a measure of rank correlation: τem(X, Y ) = N the similarity of the orderings of the data when ranked by each of the quantities. The rank is high when the variables have a similar rank, and is low when the ranks are dissimilar. . (3) 4 Number of Videos Categories Metrics Abbreviation 85657 90586 60438 431803 58820 Null News Fashion Sports Gaming Comedy Null Number of Views Number of Likes Number of Comments Video Title Length Number of Subscribers Annotation Clicks Views Likes Comm TitLen Subs Anno TABLE II: YouTube Video Data Categories, Metrics and Abbreviations TABLE III: Summary of YouTube data 4355984 134103 22932 Stats Min Max Median Mean Kurtosis Skewness Views 1 Likes 0 5775400 12111 715 25540 9.59 1.61 2 124.50 11.44 1.04 Stats Min Min Max Median Mean Kurtosis Skewness Stats Min Max Median Mean Kurtosis Skewness Stats Min Max Median Mean Kurtosis Skewness Views 1 1 Likes 0 0 1385 50264 14.32 5.05 Views 0 19 487.7 13.46 3.18 Likes 0 5516714 12361 1772 17298 12.15 3.10 11 110.3 12.30 1.52 Views 1 Likes 0 6900910 22846 1287 30666 4.44 1.83 14 128 5.63 1.87 Stats Min Max Median Mean Kurtosis Skewness Views 0 Likes 0 3233762 28314 341 7380 12.16 3.21 6 121 4.94 1.96 (A): News Comm TitLen 0 9035 1 71.43 7.83 1.27 0 0 9 4 120 50 50.66 0.23 0.21 4 1 120 36 (B): Comedy Comm TitLen 95.64 11.82 2.91 (C): Sports 38.69 0.041 0.096 Comm TitLen 0 5963 6 4 120 54 55.25 0.21 0.10 42.29 6.14 2.14 (D): Fashion Comm TitLen 0 5094 8 3 120 45 45.05 0.037 0.062 36.18 4.85 1.79 (E): Gaming Comm TitLen 0 9731 4 39.22 5.99 2.29 2 120 54 54.37 0.027 0.021 Subs 0 1589 1.0 13.6 2.30 1.30 Subs 0 7553 2.00 36.76 4.70 1.30 Subs 0 7405 0.00 12.02 13.17 3.82 Subs Anno AvgPer 0 0 0 9793 35.78 0 26.62 9.81 2.15 0 0.27 10.41 1.25 99.03 56.40 50.77 0.74 -0.43 Subs 0 0 23338 1.00 54.36 13.30 3.68 Anno 0 0 408.764 0.0 2.096 5.82 2.00 AvgPer 0 0 99.04 40.17 40.43 0.042 0.57 AvgPer 0 92.07 39.71 40.34 0.05 0.066 AvgPer 0 98.53 28.73 29.70 0.03 0.049 Anno 0 109.1267 0.0 1.198 1.26 0.90 Anno 0 176.8490 0.0 1.0688 3.65 1.62 Anno AvgPer 0 91.4822 0.0 0.6450 2.52 1.40 0 98.36 26.72 30.21 0.063 0.11 5 Fig. 1: The scatter plots (lower matrix) and empirical Kendall's tau (upper matrix) for the copula data of "News" YouTube videos. The empirical Kendall's tau is estimated from data using Table II, while the scatter plots provide qualitative information regarding the pair-wise dependence. For instance, plots of "titlen" and "AvgPer" with other metrics are scattered everywhere, this implies weak dependence of these two metrics on the other metrics. On the other hand, scatter plots of "Views", "Likes" and "Subs" show distinct patterns of co-movements with each other, this implies their strong dependence on each other, and might be in central position in the dependence structure. N and Bk N are the concordance and disconcordance where Ak number [20] of kth pair that has N data points. The concor- dance number and the disconcordance number count the data points that move in the same direction and opposite direction, respectively. In contrast to the empirical Kendall's tau, the theoretical Kendall's tau, which is computed using bivariate copulas[21]: (cid:90) u=1 (cid:90) v=1 τth(X, Y ) = 4 u=0 v=0 C(u, v)dC(u, v) − 1. (4) Here, C is the bivariate copula to be selected in the vine the copula data of X and Y , model, u and v represent respectively. The empirical Kendall's tau and scatter plot for the copula data of "News" videos are shown in Fig.1. In order to compute empirical Kendall's tau, 6000 "News" videos are randomly selected from 85657 videos over 3217 YouTube "News" channels, its theoretical Kendall's tau values shown in Table V(A) are computed from the vine copula model. The empirical Kendall's tau, which is computed from data, is required in the R-vine structure selection step for the pair copula construction of vine copula (reviewed in the Appendix); while theoretical Kendall's tau is computed as the measure of dependence given by the vine copula model. D. Summary of Main Conclusions Based on the vine copula analysis of the YouTube dataset, important facts regarding dependence we conclude several structures of YouTube videos. (Sec.III-E describes these de- pendencies in more detail.) 1) Conditional dependence of the seven meta-level metrics of YouTube videos is insignificant, compared with a much stronger unconditional dependence. 2) Amongst the seven meta-level metrics of YouTube, "num- ber of views" and "number of likes" are in the central position of the dependence structure. The other five metrics are much more dependent on these two metrics than on each other. 3) The "News" category has a different dependence structure from the other four categories. Furthermore, the met- rics of "News" videos have stronger inter-dependence when their values are large (i.e. positive extreme co- movements), the other categories don't possess this prop- erty. 4) For "Gaming" video category, "annotation clicks rate" is least dependent on number of views among all the five categories. 5) For "Comedy" video category, users are more likely to subscribe to the channel for a popular video than other categories. 6) Users watching "Comedy" videos are more likely to give 7) For a video with certain popularity, users are more likely to finish a video in "Fashion" category than in other categories. 8) "Length of video title" is independent of the other met- comments. rics. E. Results and Discussion We are now ready to discuss the main conclusions on our dependency analysis of YouTube video meta-level metrics. Once the empirical marginal distributions of YouTube video metrics are obtained using vine copula described in Sec.III-B, the three steps outlined in the Appendix were applied to model the multivariate distributions for YouTube video metrics. Table V summarizes the estimated parameters: Kendall's tau τ, copula parameters and lower/upper tail dependence λL/λU (defined in (19) in the Appendix), for the vine copula model of all five video categories. General dependence analysis for the five categories and category-specific conclusions are shown as follows. 1) General Dependence Analysis for All Five Categories: Fig.2 and Fig.3 are the main graphical dependency results of our analysis. They illustrate the dependence structure for all five video categories, with pair-wise theoretical Kendall's tau values and bivariate copula names. First, as described in the Appendix, a vine structure uses multiple dependence trees to describe the dependence struc- ture, which consists of two types of trees: • Unconditional dependence tree: the first tree of the vine • Conditional dependence trees: all the trees of a vine excluding the unconditional dependence tree in Fig.2 and Fig.3, we only use the first trees However, (i.e. unconditional dependence trees) to represent the de- pendence structure for YouTube video metrics. Uncondi- tional/conditional dependence trees describe the dependence of two or more random variables when another random variable is present, and are induced through the decomposition of vine structure. For instance, in (15), given three random variables X1, X2 and X3, copula density c12 is the joint density of (X1, X2), and c132 is the conditional density of X1, X3 given X2. So c12 describes the unconditional dependence of X1, X2, while c132 describes the conditional dependence of X1, X3 given X2. Table V shows that the unconditional dependencies for the seven metrics (Kendall's tau values of 0.3-0.6) are much stronger than the conditional dependencies (Kendall's tau values of 0.01-0.2). Therefore, the conditional dependence is insignificant for YouTube video metrics, and can be ignored. Second, in Fig.2, it can be observed that for "Comedy", "Sports", "Fashion", "Gaming" video categories, "number of views" and "number of likes" are in the central position of the dependence structure of the seven YouTube video metrics. More specifically, "number of comments", "number of sub- scribers" and "annotation clicks" have a strong unconditional dependence on these two video metrics, with high Kendall' tau values between 0.3 and 0.65. The exceptions are "title length" and "average percentage of watching": "title length" shows little dependence on other metrics with Kendall's tau values that are no more than 0.1, while "Average Percentage of Watching" shows a moderate dependence on other metrics with Kendall's tau values between 0.14 and 0.25. Third, given the central roles of "number of views" and "number of likes" in the dependence structure, we should assign dominant weights to them if we want to assess a video using these seven video metrics. Note that "number of views" and "number of likes" are important indicators for the popularity of a video. Since "title length" is statistically independent of "number of views" and "number of likes" (considering its Kendall's tau values that are less than 0.1), one can conclude that changing video title length will not increase the popularity of video. As for "average percentage of watching", which is an important indicator for video quality, surprisingly it is not highly dependent on the YouTube video viewcount. 6 2) Category-specific Dependence Analysis: By comparing the dependence structures of different categories in Fig.2, we can see that "Gaming", "Sports", "Fashion" and "Comedy" videos possess similar dependence structure. That is, "number of views" and "number of likes" are in the central position of the dependence structure, while other metrics are in the border of the dependence structure. The exception is the "News" category. As shown in Fig.3, "number of subscribers" for the "News" category also plays the same central role as "number of likes" and "number of views", although the overall dependence of "News" category turns to be weaker (i.e. smaller Kendall's tau values) than the other categories. This can be explained by the fact that, all the other four categories possess a strong characteristic of entertainment, which "News" doesn't have much, thus a big difference of dependence structure should be expected. Furthermore, by comparing the theoretical Kendall's tau val- ues among different video categories, more category-specific conclusions can be made. The "Gaming" video category has the smallest Kendall's tau value (0.22) for the (Anno, Views) pair, while "Comedy" category has the largest τ for both the (Comm, Likes) pair and the (Subs,Views) pair. The largest τ value for the (AvgPer, Likes) pair belongs to the "Fashion" cat- egory. Therefore, YouTube viewers watching "Gaming" videos are more likely to accept the suggestions from the channel and watch more related videos; while "Comedy" channels should be a better place for video makers raising more subscribers and create active online community; if business looks for channels to put advertisements on, "Fashion" channels should have a better chance to make viewers look at their break-in advertisements. Finally, from Table V, it can be observed that for uncon- ditional dependence structures of video categories including "Comedy", "Sports", "Fashion", "Gaming", there are few values for lower and upper tail dependence. This implies that for these categories, YouTube video metrics don't have many co-movements (i.e. small dependence) when their values are very large or very small. The exception is again the "News" category: with large values of upper tail dependence for four pairs of metrics shown in Table V(A), the "News" video metrics are expected to have stronger inter-dependence when the values of these metrics are large. IV. VALIDATION OF VINE COPULA MODEL USING THE WHITE TEST How good is the vine copula model of Sec.III in terms of de- termining the dependency structures in YouTube? Goodness- of-fit tests including the misspecification test, the information matrix ratio test, and the Rosenbatt's transform test, have been introduced for the vine copulas over the last decade [22]. Considering that we used regular vine (R-vine) to model the dependence structure, below we use one type of misspecifica- tion test (we call it "White test") for the goodness-of-fit test of R-vine. Proposed by White and enhanced by Schepsmeier, this test is shown to have excellent performance and power behavior [23]. The theorem of White states that, under the correct model, the negative Hessian matrix and outer product of gradient for 7 Fig. 2: The first dependence (unconditional dependence) trees of the vine copula for the "Comedy", "Sports", "Fashion", "Gaming" YouTube video data, along with their theoretical Kendall's tau values and pair-wise copula families. Second and further dependence trees are not provided, since we have shown in Table V that conditional dependence is not significant in vine structure of YouTube videos. It can be observed that "number of views" and "number of likes" are in the central position of the dependence structure. TABLE IV: p-values of uniform K-S test for YouTube data 8 Category Views Likes Comm TitLen 0.91 0.71 0.99 0.88 0.89 News Sports Fashion Gaming Comedy 0.72 0.92 0.76 0.87 0.98 0.97 0.82 0.99 0.96 0.98 0.79 0.93 0.83 0.76 0.93 Subs Anno AvgPer 0.98 0.96 0.87 0.99 0.92 0.91 0.87 0.85 0.90 0.78 0.86 0.86 0.88 0.70 0.98 TABLE V: Estimated Parameters for the Vine Copula Model: bivariate copula types discussed in the Appendix, theoretical Kendall's tau τ, bivariate copula parameters, lower/upper tail dependence λL/λU (defined in (19) in the Appendix) Tree 1 1 1 1 1 1 2 2 2 2 2 Dependence Pair (Views, Comm) (Likes, Comm) (Views, Likes) (Subs, Anno) (Views, Subs) (Views, Avgper) (Titlen, LikesViews) (Comm, ViewsLikes) (Likes, Subsviews) (Anno, Viewssubs) (Subs, Avgperviews) Tree Copula S-Joe Joe Joe Joe Joe S-BB8 BB8-270 S-BB7 Joe Tawn-180 BB8-90 τ 0.098 0.35 0.35 0.18 0.33 0.16 -0.081 0.11 0.17 0.017 -0.121 Dependence Pair (AvgPer, Views) (Titlen, Likes) (Comm, Likes) (Views, Views) (Subs, Views) (Likes, Anno) (AvgPer, CommViews) (Titlen, ViewsLikes) (Comm, LikesViews) (Views, SubsViews) (Subs, AnnoViews) 1 1 1 1 1 1 2 2 2 2 2 Tree 1 1 1 1 1 1 2 2 2 2 2 (A): News Parameters [1.20, null] [1.98, null] [1.95, null] [1.42, null] [1.85, null] [1.77, 0.80] [-1.27, -0.91] [1.10, 0.16] [1.35, null] [1.28, 0.020] [-1.72, -0.72] (B): Comedy Copula Tawn Clayton BB8 BB8 BB8 BB8 Frank Frank Tawn Clayton BB8 (C): Sports λL 0.22 0 0 0 0 0 0 0.12 0 0.015 0 λU 0 0.58 0.57 0.37 0.55 0 0.55 0.013 0.33 0 0 τ 0.14 0.12 0.63 0.63 0.62 0.30 -0.17 -0.041 0.12 0.13 0.0075 Parameters [1.78, 0.20] [0.26, null] [4.40, 0.98] [5.16, 0.91] [4.53, 0.96] [1.95, 0.96] [-1.58, null] [-0.37, null] [1.30, 0.33] [0.3, null] [1.3, 0.84] λL 0.17 0.07 0 0 0 0 0 0 0 0 0 λL 0 0 0 0 0 0.06 0 0 0 0 λU 0 0 0 0 0 0 0 0 0.15 0.10 0 λU 0 0 0 0 0 0 0 0.53 0.25 0 0.0073 0.0073 Dependence Pair (AvgPer, Likes) (Comm, Likes) (Likes, Views) (Subs, Views) (Views, Anno) (Titlen, Anno) Copula Frank BB8 BB8 BB8 BB8 Tawn-180 (AvgPer, CommLikes) Gaussian (Comm, ViewsLikes) Tawn (Likes, SubsViews) Tawn (Subs, AnnoViews) BB8 (Views, TitlenAnno) Student t τ 0.19 0.58 0.55 0.53 0.31 0.045 -0.052 0.035 0.17 0.12 0.0036 Parameters [1.80, null] [3.94, 0.96] [4.19, 0.90] [3.47, 0.95] [2.65, 0.79] [1.29, 0.099] [-0.082, null] [1.11, 0.22] [1.38, 0.54] [1.46, 0.88] [0.0051, 9.92] 9 Fig. 3: The first dependence (unconditional dependence) trees of the vine copula for the "news" category, with its theoretical Kendall's tau values and pair-wise copula families. It can be observed that different from the other four categories, in the dependence structure of the "News" category, "number of subscribers" is as important as "number of views" and "number of likes". Although the overall inter-dependence of video metrics in "News" are weaker than in the other four categories. (D): Fashion Tree 1 1 1 1 1 1 2 2 2 2 2 Tree 1 1 1 1 1 1 2 2 2 2 2 Dependence Pair (Likes, Comm) (Views, Titlen) (Likes, AvgPer) (Views, Likes) (Views, Subs) (Views, Anno) (Comm, ViewsLikes) (Titlen, LikesViews) (AvgPer, ViewsLikes) (Likes, SubsViews) (Subs, AnnoViews) Dependence Pair (AvgPer, Likes) (Comm, Likes) (Likes, Views) (Subs, Views) (Views, Anno) (Titlen, Anno) (AvgPer, ViewsLikes) (Comm, ViewsLikes) (Likes, SubsViews) (Subs, AnnoViews) (Views, TitlenAnno) Copula BB8 Survival BB7 Survival BB8 BB8 BB8 BB8 Tawn BB8 Tawn-90 BB8 Tawn (E): Gaming τ 0.50 0.11 0.25 0.53 0.55 0.32 0.10 -0.053 -0.029 0.27 0.068 Parameters [3.25, 0.95] [1.13, 0.12] [2.06, 0.85] [3.25, 0.97] [3.46, 0.95] [2.68, 0.81] [1.25, 0.30] [-1.22, -0.81] [-1.17, 0.093] [3.12, 0.67] [1.17, 0.33] Copula BB8 Joe BB8 Joe BB8 Gaussian Student t Student t Gumbel Frank Tawn-180 τ 0.16 0.50 0.51 0.44 0.22 0.037 -0.034 0.13 0.17 0.046 0.014 Parameters [2.22, 0.65] [2.82, null] [2.96, 0.99] [2.42, null] [1.59, 0.97] [0.06, null] [-0.054, 7.19] [0.21, 16.5] [1.21, null] [0.41, null] [1.11, 0.045] λL 0 0 0 0 0 0 0.016 0.003 0 0 0.016 λL 0 0.15 λU 0 0.003 0 0 0 0 0 0 0 0 0 0 0 0 0 0.13 0 0 0 0.1 λU 0 0.72 0 0.67 0 0 0.016 0.003 0.23 0 0 10 Fig. 4: The scatter plots for original and simulated "Sports" YouTube copula data. It can be observed that, the original YouTube copula data and the copula data simulated from vine copula model share a dependence pattern. This qualitatively shows that the vine copula model captures the dependence patterns accurately, such conclusion is validated by the high p-values of White test in Table VII. TABLE VII: p-values of White test for YouTube copula data Fashion Gaming Comedy Categories News p-values 0.674 0.591 0.666 Sports 0.685 0.714 the likelihood function are equal [23]. Therefore, the White test is the following hypothesis test: H0 : H(θ0) + C(θ0) = 0 H1 : H(θ0) + C(θ0) (cid:54)= 0. where H(θ) is the Hessian matrix: H(θ) = ∂2 ∂2θ L(θU ). and C(θ) is the outer product of the gradient: C(θ) = ∂ ∂θ L(θU )( ∂ ∂θ L(θU ))T . (5) (6) L(θU ) is the likelihood function defined in (18), and U is the simulated copula data following our vine copula model. The p-values of the White test can be computed based on (4) and (5), the reader can refer to [23] for more details. Table VII lists the p-values of the White test for the vine copula model, given the YouTube dataset. Based on the high p-values of White test for all five YouTube video categories considered, the null hypothesis can not be rejected. Thus the vine copula model obtained from Sec.III-E is a reasonable model for the multivariate probability distribution of YouTube video metrics. Fig.4 compares the pairwise scatter plots of YouTube copula data, along with the simulated data sampled from our vine copula model. A common dependence structure pattern can be observed in both plots, which show that the vine copula model captures the dependence structures of YouTube data accurately. channel on day t is denoted by I(t). Define, vj(t) = vj i (t), 11 (7) I(t)(cid:88) i=1 nv(cid:88) i=k as the total view count of channel j at time t. The Granger causality test involves testing if the coefficients bi are non- zero in the following equation which models the relationship between subscribers and view counts: sj(t) = aj ksj(t − k) + bj k vj(t − k) + εj(t), (8) ns(cid:88) k=1 i}{i=1,...,ns} and {bj where εj(t) represents normal white noise for channel j at time t. The parameters {aj i}{i=1,...,nv} in (8) for channel are the coefficients of the AR model j, with ns and nv denoting the lags for the subscriber and view counts time series respectively. If the time-series Dj = {sj(t), vj(t)}t∈{1,...,T} of a channel j fits the model (8), then we can test for a causal relationship between subscribers and view count. In equation (8), it is assumed that ai < 1, bi < 1 for stationarity. The causal relationship can be formulated as a hypothesis testing problem as follows: H0 : b1 = ··· = bnv = 0 vs. H1 : Atleast one bi (cid:54)= 0. (9) The rejection of the null hypothesis, H0, implies that there is a causal relationship between subscriber and view counts. Two hypothesis testing procedures are applied to test for Granger causality. First, we use Box-Ljung test is to evaluate the quality of the model (8) for the given dataset Dj. If satisfied, then the Granger causality hypothesis (9) is evaluated using the Wald test. If both hypothesis tests pass then we can conclude that the time series Dj satisfies Granger causality– that is, the previous day subscriber and view count have a causal relationship with the current subscriber count. An important issue prior to performing the Granger causal- ity test is to determine the percentage of videos in the YouTube dataset satisfy the AR model in (8). To perform this analysis we apply the Box-Ljung test with a confidence of 0.95 (p- value = 0.05). First, we need to choose ns and nv, namely, the number of lags for the subscribers and view count time series. For ns = nv = 1, we found that only 20% of the channels satisfy the model (8). When ns and nv are increased to 2, the number of channels satisfying the model increases to 63%. For ns = nv = 3, we found that 91% of the channels satisfy the model (8), with a confidence of 0.95 (p-value = 0.05). Hence, we chose ns = nv = 3. It is interesting to note that the mean value of coefficients bi decrease as i increases indicating that older view counts have less influence on the subscriber count. Similar results also hold for the coefficients ai. Hence, as expected, the previous day subscriber count and the previous day view count most influence the current subscriber count. Given the above causal relation between subscriber count and view count, a natural question is: Is there a causal relationship between the subscriber dynamics and the view count dynamics? This is modeled using the hypothesis in (9). We use the Wald test with a confidence of 0.95 (p-value = 0.05) and found that approximately 55% of the channels satisfy the hypothesis. For approximately 55% of the channels Fig. 5: Viewcount and subscribers for the popular movie trailer channel: VISOTrailers. The Granger causality test for view counts "Granger causes" subscriber count is true with a p- value of 5 × 10−8. V. YOUTUBE DYNAMICS: CAUSALITY AND SCHEDULING. Thus far we have unravelled dependency structures in YouTube metrics using vine copulas. Recall that Fig.2 shows the dependence between view count and number of sub- scribers. In this section we dig further into the dynamics of YouTube in two ways: First we use Granger causality (see also [36] for a more detailed study) to detect the causal relationship between subscriber and viewer counts and how it can be used to estimate the next day subscriber count of a channel. The results are important for determining the popularity of a YouTube channel. Second, we study the scheduling dynamics of of YouTube channels. We find the interesting property that for popular gaming YouTube channels with a dominant upload schedule, deviating from the schedule increases the views and the comment counts of the channel. A. Causality Between Subscribers and View Count in YouTube Fig. 5 displays the subscriber and view count dynamics of a popular movie trailer channel in YouTube. It is clear from Fig. 5 that the subscribers "spike" with a corresponding "spike" in the view count. The main idea behind Granger causality is that if the value(s) of a lagged time-series can be used to predict an- other time-series, then the lagged time-series "Granger cause" the predicted time-series. To formalize the Granger causality model, let sj(t) denote the number of subscribers to a channel j on day t, and vj i (t) the corresponding view count for a video i on channel j on day t. The total number of videos in a IEEETRANSACTIONSONKNOWLEDGEANDDATAENGINEERING81,bi<1forstationarity.Thecausalrelationshipcanbeformulatedasahypothesistestingproblemasfollows:H0:b1=···=bnv=0vs.H1:Atleastonebi6=0.(7)Therejectionofthenullhypothesis,H0,impliesthatthereisacausalrelationshipbetweensubscriberandviewcounts.First,weuseBox-Ljungtest[33]istoevaluatethequalityofthemodel(6)forthegivendatasetDj.Ifsatisfied,thentheGrangercausalityhypothesis(7)isevaluatedusingtheWaldtest[34].IfbothhypothesistestspassthenwecanconcludethatthetimeseriesDjsatisfiesGrangercausality–thatis,thepreviousdaysubscriberandviewcounthaveacausalrelationshipwiththecurrentsubscribercount.AkeyquestionpriortoperformingtheGrangercausalitytestiswhatpercentageofvideosintheYouTubedataset(Appendix)satisfytheARmodelin(6).ToperformthisanalysisweapplytheBox-Ljungtestwithaconfidenceof0.95(p-value=0.05).First,weneedtoselectnsandnv,thenumberoflagsforthesubscribersandviewcounttimeseries.Forns=nv=1,wefoundthatonly20%ofthechan-nelssatisfythemodel(6).Whennsandnvareincreasedto2,thenumberofchannelssatisfyingthemodelincreasesto63%.Forns=nv=3,wefoundthat91%ofthechannelssatisfythemodel(6),withaconfidenceof0.95(p-value=0.05).Hence,inthebelowanalysisweselectns=nv=3.Itisinterstingtonotethatthemeanvalueofcoefficientsbidecreaseasiincreasesindicatingthatolderviewcountshavelessinfluenceonthesubscribercount.Similarresultsalsoholdforthecoefficientsai.Hence,asexpected,thepreviousdaysubscribercountandthepreviousdayviewcountmostinfluencethecurrentsubscribercount.Thenextkeyquestionisdoestheirexistacausalre-lationshipbetweenthesubscriberdynamicsandtheviewcountdynamics.Thisismodeledusingthehypothesisin(7).Totest(7)weusetheWaldtestwithaconfidenceof0.95(p-value=0.05)andfoundthatapproximately55%ofthechannelssatisfythehypothesis.Forapproximately55%ofthechannelsthatsatisfytheARmodel(6),theviewcount"Grangercauses"thecurrentsubscribercount.Interestingly,ifdifferentchannelcategoriesareaccountedforthenthepercentageofchannelsthatsatisfyGrangercausalityvarywidelyasillustratedinTable4.Forexample,80%oftheEntertainmentchannelssatisfyGrangercausalitywhileonly40%oftheFoodchannelssatisfyGrangercausality.Theseresultsillustratetheimportanceofchannelownerstonotonlymaximizetheirsubscribercount,buttoalsouploadnewvideosorincreasetheviewsofoldvideostoincreasetheirchannelspopularity(i.e.viaincreasingtheirsubscribercount).Additionally,fromouranalysisinSec.2whichil-lustratesthattheviewcountofapostedvideoissensitivetothenumberofsubscribersofthechannel,increasingthenumberofsubscriberswillalsoincreasetheviewcountofvideosthatareuploadedbythechannelowners.3.2SchedulingdynamicsinYouTubeInthissection,weinvestigatetheschedulingdynamicsofYouTubechannels.WefindtheinterestingpropertythatforpopulargamingYouTubechannelswithadominantuploadschedule,deviatingfromthescheduleincreasestheviewsandthecommentcountsofthechannel.CategoryaFractionGaming0.60Entertainment0.80Food0.40Sports0.67aYouTubeassignsacategorytovideos,ratherthanchannels.Thecategoryofthechannelwasobtainedasthemajorityofthecategoryofallthevideosuploadedbythechannel.TABLE4:Fractionofchannelssatisfyingthehypothesis:Viewcount"Grangercauses"subscribercount,splitaccordingtocategory.01,0002,0003,00000.511.52·106Time[Days]Viewcount01,0002,0003,00002,0004,0006,0008,000Time[Days]SubscribersFig.4:Viewcountandsubscribersforthepopularmovietrailerchannel:VISOTrailers.TheGrangercausalitytestforviewcounts"Grangercauses"subscribercountistruewithap-valueof5⇥108.CreatorAcademy10intheirbestpracticesectionrec-ommendstouploadvideosonaregularscheduletogetrepeatviews.ThereasonforaregularuploadscheduleistoincreasetheuserengagementandtorankhigherintheYouTuberecommendationlist.However,weshowinthissectionthatgoing"offtheschedule"canbebeneficialforagamingYouTubechannel,witharegularuploadschedule,intermsofthenumberofviewsandthenumberofcom-ments.Fromthedataset,we'filteredout'videochannelswithadominantuploadschedule,asfollows:Thedominantuploadschedulewasidentifiedbytakingtheperiodogramoftheuploadtimesofthechannelandthencomparingthehighestvaluetothenexthighestvalue.Iftheratiodefinedaboveisgreaterthan2,wesaythatthechannelhasadominant10YouTubewebsiteforhelpingwithchannels that satisfy the AR model (8), the view count "Granger causes" the current subscriber count. An interesting property is that the percentage of channels that satisfy Granger causality vary widely depending on the channel category. For example, 67% of Sports channels and 60% of the Gaming channels satisfy Granger causality, while 80% of Sports channels satisfy Granger causality. These results illustrate the importance of channel owners to not only maximize their subscriber count, but to also upload new videos or increase the views of old videos to increase their channels popularity (via increasing their subscriber count). B. Scheduling Dynamics From the dataset, we selected video channels with a domi- nant upload schedule, as follows: The dominant upload sched- ule was identified by evaluating the periodogram of the upload times of the channel and comparing the highest value to the next highest value. If the ratio defined above is greater than 2, we say that the channel has a dominant upload schedule. From the dataset containing 25 thousand channels, only 6500 channels contain a dominant upload schedule. Some channels, particularly those that contain high amounts of copied videos such as trailers, movie/TV snippets upload videos on a daily basis. These have been removed from the analysis so as to concentrate on those channels that contain only user generated content. We found that channels with gaming content account for 75% of the 6500 channels with a dominant upload schedule and the main tags associated with the videos were: "game", "gameplay" and "videogame". We computed the average views when the channel goes off the schedule and found that on an average when the channel goes off schedule the channel gains views 97% of the time and the channel gains comments 68% of the time. Thus channels with "gameplay" content with periodic upload schedule benefit from going off the schedule. This suggests that by deliberately going off schedule, gameplay channels can increase their view count. VI. CONCLUSIONS YouTube video metrics across thousands of channels form a big-data time series. In this paper, we conducted a data- driven dependence analysis for seven meta-level metrics of YouTube videos among five different categories, based on a YouTube dataset of over 6 million videos across 25 thousand channels. To unravel the dependency structures of these meta- level metrics, we constructed a vine copula model on the YouTube dataset: the marginal distribution for each video metric is estimated empirically; the Kendall's tau is introduced as the measure of dependence in vine copula model; the vine structure is selected based on absolute empirical Kendall's tau, bivariate copulas are chosen by using AIC approach, then cop- ula parameters are estimated using the method of maximum- likelihood. Parameters including theoretical Kendall's tau and tail dependence coefficients are computed for the dependence analysis of YouTube video metrics. The analysis in this paper reveals three main conclusions regarding the YouTube users' watching behaviours in different 12 video categories: conditional dependence is insignificant in YouTube video metrics, number of views and number of likes are in the central position of dependence structure, and "News" category possess a stronger tail dependence than the other YouTube video categories. Finally, we also studied the dynamics of YouTube in two ways. First, using Granger causality, we unravelled the causal dependence between subscribers and view count. Second, by studying the upload dynamics, we found that periodic content providers can increase their view count by going off schedule. REFERENCES [1] Z. D. Stephens, S. Y. Lee, F. Faghri, R. H. Campbell, C. Zhai, M. J. Efron, R. Iyer, M. C. Schatz, S. Sinha, and G. E. Robinson, "Big data: astronomical or genomical?" PLoS Biol, vol. 13, no. 7, pp. e1002195, 2015. [2] D. G. Popescu, P. Crama, "Ad revenue optimization in live broadcasting" Management Science, vol. 62, no. 4, pp. 1145–1164, 2015. [3] W. Hoiles, O. N. Gharehshiran, V. Krishnamurthy, N.-D. Dao, and H. Zhang, "Adaptive Caching in the YouTube content distribution network: A revealed preference game-theoretic learning approach," IEEE Transactions on Cognitive Communications and Networking, vol. 1, no. 1, pp. 71–85, 2015. [4] R. Zhou, S. Khemmarat, and L. Gao, "The impact of YouTube recom- mendation system on video views," in Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. ACM, 2010, pp. 404–410. [5] J. Davidson, B. Liebald, J. Liu, P. Nandy, T. Van Vleet, U. Gargi, S. Gupta, Y. He, M. Lambert, B. Livingston et al., "The Youtube video recommendation system," in Proceedings of the Fourth ACM Conference on Recommender Systems. ACM, 2010, pp. 293–296. [6] J. R. Zhang, Y. Song, and T. Leung, "Improving video classification via YouTube video co-watch data," in Proceedings of the 2011 ACM Workshop on Social and Behavioural Networked Media Access. ACM, 2011, pp. 21–26. [7] V. Krishnamurthy, A. Aprem and S. Bhatt, "Opportunistic advertisement scheduling in live social media: A multiple stopping time POMDP approach", arXiv :1611.00291, 2016. [8] F. Durante and C. Sempi, "Copula theory: an introduction," in Copula theory and its applications. Springer, 2010, pp. 3–31. [9] P. K. Trivedi and D. M. Zimmer, Copula modeling: an introduction for practitioners. Now Publishers Inc, 2007. [10] H. Joe, "Dependence modeling with copulas", CRC Press, 2014. [11] M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon, "I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system," in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 2007, pp. 1–14. [12] X. Cheng, C. Dale, and J. Liu, "Statistics and social network of YouTube videos," in IWQoS 2008. 16th International Workshop on Quality of Service. IEEE, 2008, pp. 229–238. [13] X. Cheng, J. Liu, and H. Wang, "Accelerating YouTube with video correlation," in Proceedings of the First SIGMM Workshop on Social Media. ACM, 2009, pp. 49–56. [14] T. Hossfeld, R. Schatz, E. Biersack, and L. Plissonneau, "Internet video delivery in YouTube: From traffic measurements to quality of experience," in Data Traffic Monitoring and Analysis. Springer, 2013, pp. 264–301. [15] D. K. Krishnappa, M. Zink, C. Griwodz, and P. Halvorsen, "Cache- centric video recommendation: an approach to improve the efficiency of YouTube caches," ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 11, no. 4, p. 48, 2015. [16] F. J. Massey Jr, "The kolmogorov-smirnov test for goodness of fit," Journal of the American Statistical Association, vol. 46, no. 253, pp. 68–78, 1951. [17] H. W. Lilliefors, "On the kolmogorov-smirnov test for normality with the American Statistical mean and variance unknown," Journal of Association, vol. 62, no. 318, pp. 399–402, 1967. [18] M. G. Kendall, "Rank correlation methods." 1948. [19] G. G. Venter, "Tails of copulas," in Proceedings of the Casualty Actuarial Society, vol. 89, no. 171, 2002, pp. 68–113. [20] C. Genest and A.-C. Favre, "Everything you always wanted to know about copula modeling but were afraid to ask," Journal of Hydrologic Engineering, vol. 12, no. 4, pp. 347–368, 2007. [21] B. Schweizer and E. F. Wolff, "On nonparametric measures of depen- dence for random variables," The Annals of Statistics, pp. 879–885, 1981. [22] C. Genest, B. Remillard, and D. Beaudoin, "Goodness-of-fit tests for copulas: A review and a power study," Insurance: Mathematics and Economics, vol. 44, no. 2, pp. 199–213, 2009. [23] U. Schepsmeier, "A goodness-of-fit test for regular vine copula models," arXiv preprint arXiv:1306.0818, 2013. [24] R. B. Nelsen, An introduction to copulas. Springer Science & Business Media, 2013, vol. 139. [25] E. Bouy´e, V. Durrleman, A. Nikeghbali, G. Riboulet, and T. Roncalli, "Copulas for finance-a reading guide and some applications," Available at SSRN 1032533, 2000. [26] A. Subramanian, A. Sundaresan, and P. K. Varshney, "Fusion for the detection of dependent signals using multivariate copulas," in 2011 Proceedings of the 14th International Conference on Information Fusion (FUSION). IEEE, 2011, pp. 1–8. [27] L. Zhang and V. Singh, "Bivariate flood frequency analysis using the copula method," Journal of Hydrologic Engineering, vol. 11, no. 2, pp. 150–164, 2006. [28] K. Aas, C. Czado, A. Frigessi, and H. Bakken, "Pair-copula construc- tions of multiple dependence," Insurance: Mathematics and Economics, vol. 44, no. 2, pp. 182–198, 2009. [29] O. Morales Napoles, R. M. Cooke, and D. Kurowicka, "About the number of vines and regular vines on n nodes," 2010. [30] T. Bedford and R. M. Cooke, "Probability density decomposition for conditionally dependent random variables modeled by vines," Annals of Mathematics and Artificial Intelligence, vol. 32, no. 1-4, pp. 245–268, 2001. [31] J. Dissmann, E. C. Brechmann, C. Czado, and D. Kurowicka, "Selecting and estimating regular vine copulae and application to financial returns," Computational Statistics & Data Analysis, vol. 59, pp. 52–69, 2013. [32] O. Morales-N´apoles, "Counting vines," Dependence Modeling: Vine Copula Handbook, pp. 189–218, 2011. [33] H. Bozdogan, "Model selection and akaike's information criterion (aic): The general theory and its analytical extensions," Psychometrika, vol. 52, no. 3, pp. 345–370, 1987. [34] C. Alexander, "Market risk analysis: Practical financial econometrics (vol. ii)," 2008. [35] P. Embrechts, F. Lindskog, and A. McNeil, "Modelling dependence with copulas," Rapport Technique, D´epartement de Math´ematiques, Institut F´ed´eral de Technologie de Zurich, Zurich, 2001. [36] W. Hoiles, A. Aprem and V. Krishnamurthy, "Engagement dynamics and sensitivity analysis of YouTube videos," IEEE Transactions on Knowledge and Data Engineering, 2017. APPENDIX Recalling the definitions of copula and Sklar theorem in Section II, this appendix gives a short outline of vine copulas and their construction (which was used to analyze the YouTube dataset). A. Bivariate Archimedean Copula One widely used copula type is the "Archimedean" copula: Definition. Bivariate Archimedean Copula is a [0, 1]2 → [0, 1] function C with the form: C(u, v) = φ −1(φ(u) + φ(v)). (10) where φ(t) is called the generator function, which is a continuous, strictly decreasing function such that φ(1) = 0; θ is the single parameter to be estimated. Bivariate archimedean copulas can be easily extended to arbitrarily high dimensions, but only bivariate ones are used for current copula applications, since it is just not a good idea that only one parameter is used to capture high dimensional dependence. 13 Archimedean copula includes several bivariate copulas such as Joe, Frank and Clayton copulas used in this work. Although there are over forty different types of bivariate copulas that are widely used. it is a harder problem to develop higher dimensional copulas. The pair-copula construction based on vine structure is a popular method of constructing a high dimensional copula [28]. B. Pair Copula Construction For convenience, we illustrate the construction process for three random variables scenario, based on which a general n-variable case can be easily obtained. The density of a 3- dimensional copula function C is defined as: c123(u1, u2, u3) = ∂C123(u1, u2, u3) ∂u1∂u2∂u3 . (11) Then by (1), if we let u1 = F1(x1), u2 = F2(x2), u3 = F3(x3), the density of joint distribution F (x1, x2, x3) can be represented as: f (x1, x2, x3) =f1(x1) · f2(x2) · f3(x3) · c123(F1(x1), F2(x2), F3(x3)). (12) One possible decomposition from the chain rule of probability density gives: f (x1, x2, x3) = f1(x1)f21(x2x1)f312(x3x1, x2). (13) Note that similar to (12), the conditional probability densities can be represented as: f21(x2x1) = c12(F1(x1), F2(x2))f2(x2) f32(x3x2) = c23(F2(x2), F3(x3))f3(x3) f312(x3x1, x2) = c132(F12(x1x2), F32(x3x2)) (14) · f32(x3x2). By combining (13) and (14), the multivariate probability density can be represented as multiplications of bivariate copula densities and marginal probability densities (recall the deifnitons of c12 and c132 in Sec. III-E1): f (x1, x2, x3) = f1(x1)f2(x2)f3(x3) (15) · c12(F1(x1), F2(x2)) · c23(F2(x2), F3(x3)) · c132(F12(x1x2), F32(x3x2)). In order to obtain a systematic way to represent these decompositions, Bedford and Cooke [30] proposed the so- called "Regular Vine" (or simply "R-Vine") graphical struc- ture, hence the name "vine-copula". "Vine" refers to a nested set of tree structures, where the edges of the ith tree are the nodes of the i + 1th tree. The formal definition of a regular vine structure is provided below. Definition. A graphical structure V is a regular vine of m elements if: 1) V = (T1, ..., Tm−1) and all trees are connected 2) The first tree T1 has node set N1 = 1, ..., m and edge set E1; then for the next trees Ti, i ∈ 2, ...m − 1, Ti has the node set Ni = Ei−1 14 to determine if it is suitable to model dependence of two distributions. According to Genest [22], under the null hypothesis of inde- pendence, Kendall's tau is approximately normally distributed with mean of zero. With empirical Kendall's tau value τ, we can choose independence copula using N observations if: (cid:115) 9N (N − 1) 2(2N + 5) τ < 2. (16) If the above independence test fails, then the Akaike Infor- mation Criterion (AIC) [33] is applied to choose the desired copula families. By computing the AIC for all possible fami- lies, the copula with smallest AIC will be selected: AIC = 2k − 2 ln(M ). (17) where k is the number of estimated parameters of a copula (ei- ther 1 or 2 for bivariate copulas), and M is the maximum value among the likelihood functions for all copula candidates [34]. In this work, the bivariate copula families are chosen from 48 possible candidates. 3) Parameter Estimation: Finally, the corresponding pa- rameters for the bivariate copula families θ, which includes (cid:1) parameters for n metrics, can be estimated by using 2 maximum likelihood estimation given data points U = (x1, x2, ...xN ): (cid:0)n θ∗ = argmax L(θU ) = argmax n−1(cid:88) N(cid:88) (cid:88) i=1 j=1 e∈Ej (18) log Cθe(F (xe1), F (xe2)). where F (xe1) and F (xe2) are the two marginal distributions (nodes of a dependence tree and can be estimated from U) connected by copula (edge of a dependence tree) e, while θe is the copula parameter for edge e. The associated likelihood function is the sum of log-likelihood of all bivariate copulas (i.e all edges Ej of tree j), for all n − 1 trees of a vine over all N observations. In addition to the regular dependency measure Kendall's tau, the tail dependence measure can also be computed. The upper and lower tail dependence coefficients λU and λL are both defined using copula [35]: limu→1 1 − 2u + C(u, u) = λU , (19) 1 − u C(u, u) u limu→0 = λL. λU and λL denote the probabilities that describe the si- multaneous co-movements in the upper and lower tails of a bivariate distribution. Fig. 6: The vine structure for a three-variable case. The vine corresponds to (15): the first tree represents the unconditional pairs c12, c23, while the second tree represents the conditional pair c132. 3) Proximity condition: If two nodes are connected by an edge in the i + 1th tree, then the two edges in ith tree corresponding to these two nodes share a node. In copula applications, the trees are used to represent the dependence structure of multiple variables: each edge repre- sents the bivariate copula connecting one pair of marginals. For instance, the regular vine structure for three variables is shown in Fig.6. Once the uniformly distributed marginals are obtained, we can construct the vine copula model for a multivariate distribution. Dissmann et al. [31] summarizes an inference procedure for pair-copula construction of vine copula. The following steps are required to construct a regular vine copula (R-vine) specification to a given dataset: 1) Construct the R-Vine structure by choosing an appropri- ate unconditional and conditional pair of metrics to use for vine copula model. 2) Choose a bivariate copula family for each pair selected 3) Estimate the corresponding parameters for each bivariate in step (1). copula. 1) R-Vine Structure Selection : Dissman et al. [31] sug- gested a sequential tree-by-tree selection method, where the first tree of the regular vine is selected to be the one with strongest dependencies, then the following trees are selected based on the same criteria. Such a heuristic approach is not guaranteed to capture the global optimum point. However, since the first tree of R-vine (unconditional dependence tree) has the greatest influence on the model fit, the sequential method has a reasonable trade-off between efficiency and accuracy. A maximum spanning tree (MST) algorithm is proposed for R-vine structure selection, where the the spanning tree with the maximum sum of absolute empirical Kendall's tau is selected [31]. To illustrate the dependence structure, the first trees of Vine copulas for the all the five categories of YouTube videos are shown in Fig.2, along with their bivariate copula families and pairwise empirical Kendall's tau values. 2) Copula Families Selection: After the R-vine structure is selected, the next step is to choose a suitable bivariate copula function for each dependence pair (edge of dependence tree) to fit the data. Due to its quick computation, the independence copula (simple product of two distributions) is first tested
1510.01997
1
1510
2015-10-07T15:53:59
Endorsement Deduction and Ranking in Social Networks
[ "cs.SI" ]
Some social networks, such as LinkedIn and ResearchGate, allow user endorsements for specific skills. In this way, for each skill we get a directed graph where the nodes correspond to users' profiles and the arcs represent endorsement relations. From the number and quality of the endorsements received, an authority score can be assigned to each profile. In this paper we propose an authority score computation method that takes into account the relations existing among different skills. Our method is based on enriching the information contained in the digraph of endorsements corresponding to a specific skill, and then applying a ranking method admitting weighted digraphs, such as PageRank. We describe the method, and test it on a synthetic network of 1493 nodes, fitted with endorsements.
cs.SI
cs
Endorsement Deduction and Ranking in Social Networks∗ Hebert P´erez-Ros´es1,2 †, Francesc Seb´e1 Josep Maria Rib´o3 (cid:134) 1Dept. of Mathematics, Universitat de Lleida, Spain 2Conjoint Fellow, University of Newcastle, Australia 3Department of Computer Science and Industrial Engineering, Universitat de Lleida, Spain August 20, 2018 Abstract Some social networks, such as LinkedIn and ResearchGate, al- low user endorsements for specific skills. In this way, for each skill we get a directed graph where the nodes correspond to users' profiles and the arcs represent endorsement relations. From the number and qual- ity of the endorsements received, an authority score can be assigned to each profile. In this paper we propose an authority score computation method that takes into account the relations existing among different skills. Our method is based on enriching the information contained in the digraph of endorsements corresponding to a specific skill, and then applying a ranking method admitting weighted digraphs, such as PageRank. We describe the method, and test it on a synthetic network of 1493 nodes, fitted with endorsements. Keywords: Expertise retrieval, social networks, LinkedIn, Research- Gate, PageRank 1 Introduction Directed graphs (digraphs) are an appropiate tool for modelling social net- works with asymmetric binary relations. For instance, the blogosphere is ∗Mathematics Subject Classifications: 05C20, 05C22, 05C50, O5C85, O5C90, 62F07, 62F10, 62H20, 68M11, 91D30 †Corresponding author -- E-mail: [email protected] -- Office: +34 973 702 781 a social network composed of blogs/bloggers and the directed 'recommen- dation' or 'follower' relations among them. Other examples include 'trust' statements in recommendation systems (some user states that he/she trusts the recommendations given by some other user) and 'endorsements' in pro- fessional social networks. Additionally, weighted arcs appear in situations where such relations can accomodate some degree of confidence ('trust' or 'endorsement' statements could be partial). LinkedIn and ResearchGate are two prominent examples of profes- sional social networks implementing the endorsement feature. LinkedIn1 is a wide-scope professional network launched in 2003. More than a decade later it boasts a membership of over 364 million, and it has become an es- sential tool in professional networking. The LinkedIn endorsement feature, introduced about three years ago,2 allows a user to endorse other users for specific skills. On the other hand, ResearchGate3 is a smaller network catering to scientists and academics. It was launched in 2008, and it reached five million members in August, 2014. ResearchGate also introduced an endorsement feature recently.4 From the endorsements shown in an applicant's profile, a potential employer can assess the applicant's skills with a higher level of confidence than say, by just looking at his/her CV. The two endorsement systems described above are very similar: For each particular skill, the endorsements make up the arcs of a directed graph, whose vertices are the members' profiles. In principle, these endorsement digraphs could be used to compute an authority ranking of the members with respect to each particular skill. This authority ranking may provide a better assessment of a person's profile, and it could become the basis for several social network applications. For instance, this authority ranking could be the core element of an eventual tool for finding people who are proficient in a certain skill, very much like a web search engine. It could also find important applications in profile personalization. For example, if a certain user is an expert in some field, say 'Operations Research', the system can display ads, job openings, and conference announcements related to that field in the user's profile. Finally, we can envisage a world where people could vote on certain decisions via social networks. For example, a community of web developers could decide on the adoption of some particular web standard. In that scenario, we might think about a weighted voting scheme, where the weight of each vote is proportional to the person's expertise in that area. Now, people usually have more than one skill, with some of those skills being related. For example, the skill 'Java' is a particular case of the skill 1http://www.linkedin.com 2More precisely, on September 24, 2012 3http://www.researchgate.net 4On February 7, 2013 2 'Programming', which in turn is strongly related with the skill 'Algorithms'. It may well happen that a person is not endorsed for the skill 'Programming', but he/she is endorsed for the skills 'Java' and 'Algorithms'. From those endorsements it can be deduced with a fair degree of confidence that the person also possesses the skill 'Programming'. In other words, a person's ranking with respect to the skills 'Java' and 'Algorithms' affects his/her ranking with respect to the skill 'Programming'. If the members of a social network were consistent while endorsing their peers, this 'endorsement with deduction' would not add anything to simple (i.e. ordinary) endorsement. In this ideal world, if Anna endorses Ben for the skill 'Java', she would be careful to endorse him for the skill 'Programming' as well.5 In practice, however, 1. People are not systematic. That is, people do not usually go over all their contacts methodically to endorse, for each contact and alleged skill, all those contacts which, according to their opinion, deserve such endorsement. This may be the source of important omissions in mem- bers' profiles. 2. People are not consistent, for consistency, like method, would require a great effort. In an analysis of a small LinkedIn community con- sisting of 3250 members we have detected several inconsistencies. For example, there are several users who have been endorsed for some spe- cific programming language, or a combination of programming lan- guages, but have not been endorsed for the skill 'Programming'. De- ciding whether there is an inconsistency entails some degree of subjec- tivism, for inconsistencies ultimately depend on the semantics of the skill names. Nevertheless, we can safely assert that practically 100% of the profiles sampled by us contained some evident inconsistency or omission. The Appendix lists some of the more significant inconsisten- cies and omissions encountered, together with a more comprehensive discussion about LinkedIn's endorsement mechanism. 3. Skills lack standardization. In most of these social networks, a set of standard, allowed skills has not been defined. As a result, many re- lated skills (in many cases, almost synonyms) may come up in different profiles of the social network. Consider, for example, skills such as 're- cruiting', 'recrutiments', 'IT recruiting', 'internet recruiting', 'college recruiting', 'student recruiting', 'graduate recruiting' .... which are, all of them, common in LinkedIn profiles. It may well happen that an expert in 'recruiting' has not even assigned to him/herself that spe- 5Some people may argue that knowledge of a programming language does not auto- matically imply programming skills, but this semantic discussion is out of the scope of this paper. 3 cific skill, but a related one such as 'recruitments', which would hide him/her as an expert in the 'recruiting' skill. Endorsement with deduction may help address those problems, and thus provide a better assessment of a person's skills. More precisely, we propose an algorithm that enriches the digraph of endorsements associated to a par- ticular skill with new weighted arcs, taking into account the correlations between that 'target' skill and the other ones. Once this has been done, it is possible to apply different ranking algorithms to this enhanced digraph with the purpose of obtaining a ranking of the social network members concerning that specific skill. 1.1 Related work This research can be inscribed into the discipline of expertise retrieval, a sub- field of information retrieval [1]. There are two main problems in expertise retrieval: 1. Expert finding: Attempts to answer the question "Who are the experts on topic X? ". In our approach, this question is answered by taking all the network members who are within a certain percentile of the ranking for topic X. 2. Expert profiling: Addresses the question "Which skills does person Y possess? ". We could answer this question by computing the rankings with respect to all the skills claimed by person Y, and taking those skills for which Y has fallen within the pre-defined percentile mentioned above. Traditionally, these problems above have been solved via document min- ing, i.e. by looking for the papers on topic X written by person Y, combined with centrality or bibliographic measures, such as the H-index and the G- index, in order to assess the expert's relative influence (e.g. [29]). This is also the approach followed by ArnetMiner6, a popular web-based platform for expertise retrieval [46]. Despite their unquestionable usefulness, systems based on document mining, like ArnetMiner, face formidable challenges that limit their ef- fectiveness. In addition to the specific challenges mentioned by Hashemi et al. [20], we could add several problems common to all data mining applica- tions (e.g. name disambiguation). As a small experiment, we have searched for some known names in ArnetMiner, and we get several profiles corre- sponding to the same person, one for each different spelling. 6http://www.arnetminer.org 4 That is one of the reasons why other expertise retrieval models resort to the power of PageRank in certain social networks, such as in the pe- rused scientific citation and scientific collaboration networks (e.g. [10, 20]). Another interesting example related to PageRank and social networks is TwitterRank [49], an extension of PageRank that measures the relative influence of Twitter users in a certain topic. Like our own PageRank ex- tension, TwitterRank is topic-specific: the random surfer jumps from one user to an acquaintance following topic-dependent probabilities. However, TwitterRank does not consider any relationships among the different top- ics. To the best of our knowledge, there are no precedents for the use of endorsements in social networks, nor for the use of known relationships among different skills, in the context of expertise retrieval. The closest approach might be perhaps the one in [42], which uses the ACM classification system as an ontology that guides the mining process and expert profiling. Another (very recent) model that uses semantic relationships to increase the effectiveness and efficiency of the search is given in [27]. Another related field which has attained a growing interest in the last few years is that of reputation systems, that is, systems intended to rank the agents of a domain based on others' agents reports. Strategies for rank- ing agents in a reputation system range from a direct ranking by agents (as used in eBay) to more sophisticated approaches (see [30] for a survey). One particularly important family of reputation system strategies is that of PageRank-based algorithms. There are many of such approaches. For instance, [8] provides an algorithm based on the so-called Dirichlet PageR- ank, which addresses problems such as: (1) Some links in the network may indicate distrust rather than trust, and (2) How to infer a ranking for a node based on the ranking stated for a well-known subnetwork. Another example of reputation system (again, based on PageRank) is In this case, a modification of the PageRank algorithm is used to [41]. create a reputation ranking among the members of an academic community. One remarkable issue of this approach is that the network does not exist explicitly, but it is created ad-hoc from the information harvested from the personal web pages of the members (e.g. a couple of members are connected if they have authored a research article together). A thorough study of reputation systems is clearly beyond the scope of this article, but in any case, all these scenarios above differ significantly from our application for expertise retrieval with deduction of new endorsements, based on existing endorsements of related skills, and information about the correlation between skills. 5 1.2 Contribution and plan of this paper This paper focuses on professional social networks allowing user endorse- ments for particular skills, such as LinkedIn and ResearchGate. Our main contributions can be summarized as follows: 1. We introduce endorsement deduction: an algorithm to enrich/enhance the information contained in the digraph of endorsements correspond- ing to a specific skill ('target' skill or 'main' skill) in a social network. This algorithm adds new weighted arcs (corresponding to other skills) to the digraph of endorsements, according to the correlation of the other skills with the 'main' skill. We assume the existence of an 'on- tology' that specifies the relationships among different skills. 2. After this pre-processing we can apply a ranking algorithm to the enriched endorsement digraph, so as to compute an authority score for each network member with respect to the main skill. In particular, we have used the (weighted) PageRank algorithm for that purpose, but in principle, any ranking method could be used, provided that it admits weighted digraphs (e.g. Hits [53]). The reasons why we have chosen PageRank in the first place are explained in Section 2.5. The authority score obtained by our method could be useful for searching people having a certain skill, for profile personalization, etc. 3. We propose a methodology to validate our algorithm, which does not rely as heavily on the human factor as previous validation methods, or on the availability of private information of the members' profiles. More precisely, we discuss the benefits of endorsement deduction in terms of (1) consistency with the results of simple weighted PageR- ank, (2) reduction in the number of ties and (3) robustness against spamming. Following this methodology, we test our solution on a syn- thetic network of 1493 nodes and 2489 edges, similar to LinkedIn, and fitted with endorsements [39]. The rest of the paper is organized as follows: Section 2 provides the essential concepts, terminology and notation that will be used throughout the rest of the paper. It also describes the PageRank algorithm, including the variant for weighted digraphs. After that, our proposal is explained in Section 3 together with a simple example. In Section 4 we compare the results obtained by ranking with deduction with those obtained by simple ranking, according to three criteria proposed by ourselves. Finally, in Sec- tion 5 we summarize our results, discuss some potential applications, and enumerate some open problems that arise as an immediate consequence of the preceding discussion. 6 2 Preliminaries 2.1 Terminology and notation A directed graph, or digraph D = (V, A) is a finite nonempty set V of objects called vertices and a set A of ordered pairs of vertices called arcs. The order of D is the cardinality of its set of vertices V . If (u, v) is an arc, it is said that v is adjacent from u. The set of vertices that are adjacent from a given vertex u is denoted by N +(u) and its cardinality is the out-degree of u, d+(u). Given a digraph D = (V, A) of order n, the adjacency matrix of D is an n × n matrix M = (mij)n×n with mij = 1 if (vi, vj) ∈ A, and mij = 0 otherwise. The sum of all elements in the i-th row of M will be denoted Σmi∗, and it corresponds to d+(vi). A weighted digraph is a digraph with (numeric) labels or weights attached to its arcs. Given (u, v) ∈ A, ω(u, v) denotes the weight attached to that arc. In this paper we only consider directed graphs with non-negative weights. The reader is referred to Chartrand and Lesniak [7] for additional concepts on digraphs. 2.2 PageRank vector of a digraph PageRank [3, 37] is a link analysis algorithm that assigns a numerical weighting to the vertices of a directed graph. The weighting assigned to each vertex can be interpreted as a relevance score of that vertex inside the digraph. The idea behind PageRank is that the relevance of a vertex increases when it is linked from relevant vertices. Given a directed graph D = (V, A) of order n, assuming each vertex has at least one outlink, we define the n×n matrix P = (pij)n×n as, (cid:26) 1 pij = if (vi, vj) ∈ A, otherwise. (1) d+(vi) 0 Those vertices without oulinks are considered as if they had an outlink pointing to each vertex in D (including a loop link pointing to themselves). That is, if d+(vi) = 0 then pij = 1/n for each j. Note that P is a stochastic matrix whose coefficient pij can be viewed as the probability that a surfer located at vertex vi jumps to vertex vj, under the assumption that the next movement is taken uniformly at random among the arcs emanating from vi. When the surfer falls into a vertex vi such that d+(vi) = 0, then he/she is able to restart the navigation from any vertex of D uniformly chosen at random. So as to permit this random restart behaviour when the surfer is at any vertex (with a small probability 1 − α), a new matrix Pα is created as, 7 Pα = αP + (1 − α) 1 n J(n), (2) with(cid:80) where J(n) denotes the order-n all-ones square matrix. By construction, Pα is a positive matrix [35], hence, Pα has a unique positive eigenvalue (whose value is 1) on the spectral circle. The PageRank vector is defined to be the (positive) left-hand eigenvector P = (p1, . . . , pn) i pi = 1 (the left-hand Perron vector of Pα) associated to this eigen- value. The probability α, known as the damping factor, is usually chosen to be α = 0.85. The relevance score assigned by PageRank to vertex vi is pi. This value represents the long-run fraction of time the surfer would spend at vertex vi. 2.3 PageRank vector of a weighted digraph When the input digraph is weighted, the PageRank algorithm is easily adapted so that the probability that the random surfer follows a certain link is proportional to its (positive) weight [50]. This is achieved by slightly modifying the definition, previously given in Eq. 1, of matrix P so that, (cid:40) (cid:80) pij = ω(vi,vj ) v∈N +(vi) ω(vi,v) 0 if (vi, vj) ∈ A, otherwise. (3) Nodes with no outlinks are treated in the same way as before. 2.4 Personalized PageRank Personalized PageRank [21] is a variant of PageRank in which, when the surfer performs a random restart (with probability 1 − α), the vertex it moves to is chosen at random according to a personalization vector v = (vi) so that vi is the probability of restarting navigation from vertex vi. Now, matrix Pα is computed as, Pα = αP + (1 − α)evT , (4) with e denoting the order-n all ones vector. As a result, the computation is biased to increase the effect of those vertices vi receiving a larger vi. 2.5 PageRank in context PageRank is actually a variant of spectral ranking, a family of ranking techniques based on eigenvalues and eigenvectors. Vigna [47] traces the origins of spectral ranking to the 1950's, with [23] and [48]. Afterwards, the method was rediscovered several times until the 1970's. Other articles which are frequently cited as the original sources of spectral ranking include 8 [16, 4, 40]. Eventually, the method became widely popular when it was adopted by Google for its search engine. The reasons for the popularity of spectral ranking in general, and Google's PageRank in particular, are, in the first place, their nice mathematical properties. Under some reasonable mathematical assumptions, PageRank produces a unique ranking vector, which reflects very accurately the rela- tive importance of the nodes. Other competing algorithms, such as Hits and Salsa do not guarantee such properties [13]. As we have seen in the previous subsections, PageRank can be adapted to weighted digraphs and supports personalization. Additionally, it can be efficiently approximated [2, 5], and can be computed in a parallel or distributed framework [31, 44]. Besides information retrieval, spectral ranking in general, and PageR- ank in particular, have been applied in social network analysis [4, 49, 38], scientometrics [40, 34, 15, 51], geographic networks [16], and many other areas with great success. Last but not least, Google's PageRank has withstood the test of public scrutiny, as it has been validated by millions of users for more than fifteen years now. 3 Endorsement deduction and ranking Let us consider a professional network in which users can indicate a set of topics they are skilled in. So as to attract attention, some dishonest network members could be tempted to set an over-inflated skill list. The effect of such malicious behaviour is reduced if network members are able to endorse other users for specific skills and the relevance they get depends on the received endorsements. Since cheating users will rarely be endorsed, their relevance in the network will be kept low. In such a social network we get an endorsement digraph for each skill. Our objective is to compute an authority ranking for a particular skill, which is not only based on the endorsement digraph of that particular skill, but also takes into account the endorsement digraphs of other related skills. From now on, the skill for which we want to compute the ranking will be called the main skill. Let S = {s0, s1, . . . s(cid:96)} be the set of all possible skills, with s0 being the main skill. Let Dk = (V, Ak) denote the endorsement digraph corresponding to skill sk, and let Mk be its adjacency matrix. We now define the skill deduction matrix Π = (πkt) as follows: Given a pair of skills sk and st, πkt represents the probability that a person skilled in sk also possesses the skill st. In other words, from sk we can infer st with a degree of confidence πkt. By definition, πkk = 1 for all k. In this way, if some user endorses another user for skill sk but no endorsement is provided for skill st, we can deduce that an endorsement (for st) should really be 9 there with probability πkt. In general, Π will be non-symmetric and sparse, thus it is better represented as a directed graph with weighted arcs. Note that Π can be seen as an ontology that also accounts for hierarchies among the topics. For example, 'Applied Mathematics' is a sub-category of 'Mathematics', and this would be reflected in Π as a link with weight 1, going from 'Applied Mathematics' to 'Mathematics'. Our proposal takes as input the skill deduction matrix Π, together with those endorsement digraphs Dk, with 0 < k ≤ (cid:96), such that πk0 > 0. Without loss of generality, we will assume that the set of skills related to s0 is S0 = {sk k (cid:54)= 0, πk0 > 0} = {s1, . . . , s(cid:96)}. 0 = (V, Awe The proposed endorsement deduction method constructs a weighted en- dorsement digraph Dwe 0 ) on skill s0, with weights ranging from 0 to 1, considering the endorsements deduced from related skills {s1, . . . , s(cid:96)}. 1. First of all, if user vi directly endorsed vj for skill s0, that is (vi, vj) ∈ 0 with ω(vi, vj) = 1 (that endorse- 0 has arc (vi, vj) ∈ Awe A0, then Dwe ment receives a maximum confidence level). 2. If (vi, vj) /∈ A0 but (vi, vj) ∈ Ak, for just one k, 1 ≤ k ≤ (cid:96), then arc (vi, vj) is added to Dwe 0 with weight ω(vi, vj) = πk0, that is, the arc is assigned a weight that corresponds to the probability that vi also considers vj proficient in skill s0, given an existing endorsement for skill sk. 3. Finally, if (vi, vj) /∈ A0 but (vi, vj) ∈ Ak1, . . . , Ak(cid:96), then the arc (vi, vj) is assigned a weight corresponding to the probability that vi would endorse vj for s0 given his/her endorsements for sk1, . . . , skl. That is, let "(ski → s0)" denote the event "endorse for skill s0 given an en- dorsement for ski (its probability is p(ski → s0) = πki,0) then (vi, vj) is assigned a weight that corresponds to the probability of the union event "∪ki∈{k1,...,k(cid:96)}(ski → s0)", assuming those events are indepen- dent. Next we show how to construct the weighted adjacency matrix of Dwe by iteratively adding deduced information from related skills. Computa- tions are shown in Eqs. 5. After the k-th iteration, matrix Qk corresponds to the weighted digraph of skill s0 after having added deduced information from skills s1, . . . , sk. The matrix computed after the last iteration Q(cid:96) cor- responds to the weighted adjacency matrix of digraph Dwe 0 . Computations can be carried out as follows, 0 Q0 = M0 Qk = Qk−1 + πk0((J(n) − Qk−1) ◦ Mk), for k = 1, . . . , (cid:96), (5a) (5b) 10 where the symbol '◦' represents the Hadamard or elementwise product of matrices. Note that Eq. 5b acts on the entries of Qk−1 that are smaller than 1, and the entries equal to 1 are left untouched. If some entry Qk−1(i, j) is zero, and the corresponding entry Mk(i, j) is non-zero, then Qk−1(i, j) takes the value of Mk(i, j), modified by the weight πk0. This corresponds to the second case above. If Qk−1(i, j) and Mk(i, j) are both non-zero, then we are in the third case above. To see how it works, let us suppose that some entry M0(i, j) is zero, but the corresponding entries M1(i, j), M2(i, j), M3(i, j), . . ., are all equal to 1. In other words, person i does not endorse person j for the main skill (skill 0), but does endorse person j for skills 1, 2, 3, . . .. In order to simplify the notation we will drop the subscripts i, j, and we will refer to qk as the (i, j)-entry of Qk. Applying Equations 5, we get: q0 = m0 = 0 q1 = q0 + π1,0(1 − q0) = π1,0 q2 = q1 + π2,0(1 − q1) = π1,0 + π2,0(1 − π1,0) = π1,0 + π2,0 − π1,0π2,0 q3 = q2 + π3,0(1 − q2) = π1,0 + π2,0 − π1,0π2,0 + π3,0(1 − (π1,0 + π2,0 − π1,0π2,0)) = π1,0 + π2,0 + π3,0 − π1,0π2,0 − π1,0π3,0 − π2,0π3,0 + π1,0π2,0π3,0 ... which corresponds to the probabilities of the events (s1 → s0), (s1 → s0) ∪ (s2 → s0), (s1 → s0) ∪ (s2 → s0) ∪ (s3 → s0), and so on. Once we have the matrix Q(cid:96) = (qij)n×n, we can apply any ranking method that admits weighted digraphs, such as the weighted PageRank al- gorithm [50]. For that purpose we have to construct the normalized weighted link matrix P, as in Eq. 3:  qij Σqi∗ 1 n pij = if Σqi∗ > 0, if Σqi∗ = 0. (6) Then we compute Pα from P, as in Eq. 4, and we finally apply the weighted PageRank algorithm on Pα. 3.1 An example As a simple illustration, let us consider a set of three skills: 'Programming', 'C++' and 'Java'. The probabilities relating them, depicted in Figure 1, 11 have been chosen arbitrarily, but in practice, they could have been obtained as a result of some statistical analysis. Figure 1: Directed graph representing a skill deduction matrix Π. Let us further assume that we have a community of six individuals, labeled from '1' to '6'. Figure 2 shows the endorsement digraphs among the community members for the skills 'Programming' and 'C++'. Figure 2: Endorsements for 'Programming'(left) and 'C++'(right). Let us suppose that the skill 'Programming' is our main skill (skill 0). Thus, Q0 = M0 is the adjacency matrix of the digraph shown in Figure 2 (left). If we compute the PageRank for the skill 'Programming', without considering its relationships with other skills, we get the following scores (P(v) denotes the PageRank score assigned to vertex v): P(1) = P(3) = P(4) = 0.0988, P(2) = P(5) = 0.1828, and P(6) = 0.3380. In other words, on the basis of the endorsements for 'Programming' alone, the individuals '2' and '5' are tied up, and hence equally ranked. Now we will include the endorsements for 'C++' in this analysis (skill 1). We apply Eq. 5 to compute Q1, as follows: Q1 = Q0 + π1,0((J(6) − Q0) ◦ M1), where π1,0 = 0.8, and M1 is the adjacency matrix of the digraph shown in Figure 2 (right). This yields the endorsement digraph depicted in Figure 3. 12 ProgrammingC++Java0.20.80.20.80.40.4123456123456ProgrammingC++ The PageRank scores assigned to nodes in that digraph are: P(1) = P(3) = P(4) = 0.0958, P(2) = 0.1410, P(5) = 0.2133, and P(6) = 0.3585. The individuals '2' and '5' are now untied, and we have better grounds to trust Programmer '5' over Programer '2'. Figure 3: Endorsements for 'Programming', with information de- duced from 'C++'. Let us now suppose that the endorsement digraph for 'Java' is the one given in Figure 4 (left). We can include the endorsements for 'Java'in the same manner: Q2 = Q1 + π2,0((J(6) − Q1) ◦ M2), where again π2,0 = 0.8. The result is given in Figure 4 (right). Figure 4: Endorsements for 'Java' (left), and endorsements for 'Pro- gramming', with information deduced from 'C++' and 'Java' (right). If we apply PageRank to this final digraph we get: P(1) = 0.1178, P(2) = 0.1681, P(3) = P(4) = 0.0945, 13 12345611110.8123456Java123456Final11110.80.80.96 P(5) = 0.2027, and P(6) = 0.3224. With the aid of the new endorsements, Programmer '1' differentiates itself from Programmers '3' and '4'. 3.2 Some properties We now pay attention to some properties of endorsement deduction: Proposition 1 Let the matrices Qk be defined as in Equations 5. Then, for all 1 ≤ i, j ≤ n, the entry Qk(i, j) satisfies the following properties: a) 0 ≤ Qk(i, j) ≤ 1, for all 0 ≤ k ≤ (cid:96). b) Qk(i, j) ≥ Qk−1(i, j), for all 1 ≤ k ≤ (cid:96). c) Q(cid:96)(i, j) = 0 if, and only if, Mk(i, j) = 0 for all 0 ≤ k ≤ (cid:96). d) Q(cid:96)(i, j) = 1 if, and only if, there exists some skill k, with 0 ≤ k ≤ (cid:96), such that Mk(i, j) = 1, and πk,0 = 1. In particular, if M0(i, j) = 1, then Q(cid:96)(i, j) = 1, since π0,0 = 1. We omit the proofs, as they follow from the straightforward application of Equations 5, and previous definitions. Put into plain words, Proposition 1 states that a particular entry Qk(i, j) can only grow with k, up to a limit of 1. This maximum can only be reached if i endorses j directly for skill 0, or for some other skill that implies skill 0 with probability 1. No other endorsement can have the same effect. This implies that, if two members of the network, i and j, who were tied up in plain PageRank, get untied after deduction, it is because one of them has received additional endorsements for other skills that are related to the main skill (or has received more relevant endorsements). 4 Simple ranking vs. ranking with deduction 4.1 Evaluation criteria There is an extensive literature on the evaluation of information retrieval and ranking systems (see [6], Sec. 1.2; [43], and others). Several evaluation criteria and measures have been developed for that purpose, such as preci- sion, recall, F -measure, average precision, P@n, etc. All these measures rely on a set of assumptions, which include, among others, the existence of: 1. a benchmark collection E of personal profiles (potential experts), 2. a benchmark collection S of skills, 14 3. a (total binary) judgement function r : E×S → {0, 1}, stating whether a person e ∈ E is an expert with respect to a skill s ∈ S. The above conditions have been taken from [6], Sec. 1.2, and adapted to our situation. Unfortunately, none of these assumptions applies in our case. To the best of our knowledge, there does not exist any reliable open- access ground-truth dataset of experts and skills, connected by endorsement relations. To begin with, the endorsement feature is relatively new, and still confined to a few social networks (e.g. LinkedIn and ResearchGate). In ResearchGate in particular, it was only introduced in February, 2013, and not enough data has accumulated so far. On the other hand, LinkedIn does not disclose sensitive information of its members (including their contacts or their endorsements), due to privacy concerns. Crawling the network, such as in [11] is not allowed: LinkedIn's terms of use specifically prohibit to "scrape or copy profiles and information of others through any means (including crawlers, browser plugins and add-ons, and any other technology or manual work)" (see [32]). Therefore, assumptions 1 and 2 do not hold in our case. The third assumption is also problematic: Even if we had a dataset with endorsements, we would still need a 'higher authority', or an 'oracle', to judge about the expertise of a person. Moreover, since our goal is to rank experts, a binary oracle would not suffice. Traditionally, ranking methods have been validated by carrying out sur- veys among a group of users (e.g. [14]), which in our opinion, is very subjec- tive and error-prone. We propose a more objective validation methodology, which is based on the following criteria: 1. Sanity check: Our ranking with deduction is close to the ranking pro- vided by PageRank. If we use endorsement deduction in connection with PageRank, results should not differ too much from PageR- ank; i.e. our method should only modulate the ranking provided by PageRank by introducing local changes. In order to evaluate the closeness between two rankings we can use some measure of rank cor- relation. Measures of rank correlation have been studied for more than a century now, and the best known of them are Spearman's correlation coefficient ρ [45], and Kendall's correlation coefficient τ [24]. 2. Ranking with deduction results in less ties than PageRank. Ties are an expression of ambiguity, hence a smaller number of ties is desirable. In the example of Section 3, we have seen that ranking with deduc- tion resolves a tie produced by PageRank. However, this has to be confirmed by meaningful experiments. 3. Ranking with deduction is more robust than PageRank to collusion spamming. Collusion spamming is a form of link spamming, i.e. an at- 15 tack to the reputation system, whereby a group of users collude to cre- ate artificial links among themselves, and thus manipulate the results of the ranking algorithm, with the purpose of getting higher reputation scores than they deserve [17, 18]. If the users create false identities (or duplicate identities) to carry out the spamming, the strategy is known as Sybil attack [12]. 4.2 Experimental setup and results We now proceed to evaluate our ranking with deduction, according to each of the above criteria. Our experimental benchmark consists of a randomly generated social network that replicates some features of LinkedIn at a small scale [39]. LinkedIn consists of an undirected base network (L), or network of contacts, and for each skill, the corresponding endorsements form a directed subgraph of (L). In [28], Leskovec formulates a model that describes the evolution of several social networks quite accurately, including LinkedIn, although this model is limited to the network of contacts (L), and does not account for the endorsements, since that feature was introduced in LinkedIn later. Thus, we have implemented Leskovec's model and used it to generate an undirected network of contacts with 1493 nodes and 2489 edges, represented in Figure 5. Additionally, we have considered five skills: 1. Programming, 2. C++, 3. Java, 4. Mathematical Modelling, 5. Statistics. We have chosen these skills for two main reasons: 1. These five skills abound in a small LinkedIn community consisting of 278 members, taken from our LinkedIn contacts, which we have used as a sample to collect some statistics. 2. These five skills can be clearly separated into two groups or clusters, namely programming-related skills, and mathematical skills, with a large intra-cluster correlation, and a smaller inter-cluster correlation. This is a small-scale representation of the real network, where skills can be grouped into clusters of related skills, which may give rise to different patterns of interaction among skills. We have computed the co-occurrences of the five skills in our small com- munity, resulting in the co-occurrence matrix Π1 of Eq. 7. The entry Π1(i, j) is the ratio between the number of nodes that have been endorsed for both skills, i and j, and the number of nodes that have been endorsed for skill i alone. 16 Figure 5: Base network of 1493 nodes, used for experiments 17  Π1 = 1 0.42 0.42 1 0.62 0.62 0.62 0.75 0.25 0.12 0.12 0.12 0.5 1 0.5 0.33 0.62 0.25 0.12 0.12 0.12 0.5 1 1 0.5  (7) Now, for each skill we have constructed a random endorsement digraph (a random sub-digraph of the base network), in such a way that the above co-occurrences are respected. We have also taken care to respect the relative endorsement frequency for each individual skill. The problem of constructing random endorsement digraphs according to a given co-occurrence matrix is not trivial, and may bear some interest in itself [39]. We have chosen to skip the details here because it is not our main concern in the present paper. The base network and the endorsement digraphs can be downloaded from http://www.cig.udl.cat/sitemedia/files/MiniLinkedIn.zip. Next, for each skill we have computed two rankings, one using the simple PageRank algorithm, and another one using PageRank with deduction. For PageRank with deduction we have used the skill deduction matrix Π2 given in Eq. 8. This matrix has been constructed by surveying a group of seven experts in the different areas involved. (8) For each skill we have computed the correlation between both rankings, and the number of ties in each case, according to the first two criteria de- scribed above. Additionally, in order to test the robustness of the method to collusion spamming, we have added to each endorsement digraph, a small community of new members (the cheaters), who try to subvert the system by promoting one of them (their leader ) as an expert in the corresponding skill. We have chosen the most effective configuration for such a spamming community, as described in [17], and depicted in Figure 6. Thereupon we have compared the position of the leader of cheaters in simple PageRank with its position in PageRank with deduction. Table 1 summarizes the results of the aforementioned experiments. Re- garding the first criterion, we can see that there is a very high correlation between PageRank with deduction and PageRank without deduction for all skills. According to Kendall's τ , there is a significant agreement between both rankings, with a significance level of 0.001, or even better. Spearman's ρ shows an even higher agreement. With respect to the second criterion, the experiments also yield unques- tionable results: For all skills, the number of ties is significantly reduced. 18  Π2 =  0.7 0.7 0.4 0.3 1 1 0.6 0.4 0.3 1 0.4 0.3 1 1 0.7 0.8 1 0.3 0.2 0.2 0.3 0.2 0.2 1 1 Figure 6: Link spam alliance: Three people collude to promote one of them. Number Correlat. of endor- sements ρ τ Skill Program. C++ Java Math Mod Statistics AVG (arcs) 220 140 137 134 128 % fall 3% 3% 3% 3% 3% 3% Number of ties Position of leader without deduct. with deduc. % without reduc. deduct. with deduc. 0.89 0.76 0.85 0.63 0.85 0.63 0.85 0.63 0.85 0.63 1460 1478 1486 1483 1486 1316 1304 1292 1318 1304 10% 12% 13% 11% 12% 11.6% 1 4 1 1 1 48 48 48 45 45 Table 1: Results from the first experiment This is also reflected in the distribution of PageRank scores, shown in Fig. 7. After deduction, the scores are more evenly distributed. As for the third criterion, in all cases there is a detectable drop in the po- sition of the leader of cheaters, which may lead us to conclude that PageR- ank with deduction is more robust to collusion spam than simple PageR- ank. However, this may not lead us to the conclusion that PageRank with deduction is an effective mechanism against collusion spam. Actually, the spam alliance that we have introduced in our experiments is rather weak. If we strengthen the spam alliance, then PageRank with deduction may also be eventually deceived. Table 2 illustrates the effect of strengthening the spam alliance, by increasing the number of assistants from 2 to 8. For each spam alliance there are three columns, labelled as '-' (position of the leader in the ranking without deduction), '+' (position in the ranking with deduction), and '%' (effectiveness of deduction, measured as the leader's fall in position, in percentage points). The simplest way to implement a collusion spam attack is the so-called Sybil attack, in which a single attacker creates several fake identities, with- out the need to collaborate with other people. Proactive measures against the Sybil attack focus on limiting the capability of a malicious user to cre- ate a large amount of accounts. It has been proven that a trusted central authority issuing credentials unique to an actual human being is the only 19 LEADERAssistantnum.1Assistantnum.2 Figure 7: Histograms of PageRank scores, before and after deduc- tion Number of assistants 2 3 4 5 6 7 8 Skill - + % - + % - + % - + % - + % - + % - + % Program. C++ Java 1 48 3 1 31 2 1 10 1 1 6 4 48 3 3 29 2 3 11 1 1 6 1 48 3 1 30 2 1 10 1 1 6 Math Mod 1 45 3 1 27 2 1 12 1 1 4 Statistics 1 45 3 1 28 2 1 11 1 1 4 0 1 4 0 1 5 0 1 4 0 1 2 0 1 2 0 1 2 0 1 2 0 1 2 0 1 2 0 1 2 0 1 1 0 1 1 0 1 1 0 1 1 0 1 1 0 0 0 0 0 Table 2: Effect of endorsement deduction in the presence of different spam alliances 20 method that may eliminate Sybil attacks completely [12]. Requiring fees per identity could mitigate them when the cost of the accounts is larger than the benefit for the attacker. Reactive measures try to mitigate the effect of such an attack. The SybilGuard [52] proposal bounds the number of identities a malicious user can create under the assumption that a malicious user could create many identities but few trust relations, so that there exists a small cut in the graph between Sybil nodes and honest ones. Our proposal belongs to the second category. It is not designed to be a safeguard against the Sybil attack, but the experiments have shown that it provides some reactive measure behaviour. In any case, the social network platform implementing our proposal could include all the proactive and re- active measures against sybil attacks without interferring with our method. A complete survey of attack and defense techniques for reputation systems is given in [19]. On the other hand, our endorsement digraphs are rather sparse, since our contacts are rather lazy when it comes to endorsing each other. It is reasonable to predict that if we should consider more skills, and if the total number of endorsements should increase, then the effects of PageRank with deduction will be stronger. In order to verify this prediction, we have carried out a second exper- iment on the same base network. For practical reasons we have decided to keep the set of skills invariant for the moment, and increase the num- ber of endorsements. Thus we have generated a second set of endorsement digraphs, with a larger number of arcs. This time we cannot enforce the co- occurrences observed in our small LinkedIn community. The co-occurrence matrix obtained is given in Eq. 9 for the sake of comprehensiveness. (9) Subsequently we have performed the same computations on this second set of endorsement digraphs, obtaining the results recorded in Table 3. These results fully confirm our prediction: There is an increase in the correlation coefficients (except in one case), as well as a larger reduction in the number of ties, and a more significant fall in the position of the leader of cheaters. 5 Conclusions and future research In this paper we describe endorsement deduction, a pre-processing algorithm to enrich the endorsement digraphs of a social network with endorsements, such as LinkedIn or ResearchGate, which can then be used in connec- 21  Π3 = 1 1 0.88 0.87 0.9 1 0.32 0.31 0.89 0.42 0.85 0.75 0.24 0.67 0.66 0.66 1 0.61 0.73 0.61 0.63 0.59 0.7 1 1  Number of ties Position of leader Number Correlat. of endor- sements ρ τ Skill Program. C++ Java Math Mod Statistics AVG (arcs) 427 1793 1856 1406 1447 without deduct. with deduc. % without reduc. deduct. with deduc. 0.76 0.63 0.97 0.93 0.97 0.93 0.95 0.89 0.96 0.90 1428 1005 1005 1130 1113 625 575 566 652 580 56% 43% 44% 42% 48% 47% 1 66 63 56 58 175 178 180 168 169 % fall 12% 7% 8% 7% 7% 8% Table 3: Results from the second experiment tion with a ranking method, such as PageRank, to compute an authority score of network members with respect to some desired skill. Endorsement deduction makes use of the relationships among the different skills, given by an ontology in the form of a skill deduction matrix. A preliminary set of experiments shows that the rankings obtained by this method do not dif- fer much from the rankings obtained by simple PageRank, and that this method represents an improvement over simple PageRank with respect to two additional criteria: number of ties, and robustness to collusion spam. Our experiments also show that the benefits provided by PageRank with deduction are likely to increase in the future, with the densification of the endorsement networks, and the introduction of new skills. However, this has to be confirmed by larger-scale experiments. It could also be interesting to test our method with other ranking algorithms, such as Hits. Although LinkedIn and ResearchGate are perhaps the best examples at hand, this system can also be extended to other social networks and platforms. Take, for instance, the open access publishing platform arXiv7. In order to submit a paper on a particular topic, say 'Statistics', an author has to be endorsed by another trusted author for 'Statistics'. However, it might as well be possible to allow an author submit a paper on 'Statistics' if he/she has been endorsed for 'Probability Theory'. There are many Internet forums, such as the 'StackExchange' suite, that assign an authority score to their members. As an illustration, let us pick one of the most popular forums of this family: The MathStackExchange8, where users can pose questions and obtain answers about mathematical problems. As of today (July, 2015), the site has more than 152 000 mem- bers, and more than 467 000 questions have been posed. Members get credit points for the questions, answers, or comments that they post, via the votes of other members. A high authority score entitles a member to certain priv- ileges. By design, all the votes are worth the same number of points, but a more realistic model would be to make the value of the votes dependent from 7http://arxiv.org 8http://math.stackexchange.com 22 the authority score of the voting person. Additionally, authority scores could be disassembled into areas of knowledge, since questions are tagged with the areas to which they belong (e.g. 'Linear Algebra', 'Calculus', 'Probability', etc.). MathOverflow9 is very similar to MathStackExchange, but it fo- cuses on more technical questions in state-of-the-art mathematics. Due to its more 'elitist' nature, MathOverflow is smaller than the MathStack- Exchange. Nevertheless, it is also a success story, with its more than 37 000 users, and circa 62 000 questions posted, and it has become an undis- putable actor in mathematical research, having attracted some of the world's top mathematicians [25]. A competitor to ResearchGate is Academia, another academic social network designed to disseminate research results, ask and answer questions, and find like-minded collaborators. In both platforms, users can upload their papers, and tag them with the different research topics. Questions can be tagged too. It has been argued that, for the moment, these platforms have failed to attract some of the most experienced scientists. This may be partly due to the fact that scientists are conservative when it comes to adopting new technologies, but judging from Egomnia's experience, it may also be partly due to the unreliability (or outright inexistence) of scoring and ranking mechanisms [33]. It would not be difficult for ResearchGate to make the RG score more reliable by adopting the techniques discussed above. As a starting point, it would be interesting to extend the experimen- tal analysis of Section 4 to a ResearchGate-like network, and compare the results with the ones obtained here. It is worth observing that all these ideas are also applicable outside the academic realm. In principle, even Google's search engine could make use of these techniques to find content by synonyms. 10 In order to do that, they would need a very large semantic network, comprising all the potential keywords and their correlation. Similarly, every social network or video repository displays some featured content on the start page, whose popularity has been computed on the basis of the number of votes (i.e. clicks on the 'Like' button). Yet, this content is usually tagged by topic, and hence, it might be possible to compute a more specific popularity score, and thus display content specifically tuned to the user's interests. The authors in [26] propose a method for ranking we- blogs. Their proposal consists in aggregating links by considering similarity in authors and topics between pairs of blogs. In any case, for the practical implementation of these techniques, two obvious problems arise: 1. The first problem has to do with the estimation of the skill deduction 9http://mathoverflow.net 10Google already has some functionality for synonyms via the '∼' operator. 23 matrix, which in this paper we estimate by polling a group of experts. There may be several alternatives to estimate the matrix from the social network itself, and it may be necessary to ponder the pros and cons of each alternative. 2. The second problem has to do with the feasibility of the computation. Assuming that the skill deduction matrix is available, computation of the weighted PageRank is a costly process for a large social net- work. Methods for accelerating PageRank computations have been considered in [22, 9]; we might need to adapt them to our situation. Additionally, we might need methods to accelerate the computation of the accumulated endorsement matrix Q. A subsidiary problem has to do with modelling the dynamics of endorse- ments in both LinkedIn and ResearchGate. Acknowledgements Authors have been partially funded by the Spanish Ministry of Economy and Competitiveness under projects TIN2010-18978, IPT-2012-0603-430000, and MTM2013-46949-P. The first two authors wish to dedicate this paper to the memory of our friend and colleague Josep Maria Rib´o Balust,who could not live to see the conclusion of his work. References [1] Balog, K., Fang, Y., de Rijke, M., Serdyukov, P., Si, L.: Expertise Retrieval. Foundations and Trends in Information Retrieval 6 (1 -- 2), 127 -- 256 (2012). [2] Bar-Yossef, Z., Mashiach, L.-T.: Local Approximation of PageRank and Reverse PageRank. Procs. of CIKM08, 279 -- 288 (2008). [3] Berkhin, P.: A Survey on PageRank Computing. Internet Mathematics 2 (1), 73 -- 120 (2005). [4] Bonacich, P.: Factoring and weighting approaches to status scores and clique identification. The Journal of Mathematical Sociology 2, 113 -- 120 (1972). [5] Broder, A.Z., Lempel, R., Magul, F., Pedersen, J.: Efficient PageRank approximation via graph aggregation. Information Retrieval 9, 123-138 (2006). [6] Ceri, S., Bozzon, A., Brambilla, M., Della Valle, E., Fraternali, P., Quar- teroni, S.: Web Information Retrieval. Springer (2013). 24 [7] Chartrand, G., Lesniak, L.: Graphs and Digraphs. CRC Press, Boca Raton, fourth ed. (2004). [8] Chung, F., Tsiatas, A., Xu, W.: Dirichlet PageRank and Trust-based Ranking Algorithms. WAW'11. Procs. of the 8th International conference on Algorithms and Models for the Web Graph. 103 -- 114 (2011). [9] Del Corso, G., Gulli, A., Romani, F.: Fast PageRank Computation Via a Sparse Linear System. Internet Mathematics 2, 251 -- 273 (2005). [10] Deng, H., King, I., Lyu, M.R.: Enhanced Models for Expertise Re- trieval Using Community-Aware Strategies. IEEE Transactions on Sys- tems, Man, and Cybernetics -- Part B: Cybernetics, vol. 42, 93 -- 106 (2012). [11] Ding, C., Chen, Y., Fu, X.: Crowd Crawling: Towards Collaborative Data Collection for Large-Scale Online Social Networks. Procs. COSN 2013, 183 -- 188 (2013). [12] Douceur, J.R.: The Sybil Attack. LNCS 2429, 251 -- 260 (2002). [13] Farahat, A., Lofaro, T., Miller, J.C., Rae, G., Ward, L.A.: Authority Rankings from Hits, PageRank, and Salsa: Existence, Uniqueness, and Effect of Initialization. SIAM J. Sci. Comput. 27, 1181 -- 1201 (2006). [14] Fujimura, K., Toda, H., Inoue, T., Hiroshima, N., Kataoka, R., Sug- izaki, M.: BLOGRANGER - A multi-faceted blog search engine. Procs. WWW 2006, 22 -- 26 (2006). [15] Gonz´alez-Pereira, B., Guerrero-Bote, V.P., Moya-Aneg´on, F.: A new approach to the metric of journals scientific prestige: The SJR indicator. Journal of Informetrics 4, 379 -- 391 (2010). [16] Gould, P.R.: On the Geographical Interpretation of Eigenvalues. Trans- actions of the Institute of British Geographers 42, 53 -- 86 (1967). [17] Gyongyi, Z., Garcia-Molina, H.: Link Spam Alliances. Procs. 31st VLDB (2005). [18] Gyongyi, Z., Garcia-Molina, H.: Web Spam Taxonomy. Procs. AIRWeb (2005). [19] Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and De- fense Techniques for Reputation Systems. ACM Computing Surveys 42, 1 -- 31 (2009). [20] Hashemi, S.H., Neshati, M., Beigy, H.: Expertise Retrieval in Bibli- ographic Network: A Topic Dominance Learning Approach. Procs. of CIKM, 1117 -- 1126 (2013). 25 [21] Haveliwala, T.H.: Topic-Sensitive PageRank: A Context-Sensitive Ranking Algorithm for Web Search. IEEE Transactions on Knowledge and Data Engineering 15(4), 784 -- 796 (2003). [22] Kamvar, S.D., Haveliwala, T.H., Manning, C.D., Golub, G.H.: Ex- trapolation methods for accelerating PageRank computations. Procs. WWW'03, 261 -- 270 (2003). [23] Katz, L.: A new status index derived from sociometric analysis. Psy- chometrika 18 (1), 39 -- 43 (1953). [24] Kendall, M.G.: A New Measure of Rank Correlation. Biometrika 30 (1/2), 81 -- 93 (1938). [25] Klarreich, E.: The Global Math Commons. https://www. simonsfoundation.org/features/science-news/mathematics- and-physical-science/the-global-math-commons, May, 2011. [26] Kritikopoulos, A., Sideri, M., Varlamis, I.: BlogRank: Ranking we- blogs based on connectivity and similarity features. Procs. of AAA-IDEA (2006). [27] Lee, J., Min, J.-K., Oh, A., Chung, Ch.-W.: Effective ranking and search techniques for Web resources considering semantic relationships. Information Processing and Management 50, 132 -- 155 (2014). [28] Leskovec, J.: Dynamics of Large Networks. PhD Thesis, School of Com- puter Science, Carnegie-Mellon Univ. (2008). [29] Li, N., Gillet, D.: Identifying Influential Scholars in Academic Social Media Platforms. Procs. of the IEEE/ACM Int. Conf. on Advances in Social Network Analysis and Mining (ASONAM), 608 -- 614 (2013). [30] Khosravifar, B.: Trust and Reputation in Multi-Agent Systems. PhD thesis. Department of Electrical and Computer Engineering. Concordia University. Montr´eal, Qu´ebec, Canada, 2012. [31] Kohlschutter, C., Chirita, P.A., Nejdl, W.: Efficient Parallel Compu- tation of PageRank. Advances in Information Retrieval, LNCS 3936, 241 -- 252 (2006). [32] LinkedIn User Agreement. https://www.linkedin.com/legal/ user-agreement, Oct. 2014. [33] Lugger, B.: Ein Vergleich fur Forscher unter sich: Der Research- Gate Score. http://www.scilogs.de/blogs/blog/quantensprung/ 2012-10-09/ein-vergleich-f-r-forscher-unter-sich-der- researchgate-score, Oct. 2012. 26 [34] Ma, N., Guan, J., Zhao, Y.: Bringing PageRank to the citation analysis. Information Processing and Management 44, 800 -- 810 (2008). [35] Meyer, C.D.: Matrix Analysis and Applied Linear Algebra. SIAM (2001). [36] Nagmoti, R., Teredesai, A., De Cock, M.: Ranking approaches for mi- croblog search. WI-IAT '10 Proceedings of the 2010 IEEE/WIC/ACM Int. Conf. on Web Intelligence and Intelligent Agent Technology - Vol. 01, 153 -- 157 (2010). [37] Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Cita- tion Ranking: Bringing Order to the Web. Technical Report, Stanford InfoLab (1998). [38] Pedroche, F., Moreno, F., Gonz´alez, A., Valencia, A.: Leadership groups on Social Network Sites based on Personalized PageRank. Math- ematical and Computer Modelling 57, 1891-1896 (2013). [39] P´erez-Ros´es, H., Seb´e, F.: Synthetic Generation of Social Net- work Data with Endorsements. Journal of Simulation, Nov. 14, 2014. DOI:10.1057/jos.2014.29. [40] Pinski, G., Narin, F.: Citation Influence for Journal Aggregates of Scientific Publications: Theory, with Applications to the Literature of Physics. Information Processing and Management 12, 297 -- 312 (1976). [41] Pujol, J.M., Sanguesa, R. Reputation Measures based on Social Net- works metrics for Multi Agent Systems. Proceedings of the 4th Catalan Conference on Artificial Intelligence (CCIA-01), 205 -- 213 (2001). [42] Punnarut, R., Sriharee, G.: A Researcher Expertise Search System using Ontology-Based Data Mining. Procs. 7th Asia-Pacific Conf. on Conceptual Modelling (APCCM), 71 -- 78 (2010). [43] Robertson, S.: Evaluation in Information Retrieval. In M. Agosti, F. Crestani, and M. Pasi (eds): Lectures on Information Retrieval, LNCS 1980, 81 -- 92 (2000). [44] Sarma, A.D., Molla, A.R., Pandurangan, G., Upfal, E.: Fast distributed PageRank computation. Theoretical Computer Science 561, 113 -- 121 (2015). [45] Spearman, C.: The proof and measurement of association between two things. Am. J. Psychol. 15, 72 -- 101 (1904). [46] Tang, J., Zhang, J.., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner: Extraction and Mining of Academic Social Networks. Procs. of the 14th 27 ACM Int. Conf. on Knowledge Discovery and Data Mining (KDD), 990- 998 (2008). [47] Vigna, S.: Spectral Ranking. arXiv:0912.0238v13 (2013). [48] Wei, T.-H.: The Algebraic Foundations of Ranking Theory. University of Cambridge (1952). [49] Weng, J., Lim, E.P.., Jiang, J., He, Q.: TwitterRank: Finding topic- sensitive influential twitterers. Procs. of the ACM Int. Conf. on Web Search and Data Mining (WSDM 10), 261-270 (2010). [50] Xing, W., Ghorbani, A.: Weighted PageRank Algorithm. Procs. of the 2nd Annual IEEE Conference on Communication Networks and Services Research, 305 -- 314 (2004). [51] Yan, E., Ding, Y.: Discovering author impact: A PageRank perspec- tive. Information Processing and Management 47, 125 -- 134 (2011). [52] Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A. "SybilGuard: defending against Sybil attacks via social networks", Proc. of SIG- COMM'06 (2006). [53] Zhang, X., Yu, H., Zhang, C., Liu, X.: An Improved Weighted Hits Algorithm Based on Similarity and Popularity. Procs. of the 2nd IEEE Int. Multisymposium on Computer and Computational Sciences, 477 -- 480 (2007). Appendix: The endorsement mechanism and its in- consistencies We make a brief discussion about LinkedIn's endorsement mechanism, which may be useful for the reader who is unfamiliar with the social network. The process starts when some user, say Anna, declares her skills (in this respect, LinkedIn differs from other social networks, such as Research- Gate, where users can suggest skills to their contacts). Then, Anna's con- tacts can endorse her for those alleged skills in three different ways: 1. When one of Anna's contacts (say Ben) opens Anna's profile, the sys- tem presents Ben with a list of Anna's presumed skills, and asks Ben whether it is true that Anna possesses those skills. By pressing a single button Ben can endorse Anna for all the skills in the list. We may call that mechanism batch endorsement. Figure 8 shows the dialog box that is presented to Ben. The main advantage of batch endorsement is that it requires very little effort by Ben, since he only has to press a single button. Nevertheless, batch endorsement may be a source of 28 inconsistencies, since the batch list presented to Ben is usually made up of several unrelated skills, and not necessarily those skills where Ben is an expert. It is true that Ben may remove some of the skills from the list, but that requires some additional effort. 2. After Ben has batch-endorsed Anna, he is then asked to endorse other users, one skill at a time. The people appear in groups of four, and their order of appearance, as well as their skills, seem to be random. Figure 9 shows a group of four users waiting to be endorsed. This en- dorsement mechanism is more specific, but also more time-consuming than batch endorsement, and people usually skip it after a few clicks. 3. Finally, if Ben wants to endorse Anna for some specific skill which did not appear, either in the initial batch list or in the subsequent endorsement suggestions, then he has to go to Anna's list of skills, and click on the specific skill he wants to endorse Anna for. This is by far the most reliable mechanism for endorsement, but it requires Ben's determination to make the endorsement. In Figure 10 we can see Anna's list of skills, which can be clicked on individually. Figure 8: First endorsement mechanism: Batch endorsement Now it becomes evident why there are inconsistencies in people's en- dorsements. In fact, we can say that practically all profiles surveyed by us contain some inconsistency, although some inconsistencies are more obvious than others, and the actual percentage may vary according to the definition of inconsistencies that is agreed upon. In any case, whatever the convention adopted, the percentage of profiles containing some form of inconsistency will be very close to 100%. We have manually surveyed 100 profiles from a pool of 3250, mainly from the areas of Mathematics and Computer Science. Our sampling method con- sisted in a random DFS of depth two with backtracking. We started at the root profile (belonging to one of the authors), then checked for inconsisten- cies, and selected one of the contacts at random, by generating a random number modulo the total number of contacts in the profile. Then we re- peated the process from the new profile. Since the contacts are not visible 29 Figure 9: Second endorsement mechanism: A group of four candi- dates to be endorsed Figure 10: Third endorsement mechanism: Anna's complete list of skills, which can be endorsed individually 30 for the profiles located at distance two (or greater) from the root profile, when we arrive at some profile of the second level, we check for inconsisten- cies and bactrack. Thus, our pool consists of all the profiles within distance two from the root profile. In the literature it is possible to find several sampling methods that are probably more effective than ours, but at this point, effectiveness and accuracy are not a concern, since we are not collecting any formal statistics. Our main purpose at this point is to find examples of inconsistencies, and classify the most significant inconsistencies encountered. Roughly speaking, the inconsistencies can be classified in the following categories: • Inconsistencies associated with the existence of hierarchies among skills. These can be subdivided into two groups: -- Bottom-up inconsistencies: A user is endorsed for some sub- category of a larger category, but not for the larger category. This is by far the most common inconsistency we have encoun- tered. For example, some users have many endorsements for sev- eral programming languages, but do not have any endorsement, or have very few endorsements for the skill 'Programming' it- self, even though they have declared the skill 'Programming' in their profiles. Also in relation to programming, some users have several endorsements for one or more object-oriented program- ming languages, such as Java, but are not endorsed for the skill 'Object-Oriented Programming'. Still other users have been en- dorsed for 'Object-Oriented Programming', but not for 'Program- ming'. In a different domain, some users have been endorsed for several mathematical skills, e.g. 'Graph Theory', 'Discrete Math- ematics', 'Applied Mathematics', 'Mathematical Modeling', 'Op- timization' etc., but not for 'Mathematics'. Finally, some users have been widely endorsed for 'Digital Signal Processing', 'Digital Image Processing', 'Image Segmentation', but not for the more generic 'Image Processing'. -- Top-down inconsistencies: A user is endorsed for some category, but is not endorsed for any sub-category of the larger category. For example, some users have been endorsed for the skill 'Pro- gramming', but not for any specific programming language. • Inconsistencies associated with the existence of synonyms for a skill, or translations in different languages: A user is endorsed for some skill, but lacks endorsements in other skills that are synonyms of the first one. For example, several users have been endorsed either for the skill 'Simulation' or for 'Simulations', but not both. Some users have been endorsed for some skill (say 'Programming') in a language other than English, but not in English. 31 • Inconsistencies between the information contained in the endorsements, and the information contained in the rest of the profile, or the pub- lic information available about the user. E.g. some user, who is a renowned expert in some area, is not endorsed for the corresponding skill. This may happen if the user himself has not declared the skill. For two concrete examples, Prof. Edy Tri Baskoro, who is a renowned graph theorist, is not endorsed for 'Graph Theory', and Prof. Cheryl Praeger, who is a renowned group theorist, is not endorsed for 'Group Theory'. This taxonomy does not attempt to cover all the situations encountered, which might be considered inconsistencies. It is very difficult to compile comprehensive statistics here, due to the huge diversity of cases, and to the subjectivism associated with defining inconsistent behaviour, but in any case it becomes quite clear that the endorsement mechanism offers some scope for improvement. 32
1803.02592
4
1803
2018-06-23T09:18:45
Foundations of Temporal Text Networks
[ "cs.SI", "physics.soc-ph" ]
Three fundamental elements to understand human information networks are the individuals (actors) in the network, the information they exchange, that is often observable online as text content (emails, social media posts, etc.), and the time when these exchanges happen. An extremely large amount of research has addressed some of these aspects either in isolation or as combinations of two of them. There are also more and more works studying systems where all three elements are present, but typically using ad hoc models and algorithms that cannot be easily transfered to other contexts. To address this heterogeneity, in this article we present a simple, expressive and extensible model for temporal text networks, that we claim can be used as a common ground across different types of networks and analysis tasks, and we show how simple procedures to produce views of the model allow the direct application of analysis methods already developed in other domains, from traditional data mining to multilayer network mining.
cs.SI
cs
Foundations of Temporal Text Networks Davide Vega and Matteo Magnani InfoLab Department of Information Technology {davide.vega, matteo.magnani}@it.uu.se Uppsala University, Sweden June 26, 2018 Abstract Three fundamental elements to understand human infor- mation networks are the individuals (actors) in the net- work, the information they exchange, that is often observ- able online as text content (emails, social media posts, etc.), and the time when these exchanges happen. An ex- tremely large amount of research has addressed some of these aspects either in isolation or as combinations of two of them. There are also more and more works studying systems where all three elements are present, but typi- cally using ad hoc models and algorithms that cannot be easily transfered to other contexts. To address this het- erogeneity, in this article we present a simple, expressive and extensible model for temporal text networks, that we claim can be used as a common ground across different types of networks and analysis tasks, and we show how simple procedures to produce views of the model allow the direct application of analysis methods already devel- oped in other domains, from traditional data mining to multilayer network mining. 1 Introduction A large amount of human-generated information is available online in the form of text exchanged be- tween individuals at specific times. Examples include social network sites, online forums and emails. The public accessibility of several of these sources allows us to observe our society at various scales, from fo- cused conversations among small groups of individu- als to broad political discussions involving heteroge- neous audiences from large geographical areas [1, 2]. This information is undoubtedly very valuable, as shown for example by the large revenues of big In- ternet companies and by its usage during political campaigns, but it is also very complex because of its joint textual, structural and temporal nature. To cope with this complexity, researchers have typi- cally focused on either the topology of the network, as commonly done in Network Science, or the text exchanged among individuals, using methods from Computational Linguistics. In some cases time has also been taken into consideration as in, respectively, the fields of Temporal Networks and Temporal Infor- mation Retrieval. However, despite this broad interest in human in- formation networks, only a limited number of works have been developed to address text, network topol- ogy and time in an integrated way and using a com- mon data model. In our opinion, this is partly a result of the over-specialization of today's academia, and the fragmented and discipline-specific develop- ment of network research. Unfortunately, omitting any of the three basic elements of temporal text net- works may lead to significant information loss and prevent a deeper understanding of the information system, as exemplified in the next section. 1 1.1 A motivating example One typical usage of social media data in research is to study how information propagates online. In one of the many studies on this topic, the authors have analyzed different aspects of the propagation process considering the online reactions generated by the death of a well-known Italian TV anchorman [3]. In Figure 1 we have reproduced (a) the information propagation network, showing which posts contained information obtained by which others, (b) the text of some of the posts generated about this event, and (c) a temporal pattern indicating the number of com- ments per day. While each of these pieces of information alone re- veals something, putting them together into a tempo- ral text network (Figure 1d) we obtain a much more comprehensive understanding of the process. On the one hand, we can see that for the posts represent- ing explicit attempts to propagate information (e.g., Mike passed away) publication time is fundamental to determine their success, and only the first of this type of posts generated a large and sudden burst of reactions in a very short time; on the other hand, conversational posts evolving from it (e.g., How has television changed? ) can appear later and still create long but less dense chains of reactions. Other posts not present in the information propagation network neither explicitly give the news nor ask for an answer, generating no or few reactions, but still have the role of re-activating the information cascade so that even the latecomers can find a trace of it; some of these posts (e.g., Bye granpa Mike!, or R.I.P.) form what has been called an online mourning ritual. In summary, time, text and topology together can lead to a deeper understanding of how this informa- tion network evolved into its current structure and how information propagated through it. 1.2 Contribution and outline In this work we introduce a simple but expressive and easily extensible model for temporal text networks, and define two main approaches to analyze this type of data. We also show how existing primitive data manipulation operations for multilayer networks can be composed to easily construct new algorithms for temporal text networks. Our claim is that such a model can play a similar role of other recent attempts to unify related areas of network science, such as multilayer networks, which have boosted research in already existing fields (e.g., multiplex network analysis) by showing that results in one area could be directly applied to other types of data now expressed using a uniform terminology and mathematical form. Our objective is to define an essential model, with a minimal number of fea- tures, so that several existing models can be unified into it without a significant increase in model complexity. We also believe that a unified model will promote the development of software li- braries providing different data analysis functions for temporal text networks inside a single system, from centrality measures to community detection and gen- erative models. The article is organized as follows. In the next section we present an overview of related work, high- lighting how a large amount of research has been pro- duced to analyze human information networks. As the main objective of this article is to introduce a data model for temporal text networks, our overview of the state of the art focuses on the data models al- ready introduced in the literature, to allow a precise comparison with our model. In Section 3 we define our model as a simple attributed bipartite network. We also show how this simple model can be used to represent many existing types of text-based interac- tions, such as direct messages, multicast and broad- cast. In addition, we show how to express different types of information networks using our model, and how to extend it with additional features. Finally, we provide a detailed comparison of our model with the ones presented in the state of the art, showing how some existing models can be expressed using ours, while others can be obtained by applying some lossy processing to ours, e.g., replacing the exchanged text with a bag of words, a set of topics, a sentiment, etc. Section 4 explains how the model can be used in data analysis. We show how the direct manipulation of the model can be complemented by two additional types of analysis: continuous and discrete. In the contin- uous case, time and text are treated as points in a 2 Mike passed away! Bye grandpa Mike R.I.P. How has television changed? R.I.P. . . . (b) Text (c) Time (a) Topology (d) Topology, text and time Figure 1: Three elements of an online human information network: a) The topology, where each edge represents an observed information propagation path: user A writes a post about some news, user B reads the post and writes herself about it, for example by commenting on it; b) the text exchanged between users, that is, the text of posts and comments; c) the number of comments over time; d) Topology, time and text combined into a temporal text network. Only details about two posts are shown. 3 lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll metric space, and analysis operations are based on the computation of similarities between these points. In the discrete case, discretization operations (such as time slicing and topic modeling) are applied, en- coding text and time into multiple discrete layers and enabling the direct application of the large number of methods already available for multilayer networks. In Section 5 we present a practical example of our model and analysis strategies applied to Twitter data. of works using some of the models is very large, we have sometimes arbitrarily and unavoidably chosen a key set of references based on our knowledge and per- sonal selection. Therefore, please notice that in the table we only indicate selected representative refer- ences; additional references are included in the text. Figure 2 complements Table 1 providing a visual in- tuition of the reviewed models and of the new models introduced in this article. 2 Related work Our concept of temporal text network is a combi- nation of text, network topology and time. In the literature there is a large number of models support- ing one or more of these aspects, and the objective of this section is to characterize existing models from a common viewpoint. In this way, in the next section we will be able to provide a precise comparison be- tween our proposal and existing work, showing that our model is more expressive but at the same time consistent with existing approaches, reusing existing modeling constructs when possible. In particular, we will show that we can express existing models using ours, but not vice-versa. Notice that there are entire well-established disci- plines developed to address text, network topology and time in isolation, and we do not review these here as they are widely covered by text books [4, 5], described in numerous research papers (see for ex- ample [6] and subsequent extensions), and included in several software packages and systems. Instead we describe recent research efforts combining at least two of these aspects. Table 1 presents a summary of the models selected for this review, also including our proposed model (core and extended temporal text network), orga- nized according to four main criteria: (1) the type of graph used to represent the topological portion of the data, (2) the type(s) of nodes allowed in the graph, (3) the way in which text is represented in the model and (4) the way in which time is represented in the model. In Section 3.3 these criteria will be used for a comparison with our model. As our aim is to com- prehensively list models, not papers, and the number 2.1 Time & Topology The most basic family of models including both time and topology is the contact sequence [7, 8]. This is the most popular model for representing time and relations as a simple network structure. Mathemat- ically, the model can be represented as a directed multi-graph G = (V, E, T ) with attributed edges. The set of vertices V represent actors (e.g., individ- uals, companies) and the set of edges E represent the interactions among the actors. When used in practice [35, 8, 36] the duration of the interactions is sometimes considered negligible and hence repre- sented as a single scalar t ∈ T , while in other oc- casions the temporal information is represented as time intervals t = (ts, te) indicating when the con- tact between two actors starts (ts) and ends (te) [37]. Contact sequences have been typically used to study information spreading [35, 38], and existing concepts such as motifs and triadic closure have been re-defined to study the evolving structure of these networks [36, 37, 39]. Differently from contact sequences, where inter- actions are time-annotated one by one, other types of models use sequences of time-annotated graphs, where each graph is sometimes also called layer. In time-sliced models, also known as time-aggregated models, time is expressed as an interval and an edge indicates that an interaction has happened at some point during the time interval associated to the graph [9]. These models are typically obtained starting from a contact sequence and aggregating edges by time. In longitudinal networks relationships about the same or similar actors are detected at different points in time [10, 11]. From a data modeling point of view, time slicing and longitudinal networks are very 4 Table 1: Comparison of models representing two or more of the main aspects of temporal text networks. The graph type is indicated as D: directed (undirected if D is not specified), O: ordered, G: Graph, MG: Multi graph, BG: Bipartite graph, ML: Multilayer graph. Node types indicate the domain of the nodes, and we distinguish between A (nodes used to represent actors) and X (nodes used to represent text-related objects). Given the variety of existing models, X is broadly used to represent full text documents, parts of it (phrases, words), other representations of documents such as bags of words (BoW), and also objects obtained by analyzing the text, such as concepts/topics. In this table we only indicate selected references. Name Graph type Node types Text repr. Time repr. Refs. DMG Contact sequence OML Time-slice OML Longitudinal DG Memory DML Memory (multilayer) - Temporal text - Longitudinal text G/DG Language networks G/DG Document networks BG Document-phrase graph BG HIN Socio-semantic network BG Temp. Socio-semantic network BG DG Citation network DG Author-citation network Spreading process DG DG Polyadic conversations DBG Core temporal text network Ext. temporal text network ML A - A - A - An - A1 ∪ · · · ∪ An - X X X X X ∪ X A ∪ X A ∪ X A ∪ X X 2A × X A × X A × 2A × X A ∪ X A ∪ X mostly edges layers layers edges (implicit) edges (implicit) vertices document layers document - word - document document, phrase - BoW, concept, doc. - - concept edges concept vertices document vertices document - edge (delay) vertices document edges document document edges [7, 8] [9] [10, 11] [12, 13, 14, 15] [16] [17] [18, 19] [20] [21, 22] [23] [24, 25, 26] [27, 28] [29] [30, 31] [32] [33] [34] similar, and in practice the main difference lies in the nature of the time annotation associated to each slice, where in time slicing adjacent slices are typ- ically associated with adjacent time intervals while in longitudinal network studies adjacent layers rep- resent network snapshots obtained at specific points in time. Different types of time annotations are de- scribed for example in [40]. Memory models provide a different view over a temporal network, where ordered tuples of two or more actors are represented as single nodes [12, 13, 14, 15]. For example, second order memory net- works [12, 13] can model the impact of one prede- cessor edge. For example, if an actor vi is receiving one message from vj and one from vk, and is later sending a message to vj and one to vk, a contact se- quence loses information on whether vi is replying to vj and vk (j → i → j, k → i → k) or forwarding the messages (j → i → k, k → i → j). A first-order 5 −→ ji, −→ ij ) and ( −→ ki, −→ ki, memory model will contain nodes for each pair of users and have an edge between two nodes if the cor- responding pairs appear on consecutive paths. In our −→ example, if vi is replying we will have two edges in −→ the memory model: ( ik), while if vi −→ is forwarding the messages we will have the edges ( ji, −→ ik) and ( ij ). Higher order memory networks also exist [14], although they are not as common, to rep- resent causality effects between pathways consisting of 3 or more nodes. Deciding the order of the model is not trivial as specific patterns can be revealed only on a specific subset of memory models. To solve this problem, Scholtes et al. [16] introduced a multilayer memory network, composed of multiple memory net- works of different order hierarchically connected be- tween them (e.g., each node in the 2nd-order layer vij is connected with all nodes in the 3rd-order layer whose path vklm contains the leg klm). ij ⊆ −−→ −→ −→ ij , so Figure 2: A visual gallery of models for time text and networks. Time often plays an important role when networks are concerned, because networks often represent dy- namical systems. However, in Table 1 we have only listed distinct data models explicitly providing time annotations. As an example, growing network mod- els [4] such as preferential attachment [41] aim at ex- 6 plaining the observed topology of empirical networks based on how they evolve in time from an initial small network. Even if nodes and edges join the network one after the other, there is no explicit representa- tion of time in the final model. Similarly, we have not listed papers about methods not explicitly intro- ducing new data models, such as [42]. 2.2 Time & Text Time is often present inside text, and commercial systems handling large human information networks from Google mail to common text messaging appli- cations on smart phones can automatically identify the messages and annotate the text with temporal information. In research, text and time are studied together in the field known as temporal information retrieval [43, 44]. This is an active area, also represented at the TREC conference where state-of-the-art informa- tion retrieval methods compete on various practical tasks. Time can be present in the text, as in the ex- amples above or as metadata, expressed as absolute or relative time and it can also be specified in queries used to express information requirements [17]. Another set of studies has focused on how text evolves in time, and in particular sentiment, with case studies ranging from tweets [18] to songs, blogs and presidential speeches [19]. Text and time are also studied across data sources, for example to correlate texts from online news to trends emerging in time se- ries such as financial data [45]. However, no specific data model is used for this type of tasks, but only time-annotated documents (understood in a broad sense, including words, etc.) and time series. 2.3 Text & Topology Text and networks have been studied together in var- ious areas, either without considering time or using networks to represent relationships between texts. Models where nodes represent parts of a document have been used in structured information retrieval, which was a particularly active research area when hypertexts and markup languages became popular [46]. Text is often contained inside some structure (e.g., a title, sections, sub-sections, etc.) and queries can be tuned to return specific parts of a document instead of a full one. As an example, if the searched keyword is contained inside Subsections 3.1 and 3.3 of a document, a query may return either the two sub- sections, or the whole Section 3, depending on the method. More relevant for this article are document net- works, that are graphs whose nodes represent text documents [21, 22]. These network models can be classified in different groups depending on whether they include time or not; later in this section we refer to citation networks as a type of directed document network where time is also typically present. Text mining, and in particular clustering, can be applied to document networks to identify groups of documents that are similar not only because of their text but also because of their connections, as summarized in a recent article about clustering attributed graphs [47]. Several works have focused on networks extracted from text, and we can broadly classify them into mod- els representing the text itself, aimed at character- izing language, and models representing actors and concepts mentioned in the text. Networks where nodes represent words have been used to model both text documents and languages [20]. For example, a document can be modeled as a network where words are connected by an edge when they are contiguous, or appear in the same sentence, paragraph, etc. Similarly whole languages can be modeled focusing on the relationships between words, as in WordNet or BabelNet. With regard to the second class of models for net- works extracted from text, Named Entity Recogni- tion methods are typically used to identify the nodes and co-occurrence (or other language analysis ap- proaches) to create edges among them [48, 24]. In this case, the output network connects different por- tions of a text document, or concepts extracted from the text. A model that has been used to represent the re- lationships extracted from texts is known as hetero- geneous information network (HIN) [49, 50]. HINs are defined as attributed directed graphs G = (V, E, A, R) with an object type mapping function V → A and a link type mapping function E → R, so 7 that each object in the network (vertices and edges) belongs to a single type and if two edges belong to the same relation type R, the two edges share the same starting object type as well as the ending object type. For example, HINs have been used in the past to model co-occurrence relations between entities (e.g., famous characters, sports, companies) in Wikipedia articles [26]. In [24] vertices represent either famous characters from the text or bags of words, while the edges connect words that best explain the contexts where two or more famous characters appear together in the text. Document-phrase graphs as defined in [23] are also HIN-based models, and more in de- tail probabilistic bipartite networks B = (V, U, E, W ) where the vertices in one partition V represent docu- ments from a large document collection, the vertices in U represent salient phrases which are semantically relevant to one or more documents in V , and edges E indicate the relevance of each sentence for each doc- ument. HINs are not limited to represent relations within documents, text and concepts; but they can also model relations between actors and text. The most common use of HIN is actually to represent co- author or citation networks. In [25], for example, the authors use an heterogeneous information network to describe the relations between scientific articles, their authors, and the venues where they were published. One of the concerns recently raised against using methods from social network analysis to analyze so- cial media is their intrinsic actor-centered approach (e.g., people, companies, stakeholders), focusing on social interactions without properly characterizing other aspects of the communication [27]. A similar argument can be used against the use of just Natural Language Processing or semantic networks [51]. Following this reasoning, a recent stream of re- search focused on combining structural and seman- tic data simultaneously, which led to the formaliza- tion of the socio-semantic network model [29, 27, 28]. Originally, socio-semantic networks were just bipar- tite graphs interconnecting agents (also known as ac- tors in Social Network Analysis) with semantic ob- jects called concepts, corresponding for example to terms, n-grams, or lexical tags. During the last decade the socio-semantic network model has been extended to extract more valuable knowledge from social media. An illustrative exam- ple of such extension can be found in [28] where the authors propose to combine the aforementioned social and socio-semantic networks into a single model. In short, they use a single matrix representation where the diagonal sub-matrices represent the relation be- tween the same type of entities (agents and con- cepts) and the off-diagonal matrices represent the relation between different ones (agent/concept and concept/agent). From the point of view of data mod- eling, HINs are very related to socio-semantic net- work models, even though HINs have been introduced as more general modeling tools while socio-semantic networks have emerged and are used in a specific ap- plication context. A final work worth mentioning in this class is [52], where topic modeling is performed using an extended model considering not only the association between topics, words and documents, but also the associa- tion between documents and their authors. However, this has not been included in our summary table be- cause it introduces a generative model to summarize the data in the form of parameters indicating the probability that a given actor produces a given set of words, but not to represent the empirical data show- ing which actors have written what text. 2.4 Time & text & topology Many works in the literature have dealt with time, text and topology using ad hoc models specifically designed to capture relevant aspects of specific plat- forms such as Twitter. For example, in [53] a com- munication network is built in three steps: (1) con- versation trees are extracted from the dataset by in- versely following the chain of Twitter user interac- tions (replies, mentions and retweets); (2) the trees are pruned based on the time elapsed between the root tweet and the overlap of tweets and participants in the tree; (3) finally, all trees are merged to generate a simple weighted graph of interactions between au- thors. A related model is the so-called polyadic con- versation [34], designed to describe user interactions in microblogging sites as a series of related conversa- tions - also called polyadic interactions. A polyadic interaction is a tuple i = (v, U, m, t) where v ∈ V is 8 the sender of the message m ∈ M , U ⊆ V is the set of receivers and t ∈ T is the timestamp of the commu- nication act. A polyadic conversation is then defined as a chronologically ordered tree G = (I, E) where I is a set of polyadic interactions and E ⊂ I × I. In [29] a temporal model was used to compare the co-growth of two epistemic networks, a Twitter dataset and a set of related blogs, with the underlying social network of contacts. The temporal information attached to the edges of the network is, afterwards, used to compare the order of formation of epistemic and social communities. Citation networks have received a lot of attention, and include text documents, directed edges between them and also time annotations [30, 31]. In addition, when author co-citation analysis is performed [32], the underlying data model must also contain infor- mation about who authored which documents. Information diffusion processes are often modeled including the diffused information item (meme, blog post, etc.), the actors propagating it, and the times of propagation. This is for example the case for the model used in [33]. However, the majority of these models do not use text to perform the data analy- sis, but (sometimes) to define the links between doc- uments. Time can also be used to infer network structure based on the observation of propagation events. For example, the observation of a group of individuals repeatedly re-sharing common tweets in the same temporal order may suggest that these peo- ple are connected, and that information (tweets, in this case) passes through these hidden connections [54]. In [55] existing theoretical diffusion models for interconnected networks are reviewed, extending con- cepts in information diffusion to a multilayer model. In order to preserve as much original information as possible, S´cepanovi´c et al. [56] use a more generic process to build the network, mixing techniques from social network and semantic analysis. In their work, the communication network is modeled as a simple, temporal graph using the Twitter "replies" to relate actors with each other. Then, they apply several semantic analysis procedures to generate support- ing networks that describe the text-related features. A comparative analysis between the communication network and a subset of the semantic networks is used to study several aspects of the overall system such as semantic homophily and its evolution. However, from a modeling point of view text is not explicitly represented in this model, but coded inside the se- mantic layers. We will later use a related approach to exemplify how to use our model for data analysis. Some attention has also been devoted to models de- scribing co-evolutionary networks [57, 58]. Some of these models allow the representation of a status as- sociated to each node. Statuses can be used for exam- ple to represent the political affiliation of the person represented by the node. In growing network models, the status can influence the evolution of the network for example by increasing the probability that people will create connections with other individuals shar- ing the same political affiliation [59, 60]. As for the case of simple network growing models, time is not typically kept at the end of the growing process, and in addition status has not been used to model text to the best of our knowledge. Therefore, we have not included these works in our summary table, even if we consider them potentially relevant for this field if extended in the future. 3 Modeling temporal text net- works In our opinion, a good model for temporal text net- works should be general enough to be able to rep- resent a wide range of systems, but also contain a minimal number of modeling constructs, to make the model easier to use and study. In other terms, a good compromise should be found between expressiveness and simplicity. In addition, given the large number of existing models that have been used for a long time to describe specific aspects of temporal text networks, we believe that both the modeling constructs and the terminology used in our model should be as aligned with previous work as possible. Following these de- sign principles, we propose the following definition of temporal text networks: Definition 1 (Temporal text network) A tem- poral text network is a triple (G, x, t) where: 9 1. G = (A, M, E) is a directed bipartite graph, where, A is a set of actors, M is a set of mes- sages, and E ⊆ (A × M ) ∪ (M × A). 2. x : M → X, where X is a set of sequences of characters (texts). in: (as, mj,{ar1 , . . . , arn}, "text"), where "text" = x(mj). Finally, when all the timestamps on the edges adjacent to a message are equal, we can also add a time to the previous notation, as in: (as, mj,{ar1, . . . , arn}, "text", tq). 3. t : E → T , where T is an ordered set of time 3.1 Applicability annotations. and where the following constraints are satisfied: 1. ∀m ∈ M, in-degree(m) = 1. 2. (ai, m), (m, aj) ∈ E ⇒ t(ai, m) ≤ t(m, aj). In our model edge directionality indicates the flow of text in the network: (ai, mj) ∈ E indicates that actor ai has produced text mj, while (mj, ai) ∈ E indicates that actor ai is the recipient of text mj. Actors with out-degree larger than 0 are information producers, actors with in-degree greater than 0 are information consumers, and actors with both positive in- and out-degree are information prosumers. Text is represented as a combination of a text con- tainer (m ∈ M ), and a textual content (x(m)). As a consequence, actors in our model do not only gener- ate text, but produce text messages. Two text mes- sages (for example, two tweets, or two emails) may be different messages even if they contain the same text and have been exchanged between the same actors at the same timestamp. The third key component of temporal text net- works is the time attribute t. In our model, time is defined based on a generic set of ordered time anno- tations T . This enables the adoption of several ways of representing time: as an absolute date-time, as a relative date-time, as a timestamp with an arbitrary format or as a discrete time interval if time has been sliced into time windows as it often happens when temporal networks are analyzed (See Table 1). When writing about the model's elements, we will sometimes use a concise notation. For example, we will sometimes write an edge and its time to- gether, as in: (ai, mj, tq), where tq = t(ai, mj), and we will sometimes write a message by also in- dicating its sender, its recipients and its text, as While very simple, the model introduced above can be used to represent a range of different forms of com- munication and data from different sources. In par- ticular, by explicitly dividing the network nodes into actors and messages, their relations implicitly carry more information. For example, whether the type of communication implemented by a message is unicast, multicast or broadcast is indicated by the out-degree of the message. With unicast a message such as a handwritten let- ter is sent from a single source to a specific target. This form of written communication has been pre- served to the present day through instant messaging services such as those offered by Twitter, Facebook Messenger or Whatsapp and, more traditionally, us- ing the electronic email. Unicast communication al- lows to keep some text private between two actors, but it can have a large overhead if the same text must be sent to multiple sources because it requires an individual message for every recipient. In order to reach a larger population it is sometimes preferable to use broadcasting or multicasting. In the former, the message is transmitted to all possible receivers1, while when the information is addressed to a group of people but not to all possible receivers, such as a post on a Facebook wall, the communication is called multicast. Fig. 3 shows these different types of communication represented using our model. Figure 4 shows an example of how a multicast com- munication through email can be modeled as part of a temporal text network. The resulting network in- cludes the sender of the message (User A) and two 1For simplicity we use the expression "all possible receivers" to refer to the community in which the information is spread, independent of whether the community is the whole Internet, the whole world or a set of members registered to a private site. 10 to study information flows. Figure 5 shows, for exam- ple, the modeling process of a blog post M1 and the associated comments from the readers {M2, M3, M4}. In this particular case, we know the identity of each one of the authors, because they are authenticated in the web platform, but we do not know exactly who are the recipients of their comments. While we can assume by context that the blog post M1 was read by follower B and that her message was then read by the blog owner A, it is uncertain what the third user (follower C) has read. We only know that the text produced by user C is a reply to the previous comment M3, but we cannot infer if he has or has not read the previous messages M1 and M2. One possible way to model such scenario is to represent the relation between messages instead of the relation between messages and receivers. Similarly, in the ex- ample of Figure 6 the edges between messages are used to represent retweets on a micro-blogging plat- form. As we discuss in the next sections, this type of ex- tension would nicely fit our analysis framework where one main class of operations transforms the data into a multilayer representation. Similarly, we may add edges between actors indicating other types of rela- tions relevant for the analysis of the human infor- mation network such as indirect recipients. Figure 6 shows the modeling process of Twitter as a tempo- ral text network. Unlike the previous communication channels we discussed, in Twitter the recipients of the information are encoded in the text of the messages rather than being explicit in the metadata (e.g., the edge (M1, B, t1) exists because actor A mentions B in the first message of the data set). In addition, Twit- ter users can also see messages from other users they are following, which in our model is represented by the actor-to-actor relations. This difference between intra- and inter-layer relations allows us to differen- tiate between direct and indirect communication in many social platforms. In our basic model x represents a generic string of characters over some alphabet, whose interpretation will depend on the source of the data and the context of the analysis. For example, while the symbol # usu- ally denotes the start of a filtering tag in online social networks such as Twitter or Instagram, in other me- Figure 3: Models for different types of commu- nication. a) unicast from A to C; b) unicast from A to B, C and D; c) broadcast from A - which can also be implemented as in the previous case if x(M1) = x(M2) = x(M3) and c) multicast from A to C and D. other actors (User B and User C ) who where ex- plicit recipients of the message. The fourth vertex M1 ∈ M represents the email and x(M1) corresponds to its text content (the subject line and the body con- tent). In this case, the time attribute associated to each one of the edges represents the time when the message was delivered or received by the SMTP and POP3 servers allowing us not only to represent the communication flow, but also the effect of the chan- nel and/or medium. Representing multiple emails as in the example above would lead to a full temporal text network. In the next section we describe how to express other human information networks by extending our core model. 3.2 Model extensions One of the design principles we used to define our model was simplicity, to make it tractable and gen- eral. On top of the basic model defined above, we can also easily add extensions to fit context-specific requirements. With regard to the structure, we can straight- forwardly add edges between messages to represent either information available from the data such as retweets on Twitter, or information deduced from the analysis of the data such as links indicating that one message is probably an answer to another, if we want 11 Figure 4: Model of a multicast email as a temporal text network. The entire text content of the email (including the subject line and the body) are encoded as a single message M1. The sender of the email (User A) and the two friends (User B, User C ) are modeled as individual actors. In this case, the ingoing and outgoing edges of the message contain a different time, indicating the delivery and reception timestamps registered in the email servers. dia sites it is just an acronym for the word "number". Therefore, for specific application contexts additional attributes can be added for example to messages by providing special information, such as the hashtags included in the text in the case of Twitter (See Fig- ure 6). In particular, we can think of having three types of information associated to each message: 1. The text, as in our basic model, 2. Metadata that is available in the specific data source used for the analysis, such as links to other resources (webpages, other tweets or multi- media content), like and retweet counts, or hash- tags. 3. Additional information not directly available from the data source but obtained analyzing the text, for example through topic analysis. Different types of temporal information have been used in existing works on temporal networks and temporal text analysis (See Section 2). For exam- ple, time can represent actions from the users such as the time when a message is posted and/or the time when it is read as we did in the Twitter ex- 12 Figure 5: Model of a blog post as a temporal text network. The original data set contains a blog post M1 and three comments (M2, M3, M4); which are encoded as three individual messages. The three participants on the discussion (User A, Follower B, Follower C ) are modeled as individual producers. In this case, the edges of the messages indicate the relation between their content. ample. Alternatively, times can be used to represent a physical property of the channel, as it happens in computer networks when there can be a transmission delay from the source to the destination of a message (See Figure 4). Finally, time can also be associated to the message, indicating for example the time interval when the message exists. Furthermore, this informa- tion can be complete or incomplete, so that if only the initial time of the interval exists we must assume the message is still valid at the time of analysis as we did when we describe the blog posts; it can be pri- vate (accessible only to specific actors) or universally accessible by everyone. 3.3 A comparison with the state of the art Our core and extended models of temporal text net- works allow us to describe a variety of human in- formation networks ranging from person-to-person email communication to complex interactions in so- cial media sites. In Section 2 we summarized other models from the literature, that have been used in the past to partially support similar scenarios. In this section we provide a comparative review between our models and the ones described in Table 1 and Fig- ure 2, emphasizing how they can be used to describe 13 Figure 6: Model of a Twitter network as a temporal text network. The entire content of each tweet (including hashtags, urls and retweeted content) are encoded as messages. Senders (@A, @D) and mentioned users (@B, @C, @D) are modeled as individual actors. In this case, both the ingoing and outgoing edges of the message contain the same time, which indicates when the tweet has been sent. The edge between M3 and M2 indicates the retweet relation between both tweets. human information networks. All models based only on time and topology (See Figs. 2a-e) do not include information about mes- sages, documents or text. A simple extension adding a text attribute to the edges would still be less ex- pressive than our model, because this simpler solu- tion would not be able to differentiate between dif- ferent types of communication such as unicast, mul- ticast and broadcast. These are instead allowed in our model exploiting the presence of nodes represent- ing text messages, and thus justifying the adoption of a bipartite model instead of the simple graphs used in contact sequences. Single time annota- tions are also unable to distinguish between produc- tion/consumption or sending/receiving time. In sum- mary, contact sequence models (Fig 2a) can be ex- pressed using our model by representing edges as edge-message-edge triples, but contact sequences can- not represent all the information that we can express using our model. Time-slices (Fig 2b) and longitu- dinal models (Fig 2c) can also be obtained start- ing from our model, as we do not make any as- sumption about how the time is represented on the edges. It is thus possible to represent both time- 14 slices and longitudinal models as temporal text net- works by just creating a new message mj and a se- quence of edges (vi, mj, l), (mj, vk, l) for each origi- nal edge e = (vi, vk, l) in the layer l of the sliced network. Finally, when only time and structure are concerned, memory models (Figs. 2d-e) are usually constructed from contact sequence models by aggre- gating the edges conditional on preceding pathways. While the original temporal information is partially preserved during the creation of the memory model, it is impossible to preserve more information from our temporal text network such as messages or network attributes. Therefore, we can think of our model as a way to represent raw and complete information about the temporal interactions and memory models as a way to emphasize information provenance. However, to represent provenance we need to allow edges be- tween messages, and for this reason only our extended temporal text network model is able to express all the information present in memory models (in addition to text, multicasting and production/consumption times, as for all the other models not based on bi- partite graphs). The absence of relations makes it difficult to de- scribe human information networks using just time and text (Figs. 2f-g), and despite their versatility to analyze text documents, strictly speaking none of the models only focusing on text and topology with- out actors (Figs. 2h-j ) allows us to represent human- information networks as they do not contain any rep- resentation of the consumers and producers of the text. When also actors are represented, as in some HIN-based models (Fig 2k ) and in socio-semantic networks (Figs. 2l-m), our model adds directionality, which is necessary to represent text sender/receiver and producer/consumer relationships. Time is also not typically used in these models, but a tempo- ral extension of existing HIN-based and basic socio- semantic models is straightforward and has in fact already appeared in the literature (Fig 2m). The application of socio-semantic networks are also lim- ited if compared with our model, as they contain al- ready processed information (concepts) rather than text. With this we do not mean that our model is superior, as it can be useful to process the text into concepts, but this shows how we can go from our model to a socio-semantic model but not the other way round. Citation networks and author-citation networks (Figs. 2n-o) can represent relationships between mes- sages, and thus require our extended model to ex- press their information. However, they cannot ex- press communication, because even the more expres- sive author-citation network model (Fig 2o) only focuses on the production of text. In particular, there are no edges between documents and authors, but only (implicit) edges between authors end doc- uments. Spreading processes (Fig 2p) also share the same limitations of either contact sequences or author-citation networks, depending on whether mes- sages and/or authors are represented in the specific model, in addition of not (typically) keeping the text content, which is however a minor problem as text can be easily added to the nodes representing the shared items. Compared with our core model, polyadic conversations (Fig 2q) can express almost the same information: both can express unicast, mul- ticast and broadcast relations between messages and actors, both differentiate between information pro- ducers and consumers and contain the raw textual information. However, while in our model each indi- vidual edge connecting messages and consumers can have a different temporal attribute, in the polyadic conversation model each polyadic interaction has one single temporal value. 4 Analyzing temporal text net- works One reason to adopt a common model instead of defining ad hoc models for each application is to reuse existing analysis methods. While our model can be analyzed directly, for example studying dynamical processes such as text propagation in a similar way as in our motivating example, we can consider other strategies. Here we define two more approaches that can be used to analyze temporal text networks: we call them continuous and discrete. The practical benefit of using these two approaches is that instead of developing new algorithms the ana- 15 lyst can focus on defining mapping functions encod- ing the model in a way that fits the data and analysis at hand. Then, these functions automatically gener- ate model views of which existing algorithms can be computed. 4.1 Continuous analysis The main idea behind this approach is to map the elements of the network (e.g., actors, messages, con- tent, etc.) into an asymmetric metric space. This means that it is possible to compute distances be- tween them. Once distances are available, one can directly reuse existing data analysis methods for metric spaces, such as traditional distance-based and density-based algo- rithms (k-means, db-scan, etc.). Distances can also be used to retrieve relevant information from large temporal text networks, specifying an information query as an element of the metric space and retriev- ing those elements that are the closest. We present an example of this last type of analysis in the next section. The first way of doing this is to use a network em- bedding method [61]. While network embedding was initially defined for simple graphs, more recent algo- rithms can be directly applied to attributed graphs [62]. Meanwhile, we foresee the definition of special versions of these algorithms that are specific for tem- poral text networks. Figure 7 shows an example of this first type of translation, where messages are the target of the analysis. The same approach can also be used to study other structures and elements in the temporal text network such as actors or combinations of actors and messages. The second way to use the continuous approach is to directly define a distance function, without any explicit embedding into a coordinate system, so that the points form a metric space but have not an ex- plicit position: only their relationships are defined. This approach is represented in Figure 8. The two approaches may look similar: in both cases algorithms use distances, which can be com- puted after an embedding or are directly defined in the distance matrix. In practice, however, there can be relevant differences. For example, after embed- Figure 7: Continuous approach: embedding. (left) A temporal text network with 6 actors - cir- cles - and 5 messages - squares; (right) the mes- sages have been grouped into two clusters based on their topological, temporal and textual distance. The point marked with q represents a user's informa- tion requirements; in this example the left cluster (m1, m2, m3) contains nodes that are more relevant for the user. Figure 8: Continuous approach: distance- based. (left) A temporal text network with 6 actors - circles - and 5 messages - squares; (right) a mes- sages' distance matrix is obtained from the network topology and time attributes. ding it is easier to index the data so that not all distances must be computed when algorithms are ex- ecuted, leading to lower computation time. On the other hand, the direct usage of a distance function is more natural if distances are asymmetric, e.g., when d(M 1, M 2) (cid:54)= d(M 2, M 1). Asymmetric distances of- ten appear in temporal and directed networks, that are both features of our model. 16 4.2 Discrete analysis The main idea behind this approach is to encode temporal and textual information into network struc- tures, in particular layers in a multilayer network, so that methods from multilayer network analysis can be directly applied [63, 64]. This can be done by defining a mapping function from time and text into a discrete set of classes that are relevant for the analysis. Then, topic-and-time-based user centrality, topic-and-time- based relevance, as well as community detection al- gorithms can be used. An example of this last type of analysis on real data follows in the next section. Textual discretization is typically performed using methods from Natural Language Processing such as topic, sentiment or semantic analysis. The main ob- jective of the procedure is to group together messages whose contents have similar characteristics. Time discretization is apparently simpler, because only the cutting points between time slices must be indicated. However, also time discretization presents many op- tions. First, there are often many ways of defining the cutting points, leading to different results. Sec- ond, after the cutting points have been defined there can still be different ways of distributing network structures into the slices. For example, if we want to discretize messages, we can place a message mi in a specific interval (ta, tb) either if the incoming edge e = (vj, mi, t) exists in the interval (ta, tb), if all the edges from/to mi exist in the interval, if at least one of the out-going edges e = (mi, vj, t) exist in the interval, etc. Finally, we use the term multiple dis- cretization when both textual and time discretization are applied together to generate the different groups. Under this procedure, our model would produce a k-partite network with one partition for each new cluster of messages and one partition for the actors. The procedure to generate such network is straight- forward once the discretization function is defined. Figure 9 shows an example of textual discretization where the resulting 3-partite network contains the original layer of actors A, and two message layers with 2 and 4 messages each grouping together mes- sages about the same topic. In this particular exam- ple, x(M4) was related to both topics, therefore the message M4 appears in both layers. A similar net- 17 Figure 9: Textual discretization. (left) A tem- poral text network with 6 actors - circles - and 5 messages - squares; (right) the network has been discretized into two clusters - the top one with 2 messages, the bottom one with 4 - based on the topic of the messages. work structure will emerge from time discretization. An additional operation on multilayer networks that can be applied to the discretized data is pro- jection, creating edges in one layer based on the in- formation present in another layer. In the resulting multilayer network, a new edge e[l] ij = (vi, vj) is cre- ated if there is a message mk in the partition l ∈ L of the original network with: a) an edge (vi, mk) from actor vi to message mk and b) an edge (mk, vj) from message mk to actor vj. Weights can also be added to the new edges, using various methods. Figure 10 shows one possible projection from the network in Figure 9. In this example the content of the mes- sages (and more in general also the time) are now encoded into the relations between actors. The main advantage of using a projected multi- layer network to analyze temporal text networks is the vast available literature that has targeted this type of data. In Section 5.2 we use the approach de- scribed above together with a clustering algorithm for multilayer networks to find communities of actors dis- cussing about the same topics during the same time spans. June, 2017. The dataset contains mentions (tweets including @username), retweets (tweets starting with RT @username), other tweets that are neither men- tions nor retweets, and the 51,369 users involved in the aforementioned communications. In order to im- prove the homogeneity of the collected data we fur- ther filtered our dataset by keeping only the tweets using at least one of thirty-two hashtags selected by domain experts as representative of main topics in this domain. This operation removed for example tweets containing the string #iot but not concerning the Internet of Things. In the following experiments we focus on the network obtained starting from the tweets containing mentions (about 5% of the initial tweets), built by coding each tweet as in Figure 6. The resulting temporal text network contains about one third of the users in the initial dataset (15,717) and the 13,210 messages exchanged between them (See Table 2). We call this the original net- work, and use it as a the starting point for both the following experiments. 5.2 Discrete analysis Social interactions within a group of participants can form a community if they occur more frequently within the group than with other members of the net- work. In temporal text networks, those interactions are the result of the exchange of messages between ac- tors. In this example we show how our model can be used to find communities of actors discussing about the same topics during the same weeks. Following the method described in Section 4.2 we first trans- form our network to a multilayer network preserving information about interactions between users, topics and time, so that we can then apply an existing clus- tering algorithm. The discretized k-partite network is built following the procedure explained in Section 4.2. In this par- ticular example, we first split the original layer of messages using their hashtags as an indication of the topic, then we further discretize based on the week when messages are posted. The second discretization uses the posting time to create hashtag-week-specific layers. Finally, we build the multilayer network by pro- Figure 10: Projection. (left) A projection of the message layers into the actor layer in the original bi- partite network in Figure 9-left. The projected mul- tilayer network has 6 actors, 12 nodes and 5 weighted edges; (right) a similar projection using the 3-partite network described in Figure 9-right which generates a multilayer network with 6 actors, 18 nodes and 7 weighted edges. 5 A case study In this section, we apply the model and approaches introduced in Sections 3 and 4 to a real temporal text network. In particular, we focus on using the discretization approach introduced in Section 4.2 to analyze the formation and evolution of communities of actors and messages. The objective of this section is two-fold. First, we want to give a concrete example of the abstract type of analysis described in the previous section. Second, we want to show in practice how a new type of anal- ysis can be easily built as a composition of the trans- formations introduced in the previous section and an existing algorithm (Section 5.2). 5.1 Dataset Our initial dataset consists of 247,399 public tweets with the hashtag #iot (Internet of Things) or some of its variants (e.g., #IoT, #IOT, etc.) automati- cally collected using the Twitter streaming API in 18 Table 2: Temporal text networks used in the case study and its basic properties: number of actors (A), number of messages (M), number of edges (E) and number of layers (L). Networks Type Original Discretized Projected bipartite k-partite multilayer A 15,717 15,717 15,717 M 13,210 17,273 - E 35,015 44,943 23,766 L 2 182 182 jecting each one of the layers containing messages into the actors' layer. Two actors in this network are connected in a given layer L = (h, w) if at least one of them has sent a message to the other using the hashtag h during the week w. If multiple mes- sages have been exchanged between two actors in the same layer, only a single edge is generated during the projection. At this step all edges are undirected and unweighted to fit the community detection algorithm we used. Table 2 describes the main properties of the original temporal text network, the projected k- partite and the final multilayer network used during the analysis. Using the multilayer network and the clique per- colation mechanism described in [9], we proceed to detect communities of actors across the whole net- work. Figure 3 shows the communities with more than 3 actors formed in the multilayer network. Communi- ties contain users and topics, and both users and top- ics can overlap across communities. The number of users is indicated by the size of the community, while the layers representing the topics of interest of the actors are annotated next to each community. The smallest community in the diagram has 4 actors in the same layer, while the largest community contains 27 different actors and 3 layers. The edges between communities in different weeks indicate that at least one third of the users in the second community were also present in its predecessor. The thicker the line, the more users are shared between them. Figure 11: Evolution of communities in the IoT space. The size of the communities is indicated by the size of the nodes - representing the number of actors - and the annotated hashtags. The thickness of the edges between two communities indicates the number of common actors between them. We can observe that some of the hashtags, in par- ticular artificial intelligence (#ai), augmented real- ity (#ar) and virtual reality (#ai), are very popu- lar in the IoT space, with several groups of inter- est of different sizes forming around one or more of them. However, while the three topics are present across the whole month, the communities they form are very volatile. Only one of the smallest community with just 4 actors, for example, is preserved in time without changing its members or the topics they dis- 19 cuss. The largest communities formed during the first week, instead, disappear in week 2. Later on, some of the same users form new communities but with less members and a higher variance of topics. Less frequent hashtags such as #machinelearning, #se- curity, #sensors, #smartcity and #blockchain also form groups of interest, usually smaller and with no or a few connections with the groups of users dis- cussing the most common topics. Overall these results suggest that the IoT space is very fragmented in this Twitter dataset. None of the found communities was big enough to become the main arena to develop a long-standing conver- sation on a specific topic. Instead, users organize themselves in smaller groups that change over time. Without combining topology, text and time we would find bigger communities, that would however include users talking about different things and at different times. In summary, this example shows how a new analy- sis method can be easily constructed using our model and the approaches described in the previous section. In addition, also the results of this experiment high- light the value of using all the elements of the tem- poral text network in the analysis. of the possibilities enabled by our model in detail, in the experimental section we show two concrete exper- iments using the aforementioned transformations to analyze a set of communication messages exchanged in the Twitter platform during June 2017. During the past century, the research community has demonstrated a huge interest in studying human information networks. As a consequence, researchers from different disciplines have devoted a considerable time to develop new models and methods to describe aspects of interest in this scenario. However, as we have shown in our review, there has been none or few successful attempts to unify the literature under a common framework: several models and algorithms have been proposed, but only for a subset of the aspects we consider in this article or they have been developed ad hoc to address a specific problem. So, results in one area cannot be directly applied to other types of data. We believe that our work can play a key role in the process of consolidating existing efforts from different disciplines under a common framework, in the establishment of a common terminology and in the development of new analytical software able to cope with the complexity of such data. 6 Discussion and conclusions In this work we introduce a general model to rep- resent temporal text networks based on the prin- ciples of expressiveness, simplicity and tractability. Our model is expressive and simple enough to encode the key components of human information networks (topology, time and text) into a single bipartite net- work, so that we can represent a range of different forms of communication and data sources spanning from postal services to online social media. We additionally show how the model can be ana- lyzed either directly or indirectly, to perform a va- riety of mining tasks. In particular, we define vari- ous transformations for two approaches that we call continuous and discrete. Using such transformations, we can map the data into existing models, allowing to reuse part of the machinery already developed to ana- lyze complex data. While we do not describe each one Acknowledgements. We would like to thank Luca Rossi and Irina Shklovski for the selection of the hashtags used in the experiments. References [1] X. Zhou, D. Hristova, A. Noulas, C. Mascolo, Detecting socio-economic impact of cultural in- vestment through geo-social network analysis, in: Proc. of the Eleventh International Confer- ence on Web and Social Media, 2017, pp. 720– 724. [2] A. Nerghes, J. S. Lee, P. Groenewegen, I. Hell- sten, The shifting discourse of the european central bank: Exploring structural space in se- mantic networks, in: 10th International Confer- ence on Signal-Image Technology and Internet- 20 Based Systems, 2014, pp. 447–455. 1109/SITIS.2014.13. doi:10. [3] M. Magnani, D. Montesi, L. Rossi, Friendfeed breaking news: death of a public figure, in: IEEE SocialCom, IEEE Computer Society, 2010. [4] M. E. J. Newman, Networks: An Introduction, Oxford University Press, 2010. [5] R. A. Baeza-Yates, B. Ribeiro-Neto, Modern In- formation Retrieval, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999. [6] D. M. Blei, A. Y. Ng, M. I. Jordan, Latent dirichlet allocation, Journal Machine Learning Research 3 (2003) 993–1022. [7] P. Holme, J. Saramki, Temporal networks, Physics Reports 519 (3) (2012) 97 – 125, tempo- ral Networks. doi:10.1016/j.physrep.2012. 03.001. [8] L. Gauvin, A. Panisson, C. Cattuto, A. Barrat, Activity clocks: spreading dynamics on tempo- ral networks of human contact., Scientific re- ports 3 (2013) 3099. doi:10.1038/srep03099. [9] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, J.-P. Onnela, Community structure in time-dependent, multiscale, and multiplex net- works, Science 328 (5980) (2010) 876–878. doi: 10.1126/science.1184819. [10] T. A. B. Snijders, Models for Longitudinal Net- work Data, Structural Analysis in the Social Sciences, Cambridge University Press, 2005, p. 215247. doi:10.1017/CBO9780511811395.011. [11] T. A. B. Snijders, Siena: Statistical Modeling of Longitudinal Network Data, Springer New York, New York, NY, 2014, pp. 1718–1725. doi:10. 1007/978-1-4614-6170-8_312. [12] I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, F. Schweitzer, Causality-driven slow-down and speed-up of diffusion in non- markovian temporal networks, Nature commu- nications 5 (1) (2014) 5024–5033. doi:10.1038/ ncomms6024. [13] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West, R. Lambiotte, Memory in net- work flows and its effects on spreading dynam- ics and community detection, Nature communi- cations 5 (1) (2014) 4630–4643. doi:10.1038/ ncomms5630. [14] R. Lambiotte, V. Salnikov, M. Rosvall, Effect of memory on the dynamics of random walks on networks, Journal of Complex Networks 3 (2) (2015) 177–188. doi:10.1093/comnet/cnu017. [15] T. P. Peixoto, M. Rosvall, Modelling se- quences and temporal networks with dy- namic community structures, Nature commu- nications 8 (1) (2017) 582–594. doi:10.1038/ s41467-017-00148-9. [16] I. Scholtes, When is a network a network?: Multi-order graphical model selection in path- ways and temporal networks, in: Proceedings of the 23rd ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining, Vol. 1 of KDD 2017, ACM, 2011, pp. 1037–1046. doi:10.1145/3097983.3098145. [17] M. Brucato, D. Montesi, Metric spaces for tem- poral information retrieval, in: European Con- ference on Information Retrieval, Vol. 8416 of LNCS, Springer Berlin Heidelberg, 2014, pp. 385–397. doi:10.1007/978-3-319-06028-6_ 32. [18] B. O'Connor, R. Balasubramanyan, B. R. Rout- ledge, N. A. Smith, From tweets to polls: Link- ing text sentiment to public opinion time series., in: W. W. Cohen, S. Gosling (Eds.), Proc. of the Eleventh International Conference on Web and Social Media, The AAAI Press. [19] P. S. Dodds, C. M. Danforth, Measuring the happiness of large-scale written expression: Songs, blogs, and presidents, Journal of Hap- piness Studies 11 (2) (2010) 441–456. doi: 10.1007/s10902-009-9150-9. [20] R. V. Sole, B. C. Murtra, S. Valverde, L. Steels, Language networks: Their structure, function, and evolution, Complexity 15 (6) (2010) 20–26. 21 [21] J. Chang, D. M. Blei, Relational topic mod- els for document networks., in: D. A. V. Dyk, M. Welling (Eds.), AISTATS, Vol. 5 of JMLR Proceedings, JMLR.org, 2009, pp. 81–88. [22] F. Menczer, Evolution of document networks, Proceedings of the National Academy of Sci- ences 101 (suppl 1) (2004) 5261–5265. doi: 10.1073/pnas.0307554100. [23] X. Ren, Y. Lv, K. Wang, J. Han, Compara- tive document analysis for large text corpora, in: Proc. of the Tenth ACM International Con- ference on Web Search and Data Mining, WSDM '17, ACM, New York, NY, USA, 2017, pp. 325– 334. doi:10.1145/3018661.3018690. [24] J. Chang, J. Boyd-Graber, D. M. Blei, Connec- tions between the lines: Augmenting social net- works with text, in: Proc. of the 15th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining, KDD '09, ACM, New York, NY, USA, 2009, pp. 169–178. doi:10.1145/1557019.1557044. [25] C. Wang, Y. Song, H. Li, Y. Sun, M. Zhang, J. Han, Distant meta-path similarities for text- based heterogeneous information networks, in: Proc. of the 2017 ACM on Conference on In- formation and Knowledge Management, CIKM '17, ACM, New York, NY, USA, 2017, pp. 1629– 1638. doi:10.1145/3132847.3133029. [26] J. Kralj, A. Valmarska, M. Grcar, M. Robnik- Sikonja, N. Lavrac, Analysis of Text-Enriched Heterogeneous Information Networks, Springer International Publishing, Cham, 2016, pp. 115– 139. doi:10.1007/978-3-319-26989-4_5. [27] C. Roth, Knowledge Communities and Socio- Cognitive Taxonomies, Springer International Publishing, Cham, 2017, pp. 1–18. doi:10. 1007/978-3-319-64167-6_1. [28] I. Hellsten, L. Leydesdorff, Automated analy- sis of topic-actor networks on twitter: New ap- proach to the analysis of socio-semantic net- works, CoRR abs/1711.08387. arXiv:1711. 08387. [29] C. Roth, J.-P. Cointet, Social and semantic co- evolution in knowledge networks, Social Net- works 32 (1) (2010) 16 – 29, dynamics of So- cial Networks. doi:10.1016/j.socnet.2009. 04.005. [30] I. for Scientific Information, E. Garfield, I. Sher, R. Torpie, The Use of Citation Data in Writing the History of Science, Institute for Scientific In- formation, 1964. [31] V. Batagelj, Efficient algorithms for citation net- work analysis, CoRR cs.DL/0309023. [32] H. D. White, B. C. Griffith, Author cocita- tion: A literature measure of intellectual struc- ture, Journal of the American Society for In- formation Science 32 (3) (1981) 163–171. doi: 10.1002/asi.4630320302. [33] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, N. Glance, Cost-effective outbreak net- works, International conference on Knowledge Discovery and Data Mining (KDD) (2007) 420doi:10.1145/1281192.1281239. detection in [34] M. Magnani, D. Montesi, L. Rossi, Conver- sation retrieval Inf. Retr. 15 (3-4) (2012) 354–372. doi:10.1007/ s10791-012-9189-9. for microblogging sites, [35] R. Lambiotte, L. Tabourier, J.-C. Delvenne, Burstiness and spreading on temporal networks, The European Physical Journal B 86 (7) (2013) 320. doi:10.1140/epjb/e2013-40456-9. [36] A. Paranjape, A. R. Benson, J. Leskovec, Mo- tifs in temporal networks, in: Proc. of the 10th ACM International Conference on Web Search and Data Mining, WSDM '17, ACM, New York, NY, USA, 2017, pp. 601–610. doi:10.1145/ 3018661.3018731. [37] T. Viard, M. Latapy, C. Magnien, Comput- ing maximal cliques in link streams, Theoreti- cal Computer Science 609 (1) (2016) 245–252. doi:10.1016/j.tcs.2015.09.030. 22 [38] J. Cheng, L. A. Adamic, J. M. Kleinberg, J. Leskovec, Do cascades recur?, in: Proc. of the 25th international conference on world wide web, International WWW Conferences Steering Committee, 2016, pp. 671–681. [39] J. Kim, J. Diesner, Over-time measurement of triadic closure in coauthorship networks, Social Network Analysis and Mining 7 (1) (2017) 9. doi:10.1007/s13278-017-0428-3. [40] V. Batagelj, S. Praprotnik, An algebraic ap- proach to temporal network analysis based on temporal quantities, Social Network Analysis and Mining 6 (1) (2016) 1–28. doi:10.1007/ s13278-016-0330-4. [41] A.-L. Barabasi, R. Albert, Emergence of scal- ing in random networks, Science 286 (5439) (1999) 509–512. doi:10.1126/science.286. 5439.509. [42] H. H. K. Lentz, T. Selhorst, I. M. Sokolov, Unfolding accessibility provides a macroscopic approach to temporal networks, Phys. Rev. 110 (11) (2013) 118701–118706. doi:10.1103/ PhysRevLett.110.118701. [43] O. Alonso, M. Gertz, R. Baeza-Yates, On the value of temporal information in information retrieval, SIGIR Forum 41 (2) (2007) 35–41. doi:10.1145/1328964.1328968. [44] N. Kanhabua, R. Blanco, K. Nørvag, Temporal information retrieval, Found. Trends Inf. Retr. 9 (2) (2015) 91–208. doi:10.1561/1500000043. [45] V. Lavrenko, M. Schmill, D. Lawrie, P. Ogilvie, D. Jensen, J. Allan, Mining of concurrent text and time series, in: SIGKDD workshop on text mining, 2000, pp. 37–44. [46] E. Kotsakis, Structured information retrieval in xml documents, in: Proc. of the 2002 ACM Symposium on Applied Computing, SAC '02, ACM, New York, NY, USA, 2002, pp. 663–667. doi:10.1145/508791.508919. [47] C. Bothorel, J. D. Cruz, M. Magnani, B. Mi- cenkova, Clustering attributed graphs: models, measures and methods, Network Science 3 (3) (2015) 408–444. [48] J. Diesner, K. M. Carley, Revealing social struc- ture from texts: Meta-matrix text analysis as a novel method for network text analysis, in: Causal Mapping for Research in Information Technology, 2004, pp. 81–108. [49] C. Shi, Y. Li, J. Zhang, Y. Sun, S. Y. Philip, A survey of heterogeneous information network analysis, IEEE Transactions on Knowledge and Data Engineering 29 (1) (2017) 17–37. [50] X. Ren, A. El-Kishky, C. Wang, J. Han, Au- tomatic entity recognition and typing in mas- sive text corpora, in: Proc. of the 25th In- ternational Conference Companion on World Wide Web, WWW '16 Companion, Interna- tional WWW Conferences Steering Committee, Geneva, Switzerland, 2016, pp. 1025–1028. doi: 10.1145/2872518.2891065. [51] J. F. Sowa, Principles of semantic networks: Ex- plorations in the representation of knowledge, Morgan Kaufmann, 2014. [52] M. Rosen-Zvi, T. Griffiths, M. Steyvers, P. Smyth, The author-topic model for authors and documents, in: Proc. of the 20th Conference on Uncertainty in Artificial Intelligence, UAI '04, AUAI Press, Arlington, Virginia, United States, 2004, pp. 487–494. [53] L. Tamine, L. Soulier, L. Ben Jabeur, F. Am- blard, C. Hanachi, G. Hubert, C. Roth, So- cial media-based collaborative information ac- cess: Analysis of online crisis-related twitter con- versations, in: Proc. of the 27th ACM Confer- ence on Hypertext and Social Media, HT '16, ACM, New York, NY, USA, 2016, pp. 159–168. doi:10.1145/2914586.2914589. [54] M. Gomez Rodriguez, J. Leskovec, A. Krause, Inferring networks of diffusion and influence, 23 Search and Data Mining, WSDM '17, ACM, New York, NY, USA, 2017, pp. 731–739. doi: 10.1145/3018661.3018667. [63] M. Kivela, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, M. A. Porter, Multilayer Networks, Journal of Complex Networks 2 (3) (2014) 203–271. doi:10.1093/comnet/cnu016. [64] M. E. Dickison, M. Magnani, L. Rossi, Mul- tilayer Social Networks, Cambridge University Press, 2016. in: Proceedings of the 16th ACM SIGKDD In- ternational Conference on Knowledge Discov- ery and Data Mining, KDD '10, ACM, New York, NY, USA, 2010, pp. 1019–1028. doi: 10.1145/1835804.1835933. [55] M. Salehi, R. Sharma, M. Marzolla, M. Mag- nani, P. Siyari, D. Montesi, Spreading processes in multilayer networks, IEEE Transactions on Network Science and Engineering 2 (2) (2015) 65–83. doi:10.1109/TNSE.2015.2425961. [56] S. S´cepanovi´c, I. Mishkovski, B. Gon¸calves, T. H. Nguyen, P. Hui, Semantic homophily in online communication: Evidence from twitter, Online Social Networks and Media 2 (2017) 1– 18. doi:10.1016/j.osnem.2017.06.001. [57] T. Gross, B. Blasius, Adaptive coevolutionary networks: a review, Journal of The Royal Soci- ety Interface 5 (2008) 259–271. [58] M. Magnani, L. Rossi, Formation of multiple networks, in: International Conference on So- cial Computing, Behavioral-Cultural Modeling, and Prediction, Vol. 7812 of LNCS, Springer Berlin Heidelberg, 2013, pp. 257–264. doi: 10.1007/978-3-642-37210-0. [59] D. Kimura, Y. Hayakawa, J.-C. Delvenne, Co- evolutionary networks with homophily and het- erophily, Phys. Rev. E 78 (1) (2008) 161–168. doi:10.1103/PhysRevE.78.016103. [60] J. Lee, M. Zaheer, S. Gnnemann, A. Smola, Pref- erential Attachment in Graphs with Affinities, in: G. Lebanon, S. V. N. Vishwanathan (Eds.), Proc. of the Eighteenth International Conference on Artificial Intelligence and Statistics, Vol. 38 of Proc. of Machine Learning Research, San Diego, California, USA, 2015, pp. 571–580. [61] P. Goyal, E. Ferrara, Graph embedding tech- niques, applications, and performance: A sur- vey, CoRR abs/1705.02801. arXiv:1705.02801. [62] X. Huang, J. Li, X. Hu, Label informed at- tributed network embedding, in: Proc. of the 10th ACM International Conference on Web 24
1809.00289
1
1809
2018-09-02T04:23:43
Opinion Conflicts: An Effective Route to Detect Incivility in Twitter
[ "cs.SI" ]
In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information for efficient incivility detection which significantly outperforms multiple baseline methods achieving an impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also study the behavioral aspects of the targets and account holders and try to understand the reasons behind the incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior. In particular, we find that there are a significant fraction of account holders who act as repeat offenders - attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times. In general, the targets are found to have higher reputation scores than the account holders.
cs.SI
cs
Opinion Conflicts: An Effective Route to Detect Incivility in Twitter SUMAN KALYAN MAITY, Northwestern University, USA AISHIK CHAKRABORTY, McGill University, Canada PAWAN GOYAL, Indian Institute of Technology Kharagpur, India ANIMESH MUKHERJEE, Indian Institute of Technology Kharagpur, India In Twitter, there is a rising trend in abusive behavior which often leads to incivility1. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information for efficient incivility detection which significantly outperforms multiple baseline methods achieving an impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also study the behavioral aspects of the targets and account holders and try to understand the reasons behind the incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior. In particular, we find that there are a significant fraction of account holders who act as repeat offenders - attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times. In general, the targets are found to have higher reputation scores than the account holders. CCS Concepts: • Human-centered computing → Social media; Social content sharing; Empirical studies in collaborative and social computing; Additional Key Words and Phrases: Incivility, cyberbullying, opinion conflicts, Twitter ACM Reference Format: Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee. 2018. Opinion Conflicts: An Effective Route to Detect Incivility in Twitter. Proc. ACM Hum.-Comput. Interact. 2, CSCW, Article 117 (January 2018), 27 pages. https://doi.org/10.1145/3274386 1 INTRODUCTION Twitter is one of the most popular online micro-blogging and social networking platforms. However, of late, this social networking site has turned into a destination where people massively abuse and act in an incivil manner. This trend is affecting the users mentally and as a result they tend to leave 1https://phys.org/news/2016-11-twitter-tool-curb-online-abuse.html This research has been performed when SKM and AC were at IIT Kharagpur, India. Authors' addresses: Suman Kalyan Maity, Northwestern University, Kellogg School of Management and Northwestern Institute on Complex Systems, Evanston, IL, 60208, USA, [email protected]; Aishik Chakraborty, McGill University, School of Computer Science, Montreal, Canada, [email protected]; Pawan Goyal, Indian Institute of Technology Kharagpur, Department of Computer Science and Engineering, Kharagpur, 721302, India, pawang@ cse.iitkgp.ernet.in; Animesh Mukherjee, Indian Institute of Technology Kharagpur, Department of Computer Science and Engineering, Kharagpur, 721302, India, [email protected]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2018 Association for Computing Machinery. 2573-0142/2018/1-ART117 $15.00 https://doi.org/10.1145/3274386 Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117 117:2 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee Twitter and other such social networking sites. In an article in Harvard Business Review 2016[44], the author claims that abuse and bullying are the primary reasons why this micro-blogging site is losing its active user base. For instance, in August 2014, the Gamergate controversy2 [19, 20, 43, 68] broke out in Twitter and other social media platforms. The Gamergate controversy originated from alleged improprieties in video game journalism and quickly grew into a larger campaign (conducted primarily through the use of the hashtag #GamerGate) centered around sexism and social justice. Gamergate supporters took to massive incivil behavior e.g., sexual harassment, doxing, threats of rape and murder. 1.1 What is incivility? In general, incivility involves sending harassing or threatening messages (via text message or e-mail), posting derogatory comments about someone on a website or a social networking site (such as Facebook, Twitter etc.), or physically threatening or intimidating someone in a variety of online settings [15, 28, 42, 65, 66, 78]. In contrast, cyberbullying is defined in the literature as intentional incivil behavior that is repeatedly carried out in an online context against a person who cannot easily defend himself or herself [63, 80, 105]. The important differences between incivility and cyberbullying are that for the latter there is i) a continuous repetition of the act and ii) the existence of imbalance of power between the target and the perpetrator. 1.2 Impact of incivility/bullying Since online content spread fast and have a wider audience, the persistence and durability can make the target as well as bystanders read the account holder's words over and over again resulting in strongly adverse effects [16]. It can, thereby, potentially cause devastating psychological setbacks like depression, low self-esteem, suicide ideation, and may even ultimately lead to actual suicides among the targets [71] [50, 73]. Teenagers are mostly affected by this; in fact, more than half of the American teens have been the targets of incivility/bullying3. Not only kids, adults too are subjected to incivility/bullying4, 5. Owing to the increasing prevalence of social media, celebrity bullying also takes place frequently which is supported by various articles [9, 27, 30]. Facebook, Twitter, YouTube, Ask.fm, and Instagram have been listed as the top five networks having the highest percentage of users who report incidents of incivility6. The rapid spread of this activity over the social media calls for immediate active research to understand how incivility occurs on OSNs today [40]. This investigation can help in developing effective techniques1 to accurately detect and contain cases of incivility. 1.3 Working definition of incivility used in this paper In this paper, we are specifically interested to study in depth the incivil behavior of Twitter users. Note that we do not consider cyberbullying in this study since it is very different in characteristics from incivility and calls for a completely separate line of investigation. In the following we present a working definition of incivility that is largely accepted in the community and shall be used all through in the rest of the paper. Working definition: We adopt the definition of incivility as an act of sending or posting mean text messages intended to mentally hurt, embarrass or humiliate another person using computers, 2https://en.wikipedia.org/wiki/Gamergate_controversy 3https://cyberbullying.org/ 4https://cyberbullying.org/bullying-is-not-just-a-kid-problem 5https://cyberbullying.org/Preventing-cyberbullying-top-ten-tips-for-adults.pdf 6https://www.ditchthelabel.org/research-papers/ Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:3 cell phones, and other electronic devices [28, 31, 32, 42, 94]. In the dataset section we precisely operationalize this definition for the experiments that follow. 1.4 Research objectives and contributions In this paper, we analyze a large Twitter dataset for incivility detection followed by a detailed post-hoc analysis of the detected tweets. Toward this objective, we make the following contributions. • We study the behavioral aspects of the targets and account holders and try to understand the reason for the incivility incidents. Our central observation is that incivility in Twitter is strongly correlated to opinion conflicts between the account holder and the target. Further analysis of target and account holder profiles across the linguistic and the cognitive dimensions reveals that account holders generally tend to use more swear words, negations; express more emotions and tweet more related to body and sexual categories. • Once we have established the association of opinion differences between account holder and target toward named entities in incivility incidents, we propose a deep learning framework based on bi-directional LSTMs and character-CNNs and incorporate the entity-specific sentiment and followership information. Our model achieves an accuracy of 93.3% with an F1-score of 0.82 which significantly outperforms (4.9%, 6.5% improvements w.r.t accuracy, F1-score respectively) the best performing baseline. • We then conduct a post-hoc analysis of the incivility tweets on the entire dataset and study repetitions in incivility. We find that there exists a significant fraction of account holders who act as repeat offenders. In line of previous works [35, 36, 81], our results also confirm prior findings of targets being attacked multiple times and targets having usually more followers. The existence of this imbalance of power in terms of the social prestige and reputation between the target and the account holder is quite interesting because of its role reversal unlike cyberbullying incidents where the power lies mostly with the account holder. 1.5 Outline of the paper We have various subsegments in this paper that we build up layer by layer to finally obtain the detection model. The entire pipeline is illustrated in Figure 1. As a first step tweets are labeled as incivil and then the timelines of the account holder and the target are crawled. This is followed by the construction of the incivility context (to be defined later). From the context, target sentiments are extracted using standard Target Dependent Sentiment Analysis (TDSA) technique. Opinions of the account holders and the targets are compared to finally ascertain opinion conflicts. This feature is then pipelined into to a deep neural framework to automatically classify a tweet as incivil. 2 RELATED WORK There have been several works in the area of incivility - online harassment, cyberbullying, trolling etc., by researchers from various communities encompassing sociologists, psychologists and com- puter scientists. The overall literature in this area can be classified into two major categories based on the approaches taken to address the issues in incivility -- i) survey/interview based approaches (non-computational) ii) computational approaches. 2.1 Survey/interview based approaches Some of the very early works in the area of cyberbullying came from developmental psychology and sociology using survey/interview based approaches. Most of these studies deal with cyberbullying among school students and youth. Prevalence of bullying: The prevalence of cyberbullying incidents in these studies varies from ∼ 6% to 72%. Finkelhor et al. [39] report that ∼ 6% of youth have been harassed online whereas Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:4 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee Fig. 1. Schematic of the steps for incivility detection. The yellow colored blocks represent inputs, the red colored blocks represent the classifiers and the blue colored blocks represent the intermediate steps. Juvonen and Gross [59] report this number to be 72%. Most of the other studies estimate that 6 − 30% of teens have experienced cyberbullying [47]. Similarly, the number of youth who admit to cyberbullying is relatively lesser (3-44%) [47]. These variability in the numbers is largely due to the following facts -- cyberbullying has been defined in various different ways [73, 99, 105] and also sometimes the perception of bullying differs across age (youth understand it differently compared to adults [11, 67]); the authors in these studies adopted various different sampling and methodological strategies [97]. Despite differences in rate of cyberbully incidents, the prominence of the factor among adolescents is well-grounded. Sociodemographics: Cyberbullying though similar to traditional (offline) bullying embarks char- acteristic differences in sociodemographics [90]. In contrast to school bullying (offline) where boys are found to be more likely targets [17, 76], in cyberbullying there is no consensus on the role of gender in bullying [97]. Some studies have found that girls are more likely to be targets of cyberbullying [62, 100] yet other studies have found no gender differences [49, 102, 106]. Age is another characteristic in which cyberbullying patterns differ from traditional bullying. Although there is a decreasing trend of traditional bullying from middle to high school [76], some studies suggest that cyberbullying incidents increase during the middle school years [62, 102] and others have found no consistent relationship between cyberbullying and age [59, 95]. Effect of cyberbullying: There have been studies on the effect of cyberbullying incidents on the adolescents. Researchers have found that cyberbullying incidents are associated with experience of sadness, anger, frustration, depression, embarrassment or fear [48, 74, 79, 107] and these emotions have been correlated with delinquency and interpersonal violence among youth and young adults [2, Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:5 12, 69, 70]. Apart from these, cyberbullying has been associated with various other behavioral and psychological outcomes like suicide, school drop-out, aggression and fighting, drug usage and carrying weapons to schools [37, 48 -- 51, 91, 106, 107]. In a recent study by Singh et al. [94], the authors have observed the influence of newer mobile app features like perceived ephemerality, location-based communication and image-based messaging etc. on cyberbullying in high school and its effect on school students. Critical observations from the above: Interpretation of cyberbullying seems to be conditioned on age (youths and adults interpret them differently). The role of gender in cyberbullying is unclear. There could be a multitude of effects of cyberbullying ranging from depression, sadness, embarrassment to more severe incidents like fighting, drug use and carrying weapons. 2.2 Computational approaches There have been several works in computer science domain mainly focusing on automatic detection of cyberbullying in social media largely based on text analytic approaches applied to online comments [22, 31, 61, 85, 89, 104, 108]. Content based approaches: Language usage: There are several works that focus on usage of language - specific high frequent terms associated with bullying incidents. Reynolds et al. [85] use curse and insult words with their level of offensive intensity as primary indicators for detection of cyberbully incidents. Chen et al. [22] propose a user-level offensiveness detection method by introducing Lexical Syntactic Feature (LSF) architecture to detect offensive content and potential offensive users. They observe the contribution of pejoratives/profanities and obscenities in determining offensive content, and propose hand-crafted syntactic rules to detect name-calling harassments. They incorporate user's writing style, structure and specific cyberbullying content as features to predict the user's potential to post offensive content. Kontostathis et al. [61] also focus on language used in cyberbullying incidents. They perform analysis of the words used in connection to cyberbullying incidents on Formspring.me and further use those words and their context words to build a cyberbullying detection framework. Gender role: Chisholm in a social study [25] show that there exist differences between males and females in the way they bully each other. Females tend to use relational styles of aggression, such as excluding someone from a group and ganging up against them, whereas males use more threatening expressions and profane words. Following this study, Dadvar et al. [29] leverage gender- specific language usage for cyberbully detection on MySpace profiles and show that such gender information improves the accuracy of the classifier. Sentiment usage: Hee et al. [98] use sentiment lexicon and content of the text as bag-of-words (unigram/bigrams of words and character trigrams) for detection of cyberbully posts on a corpora of ∼ 91, 000 Dutch posts from Ask.fm. Nahar et al. [75] use sentiment features generated from Probabilistic Latent Semantic Analysis (PLSA) on cyberbully texts and bag-of-word features to detect cyberbullying incidents. Further, they detect and rank the most influential persons (bullies and targets). Mitigation of cyberbullying incidents: Dinakar et al. [31] address the problem of detection of cyberbullying incidents and propose an intervention technique by notifying participants and net- work moderators and offering targeted educational material. In this work, they present an approach for bullying detection based on natural language processing and a common sense knowledge base that allows recognition over a broad spectrum of topics in everyday life. They construct BullySpace, a common sense knowledge base that encodes particular knowledge about bullying from various associated subject matters (e.g., appearance, intelligence, racial and ethnic slurs, social acceptance, and rejection) and then perform a joint reasoning with common sense knowledge. To mitigate the Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:6 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee problem of cyberbullying, they propose a set of intervention techniques. They propose an "air traffic control"-like dashboard, that alerts moderators to large-scale outbreaks of bullying incidents that appear to be escalating or spreading and help them prioritize the current deluge of user complaints. For potential victims, they provide educational material that informs them about coping with the situation, and connects them with emotional support from others. Leveraging contextual information: Apart from the content of the text, the contextual information is also important and relevant for cyberbully detection since the lexicon based filtering approach is prone to problems around word variations and lack of context. Yin et al. [108] use a supervised learning methodology for cyberbully detection using content and sentiment features, as well as contextual (documents in the vicinity) features of the considered documents on Slashdot and MySpace dataset. Similarly, Zhong et al. [110] study cyberbullying of images on Instagram using text as well as image contextual features. Hosseinmardi et al. [55] examine the users who are common to both Instagram and Ask.fm and analyze the negativity and positivity of word usage in posts by common users of these two social networks. Hosseinmardi et al. in two related works [56, 57] study detection and prediction of cyberbullying. In [57], the authors detect cyberbullying in Instagram by classifying images to different categories and further including text features from comments. In [56], the authors try to predict cyberbullying instances using the initial posting of the media object, any image features derived from the object, and any properties extant at the time of posting, such as graph features of the profile owner. In a recent paper [19], Chatzakou et al. employ a more robust approach considering text, user and users' follower-followee network-based attributes for detecting aggression and bullying behavior on Twitter. In this paper, the prime objective of the authors is to distinguish cases of cyberbullying from aggression and spamming. In a related vein, Chatzakou et al. [18, 20] study cyberbullying and aggression behavior in GamerGate controversy (a coordinated campaign of harassment in the online world) on Twitter. Kwak et al. [64] have analyzed a large-scale dataset of over 10 million player reports on 1.46 million toxic players from one of the most popular online game in the world, the League of Legends. They observe reporting behavior and find that players are not engaged in actively reporting toxic behavior and this engagement can be significantly improved via explicit pleas from other players to report. There are significantly varying perceptions of what constitutes toxic behavior between those that experienced it and neutral third parties. There are biases with respect to reporting allies vs. enemies. There are also significant cultural differences in perceptions concerning toxic behavior. Chen et al. [21] in a recent study, present a dataset of user comments, using crowdsourcing for labeling. Due to ambiguity and subjectivity in abusive content from the perspective of individual reader, they propose an aggregated mechanism for assessing different opinions from different labelers. In addition, instead of the typical binary categories of abusive or not, they introduce an additional third category of 'undecidedness' to capture the instances that are neither blatantly abusive nor clearly harmless. They evaluate against the performance of various feature groups, e.g., syntactic, semantic and context-based features which yield better classification accuracy. Samghabadi et al. [88] perform similar study of nastiness (invective in online posts) detection in social media. They present evolving approaches for creating a linguistic resource to investigate nastiness in social media. The starting point is selecting profanity-laden posts as a likely hostile source for invective potentially leading to cyberbullying events. They use various types of classic and new features, and try to combine them for distinguishing extremely negative/nasty text from the rest of them. In a recent study, Hosseini et al. [53] analyze the recent advancement of Google's Perspective API for detecting toxic comments and show that the system can be fooled by slight perturbation of abusive phrases to receive very low toxicity scores, while preserving the intended meaning. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:7 Pavlopoulos et al. [81] have recently introduced deep neural models to moderate abusive (hate speech, cyberbullying etc.) user content. Critical observations from the above: Both content and context have been extensively used to design hand-crafted features for detection of cyberbullying. There have also been one or two attempts to use deep learning techniques to abusive content moderation in general. However, there are hardly any approach that marry deep neural models with features that could be critically responsible for the invocation of incivil posts. Hate Speech: Hate speech detection has been studied by various researchers. These works use several lexical properties such as n-gram features [77], character n-gram features [72], word and paragraph embeddings [33, 77] to detect hate speech. Apart from detection, there exist research works that look into various aspects of hate targets and the instigators. Silva et al. [93] study the targets of online hate speech by searching for sentence structures similar to "I <intensity> hate <targeted group>". They find that the top targeted groups are primarily bullied for their ethnicity, behavior, physical characteristics, sexual orientation, class, or gender. ElSherief et al. [36] present the comparative study of hate speech instigators and target users on Twitter. They study the characteristics of hate instigators and targets in terms of their profile self-presentation, activities, and online visibility and observe that hate instigators target more popular (celebrities with a higher number of followers) Twitter users. Their personality analysis of hate instigators and targets show that both groups have eccentric personality facets that differ from the general Twitter population. In another concurrent paper, ElSherief et al. [35] focus on the hate targets - either directed toward an individual or toward a group of people. They perform the linguistic and psycholinguistic analysis of these two forms of hate speech and show that directed hate speech, being more personal and directed, is more informal, angrier, and often explicitly attacks the target (name calling) with fewer analytic words and more words suggesting authority and influence. Generalized hate speech, on the other hand, is dominated by religious hate, is characterized by the mentions of lethal words such as murder, exterminate, and kill; and quantity words such as million and many. In our study, as well, we observe similar findings regarding the accounts and targets. Trolling: Trolling has been defined in the literature as behavior that falls outside acceptable bounds defined by those communities [7, 45]. There have been divided opinions on trolling behavior. Prior research works suggest that trolls are born and not made: those engaging in trolling behavior have unique personality traits [14] and motivations [3, 46, 92]. However, there is other school of thought suggesting that people can be influenced by their environment to act aggressively [26, 58]. Cheng et al. [23] in a recent study, focus on the causes of trolling behavior in discussion communities. By understanding the reason behind trolling and its spreads in communities, one can design more robust social systems that can guard against such undesirable behavior. 2.3 The present work Our work is different from the previous works in several ways. We focus on understanding the incivility incidents on general population in Twitter (unlike most of the previous studies which are based on children or teens and dated online platforms like FormSpring, MySpace etc.). While most of the survey/interview based techniques concentrate on analyzing the effects and consequences of these incidents after the incident has happened, we attempt to (i) early detect the incidents of incivility in the first place and then (ii) analyze the behavioral aspects of the account holder and the targets so detected. Though there have been several lexicon-based studies, they have rarely reused any labeled data from previous researchers due to incompatibility issues of applying on different platforms. Our study, though on Twitter, can be used in other social media platforms because of presence of a single user in multiple platforms and essentially similar language usage trend. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:8 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee In particular, we observe that opinion conflict (target and account holder showing opposite sentiments towards same named entities) is associated with incivility and we believe that this aspect has not been earlier reported in the literature, not even in any of the earlier computational studies. We then propose a deep learning based model that can automatically detect incivility text more efficiently by correctly exploiting the aforementioned connection between incivility incidents and target dependent expression of sentiments. This fusion of a deep neural model with a critical feature that stems from opinion conflict is a prime novelty of our work. 3 DATASET PREPARATION Recall that our working definition of incivility refers to the act of sending or posting mean text messages intended to mentally hurt or embarrass a target. In this section we describe how we operationalize this definition through the assemblage of appropriate data. 3.1 Operationalizing the definition of incivility Although incivility is rising in Twitter1, from automated crawls, it is difficult to obtain data contain- ing direct incivility instances. However, our working definition presents us with one important clue that incivility tweets should generally contain offensive/mean words. We use a list of such offensive words compiled by Luis von Ahn of Carnegie Mellon University7. This list is very comprehensive and larger than any list containing offensive words known to us or used previously by other authors. This list has been used by various authors [1, 4, 13, 21, 41, 83] in the past and this rich literature justifies our choice. The list contains 1374 offensive words. The offensive words included in the list can be categorized as: (i) Swear/profane words: f**k, a$$hole, b*tch etc., (ii) Negative words: die, hell, death etc. and (iii) Others: enemy, drug etc. Note that the list contains certain words that some of the people would not find offensive. However, incivil tweets have a very high chance of having these offensive words8. We do understand that these may not cover all instances of incivility and might affect the recall of our models which is a limitation of our treatment of the problem. However, the precision of the system should not be affected by this limitation and the current target of the paper is to build a highly precise system. We then use these words to filter the Twitter data stream. The crawling has been done from August to December 2017. We filter the tweets in which any of those offensive words are present. We obtain a total of ∼2,000,000 tweets containing one or more such offensive words. Out of the 1374 offensive words, 59.4% of words have been used at least once, 54.9% have been used at least twice and 47.8% have been used at least thrice. Some offensive words have also been used in as high as 1.3% of the tweets. 3.2 Mention based filtering of the dataset We further filter the dataset based on the presence of mentions in the tweets. This is because in general, any conversation in Twitter should contain mention(s) and an account holder would generally mention the target in their (incivil) tweets. We consider only those tweets in which one or more mentions appear. This reduces the tweet dataset to ∼300,000 tweets from the earlier ∼2,000,000 tweets. Note that this step operationalizes the second part of the working definition of incivility, i.e., the offensive text is usually targeted to an individual, which in this case is the mentioned target. 7https://www.cs.cmu.edu/ biglou/resources/bad-words.txt 8Note that the number of incivil tweets in a random sample of tweets is very low. In fact, we observe that in a random sample of 100 tweets, there are only 2 tweets that fall into the category of incivility. Also the tweets that were incivil from the random sample contained words from the "mean" words list. After obtaining manually annotating the tweets as incivil or civil , we found that the fraction of mean words were higher in the incivil tweets. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:9 3.3 Manual labeling of the tweets While the previous step reduces some noise in the data, not all the tweets obtained are related to incivility. We, therefore, randomly sample 25,000 tweets out of these ∼300,000 tweets and manually label them as incivil/civil instances. We consider those cases where we have full agreement between the two authors who did the labeling. Out of the 25,000 tweets, we discard 729 tweets where there was a disagreement between the authors. In the 24,271 selected tweets where there was full agreement, we find 8,800 tweets as instances of incivility and the remaining 15,441 tweets as instances of civility. 3.4 Criteria for labeling the tweets Following are some of the broad cases where we have labelled the tweets as being incivil: (a) Blackmails or threats: These tweets have expressions of physical or psychological threats to the targets. Example: 'I'll smash you in the face when I see you.' (b) Insult: These tweets have insults that are abusive for the target. Example: 'You are such an a$$hole.' (c) Cursing: These tweets have expressions wishing that some grave misfortune befalls the target (like their or their loved one's death). Example: 'You'll die and burn in hell.' (d) Sexual harassment: These tweets contain unwanted sexual talk which might be derogatory. Example: 'Post a naked pic u sl*t!' While labelling the tweets, we took into account that some of these tweets although might contain offensive words are not cases of incivility, eg., 'Hey bitches, feel like seeing a movie tonight?' 4 TARGET SENTIMENTS & INCIVILITY In this section, we construct an incivility context to be able to perform an in-depth analysis of the reason for incivility. We find that contradicting sentiments (opinion conflicts) by the account holder and target toward a named entity, are highly correlated to the act of incivility. 4.1 The incivility context As described in the previous section, we label the incivil tweets and from the mention relationship, identify the target and the account holder. A typical example is as follows: @user1 what a dumb ass ** person you are, user2 Here user2 is the account holder while user1 is a target. In our work, we consider the mentions of an incivil tweet as the target. In case of multiple mentions, we consider all of the mentions as targets. However, it might be possible that some of the mentions are not actually targets (usually rare as observed through manual inspection) and is currently a limitation of our work which we wish to address in the future. Once we have the account holder-target pairs, we consider the targets' and the account holders' profiles and crawl their timeline (we get a maximum of 3,200 tweets per user). Also note that the timeline is crawled at around the same time we collected our dataset. We take the first 100 tweets from their timeline. We find that taking the first 100 tweets itself contains ample clues for us to investigate. The intuition behind constructing this context is that these tweets might contain the context that triggered the incivil tweet and thus these tweets should provide the best clues as to why the account holder targeted the target. In fact, for annotating the tweets in the previous section, the annotators in many instances had to visit the target and the account holder profiles to ensure if the instance was indeed a case of incivility. In almost all the cases where the annotators attested instances of incivility they observed opinion conflicts between the target and the account holder. We therefore attempt to automate this natural "back-and-forth" process adopted by the annotators for identifying Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:10 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee incivility instances and build the incivility context to automatically analyze such opinion conflicts by making comparisons between the target's and the account holder's timelines. From the example of incivility context cited below, we observe that the target tweets positively about Donald Trump and US Economy. However, the account holder tweets negatively about Trump and positively about President Obama. We can observe that there is a conflict of opinion between the target and the account holder as the sentiments expressed toward the common named entity Donald Trump is opposite. Going through the entire context, we find that this opinion conflict leads to an incident of incivil post. account holder's tweet: @user1 Enjoy prison a$$hole! account holder's context tweets: @user5 @user6 You sir, are just another clueless Trump lemming. @user7 @user8 Seriously, get your head out of Trump's ass already. Go watch your Fox News & Friends and eat your jello. @user8 The video of what your boyfriend said: Trump labels US justice system 'laughingstock' @CNNPolitics https://t.co/QNa2jqAYsE @user9 if the Devil was running as a Republican, would you still vote for him? Your morals and priorities are so screwed up. @user5 Seriously, let it f**king go. You are worse that a scorned girlfriend bringing up decades of shit that does not matter. You are the BIGGEST LOSER of all time. @user11 Trump idiot lemmings are condemning the outrage over slavery and agreeing w/the idiot Kelly about praising Lee? Clueless losers target's context tweets: @user10 You are truly stupid. Trump is the first President to come into Office supporting marriage equality Strange that the #fakenews media never gets stories wrong in favor of Trump. It's almost like they do it on purpose According to HuffPo, President Trump is effective, but they don't like it. Donald Trump's relentless focus on tax cuts, deregulation and draining the swamp is great for job growth... with minorities and so on ... Based on the 8800 incivility incidents in our manually labeled dataset, we obtain the incivility contexts. Since our hypothesis is that opinion conflicts between the account holders and the targets create the rift between them, we plan to use sentiment analysis as a tool to automatically identify the conflicts. In particular, we try to find out the sentiments expressed by the targets toward different named entities in their tweets. We also find out the sentiments expressed by the account holders toward the different named entities. Next we find the common named entities toward which the target and the account holder expresses positive or negative sentiments. Finally, we identify if the targets and the account holder have expressed opposing sentiments toward the same entity. We propose an algorithm to detect such opinion conflicts easily in the following subsections. 4.2 Step 1: Named entity recognition We use a named entity recognition (NER) system to identify named entities that will enable us to proceed further with the sentiment analysis. Recall that, according to our hypothesis, we first need to identify the named entities and then find the sentiments expressed by the users toward these named entities. For this purpose, we use the tool proposed in [86, 87]9 that is trained on Twitter data and performs much better than other traditional NER tools like the ones proposed in [38]10. 9https://github.com/aritter/twitter_nlp 10http://nlp.stanford.edu/software/CRF-NER.shtml Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:11 Classifier Accuracy Macro F1 TD-LSTM on benchmark dataset TD-LSTM on our dataset 69.2% 73.4% 0.68 0.71 Table 1. Accuracy of the TD-LSTM. 4.3 Step 2: Target dependent sentiment analysis After named entity recognition, we set out to obtain the sentiment polarity associated with each named entity in a given text. Our sentiment analysis model is based on an LSTM framework. A brief description of LSTMs and how we use it for target sentiment detection follows below. Long Short Term Memory (LSTM) Recurrent Neural Networks (RNNs) are used for handling tasks that use sequences. A recurrent network takes an input vector x and outputs a vector y. However, y depends on not only the current input, but on all the inputs fed into it in the past. RNNs are however not capable of handling long term dependences in practice [5]. It was observed that the backpropagation dynamics caused gradients in an RNN to either vanish or explode. The exploding gradient problem can be solved by the use of gradient clipping. [52] introduced LSTM to mitigate the problem of vanishing gradient. The LSTMs by design have a hidden state vector (ht) and also a memory vector ct at each timestep t. The gate equations at timestep t with input as xt and output as ot are: ft = σ(Wf .[ht−1, xt] + bf ) it = σ(Wi .[ht−1, xt] + bi) Ct = tanh(WC .[ht−1, xt] + bC) ct = ft ◦ ct−1 + it ◦ Ct ht = ot ◦ tanh(ct) ot = σ(Wo .[ht−1, xt] + bo) Here, the three vectors f , i, o are thought of as binary gates to control whether each memory cell is updated. The ◦ operation here denotes the element-wise matrix multiplication. Target dependent sentiment classification using LSTM: Here we describe a LSTM based model for target dependent (TD) sentiment classification. The model we use is adapted from [96]. The sentence representation in this model can be naturally considered as the feature to predict the sentiment polarity of the sentence. We use the glove vector word embeddings which are trained on 27 billion tokens and 2 billion tweets as the vector representation of the words. We use the target dependent LSTM approach (TD-LSTM) to find the sentiment polarity of the tweets toward a target. The training of the TD-LSTM is done in a supervised learning framework using cross entropy loss. We perform all parameter updates through backpropagation and stochastic gradient descent. Evaluation results: We use the benchmark dataset from [34]. We train it on their Twitter dataset having 6248 sentences and test it on 692 sentences. The percentages of positive, negative and neutral instances in both the training and test sets are 25%, 25% and 50% respectively. The accuracies reported in table 1 are obtained using 200 dimensional glove word embeddings. We manually label the sentiments of 100 random entities from our dataset. We achieve an accuracy of 73.4% on our dataset. The above accuracy has been obtained using the early stopping criteria and the same weight initializations as mentioned in [96]. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:12 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee 4.4 Observations from TD sentiment analysis In this section, we analyze the outcome of the TD sentiment analysis on the named entities. For each incivility context, we perform the NER and target dependent sentiment analysis. Specifically, we take all tweets in the incivility context of the account holders and targets and then run the NER on the tweets to extract the named entities. Then we run the TD-LSTM with targets as these named entities to get the target's polarities toward the named entities. We can conclude that the cases of incivility where the algorithm returns empty sets for both the positive and the negative sentiments for all the named entities are not related to contradicting sentiments between the account holder and the target. Sentiment expression toward different named entities: In Figure 2, we show the distribution of Neutral Positive Negative s e i t i t n e f o n o i t c a r F 0.8 0.6 0.4 0.2 0 company facility other movie person band product mentions Fig. 2. Comparison of sentiment toward different named entity classes. ·105 1.5 1 0.5 s t e g r a t f o o N 0 Tru m p M o ore @ F o x N e w s Y o utu be T m erica A laba m a R ealD P O R o y @ @ A T @ U S w itter C hrist m as T 3. Popular which express Fig. entities different toward senti- targets ments.(@RealDonaldTrump has been shortened as @RealDT.) Neutral Positive Negative 0.4 0.2 s r e s u f o n o i t c a r F 0 0-100 100-1 k 100 k-1 M 10 k-100 k 1 k-10 k 10 M -100 M 1 M -10 M Fig. 4. Sentiments versus follow- ership counts of targets. sentiments expressed toward different named entity classes by the targets in the incivility context. It is evident from the figure that users express opinions differently about different entities. For example, many users express negative sentiments toward a mention or a person. However, users express no opinion toward the majority of mentions. Further, users express negative sentiments more often than positive sentiments. This observation can act as an effective strategy to predict incivility incidents beforehand. Next we attempt to identify the popular entities toward which targets express sentiments (see Figure 3). It is evident from the figure that there are more targets expressing opinion about Trump, Youtube and Fox News. These entities might come on top due to the particular dataset used for this work. Table 2 shows examples where the target is attacked for expressing positive sentiment toward Trump in an example and negative sentiment in another. Sentiments and followership: We next study whether followership counts and the sentiments ex- pressed by a target have any correlation. Figure 4 shows the relationship between the sentiment expressed by the users and their number of followers. There is a distinct trend observed here. Users with moderately low followership (100-10K) tend to express more negative sentiments toward the named entities while the users with high followership (100K-10M) show more positive sentiments toward such entities. Usually incivility is associated to negative sentiments. It seems that users with high followership are less likely to be an account holder. In the later sections, we show that this is indeed true. Opinion conflicts. We have defined opinion conflicts as the case where the target and the account holder express opposing sentiments toward the same entity. For example, suppose the target T Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility Positive Sentiment Table 2. Sentiment toward a common named entity 117:13 Negative Sentiment Incivil tweets @user1 you really are a stupid dumb **. Do you know anything. Like trump you are a ** brainless **. Dumbo @user2 @user3 @user4 Since when do you have to be a politician to talk to people with respect you stupid moron. You are a fool. Incivility context RT @user5: The Washington Post calls out #Crooked- Hillary for what she REALLY is. A PATHOLOGICAL LIAR! Watch that nose grow! RT @user6: The Obama/Clinton admin has failed Amer- icans: "The Obama economy is trouble for Hillary Clin- ton" https://t.co/JBoCmyHj6v I don't think he's got a thing to apologize for... He is not a professional politician @user7: Trump is trying to go negative; drive up those numbers so that he &; Clinton are on the same page https://t.co/RlB00L32v9 expresses 10 sentiments toward entity E, out of which 8 are positive and 2 are negative. Similarly, suppose the account holder expresses 20 sentiments toward entity E, out of which 4 are positive and 16 are negative. Then, the overall sentiment toward the entity E by T is positive, whereas by A is negative. This counts as a single opinion conflict between A and T. We use this mechanism to compute the opinion conflict feature values. We find that opinion sentiments are highly correlated to incivility. We observe that 75% of the incivil tweets in our dataset have at least one opinion conflict between the targets and account holders. In contrast, there are only 53% civil incidents where there is an opinion conflict. Further, for each incivil incident, there are 2.52 ± 0.03 similar sentiments expressed, whereas, for each civil incident, the mean similar sentiments expressed is 4.49 ± 0.19. Thus, it is clear that most civility contexts come with an agreement of opinion (67% of total sentiments) whereas an incivility context is filled with opinion conflicts (49% of total sentiments). Therefore, we use this concept as a potential strategy for incivility detection and further use this as a feature in our subsequent models. 5 BEHAVIOR OF THE ACCOUNT HOLDERS AND THE TARGETS In this section, we study the socio-linguistic behavior of the targets and the account holders. Specifically, we analyze their user profiles to study followership behavior, tweeting behavior and psycholinguistic dimensions. 5.1 Followerships In Figure 5, we show the followership distribution of the user profiles in our dataset. It is evident from the figure that our dataset is a good mix of both normal users as well as celebrity users. Figure 6 shows a comparison between the follower counts of the account holder and the target accounts. The figure indicates that the target accounts are more popular than the account holder accounts (p-value of significance is < 10−5). Apparently, many well known users or celebrities tend to be targets of incivility. A number of news articles also seem to mention this [9, 27, 30]. Moreover, usually celebrities (i.e., those with typically high follower counts) tend to avoid insulting someone on social media sites. 5.2 Tweeting behavior The following analysis has been done on the timeline crawls of the account holders and the targets to identify differences in their respective tweeting patterns. Figure 7 shows a comparison between the account holder and the target accounts with respect to their tweeting behavior. We observe that there are more account holders who tweet less or moderately compared to the targets (p-value of significance is < 10−5). However, in the high tweeting zone, there are comparatively more targets than the account holders. In fact, there are several accounts with more than 100K tweets. These are Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:14 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee Fig. 5. Followership distribution of all the users in our dataset. Account Holder Target 0.4 Account Holder Target y t i l i b a b o r P 0.2 0 1-100 100-1 k 1 k-10 k 10 k-100 k 100 k-1 M Account Holder Target 0.6 0.4 0.2 0 y t i l i b a b o r P 1 M -10 M 0 1 2 3 4 5 6 7 8 9 > = 10 No of mentions 0.4 0.2 y t i l i b a b o r P 0 1-100 100-1 k 1 k-10 k 10 k-100 k 100 k-1 M 1 M -10 M 10 M -100 M No of followers No of tweets Fig. 6. Comparison of number of followers of the account holders and the target accounts. Fig. 7. Comparison of the number of tweets posted by the account holder and the target accounts. Fig. 8. Comparison between num- ber of mentions in a tweet by the account holder vs the target ac- counts. typically news media accounts like Fox News, Sky Sports, Telegraph, CBS Sweden, CNN News 18 etc. They are being cyberaggressed for the news/opinions the news anchors associated with them typically express. We cite below such an example of a news media involved in incivility. @user1 @newsmedia1 stupid English b*tch asking is there people on that plane?... No you thick c*nt it's like google cars.... Incivility context: A Dubai firefighter has died of injuries sustained putting out fire after plane crash landing - Emirates chairman https://t.co/i25sjAKfOC We also observe the mention patterns of the targets and account holders. Figure 8 shows the distribution of number of mentions in a tweet by the account holders versus the distribution of number of mentions in a tweet by the targets. It is evident that there are many targets (∼ 30%) who do not mention at all. The account holders generally mention multiple people in a tweet and much more often than the targets (p-value of significance is < 10−5). This also indicates that they might be insulting multiple targets. We further observe that there are some targets who use more mentions in their tweets than account holders. These targets have high followers (198K on average) and they probably use more mentions mostly for promotional purposes. 5.3 Linguistic and cognitive dimensions In this section, we perform linguistic and psychological measurements of the tweets posted by the target and the account holder profiles. We use the Linguistic Inquiry and Word Count (LIWC) [82], a text analysis software to find which categories of words are used by the targets and the account holders. LIWC evaluates different aspects of word usage in different meaningful categories, by counting the number of words across the text for each category. Table 3 notes the frequent words Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility ·10−2 s e u l a V C W I L 2 1 0 n o s r e p d n 2 l a r u l p n o s r e p t s 1 r a l u g n i s n o s r e p t s 1 Account Holder Target ·10−2 1 0.8 0.6 0.4 0.2 s e u l a V C W I L Account Holder Target ·10−2 s e u l a V C W I L 6 4 2 0 117:15 Account Holder Target n o s r e p r a l u g n i s d r 3 s n o i t a g e N s d r o W r a e w S l a r u l p n o s r e p d r 3 k r o W e v e i h c A e r u s i e L e m o H y e n o M h t a e D n o i g i l e R e e S l e e F r a e H y d o B h t l a e H l a c i g o l o i B l a i c o S y l i m a F d n e i r F s n a m u H s n o i t o m E s n o i t o m E r e g n A y t e i x n A s s e n d a S l a u t p e c r e P e v i t i s o P e v i t a g e N (a) Comparison of LIWC scores in the linguistic categories be- tween the account holder and the target tweets. (b) Comparison of LIWC scores in personal concerns categories between account holder and tar- get tweets. (c) Comparison of LIWC scores in the cognitive categories between the ac- count holder and the target tweets. Fig. 9. LIWC analysis. We have used standard error as error bars in the graph. from our dataset corresponding to the different LIWC categories. In Figure 9a, we show the linguistic categories for the target and the account holder tweets. It is quite evident from the figure that the account holders use first person quite frequently compared to the targets and refer to others (here, targets) in third person. Moreover, the use of swear words and negations are more in the account holder tweets than the target tweets. Next, we look at some of the personal concerns such as work, achievements, leisure, etc. Figure 9b shows the differences of the account holder and the target profiles in terms of expression of personal concerns. We observe that the targets tweet more about work and achievements; account holders tweet more about monetary aspects. We also observe that in "religion" (e.g., church, mosque) and "death" (e.g., bury, kill) categories, account holders tweet more than the targets. This is indicative of the fact that religion-based incivility is more prevalent in social media. This is in line with the work by Hosseinmardi et al. [54] where they found that there is a high usage of profane words around words like "muslim" in ask.fm social media. We further analyze the cognitive aspects of the target and the account holder tweets (see Figure 9c). We observe that account holders are more expressive of their emotions than the targets. Further, the account holders tend to tweet more related to "body" (e.g. face, wear) and "sexual" (e.g. sl*t, rapist etc.) categories. In "friend" category, both account holder and target tend to tweet in similar proportions. However, the account holders talk more frequently related to the "social" category. Also targets express more "positive emotion" whereas, account holders express "negative emotion". 6 DETECTING INCIVILITY In the earlier section, we have discussed the possible connections of incivility with target dependent sentiments and observed the various behavioral aspects of the targets and the account holders. Note that to do this, we had to manually label the incivil tweets as a first step in order to build the incivility context. In this section, we shall propose an automatic approach to classify incivil tweets. Training and test sets: Recall that we have 24,271 manually labeled tweets. We choose randomly 21,000 of these tweets and consider them as our training set. The remaining 3271 points are in the test set. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:16 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee Table 3. Frequent words from the LIWC category in our dataset. The asterisk here denotes the acceptance of all letters, hyphens, or numbers following its appearance.11 Category Swear words Work Achieve Leisure Home Money Religion Death Social Family Friends Humans Positive Emotions Negative Emotions Anxiety Anger Sadness Perceptual See Hear Feel Biological Body Health Frequent words from the dataset shit*, dumb*, bloody, crap, fuck Read, police, political, policy, student* Better, win, won, first, best party*, read, running, show, shows clean*, address, home, family, house* Free, money*, worth, trade*, tax Sacred, moral, worship*, hell, devil* War, death*, murder*, kill*, die You, we, your, our, they Family, families*, pa, mother, ma Mate, mates, fellow*, lover*, friend* people*, human*, women*, children*, woman Like, party*, lol, better, support War, wrong*, violent*, liar*, rape* doubt*, fear, risk*,avoid*, afraid War, violent*, liar*, rape*, fight* low*, lost, lose, loser*, fail* green*, say*, said, watch*, see green*, watch*, see, white*, look say*, said, hear, heard, listen round*, hard, loose*, hand, feel health*, drug*, rape*, life, shit* shit*, head, brain*, hand, face health*, drug*, life, weak*, living 6.1 Baseline models There have been several studies like [10] that consider identifying incivility instances in various social media platforms based on various content features. We adopt this work (baseline 1) for comparison with our model. A few studies use basic n-gram features. Hosseinmardi et al. [57] uses unigrams and tri-grams to detect incivility. Xu et al. [104] uses unigrams, unigrams+bigrams as features to detect incivil traces in social media. These n-gram features constitute our second baseline model. We also consider n-gram (uni-, bi-,tri-) based model with automatic feature selection to reduce the feature space to smaller number of features. We also use the work by Chen et al. [21] as a baseline. In particular, we use n-grams together with textual features. The textual features include number of words in the tweet, number of characters in the tweet, number of sentences in the comment ,average word length (#characters divided by #words) , average sentence length (#words divided by #sentences) , profane words usage level (#profane words divided by #words) , uppercase letter usage (#uppercase letters divided by #sentences) , punctuations usage (#punctuations divided by #sentences) , URL usage level (#URL divided by #words) , mentions usage level (#mentions divided by #words) For all the above models, we use different classifiers like SVM with linear and rbf kernels, k-NN, logistic regression, Adaboost with L2 regularization wherever possible and report the best overall accuracy. Feature engineering: We use the following content features adopted from Bommerson [10]. Length of the tweet. This feature simply corresponds to the length of the tweet measured in terms of the number of words in the tweet. Number of negative/offensive words in the tweet. This feature calculates the number of of- fensive words using the offensive words list we introduced earlier. Severity value of the tweet. We label every word in the offensive words list manually as '1' or '2' and this is unanimously agreed upon by two of the authors. This is done because all offensive words are not equally bad; some have more severe effect when used in the tweet. We label the more severe offensive words as '2' while the less severe ones are labeled as '1'. If w is a bad word in a sev(w), where sev(w) tweet and W is a set of all offensive words, then severity of a tweet =  denotes the severity of the word w and sev(w) ∈ {1, 2}. w ∈W Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:17 Time of the tweet. The time of post of a tweet is taken as a feature. It can be a distinguishing feature between the two classes as incivility among teenagers happens usually after school whereas normal tweets flow in all throughout the day. Negation used or not. Sometimes the offensive words can be used with negations. This however reverses the effect of the word and thus the tweets in these cases are usually civil (e.g., '@xyz Please don't die.'). To handle this case, we take into account if negations are used along with offensive words. Drawbacks of the baseline models: The baseline model suffers from the following drawbacks: Sentence dependencies. The above features cannot detect dependencies between different sen- tences in a tweet. For example, '@xyz you are a footballer. All footballers are brainless.' Multiple connotations. The above features do not take into account the multiple connotations of a word or phrase. For example, the word 'well' has a neutral connotation whereas the words 'sooo welllll' indicates a much happier/excited state of the mind of the author. Obfuscated words. The account holder can use words like 'a$$hole' or 'f**k' which will not get detected by the above features. In this work, we use character-level models that build representations of sentences using the constituent characters. The advantage of using these kinds of models is that we can easily deal with non-traditional spellings used in social media website and hence, can easily capture obfuscated words, multiple connotations of words and sentence dependencies without the need of normalizing the words to their correct forms. In particular, we use several deep learning models that take such character embeddings as input and output a sentence representation using which we are able to classify if the tweet is related to incivility or not. As an additional deep learning based basline we use the model proposed by Pavlopoulos et al. [81] that was introduced to moderate abusive user content. 6.2 The deep learning frameworks We propose deep learning frameworks primarily based on character-level LSTM and character- level CNNs. We use character-level models in this experiment as the characters can provide more information than the words as a whole for the tweet dataset under consideration. In particular, since the tweets are limited to only 140 (now 280) characters, it is very difficult to obtain rich embeddings from such a short text where only a few words are present. Therefore, character-level LSTM/CNN can obtain more information than a word-level LSTM/CNN in such a scenario. We would also like the model to have knowledge about the past sequence of characters as well as to look into the future. Thus, we choose the bidirectional LSTM framework12 for our purpose. The second model we use is a character-level CNN model. The authors in [109] have successfully used character level CNNs for text classification. This motivated us to try CNNs for the purpose of our task. We use a model with 2 convolution layers, each layer followed by a max-pooling layer. Bi-directional LSTM: We use a character-level bi-directional LSTM with tanh as the function that provides non-linearity. The 100 dimensional characters embeddings are initialized randomly and updated during training. The encoded vectors are passed to the LSTM units and then the output of each unit which is a 100 dimensional vector is passed to the next unit in the forward as well as backward direction. We concatenate the output of the LSTM unit in the last timestep in both forward and backward direction. Finally, we use a softmax layer to calculate the probability of the tweet belonging to a particular class. Character CNN: The second model we use is a character-level CNN model with ReLU non-linearity. The first convolution layer contains 100 filters with kernel size 5 × 5. The second convolution layer, 12We have also compared the model with unidirectional LSTM, GRUs although we do not report the results for all these. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:18 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee Fig. 10. char-CNN + opinion conflict feature based model for incivility detection. once again, contains 100 filters with kernel size 5 × 5. Both the convolution layers are followed by a max pooling layer. Finally, we flatten the output vector and use a dense layer followed by a softmax to get the output probabilities for the two classes. We also use dropout and batch normalization in both the above models to prevent overfitting. Character CNN + opinion conflict feature: The char-LSTM and char-CNN models might be able to extract some features and temporal relations between characters but still they might not be able to take into account the crucial observations about incivility that we made in the two previous sections. To improve the performance of the model and to take advantage of both the scenarios, in the char-CNN model, we fuse the flattened vector we get after the two convolution and maxpool layers with a special entity sentiment based feature, which we have seen in the previous sections to be very discriminative. The full architecture is shown in Figure 10. In particular, we take the vector obtained by flattening and concatenate it with the opinion conflict feature described below. Then we take this vector as an input to a feed forward neural network which classifies the tweet as an instance of incivility or otherwise. Thus, we train the fused model end-to-end according to the final loss function. The weights learned from the feed forward network at the end of the concatenated flattened vector and custom feature vector tell the model the amount by which each feature should be weighed. Opinion conflict feature: The opinion conflict feature is the total count of opinion conflicts that appear in the incivility context between the account holder and all the targets in a particular tweet. Training: We perform all parameter updates through backpropagation and stochastic gradient descent. We apply dropout with probability 0.25. We also use early stopping with patience value as 3. Results: We train the model in a supervised learning framework using the same training and test data on which we had trained the baseline model. The results are noted in Table 4. The first observation is that content based features do not perform very well in this setting (see pink row). As we can see from the table, the character CNN model along with the opinion conflict feature (see green row) outperforms the baseline models achieving 93.3% accuracy with F1-score of 0.82 and ROC area of 0.89. Note that while the increase in F1-score from char-CNN to char-CNN + opinion conflict model is from 0.81 to 0.82, it is statistically significant with p-value < 0.05. Furthermore the char-CNN + opinion conflict model corrects 10.14% of the errors made by the char-CNN model. Among the baseline models, the best performance is obtained when we use unigram, bigram and trigrams as features (see yellow row). Our model significantly outperforms this best performing Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:19 Table 4. Classification results Bommerson et al. [10]) Content based features n-gram based features Method unigrams bigrams trigrams unigrams (automatic feature selection) bigrams (automatic feature selection) trigrams (automatic feature selection) unigrams + bigrams unigrams + bigrams (automatic feature selection) (Xu et al. [104]) unigrams + trigrams (automatic feature selection) (Hosseinmardi et al. [57]) unigrams + trigrams bigrams + trigrams bigrams + trigrams (automatic feature selection) unigrams + bigrams + trigrams unigrams + bigrams + trigrams (automatic feature selection) baseline 1 + opinion conflict unigrams + bigrams + trigrams + opinion conflict unigrams + bigrams + trigrams + textual features (Chen et al. [21]) char-LSTM and char-CNN Models 1 char-LSTM char-LSTM+attention (Pavlopoulos et al. [81]) char-LSTM+attention (Pavlopoulos et al. [81])+opinion conflict char-CNN char-CNN + opinion conflict Accuracy F1-Score ROC-AUC 71.1% 86.4% 85.6% 86.7% 88.4% 82.3% 83.6% 86.7% 87.5% 86.7% 86.7% 86.8% 88.8% 86.8% 88.9% 76.1% 80.9% 86.7% 88.9% 78.5% 78.6% 93.0% 93.3% 0.27 0.73 0.72 0.66 0.69 0.18 0.29 0.74 0.67 0.63 0.64 0.66 0.76 0.73 0.77 0.37 0.77 0.77 0.80 0.53 0.54 0.81 0.82 0.61 0.91 0.91 0.79 0.81 0.54 0.59 0.91 0.79 0.62 0.62 0.79 0.93 0.91 0.92 0.61 0.90 0.92 0.84 0.74 0.75 0.88 0.89 1 Results have been obtained by taking mean of 10 random runs. baseline (5.1%, 6.5% improvements w.r.t accuracy and F1-score). The CNN model seems to learn better representations than hand picked bag of word n-gram features. Below we list a couple of examples where char-CNN fails and char-CNN+opinion conflict predicts correctly. Both cases have very few linguistic cues to help in the classification task. In the first case, the account holder tweets negatively about Old Alabama whereas the target @user1 tweets positively about Old Alabama. In the second case, we found that the account holder tweets positively about Daily News and @user1, the target negatively about Daily News. 1. @user1 @user2 YOU and your incessant attempts at lying to and bullying the press while at the White House as PS are reason for apology you sack of dog stools. The AMERICAN public does not distrust the media other than by your disingenuous propaganda. Ur time is coming you asshole. 2. @user1 No just you. Everyone would know he was asking for you. Asshole! 7 POST-HOC ANALYSIS We run the trained char-CNN model on the entire dataset of ∼ 300, 000 tweets and perform a post-hoc analysis of the incivility tweets to extract some more interesting properties. The key observation is that there are multiple instances of incivil posts from the same account holder as well as a target being attacked multiple times. 7.1 Repetition of incivility and targeting In this section, we analyze the incivil posts in more detail focusing on their repetitions. Following are some examples of multiple incivility and targeting. The first two examples show @user1 being Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:20 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee attacked by multiple account holders (user3 and user4) and the last two examples show @user5 being attacked multiple times by user6. s r e d l o H t n u o c c A f o n o i t c a r F 0.6 0.4 0.2 0 2 3 4 5 6 7 8 9 10 11 No of times an account holder harasses s t e g r a T f o n o i t c a r F 0.4 0.2 0 4 3 2 No of times a target gets harassed 9 10 11 5 6 7 8 Fig. 11. Account holders involved in multiple in- stances of incivility. @user1 Hillary was a skankb*tch,and they make a cream for your butt-hurt condition (account holder: user3) @user1 Get ur a$$ off here, u stupid b*tch (account holder: user4) Fig. 12. Targets attacked multiple times. @user5 you are the biggest f**king piece of scum there is. Karma is a b*tch (account holder: user6) @user5 you are the biggest scumbag (account holder: user6) In Figure 11 we show the distribution of account holders involved in multiple instances of attacking another person. We observe that there are a significant number of account holders (∼ 13%) who attack more than once and if we observe the distribution among them, while a majority of them attack 2-5 times, there are also account holders who attack more than 10 times. This scenario of multiple incivil posts seems alarming as it might be one of the prime reason for users to quit social media sites. Thus, it is important to detect these account holders' accounts and take necessary preventive measures. We also observe that the same target is attacked multiple times. In Figure 12, we see that there are a significant number of targets (∼ 19%) who get attacked multiple times and a majority of them experience 2-3 times of attack. However, there are also a small fraction of targets who are attacked more than 10 times. #f ollowers 7.2 Reputation scores Reputation score is a measure that determines the reputation of a profile in social media and is defined as #f ollowers +#f riends . A celebrity who tends to have a very large followership but follows less people, i.e., having f ollowers >> f riends will have a reputation score close to 1. Figure 13a shows the average reputation scores for the account holders, the targets, the multiple-time insulting account holders and the multiple-time targets. The plot suggests that targets who are attacked multiple times have the highest reputation scores and are therefore celebrities with high probability. Moreover, the targets in general tend to have higher reputation scores than the account holders. We next consider the account holder-target pairs. Figure 13b shows the distribution of the reputation score ratio ( r epscor e(accountholder)) for the account holder-target pairs. It is quite evident from the result that there are more number of account holder-target pairs with reputation score ratio more than 1. Therefore, in general, the targets are more reputed than account holders. Figure 13c shows the distribution of reputation score ratios for the account holder-target pairs appearing multiple times and pairs appearing once. The pairs occurring multiple times tend to have greater reputation score ratio with higher probability. Thus, targets who are attacked by the same account holder again and again seem to have higher number of followers, and are highly likely to be celebrities. r epscor e(tarдet) Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:21 Mult AccHolder/Target Pair Normal Pair 0.8 y t i l i b a b o r P 0.6 0.4 0.2 (a) Reputation score comparison between account holders, targets, account holders offending multiple- time times and multiple-time tar- gets. (b) Reputation score comparison for account holder-target pairs. 0 0-0.5 0.5-1.0 >1.0 (c) Reputation score comparison for account holder-target pairs ap- pearing multiple times and pairs appearing once. Fig. 13. Reputation score comparison 7.3 Follower/followee properties We further study the follower/followee behavior of multiple-time insulting account holders and targets. Figure 14a shows a comparison between the followers of account holders who attack multiple times and targets who are targeted multiple times. The graph shows that the targets have higher number of followers in general as compared to the account holders (p-value of significance is < 10−5). Many of the targets' follower count falls in the 1M -- 10M range, whereas more than 40% of the account holders' follower count lies in the 1K-10K bucket. Figure 14b compares the friends of multiple-time jnsulting account holders and targets. It is evident from the distribution that account holders have larger number of friends in general with high probability (p-value of significance is < 10−5). 0.4 0.2 y t i l i b a b o r P 0 1-100 Account Holder Target 100-1 k 1 k-10 k 100 k-1 M 10 k-100 k 1 M -10 M (a) Follower distribution. 0.6 0.4 0.2 y t i l i b a b o r P 0 1-100 Account Holder Target 100-1 k 1 k-10 k 10 k-100 k 100 k-1 M (b) Friend distribution. Fig. 14. Distribution of various properties for multiple-time account holders and multiple-time targets. 8 DISCUSSIONS AND CONCLUSIONS 8.1 Implications of our work There are several implications of this study. We report these in the following. Mitigating the spread of negativity: Incivility has high impact on the spread of negativity among communities in social media platforms. In prior research works [23, 24, 101], it has been shown that negative behavior can persist and spread across a community (if not controlled) due to its reinforcing nature. Opinion disagreements can act as early indicators for stopping the spread of such negativities. Our proposed framework can be efficiently used to detect opinion disagreements Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:22 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee that might lead to incivilities early in time with minimal features. Since lot of conversations around controversial topics or policy issues, e.g., global warming, vaccination, abortion, immigration etc. on social media generally lead to opinion disagreements, our framework can be tuned to detect the level of toxicity or incivility in the posts so that only the ones which are below a threshold (can be a system parameter) are detected. This will increase the system efficiency of detecting potential incivil incidents. Early detection of these opinion disagreements can act as alerts that can be sent to content moderators (bots or humans) so that they monitor the conflicts and take necessary actions to mitigate the further spread of negativity in the community. Social and policy implications: Our work also has important implications to law, public policy and the society. Wolfson in context of American concept of free speech and political scenario, has argued in his book [103] that it is almost impossible to separate the good speech or the bad speech/incivility/abusiveness. According to the First Amendment to the United States Constitution, one has to provide adequate opportunities to express differing opinions and engage in public political debate. However, Wolfson also notes that in case of private individuals, these differing opinions impact emotional health of the targeted individual and hence must be prohibited. In contrast, incivility directed toward a group or community has the potential to mobilize a larger number of individuals and can have devastating consequences. These open up the debate for the need to censorship, regulations or Government laws. Design of online platforms to reduce conflicts: It might not be always appropriate to attribute the strong sentiment expressed by a target to be representative of his/her internal characteristics; in contrast, it might be because of a very specific and one-time external factor, for instance a "very bad day" of the target for which he/she might hold the named entity responsible eventually causing him/her to post a (one-off) tweet expressing a strong sentiment toward that named entity. Our work sheds light on how we might design discussion platforms that minimize the number of opinion conflicts due to such incidents. Early detection of opinion conflict might be used by the platform moderators to alter the context of the discussion by possibly selectively hiding strong sentiments toward entities and prioritizing constructive comments. This may directly enhance civility in the platform making account holders less likely to be invective (similar observations in the context of trolling and online harassment has been made in earlier works [8, 23]). In addition, community norms might be introduced to reduce conflicts. For instance, the moment someone is found to express strong sentiments toward a certain entity, the platform may raise alerts/reminders of ethical standards or cite past moral actions. We believe that many of these efforts can come directly from the researchers and designers in the CSCW community so as to make the online experience of user more safe and accommodating. 8.2 Conclusions In this paper, we study the behavioral aspects of the targets and account holders and try to understand various factors associated with incivility incidents. We then automate the incivility detection process by developing a deep learning model with character level LSTM and CNNs and incorporating information related to entity-specific opinion conflicts. Our model achieves an accuracy of 93.3% with an F1-score of 0.82 which significantly outperforms the best performing baseline models achieving 4.9%, 6.5% improvements w.r.t accuracy, F1-score respectively. Insights: We gained several insights from our analysis and automation. Some of these are - (i) Opinion conflicts among the target and the account holder at early stages can lead to eventual instances of incivility; Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:23 (ii) Targets are usually more popular with higher reputation compared to account holders; this is opposite to instances of cyberbullying where the perpetrator is usually more reputed and powerful; (iii) Account holders tend to post tweets that are inflicted with negative sentiments/emotions, "swear", "sex", "religion" and "death" words; (iv) Targets usually post tweets rich in positive emotions; (v) There are extensive evidences of repeated incivility as well as repeated targeting, sometimes each of these up to 10 times. This could be very alarming for the social media sites and suitable automatic procedures should be built in to contain such cases early in time. Our deep learning model could be a first step toward this enterprise. 8.3 Future works There are quite a few interesting directions that can be explored in future. One such direction could be to look into the problem of incivility from perspectives of various events and topics and study the effect of such topics/events on the incivility dynamics. Another interesting direction could be to study the temporal characteristics of incivility incidents on social media and identify the factors leading to rise in incivility incidents [6, 60, 84]. Apart from understanding the cause of incivility and thereby detecting it, one can also develop alert-systems that can subsequently take action to mitigate the impact of opinion disagreements leading to incivilities. REFERENCES [1] Aseel Addawood, Rezvaneh Rezapour, Omid Abdar, and Jana Diesner. 2017. Telling Apart Tweets Associated with Controversial versus Non-Controversial Topics. In Proceedings of the Second Workshop on NLP and Computational Social Science. 32 -- 41. [2] Robert H Aseltine Jr, Susan Gore, and Jennifer Gordon. 2000. Life stress, anger and anxiety, and delinquency: An empirical test of general strain theory. Journal of Health and Social Behavior (2000), 256 -- 275. [3] Paul Baker. 2001. Moral panic and alternative identity construction in Usenet. Journal of Computer-Mediated Communication 7, 1 (2001), JCMC711. (SIGIR '17). 1069 -- 1072. [4] Kaspar Beelen, Evangelos Kanoulas, and Bob van de Velde. 2017. Detecting Controversies in Online News Media [5] Yoshua Bengio, Patrice Simard, and Paolo Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE transactions on neural networks 5, 2 (1994), 157 -- 166. [6] Annabella Biancheri. 2017. Cyberbullying on the rise; social media to blame. http://lobbyobserver.org/lobbyo/2016/ 11/cyberbullying-on-the-rise-due-to-recent-technological-advances/. (2017). [Online]. [7] Amy Binns. 2012. DON'T FEED THE TROLLS! Managing troublemakers in magazines' online communities. Journalism Practice 6, 4 (2012), 547 -- 562. [8] Lindsay Blackwell, Jill Dimond, Sarita Schoenebeck, and Cliff Lampe. 2017. Classification and Its Consequences for Online Harassment: Design Insights from HeartMob. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 24 (2017), 24:1 -- 24:19 pages. [9] BlogXilla. 2013. 8 Of The Most Cyberbullied Celebrities On The Web (LIST). https://globalgrind.cassiuslife.com/ 1969918/8-most-cyberbullied-celebrities-web-social-media-list/. (2013). [Online]. [10] Bouke Bommerson. 2015. Machine learning to classify bullying messages on twitter. . https://www.authorea.com/ users/40545/articles/46776/_show_article. (2015). [11] Danah Boyd. 2014. It's complicated: The social lives of networked teens. Yale University Press. [12] Lisa Broidy and Robert Agnew. 1997. Gender and crime: A general strain theory perspective. Journal of research in crime and delinquency 34, 3 (1997), 275 -- 306. [13] Elia Bruni, N Tram, Marco Baroni, et al. 2014. Multimodal distributional semantics. The Journal of Artificial Intelligence [14] Erin E Buckels, Paul D Trapnell, and Delroy L Paulhus. 2014. Trolls just want to have fun. Personality and individual Research 49 (2014), 1 -- 47. Differences 67 (2014), 97 -- 102. [15] Amanda Burgess-Proctor, Justin W Patchin, and Sameer Hinduja. 2009. Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered (2009), 153 -- 175. [16] Marilyn A Campbell. 2005. Cyber Bullying: An Old Problem in a New Guise?. Australian journal of Guidance and Counselling 15, 01 (2005), 68 -- 76. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:24 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee [17] Kellie E Carlyle and Kenneth J Steinman. 2007. Demographic Differences in the Prevalence, Co-Occurrence, and Correlates of Adolescent Bullying at School. Journal of School Health 77, 9 (2007), 623 -- 629. [18] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Hate is not Binary: Studying Abusive Behavior of# GamerGate on Twitter. arXiv preprint arXiv:1705.03345 (2017). [19] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean Birds: Detecting Aggression and Bullying on Twitter. In WebSci. 13 -- 22. [20] Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Measuring# GamerGate: A Tale of Hate, Sexism, and Bullying. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 1285 -- 1290. [21] Hao Chen, Susan Mckeever, and Sarah Jane Delany. 2017. Presenting a labelled dataset for real-time detection of abusive user posts. In Proceedings of the International Conference on Web Intelligence. ACM, 884 -- 890. [22] Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting offensive language in social media to protect adolescent online safety. In Proc. of PASSAT. 71 -- 80. [23] Justin Cheng, Michael Bernstein, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2017. Anyone can become a troll: Causes of trolling behavior in online discussions. In CSCW, Vol. 2017. 1217. [24] Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2014. How community feedback shapes user [25] June F Chisholm. 2006. Cyberspace violence against girls and adolescent females. Annals of the New York Academy of [26] Robert B Cialdini and Noah J Goldstein. 2004. Social influence: Compliance and conformity. Annu. Rev. Psychol. 55 behavior. In ICWSM. Sciences 1087, 1 (2006), 74 -- 89. (2004), 591 -- 621. [27] Dan Claredon. 2017. 11 Celebrities Cyberbullied Off Social Media: Ed Sheeran, Normani Kordei, & More. http: //www.wetpaint.com/cyberbullied-celebrities-twitter-1507798/. (2017). [Online]. [28] Lucie Corcoran, Conor Mc Guckin, and Garry Prentice. 2015. Cyberbullying or Cyber Aggression?: A Review of Existing Definitions of Cyber-Based Peer-to-Peer Aggression. Societies 5, 2 (2015), 245 -- 255. [29] Maral Dadvar, Franciska MG de Jong, RJF Ordelman, and RB Trieschnigg. 2012. Improved cyberbullying detection using gender information. (2012). [30] Noelle Devoe. 2016. 8 Celebrities Who Have Quit Social Media. https://www.seventeen.com/celebrity/news/a42328/ celebrities-who-have-quit-social-media/. (2016). [Online]. [31] Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. TIIS 2, 3 (2012), 18. [32] Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11, 02 (2011). [33] Nemanja Djuric, Jing Zhou, Robin Morris, Mihajlo Grbovic, Vladan Radosavljevic, and Narayan Bhamidipati. 2015. Hate speech detection with comment embeddings. In Proceedings of the 24th international conference on world wide web. ACM, 29 -- 30. [34] Li Dong, Furu Wei, Chuanqi Tan, Duyu Tang, Ming Zhou, and Ke Xu. 2014. Adaptive Recursive Neural Network for Target-dependent Twitter Sentiment Classification.. In Proc. of ACL. 49 -- 54. [35] Mai ElSherief, Vivek Kulkarni, Dana Nguyen, William Yang Wang, and Elizabeth Belding. 2018. Hate Lingo: A Target-based Linguistic Analysis of Hate Speech in Social Media. In ICWSM. [36] Mai ElSherief, Shirin Nilizadeh, Dana Nguyen, Giovanni Vigna, and Elizabeth Belding. 2018. Peer to Peer Hate: Hate Speech Instigators and Their Targets. In ICWSM. [37] Nels Ericson. 2001. Addressing the problem of juvenile bullying. US Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention Washington, DC. [38] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling. In Proc. of ACL (ACL '05). 363 -- 370. [39] David Finkelhor, Kimberly J Mitchell, and Janis Wolak. 2000. Online Victimization: A Report on the Nation's Youth. [40] Sharon Florentine. 2016. Twitter needs to stop the harassment. https://www.cio.com/article/3098441/ leadership-management/twitter-needs-to-stop-the-harassment-leslie-jones.html. (2016). [Online]. [41] Rolf Fredheim, Alfred Moore, and John Naughton. 2015. Anonymity and Online Commenting: The Broken Windows Effect and the End of Drive-by Commenting. In Proceedings of the ACM Web Science Conference (WebSci '15). [42] Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. J. of psychologists and counsellors in schools 20, 2 (2010), 143 -- 156. (2000). Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:25 [43] Joshua Guberman, Carol Schmitz, and Libby Hemphill. 2016. Quantifying toxicity and verbal violence on Twitter. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion. ACM, 277 -- 280. [44] Umair Haque. 2016. The Reason TwitterâĂŹs Losing Active Users. https://hbr.org/2016/02/ the-reason-twitters-losing-active-users. (2016). [Online]. [45] Claire Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. (2010). [46] Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab. 2002. Searching for safety online: Managing" trolling" in a feminist forum. The information society 18, 5 (2002), 371 -- 384. [47] S Hinduja and JW Patchin. 2012. School climate 2.0: Reducing teen technology misuse by reshaping the environment. (2012). (2010), 206 -- 221. [48] Sameer Hinduja and Justin W Patchin. 2007. Offline consequences of online victimization: School violence and [49] Sameer Hinduja and Justin W Patchin. 2008. Cyberbullying: An exploratory analysis of factors related to offending delinquency. Journal of school violence 6, 3 (2007), 89 -- 112. and victimization. Deviant behavior 29, 2 (2008), 129 -- 156. [50] Sameer Hinduja and Justin W Patchin. 2010. Bullying, cyberbullying, and suicide. Archives of suicide research 14, 3 [51] Sameer Hinduja and Justin W Patchin. 2015. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbul- lying (2nd edition). Thousand Oaks, CA: Sage Publications. [52] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735 -- 1780. [53] Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138 (2017). [54] Homa Hosseinmardi, Amir Ghasemianlangroodi, Richard Han, Qin Lv, and Shivakant Mishra. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In ASONAM '14. 244 -- 252. [55] Homa Hosseinmardi, Shaosong Li, Zhili Yang, Qin Lv, Rahat Ibn Rafiq, Richard Han, and Shivakant Mishra. 2014. A comparison of common users across instagram and ask. fm to better understand cyberbullying. In Big Data and Cloud Computing (BdCloud), 2014 IEEE Fourth International Conference on. 355 -- 362. [56] Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishr. 2015. Prediction of Cyberbullying Incidents on the Instagram Social Network. arXiv preprint arXiv:1508.06257 (2015). [57] Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015). [58] John W Jones and G Anne Bogat. 1978. Air pollution and human aggression. Psychological Reports 43, 3 (1978), [59] Jaana Juvonen and Elisheva F Gross. 2008. Extending the school grounds? -- Bullying experiences in cyberspace. Journal of School health 78, 9 (2008), 496 -- 505. [60] Maria Konnikova. 2015. How the Internet Has Changed Bullying. https://www.newyorker.com/science/ maria-konnikova/how-the-internet-has-changed-bullying. (2015). [Online; The New Yorker]. [61] April Kontostathis, Kelly Reynolds, Andy Garron, and Lynne Edwards. 2013. Detecting cyberbullying: query terms and techniques. In Proc. of ACM web science conference. ACM, 195 -- 204. [62] Robin M Kowalski and Susan P Limber. 2007. Electronic bullying among middle school students. Journal of adolescent 721 -- 722. health 41, 6 (2007), S22 -- S30. age. John Wiley & Sons. [63] Robin M Kowalski, Susan P Limber, Sue Limber, and Patricia W Agatston. 2012. Cyberbullying: Bullying in the digital [64] Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). 3739 -- 3748. [65] Amanda Lenhart. 2007. Cyberbullying and online teens. (2007). [66] Qing Li. 2007. New bottle but old wine: A research of cyberbullying in schools. Computers in human behavior 23, 4 (2007), 1777 -- 1791. [67] Alice E Marwick et al. 2011. The drama! Teen conflict, gossip, and bullying in networked publics. (2011). [68] Adrienne Massanari. 2017. #Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society 19, 3 (2017), 329 -- 346. [69] Paul Mazerolle, Velmer S Burton, Francis T Cullen, T David Evans, and Gary L Payne. 2000. Strain, anger, and delinquent adaptations specifying general strain theory. Journal of Criminal Justice 28, 2 (2000), 89 -- 101. [70] Paul Mazerolle and Alex Piquero. 1998. Linking exposure to strain with anger: An investigation of deviant adaptations. Journal of Criminal Justice 26, 3 (1998), 195 -- 211. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. 117:26 Suman Kalyan Maity, Aishik Chakraborty, Pawan Goyal, and Animesh Mukherjee [71] David McNamee. 2016. Cyberbullying 'causes suicidal thoughts in kids more than traditional bullying'. https: //www.medicalnewstoday.com/articles/273788.php. (2016). [Online]. [72] Yashar Mehdad and Joel Tetreault. 2016. Do Characters Abuse More Than Words?. In Proceedings of the 17th Annual Meeting of the Special Interest Group on Discourse and Dialogue. 299 -- 303. [73] Ersilia Menesini and Annalaura Nocentini. 2009. Cyberbullying definition and measurement: Some critical considera- tions. Journal of Psychology 217, 4 (2009), 230 -- 232. [74] Faye Mishna, Charlene Cook, Tahany Gadalla, Joanne Daciuk, and Steven Solomon. 2010. Cyber bullying behaviors among middle and high school students. American Journal of Orthopsychiatry 80, 3 (2010), 362 -- 374. [75] Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment analysis for effective detection of cyber bullying. In Asia-Pacific Web Conference. 767 -- 774. [76] Tonja R Nansel, Mary Overpeck, Ramani S Pilla, W June Ruan, Bruce Simons-Morton, and Peter Scheidt. 2001. Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Jama 285, 16 (2001), 2094 -- 2100. [77] Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive language detection in online user content. In Proceedings of the 25th international conference on world wide web. 145 -- 153. [78] Justin W Patchin and Sameer Hinduja. 2006. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. [79] Justin W Patchin and Sameer Hinduja. 2011. Traditional and nontraditional bullying among youth: A test of general [80] Justin W Patchin and Sameer Hinduja. 2012. An update and synthesis of the research. Cyberbullying prevention and Youth violence and juvenile justice 4, 2 (2006), 148 -- 169. strain theory. Youth & Society 43, 2 (2011), 727 -- 751. response: Expert perspectives (2012), 13. [81] John Pavlopoulos, Prodromos Malakasiotis, and Ion Androutsopoulos. 2017. Deeper attention to abusive user content moderation. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. 1125 -- 1135. [82] James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates 71 (2001), 2001. [83] Quang Anh Phan and Vanessa Tan. 2017. Play with Bad Words: A Content Analysis of Profanity in Video Games. Acta Ludica-International Journal of Game Studies 1, 1 (2017), 7 -- 30. [84] Team Rawhide. 2017. Teen Cyberbullying and Social Media Use on the Rise [INFOGRAPHIC]. http://www.rawhide. org/blog/wellness/teen-cyberbullying-and-social-media-use-on-the-rise/. (2017). [Online]. [85] Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In ICMLA, Vol. 2. 241 -- 244. Study. In EMNLP. [86] Alan Ritter, Sam Clark, Mausam, and Oren Etzioni. 2011. Named Entity Recognition in Tweets: An Experimental 357 -- 370. [87] Alan Ritter, Mausam, Oren Etzioni, and Sam Clark. 2012. Open Domain Event Extraction from Twitter. In KDD. [88] Niloofar Safi Samghabadi, Suraj Maharjan, Alan Sprague, Raquel Diaz-Sprague, and Thamar Solorio. 2017. Detecting Nastiness in Social Media. In Proceedings of the First Workshop on Abusive Language Online. 63 -- 72. [89] Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. ser. NSDI 12 (2011), 15 -- 15. [90] Shari Kessel Schneider, Lydia O'Donnell, Ann Stueve, and Robert WS Coulter. 2012. Cyberbullying, school bullying, and psychological distress: A regional census of high school students. American Journal of Public Health 102, 1 (2012), 171 -- 177. [91] Dorothy Seals and Jerry Young. 2003. Bullying and victimization: Prevalence and relationship to gender, grade level, ethnicity, self-esteem, and depression. Adolescence 38, 152 (2003), 735. [92] Pnina Shachaf and Noriko Hara. 2010. Beyond vandalism: Wikipedia trolls. Journal of Information Science 36, 3 (2010), [93] Leandro Araújo Silva, Mainack Mondal, Denzil Correa, Fabrício Benevenuto, and Ingmar Weber. 2016. Analyzing the Targets of Hate in Online Social Media.. In ICWSM. 687 -- 690. [94] Vivek K Singh, Marie L Radford, Qianjia Huang, and Susan Furrer. 2017. " They basically like destroyed the school one day": On Newer App Features and Cyberbullying in Schools.. In CSCW. 1210 -- 1216. [95] Peter K Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry 49, 4 (2008), 376 -- 385. [96] Duyu Tang, Bing Qin, Xiaocheng Feng, and Ting Liu. 2015. Effective LSTMs for Target-Dependent Sentiment Classification. arXiv preprint arXiv:1512.01100 (2015). [97] Robert S Tokunaga. 2010. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in human behavior 26, 3 (2010), 277 -- 287. [98] Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and Véronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In International Conference on Human and Social Analytics (HUSO 2015). IARIA, 13 -- 18. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018. Incivility 117:27 [99] Heidi Vandebosch and Katrien Van Cleemput. 2008. Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11, 4 (2008), 499 -- 503. [100] Jing Wang, Ronald J Iannotti, and Tonja R Nansel. 2009. School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent health 45, 4 (2009), 368 -- 375. [101] Robb Willer, Ko Kuwabara, and Michael W Macy. 2009. The false enforcement of unpopular norms. Amer. J. Sociology [102] Kirk R Williams and Nancy G Guerra. 2007. Prevalence and predictors of internet bullying. Journal of adolescent [103] Nicholas Wolfson. 1997. Hate Speech, Sex Speech, Free Speech. (1997). [104] Jun-Ming Xu, Kwang-Sung Jun, Xiaojin Zhu, and Amy Bellmore. 2012. Learning from bullying traces in social media. 115, 2 (2009), 451 -- 490. health 41, 6 (2007), S14 -- S21. In Proc. of NAACL. 656 -- 666. [105] Michele L Ybarra, Danah Boyd, Josephine D Korchmaros, and Jay Koby Oppenheim. 2012. Defining and measuring cyberbullying within the larger context of bullying victimization. Journal of Adolescent Health 51, 1 (2012), 53 -- 58. [106] Michele L Ybarra and Kimberly J Mitchell. 2004. Youth engaging in online harassment: Associations with caregiver -- child relationships, Internet use, and personal characteristics. Journal of adolescence 27, 3 (2004), 319 -- 336. [107] Michele L Ybarra and Kimberly J Mitchell. 2007. Prevalence and frequency of Internet harassment instigation: Implications for adolescent health. Journal of Adolescent Health 41, 2 (2007), 189 -- 195. [108] Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D Davison, April Kontostathis, and Lynne Edwards. 2009. Detection of harassment on web 2.0. Proc. of the Content Analysis in the WEB 2 (2009), 1 -- 7. [109] Xiang Zhang, Junbo Zhao, and Yann LeCun. 2015. Character-level convolutional networks for text classification. In NIPS. 649 -- 657. [110] Haoti Zhong, Hao Li, Anna Squicciarini, Sarah Rajtmajer, Christopher Griffin, David Miller, and Cornelia Caragea. 2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network. (2016). Proceedings of the ACM on Human-Computer Interaction, Vol. 2, No. CSCW, Article 117. Publication date: January 2018.
1503.02373
3
1503
2015-09-16T06:03:23
Measuring Technological Distance for Patent Mapping
[ "cs.SI", "cs.CY", "cs.DL", "physics.soc-ph" ]
Recent works in the information science literature have presented cases of using patent databases and patent classification information to construct network maps of technology fields, which aim to aid in competitive intelligence analysis and innovation decision making. Constructing such a patent network requires a proper measure of the distance between different classes of patents in the patent classification systems. Despite the existence of various distance measures in the literature, it is unclear how to consistently assess and compare them, and which ones to select for constructing patent technology network maps. This ambiguity has limited the development and applications of such technology maps. Herein, we propose to compare alternative distance measures and identify the superior ones by analyzing the differences and similarities in the structural properties of resulting patent network maps. Using United States patent data from 1976 to 2006 and International Patent Classification system, we compare 12 representative distance measures, which quantify inter-field knowledge base proximity, field-crossing diversification likelihood or frequency of innovation agents, and co-occurrences of patent classes in the same patents. Our comparative analyses suggest the patent technology network maps based on normalized co-reference and inventor diversification likelihood measures are the best representatives.
cs.SI
cs
Measuring Technological Distance for Patent Mapping Bowen Yan SUTD-MIT International Design Centre & Engineering Product Development Pillar Singapore University of Technology and Design 8 Somapah Road, Singapore 487372 Email: [email protected] Jianxi Luo* SUTD-MIT International Design Centre & Engineering Product Development Pillar Singapore University of Technology and Design 8 Somapah Road, Singapore 487372 Email: [email protected] * Corresponding author Abstract Recent works in the information science literature have presented cases of using patent databases and patent classification information to construct network maps of technology fields, which aim to aid in competitive intelligence analysis and innovation decision making. Constructing such a patent network requires a proper measure of the distance between different classes of patents in the patent classification systems. Despite the existence of various distance measures in the literature, it is unclear how to consistently assess and compare them, and which ones to select for constructing patent technology network maps. This ambiguity has limited the development and applications of such technology maps. Herein, we propose to compare alternative distance measures and identify the superior ones by analyzing the differences and similarities in the structural properties of resulting patent network maps. Using United States patent data from 1976 to 2006 and International Patent Classification system, we compare 12 representative distance measures, which quantify inter- field knowledge base proximity, field-crossing diversification likelihood or frequency of innovation agents, and co-occurrences of patent classes in the same patents. Our comparative analyses suggest the patent technology network maps based on normalized co-reference and inventor diversification likelihood measures are the best representatives. Keywords: information mapping, patents, innovation, technology networks, technological distance 2 1. Introduction To pursue innovation, inventors, companies or R&D organizations, cities or countries continually diversify to explore technology fields different from their past ones, or combine their existing knowledge with those of new fields to build new technological capabilities (Schumpeter, 1934; Dosi, 1982). Therefore, innovation can be viewed as a process of searching and combining knowledge across different technology fields. The variety of technology fields together constitutes the “technology space”, in which the fields may have different distances between each other (Teece et al., 1994; Breschi et al., 2003; Kay et al., 2014). In turn, the heterogeneous structure of the technology space may condition the diversification paths or knowledge recombination prospects of innovation agents (e.g., Thomas Edison, Google, China) with different knowledge positions in the space, and condition the development potentials of specific technologies (e.g., fuel cells, robots, aircrafts) given the positions of their knowledge base in the whole technology space. Recent studies have proposed to represent the technology space as a network map of technology fields based on mining patent data (Leydesdorff et al., 2014; Kay et al., 2014; Nakamura et al., 2014). In such a network, a vertex represents a technology field and is operationalized as a patent technology class. The weighted edge between a pair of vertices denotes the distance between the vertex-represented technology fields. One can also overlay such a network map by highlighting a subset of fields that are associated with a technological design domain of interest (e.g., robotics, fuel cells), or the innovative activities of an innovation agent (Kay et al., 2014). Fig. 1 illustrates an example of the network overlaid with a subset of highlighted fields where Google Inc. had been granted US patents over time. Such an overlay map locates the fields where a specific agent has developed innovation capabilities and also reveals the evolution of such capabilities. Assessment of the relative network positions of the subset of fields on the overlaid map may illuminate new fields that are proximate to them in the technology space and present great knowledge recombination potential with them (Fleming, 2001; Nakamura et al., 2014). Such analyses may also lead to insights on the directions and paths of technology diversification of an innovation agent, e.g., firm, city or country (Breschi et al., 2003; Rigby, 2013; Boschma et al., 2014), or help forecast development directions and potentials of an emerging technology, e.g., fuel cells or solar cells (Kajikawa et al., 2008; Ogawa and Kajikawa, 2015; Benson and Magee, 2013; 2015), given the locations of its established knowledge base in the technology space. In general, such a map of technology fields will be 3 useful to aid in technology road mapping of innovation agents or technology-based industries and forecasting development directions of emerging technologies. Fig. 1. Example of the technology network map overlaid with Google’s knowledge positions.1 Each vertex represents a 3-digit technology class defined in the International Patent Classification (IPC) system, and its size corresponds to the total number of patents in the class from 1976 to 2006. An edge between pairs of vertices is measured as inventor cross-field diversification likelihood (see details of the measure in Section 2 and Section 3.2). The original network is extremely dense. The network visualized here contains the maximum spanning tree (i.e., a minimal set of edges that connect all vertices and maximize total edge weights) as the backbone plus the strongest edges, which together make the total number of edges be twice of the vertices, as suggested by Hidalgo et al. (2007) for best visualization. A vertex is highlighted in red color if Google had patents in the corresponding technology class in a given time period. Details about this network are in Section 4.1. For such a network to adequately represent the technology space requires an appropriate measure of the distance between different technology fields (Jaffe, 1986; Joo and Kim, 2010; Altuntas et al., 2015). Although various distance measures have been proposed from different perspectives in the literature (see a review of the measures in Section 2), they have not been assessed and compared using consistent criteria or methodology. It is unclear which measures are superior for the purpose of constructing technology network maps, and which measures are more representative of the others. This ambiguity has limited the use of technology network maps in technology forecasting and roadmap analyses. In this paper, we recognize that the choice of inter-field distance measures determines the structure of the technology network to be constructed, which in turn influences the innovation-related insights to be drawn from the network analysis. Following this logic, we 1 Fig. 1 highlights that Google’s first patents were in IPC class G06 computing in 2003. Later, Google diversified into additional fields. In 2006, it had patents in H03 electronic circuitry, H04 electronic communication and H05 electric techniques, and G10 music instruments and acoustics, in addition to G06. These new fields appear to be proximate to the original field G06, within the core of the technology network map. 4 propose a strategy to use the structures of the overall technology networks resulting from the choices of distance measures as the lens or protocol to assess and compare corresponding measures. We also demonstrate this strategy through a comparative analysis of twelve alternative distance measures, by using a few network metrics and patent data from United States Patent and Trademark Office (USPTO). These twelve measures are chosen as representatives of the main types of distance measures in the literature. Our analyses yield new understandings on the differences and similarities of these measures, and also shed light on some of these measures that yield more representative network maps than others for constructing technology network maps. The paper is organized as follows. We first survey the literature on various quantitative measures of the distance of technology fields in Section 2. Section 3 introduces our data, methodology and twelve distance measures. Section 4 reports and discusses results. Section 5 concludes the paper with suggestions for future work. 2. Literature review: Measures of distance between technology fields In the literature, various technological distance measures have been developed, using the information of references, classifications and inventor identities in patent documents. Some of these measures were noted as “technological proximity”, which is direct reverse concept of technological distance (Jaffe, 1986; Leydesdorff et al., 2014). 2.1 Patent reference-based measures One strand of the measures uses patent citation information to calculate indicators of knowledge distance of different technology fields. For instance, to construct the network map of IPC classes, Leydesdorff et al. (2014) used the cosine similarity index to normalize the citing-to-cited relationships between technology classes in an aggregated citation matrix. The angular cosine value of the two vectors of citations from two classes to other classes captures the similarity of their knowledge bases. Kay et al. (2014) also used the cosine similarity as the measure of technological distance among different patent categories, some of which combine original IPC patent classes to optimize the size distribution of classes for the sake of visualization. Indeed, Jaffe (1986) was the first to propose this index for technology mapping, whereas he used it to measure the correlation between the vectors representing the distributions of firms’ patents in a set of technology fields. In addition, to measure the knowledge distance between patents, co-citations, i.e., the number of shared forward citations of two patents, and bibliographic coupling, i.e., the number of shared backward citations (i.e. references) of two patents, were popularly used 5 (Iwan von Wartburg et al., 2005; Leydesdorff and Vaughan, 2006). A co-citation index can be further normalized over the total number of citations for each article, i.e., the Jaccard index (Small, 1973), or over a probabilistic measure of expected co-citation counts (Zitt et al., 2000). The formulas of co-citations or bibliographic coupling of patents or academic articles can be adopted to measure and indicate the distance of different technology classes. 2.2 Patent classification-based measures Scholars have also used the “co-classification” information of patents to develop indicators of the distance between technology classes. A patent belongs to at least one, but usually multiple classes assigned by the patent examiners of the issuing offices. Using this information, the distance between technology fields can be indicated by the co-occurrence of classification codes assigned to individual patent documents (Engelsman and van Raan, 1994). The assumption is that the frequency in which two classes are jointly assigned to the same patents will be high if these two classes are proximate. This assumption is similar to the survivor principle in economics (Stigler, 1968), which suggests that surviving firms’ behaviors are more observable in empirical data, because they are more efficient and thus make firms survive and observable. Jaffe (1986) was also the first to apply the cosine index to measuring the distance of firms’ technological portfolios based on the symmetrical matrix of the frequency of two technology classes being jointly assigned to the same patent that belongs to the observed firms. Later, the cosine index was adopted for the general symmetrical co-occurrence matrix in which each cell represents the total number of patents that are assigned with both technology fields represented by the respective row and column (Breschi et al., 2003; Ejermo, 2005; Kogler et al., 2013). Leydesdorff and Vaughan (2006) argued that the symmetrical co-occurrence matrix contains similarity data and can be analyzed directly, whereas further normalization of the co-occurrence matrix using the Pearson correlation or cosine may distort the data and generate spurious correlations. Leydesdorff (2008) further proposed to analyze the asymmetrical classification assignment matrix, with patents as the units of analysis and the technology classes as the column variables, and use the cosine index to associate the column variables. He also found that networks built using classification data match poorly with those generated by citation data, and the classification data might be less useful than co-citation data for technology network mapping, primarily because the classifications were assigned poorly by the ISI staff. In addition, Joo and Kim (2010) also argued that co-classification measures may not directly assess the distance of technology fields and proposed to create a multi-dimensional 6 contingency table to represent patent classification data and apply the Mantel-Haenszel common odds ratio on the table for measurement. Furthermore, Nesta and Dibiaggio (2005), using the typical co-occurrence matrix, measured the deviation of the number of observed patents shared between classes from the expected number of randomly shared patents, in order to reveal the distance among fields, following Teece et al. (1994) who initially developed this normalization method to measure the distance between industrial fields. This measure takes a t-statistic form and adjusts for the effects of class sizes. Similarly, recognizing the uneven importance of different patents and their classes, Altuntas et al. (2015) used the data of forward citations of each patent and of the size of each technology class in terms of total patent count to weight each patent occurring between a pair of technology classes, when counting the occurrences of the same patents in a pair of classes. 2.3 Likelihood of diversification as measures of distance Another group of measures utilizes the data on field-crossing diversification behaviors of innovation agents (e.g., countries, regions, cities, organizations or inventors) to indicate the proximity (the reverse of distance) between technology fields. In studying the product space, Hidalgo et al. (2007) measured the proximity between two product categories in terms of the likelihood for an average country to develop strong relative comparative advantage (RCA) in one product category, given that it has developed strong RCA in the other. The assumption is that this likelihood is high if the capabilities required to produce products in one category are similar to those required to produce another product. In other words, the likelihood of the diversification of countries across two product categories may indicate the proximity of the knowledge base of these two product categories. Boschma et al. (2013) applied the same proximity measure to studying the diversification of productive capabilities of different regions in Spain based on export product categories. Although the studies of product space were based on export and import data and the custom classifications of products, their proximity measure can be adapted to patent data and patent technology classifications. For instance, a mathematically similar index called the revealed technological advantage (RTA) has been used to measure the pattern of technological specialization of innovation agents (Cantwell and Vertova, 2004; Hall et al., 2001). Boschma et al. (2014) applied this measure to calculating the likelihood of technology diversification at the region and city levels, and used such a likelihood as edge weight in the network of patent technology classes. 7 In parallel, Teece et al. (1994) estimated how much the frequencies that firms diversify in combinations of 4-digit SIC industries deviate from what one would expect if diversification patterns were random. They called it a “survivor-based measure”, because their inspiration was from the survivor principle in economics (Stigler, 1968), which suggests that efficient firms survive and contribute to empirical observations and regularity. Following the survivor principle, Teece et al. argued that one can observe that firms diversify more often across industries that are more proximate, so that the number of diversifying firms in a pair of industries may indicate the distance of the industries. Particularly, this measure is superior in that it extracts the information about the true distance in the number of empirical observations by comparing it to the expected value under the hypothesis that diversification is random and not affected by the true distance. In doing so, it adjusts for industry size such that it can be compared consistently across industry pairs. Despite being initially developed to measure industry distance, this measure can be easily leveraged to measure the distance of technology fields, based on patent data. 2.4 Other measures In addition to the information on references, classifications, and inventor identities in patent documents, patent texts have also been analyzed to measure the distance of different technologies and fields. For instance, Nakamura et al. (2014) measured the technological distance of patents in the sub-domains of automobile and aircraft industries by using cosine similarity of the vectors representing occurrence frequencies of words in the patent titles and abstracts of pairs of sub-domains. Fu et al. (2013) proposed a technological distance measure as the text similarity between patents in terms of the functional meanings of the verbs that appear in the description texts of patents. Information of “functional similarity” is useful, because those different solutions or mechanisms used in different inventions to address similar functions present great potential to be recombined into new technologies. Despite the variety of distance measures in the literature, they have not been assessed and compared using a consistent methodology or criterion. To address this gap, this paper presents a strategy and methodology to assess and compare alternative measures by investigating the similarities and differences in the structures of their resulting technology networks. To implement this strategy, we analyze twelve distance measures that belong to the categories of measures reviewed in Section 2.1, 2.2 and 2.3, respectively. 8 3. Data and methodology 3.1 Data The vertices in our technology network maps are patent classes defined in the International Patent Classification (IPC) system, following many other authors who have considered IPC classes the most suitable and stable representations of technology fields (Leydesdorff et al., 2014).2 The IPC system includes 8 broad technical domains, which can be subdivided into, for example, 3-digit and 4-digit level subclasses. For the best visualization without losing necessary details and resolution of the technology landscape, we chose 3-digit classes to represent vertices in networks. Some undefined classes, for example, “A99 - subject matter not otherwise provided for in this section,” are excluded from the analysis. As a result, the networks contain 121 vertices, i.e. 3-digit level IPC classes. We use the patent data from 1976 to 2006 from United States Patent & Trademark Office (USPTO) and NBER Patent Data Project3. The data set contains 3,186,310 utility patents. Each patent is classified in one or multiple IPC classes. 3.2 Distance measures The literature review has shed light on at least four categories of distance measures: 1) the proximity (either similarity or relatedness) of knowledge bases of the innovation activities in a pair of technology fields, using patent citation data; 2) the likelihood for the same innovation agents (i.e., inventors, R&D organizations, or countries) to invent technologies in a pair of technology fields, using data on the successful patenting records of the agents (i.e., in which classes one has patents); 3) the frequency to observe the same innovation agents inventing technologies in a pair of technology fields, using data on the successful patenting records of the agents; 4) the frequency to observe a pair of technology fields being assigned to the same patents, using data on the co-classifications of patents. In this paper, we choose to analyze 3 specific measures that are most representative for each above category, totaling 12 measures. Table 1 summarizes these 12 measures that follow respective rationales. 2 This paper focuses on comparing vertex distance measures, so vertex definitions are fixed. Future research may conduct similar analyses based on different definitions of vertices, such as United States Patent Classes and recently proposed hybrid patent categories (Kay et al. 2014; Bensen and Magee, 2013; 2015). 3 NBER Patent Data Project website: https://sites.google.com/site/patentdataproject/Home 9 Table 1 Twelve distance measures in four different categories Rationale A: Similarity or relatedness of knowledge bases Data required Patent references B: Likelihood for innovation agents to diversify across fields Bibliographical information of inventors, assignees and regions C: Frequency to observe innovation agents diversifying across fields Bibliographical information of inventors, assignees and regions D: Frequency for technology fields to share same patents Information of multiple classes assigned to the same patent Measures A1: Normalized co- reference A2: Class-to-class cosine similarity A3: Class-to-patent cosine similarity B1: Inventor diversification likelihood B2: Organization diversification likelihood B3: Country diversification likelihood C1: Inventor co- occurrence frequency C2: Organization co- occurrence frequency C3: Country co- occurrence frequency D1: Normalized co- classification D2: Co-classification cosine similarity D3: Patent co- occurrence frequency Definitions The count of shared citations, normalized by the count of all unique citations of patents in a pair of classes The cosine of the angle of the two vectors representing two technology classes’ distributions of citations into all patent classes The cosine of the angle of the two vectors representing two technology classes’ distributions of citations into unique patents Minimum of the pairwise conditional probabilities of an inventor having stronger than average patenting records in one class, given that he also has stronger than average records in the other Minimum of the pairwise conditional probabilities of an organization having stronger than average patenting records in one class, given that it also has stronger than average records in the other. Minimum of the pairwise conditional probabilities of a country having stronger than average patenting records in one class, given that it also has stronger than average records in the other The deviation of the number of shared inventors of a pair of technology classes from the expected value under the hypothesis that diversification patterns are random. The deviation of the number of shared inventing organizations of a pair of technology classes from the expected value under the hypothesis that diversification patterns are random. The deviation of the number of shared inventing countries of a pair of technology classes from the expected value under the hypothesis that diversification patterns are random. The number of shared patents of a pair of technology classes, normalized by the number of all unique patents in both classes. The cosine of the angle of the two vectors representing two technology classes’ distributions of shared patents with all other technology classes. The deviation of the number of shared patents of a pair of technology classes from the expected value under the hypothesis that classes are randomly assigned to patents. The first group of measures (A1, A2 and A3) uses the information of backward citations (i.e. references) of patents, which represent the knowledge inputs to innovation activities, to measure either relatedness or similarity of knowledge bases or inputs of different classes. A1. “Normalized co-reference”: the count of shared references, normalized by the total count of all unique references of patents in a pair of classes, formulated as 10 Co-Reference = C C ∩ i C C ∪ i j j (1) where Ci and Cj are the numbers of backward citations (i.e., references) of patents in technology classes i and j; C C∩ i j is the number of patents referenced in both technology classes i and j, and C C∪ i j is the total number of unique patents referenced in both technology classes i and j, respectively. It is also known as the Jaccard index (Jaccard, 1901). A2. “Class-to-class cosine similarity”: the cosine of the angle of the two vectors representing two technology classes’ distributions of citations into all patent classes (Leydesdorff, 2007), formulated as Cosine( , ) j i = ∑ k 2 C ik ∑ k C C ik jk ∑ k C 2 jk (2) where Cij denotes the number of citations referred from patents in technology class i to the patents in technology class j; k belongs to all the technology classes. The cosine value is between [0,1] and indicates the similarity of the knowledge bases of two fields. A3. “Class-to-patent cosine similarity”: the cosine of the angle of the two vectors representing two technology classes’ distributions of citations into specific unique patents instead of aggregated classes. The same formula as (2) applies, but Cij now denotes the number of citations of all patents in class i to the specific patent j. Measure A3 has a better resolution than measure A2, whereas computation is slightly more complex. The next two groups of measures, B1-B3 and C1-C3, similarly utilize the patent information related to successful inventive behaviors of different types of agents (inventors, organizations and countries) in terms of which classes their patents are assigned in. These measures generally indicate the likelihood or frequency that innovation agents diversify across a pair of technology fields. We separate them into two groups, B and C, due to the difference in their mathematical formulas. B1. “Inventor diversification likelihood”: minimum of the pairwise conditional probabilities (Rij) of an inventor having strong inventing records in one class, given that this person also has strong inventing records in the other = R ij min{ Prob (RTA RTA ), Prob (RTA RTA )} , c j , c i , c i , c j (3) where RTAc,i and RTAc,j denotes inventor c’s revealed technological advantage in technology class i and j. 11 RTA , c i = ( ) , x c i ( , x c i ∑ i ) ) ( , x c i ) ( , x c i , c i c ∑ ∑ where (cid:1)(cid:2)c,i(cid:3) is the number of patents held by an inventor c in technology class i; ∑ x(c,i) i (4) is the number of patents held by an inventor c in all technology classes; ∑ x(c,i) c is the total number of patents held by all inventors c in class i; ∑ x(c,i) c,i is the total number of patents in the observed data. RTAc,i is an indicator of the relative inventive capacity of inventor c in class i. RTAc,i > 1 means inventor c has more patents in class i as a share of the inventor’s total patents than an “average” inventor; otherwise, if RTAc,i ≤ 1 . The mathematical formulation is adopted from Hidalgo et al. (2007). A high Rij value indicates a higher likelihood for an inventor to leverage knowledge across technology fields i and j for innovation, or to diversify personal inventive activities across fields i and j. To calculate this measure, we use the unique inventor identifiers from the Institute for Quantitative Social Science at Harvard University (Li et al., 2014). B2. “Organization diversification likelihood”: the formula is the same as the “inventor diversification likelihood” above (Eq. 3 and Eq. 4), except that the agent is now an “organization”, which is often a company, university, or public R&D institute. The organizations are identified using the “unique assignee” identifiers created by the National Bureau of Economics Research (NBER) (Hall et al., 2001). B3. “Country diversification likelihood”: the formula is the same as the “inventor diversification likelihood” above (Eq. 3 and Eq. 4), except that the agent is now a country. Measures C1, C2 and C3 employ the form of a measure, which Teece et al. (1994) first proposed to indicate the relatedness between industries, following the “survivor principle” in economics. Applied to the context of technology classes, the measure compares the empirically observed frequency of co-occurrences of a pair of technology classes in the patenting records of the same inventors, organizations or countries, to the expected frequency in a random co-occurrence situation controlled for the sizes of technology classes. C1: “Inventor co-occurrence frequency”: the deviation of the empirically observed number of inventors occurring in a pair of technology classes from the value that would be expected when technology classes are randomly assigned to inventors. The formula is, m ij = r ij O ij s ij (5) where Oij is the observed number of inventors active in both technology classes i and j, i.e. the count of inventor-level occurrences of patent technology classes i and j; µ ij and σij are the 12 - mean and variance of the expected number of inventors active in both classes i and j, given by a hypergeometric distribution. The hypoergeometric distribution defines µ ij and σij as m = ij N N i T j s 2 = m ( ij T N T i )( T N 1 T j ) (6) (7) where T is the total number of inventors having two or more technology classes; Ni and Nj are the number of inventors empirically observed in technology i and j, respectively. Thus rij is analogous to a t-statistic. It indicates that, when the actual number Oij observed between classes i and j greatly exceeds the expected number µ ij, these two technology fields are considered highly proximate. This measure controls for the effect of the sizes of technology classes on inventor appearances in them. If technology classes have many inventors, i.e. Ni (or Nj) is large, the chance for inventors in Ni (or Nj) to be active in class j would be high, even if classes i and j are distant. When Ni or Nj is small, one would not expect to see many co-occurrences even if classes i and j are highly proximate. µ ij estimates the co-occurrence frequency resulting only from the size effect but not from the effect of knowledge distance. Therefore, rij extracts the information in Oij about actual distance. C2. “Organization co-occurrence frequency”: the formula is the same as “inventor co- occurrence frequency” above (Eq. 5-7), except that the agent is now an “organization”, which is often a company, university, or public R&D agency. C3. “Country co-occurrence frequency”: the formula is the same as “inventor diversification likelihood” above (Eq. 5-7), except that the agent is now a country. The last group of measures (D1, D2 and D3) uses the information of the co-classifications of patents to quantify the co-occurrences of a pair of technology classes in the same patents. Co-classification means that a patent is assigned to more than one class. Patent examiners based on their assessments of the inventions carry out the assignment activity. D1. “Normalized co-classification”: the count of shared patents, normalized by the total count of unique patents in a pair of classes, formulated as Co-Classification = N N i i ∩ ∪ N N j j (8) where Ni and Nj are the number of patents in technology classes i and j, respectively; N i N∩ j is the number of shared patents in both technology classes i and j, and N i N∪ j is the total number of unique patents in both technology classes i and j. 13 - - - D2. “Co-classification cosine similarity”: the cosine of the angle of the two vectors representing two technology classes’ distributions of patents shared with all other technology classes, formulated as Cosine( , ) j i = ∑ k 2 O ik ∑ k O O ik jk ∑ k O 2 jk (9) where Oij is the number of shared patents in both technology classes i and j. D3: “Patent co-occurrence frequency”: the deviation of the empirically observed number of patents occurring in a pair of technology classes from the value that would be expected when technology classes are randomly assigned to patents. Its formulas are the same as those for inventor, organization and country co-occurrence frequencies, i.e. Eq. (5)-(7). But here the variables are given new meanings: Oij is the number of shared patents in both classes i and j; T is the total number of patents having two or more technology classes; Ni and Nj are the number of patents in classes i and j, respectively. D3 concerns the frequency of patents being assigned to a pair of classes, differing from C1, C2 and C3 that concern the frequency of innovation agents being active in a pair of classes. By far we have introduced 12 measures to be analyzed in Section 4. While some measures (such as A2, B3, D2 and D3) have appeared in prior studies of technology networks, the others (such as A1, A3, B1, B2, C1, C2, C3 and D1) are new. A1 and D1 use the formula of well-established Jaccard index, but are new to the literature on patent network mapping. While A3 employs the cosine formula of A2 that has been used to construct patent technology networks (Leydesdorff et al., 2014; Kay et al., 2014), it is new in that it considers the distribution of citations to unique patents, rather than classes, in order to improve measurement resolution. The formula for B1, B2 and B3 first appeared in the studies on the diversification of countries or regions in the product space based on export product data (Hidalgo et al., 2007; Boschma et al., 2014). To our best knowledge, the present paper is the first to apply this formula to the analysis levels of inventors and inventive organizations in the context of technology and patent classes. Thus we consider B1 (inventor diversification likelihood) and B2 (organization diversification likelihood) are new to the literature. Likewise, the formula of C1, C2 and C3 was first developed to measure industry relatedness (Teece et al., 1994). Here, it is the first time that the formula is used to measure the frequency of innovation agents having patents in pairs of patent technology classes. 14 3.3 Strategy of comparison Because these distance measures deal with the same underline structure of the technology space, the overall network map structures resulting from them are expected to be similar. The maps that exhibit the highest structural similarities with all other maps are the best representatives out of this set of alternative maps to represent the underlining technology space. Therefore, after the networks of the 121 IPC classes are constructed by using the twelve distance measures, we investigate their pairwise correlations/similarities in terms of network structural properties, for example, weights of corresponding edges and centralities of corresponding vertices in different networks. To calculate the centrality of each vertex, we employ the two most commonly used network centrality metrics in graph theory, because of their applicability to weighted undirected networks. One is degree centrality, which is the sum of the weights of the edges connected to the focal vertex. The other is eigenvector centrality, which is the value of the focal vertex’s respective element in the dominant eigenvector of the adjacency matrix of the network (Newman, 2005). We also assess the correlation between vertex centralities and the indicators of “importance” of technology classes (e.g., total numbers of patents and forward citation counts of patents in a class), in the 12 technology networks. 4. Results Before comparing different types of networks, we first examine the over-time changes of each of them. Table 2 reports the Pearson coefficients of correlations of the weights of corresponding edges in different time periods for each network. It is shown that the correlations between networks of the same type but in different time periods are generally high (in most cases, higher than 0.9), indicating that network changes over time are fairly slow regardless of the choices of distance measures. Such observations are consistent with the prior study of Hinze et al. (1997) that also suggested the stability of the network of technology fields. In the meantime, these two networks based on measures of the likelihood and frequency of country-level cross-field diversification (B3 and C3) are the least stable over time, as indicated by their lowest correlation coefficients in the range of 0.5~0.6. For all measures, the network based on data for the longest time period (1976 to 2006) is the most correlated with all other networks constructed using data for single decades (e.g. 1977 to 1986, 1987 to 1996, 1997 to 2006). Therefore, in later analyses we focus on the networks constructed using our 15 total patent data from 1976 to 2006, to have the most representative empirical approximation of the distance between technology fields. Table 2 Correlation coefficients of edge weights in the same technology network for different time periods A1. Normalized co-reference 1977-1986 1987-1996 1997-2006 1976-2006 A2. Class-class cosine 1977-1986 1987-1996 1997-2006 1976-2006 A3. Class-patent cosine 1977-1986 1987-1996 1997-2006 1976-2006 B1. Inventor diversification likelihood 1977-1986 1987-1996 1997-2006 1976-2006 B2. Organization diversification likelihood 1977-1986 1987-1996 1997-2006 1976-2006 B3. Country diversification likelihood 1977-1986 1987-1996 1997-2006 1976-2006 C1. Inventor co-occurrence frequency 1977-1986 1987-1996 1997-2006 1976-2006 C2. Organization co-occurrence frequency 1977-1986 1987-1996 1997-2006 1976-2006 C3. Country co-occurrence frequency 1977-1986 1987-1996 1997-2006 1976-2006 D1. Normalized co-classification 1977-1986 1987-1996 1997-2006 1976-2006 D2. Co-classification cosine 1977-1986 1987-1996 1997-2006 1976-2006 D3. Patent co-occurrence frequency 1977-1986 1987-1996 1997-2006 1976-2006 1997-2006 1.000 0.987 1997-2006 1.000 0.987 1997-2006 1.000 0.973 1997-2006 1.000 0.972 1997-2006 1.000 0.969 1997-2006 1.000 0.819 1997-2006 1.000 0.979 1997-2006 1.000 0.968 1997-2006 1.000 0.889 1997-2006 1.000 0.904 1997-2006 1.000 0.948 1997-2006 1.000 0.957 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1976-2006 1.000 1987-1996 1.000 0.951 0.977 1987-1996 1.000 0.882 0.921 1987-1996 1.000 0.812 0.913 1987-1996 1.000 0.916 0.973 1987-1996 1.000 0.938 0.969 1987-1996 1.000 0.633 0.752 1987-1996 1.000 0.942 0.978 1987-1996 1.000 0.932 0.965 1987-1996 1.000 0.687 0.746 1987-1996 1.000 0.741 0.947 1987-1996 1.000 0.874 0.954 1987-1996 1.000 0.890 0.973 1977-1986 1.000 0.952 0.894 0.937 1977-1986 1.000 0.896 0.817 0.874 1977-1986 1.000 0.877 0.712 0.817 1977-1986 1.000 0.943 0.846 0.928 1977-1986 1.000 0.929 0.864 0.935 1977-1986 1.000 0.592 0.547 0.654 1977-1986 1.000 0.950 0.879 0.939 1977-1986 1.000 0.938 0.886 0.938 1977-1986 1.000 0.541 0.483 0.606 1977-1986 1.000 0.922 0.654 0.896 1977-1986 1.000 0.873 0.784 0.912 1977-1986 1.000 0.923 0.810 0.931 16 To develop a general intuition about technology network structures, we visualize these twelve networks, using VOSviewer that was initially created to visualize bibliometric networks. Leydesdorff et al. (2014) showed that it also provides good visualizations of patent technology networks. As an example, Fig. 2 visualizes the technology network constructed by using the measure of inventor diversification likelihood (B1). This network is also the background map used in Fig. 1 to locate the specific knowledge positions of Google and to reveal its innovation directions or diversification paths by overlaying. These networks are almost fully connected, but most of the edges have extremely small values, indicating long distance between most fields. Therefore, to visually reveal its main structure, we filter the network to contain only the maximum spanning tree4 as the skeleton plus the strongest edges, which together make the total number of edges be twice that of the vertices. Hildago et al. (2007) suggested this threshold of edge filtering as a rule of thumb for good network visualization. Fig. 2 is such a filtered network. It exhibits a heterogeneous structure, with six communities of technology fields identified by the Louvain community detection method (Blondel et al., 2008). The heterogeneity, instead of homogeneity, of the structure of technology networks justifies it as a good lens or protocol for the comparison of alterative networks. Fig. 2 The technology network using the inventor diversification likelihood as distance measure. Vertex sizes correspond to the total patent counts in respective IPC patent classes; vertex colors denote different communities. 4 A maximum spanning tree (MST) only keeps those strongest edges that minimally connect the network into a tree. The MST for the network in Fig. 2 contains the strongest 120 edges that connect all 121 vertices into a tree. 17 4.1 Correlation of edge weights between different networks To compare the structures of the 12 networks, we first investigate the Pearson correlation coefficient between the edge weights of corresponding pairs of technology classes in different networks (see Table 3). In Table 3, we underline the highest correlation coefficient between each measure and any other measures, and also report the average of the correlation coefficients of one measure with all other 11 measures. In respective categories (A, B, C and D), the networks using the measures of normalized co-reference (A1), inventor diversification likelihood (B1), inventor co-occurrence frequency (C1) and co-classification (D1) are the most correlated with all other types of networks. This result suggests, A1, B1, C1 and D1 lead to the most representative networks in their respective groups. Table 3 Correlation coefficients of edge weights between technology networks (1976-2006) A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 D3 Average A1 0.541 0.857 0.915 0.785 0.178 0.792 0.723 0.145 0.736 0.453 0.587 0.610 A2 0.541 0.661 0.482 0.414 0.021 0.592 0.460 -0.119 0.454 0.446 0.490 0.404 B1 A3 0.857 0.915 0.661 0.482 0.814 0.814 0.664 0.840 0.142 0.205 0.775 0.827 0.622 0.737 0.083 0.191 0.734 0.836 0.350 0.398 0.635 0.666 0.576 0.628 B2 0.785 0.414 0.664 0.840 0.389 0.703 0.866 0.371 0.609 0.431 0.522 0.599 B3 0.178 0.021 0.142 0.205 0.389 0.259 0.288 0.428 0.139 0.171 0.228 0.223 C1 0.792 0.592 0.775 0.827 0.703 0.259 0.714 0.134 0.736 0.451 0.898 0.626 C2 0.723 0.460 0.622 0.737 0.866 0.288 0.714 0.413 0.529 0.489 0.522 0.578 C3 0.145 -0.119 0.083 0.191 0.371 0.428 0.134 0.413 0.085 0.133 0.112 0.180 D1 0.736 0.454 0.734 0.836 0.609 0.139 0.736 0.529 0.085 0.238 0.735 0.530 D2 0.453 0.446 0.350 0.398 0.431 0.171 0.451 0.489 0.133 0.238 0.279 0.349 D3 0.587 0.490 0.635 0.666 0.522 0.228 0.898 0.522 0.112 0.735 0.279 0.516 * Distance measures: (A1) normalized co-reference; (A2) class-to-class cosine similarity; (A3) class-to-patent cosine similarity; (B1) inventor diversification likelihood; (B2) organization diversification likelihood; (B3) country diversification likelihood; (C1) inventor co-occurrence frequency; (C2) organization co-occurrence frequency; (C3) country co-occurrence frequency; (D1) normalized co-classification; (D2) co-classification cosine similarity; (D3) patent co-occurrence frequency. In particular, among all the pairwise correlations, the correlation coefficient (=0.915) for the pair of A1 and B1 is the highest. This may suggest a strong effect of the technological distance of a pair of fields on the likelihood for inventors to diversify across fields or to combine knowledge of these fields to generate new inventions. In the meantime, this effect of knowledge distance on diversification patterns is lesser for organizations and the least for countries. The networks based on country diversification likelihood (B3) and country co- occurrence frequency (C3) are the least correlated with networks in group A based on knowledge distance measures as well as all other networks. That is, the survivor principle may not explain technology diversification patterns of countries. A country may survive many inefficient diversification choices and behaviors across distant fields, as long as their resources are abundant enough to ensure survival. In contrast, individual inventors must learn and master relevant knowledge of a technology field in order to invent there. Thus the 18 diversification patterns of inventors, as measured by B1 and C1, are strongly constrained by the knowledge distance of different fields, as measured by A1. We further plot and visually compare the distributions of edges by weights of the 12 network maps in Fig. 3. The networks using group A measures and the networks using B1 and B2 as well as D1 measures exhibit negative exponential distributions. In particular, the high skewness of the A1, A2 and A3 networks indicates that very most technology fields are indeed highly distant from one another. Thus, the likelihood for inventors to diversify across most pairs of technology fields must be also limited. This is reflected in the similarly skewed distribution of edges in the network using inventor diversification likelihood (B1). Fig. 3 Distributions of edges by weights of the technology networks using 12 alternative measures. 19 In group B, as we expand the scope of the innovation agents from inventors (B1) to organizations (B2) and then to countries (B3), the mean values of inter-field distance decreases (i.e. proximity increases) and the skewness of the distribution decreases. This increasing normality from B1 to B3 may also suggest that countries may make more normal decisions of cross-field diversifications, without being strongly constrained by inter-field knowledge distance whose distributions are highly skewed. In addition, the distributions of C1, C2, C3 and D3 all exhibit the form of normal distributions, despite varied skewness. This similarity may result from their shared mathematical formation that normalizes empirical observations with corresponding random scenarios. 4.2 Correlation of vertex centralities between different networks We also investigate the correlation between degree and eigenvector centralities of the same set of 121 vertices in different networks. In Tables 4(a) and 4(b), we underline the highest correlation coefficients between each measure and any other measures, and also report the average of the correlation coefficients of each measure with all other 11 measures. For both types of centrality metrics, within group A, the networks using normalized co-reference (A1) and class-to-patent cosine similarity (A3) are far more correlated with all other networks than class-to-class cosine similarity (A2), although A2 is popularly used in the literature (Leydesdorff et al., 2014; Kay et al., 2014). Table 4(a) Correlations of vertex degree centrality between technology networks (1976-2006) A1 0.236 0.914 0.910 0.539 -0.179 0.101 0.496 0.047 0.837 0.338 -0.521 0.338 D1 0.837 0.277 0.844 0.819 0.493 -0.126 -0.049 0.390 -0.029 0.043 -0.632 0.261 C3 0.047 -0.334 -0.003 0.241 0.514 0.435 0.387 0.560 -0.029 0.194 0.286 0.209 B1 0.910 0.168 0.833 0.760 -0.062 0.295 0.709 0.241 0.819 0.273 -0.361 0.417 B3 -0.179 -0.369 -0.192 -0.062 0.380 0.242 0.149 0.435 -0.126 -0.064 0.309 0.048 C1 0.101 0.132 0.201 0.295 0.493 0.242 0.496 0.387 -0.049 0.285 0.734 0.302 C2 0.496 0.119 0.453 0.709 0.876 0.149 0.496 0.560 0.390 0.230 0.033 0.410 D2 0.338 0.131 0.265 0.273 0.156 -0.064 0.285 0.230 0.194 0.043 0.044 0.172 D3 -0.521 -0.107 -0.419 -0.361 0.018 0.309 0.734 0.033 0.286 -0.632 0.044 -0.056 A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 D3 Average A2 0.236 0.474 0.168 0.051 -0.369 0.132 0.119 -0.334 0.277 0.131 -0.107 0.071 A3 0.914 0.474 0.833 0.502 -0.192 0.201 0.453 -0.003 0.844 0.265 -0.419 0.352 B2 0.539 0.051 0.502 0.760 0.380 0.493 0.876 0.514 0.493 0.156 0.018 0.435 Table 4(b) Correlations of vertex eigenvector centrality between technology networks (1976-2006) A1 0.285 0.826 0.891 0.418 -0.278 -0.041 0.472 -0.001 0.391 0.293 A2 0.285 0.502 0.284 0.053 -0.41 -0.167 0.159 -0.338 0.165 0.101 A3 0.826 0.502 0.801 0.437 -0.17 -0.342 0.44 0.038 0.368 0.199 B1 0.891 0.284 0.801 0.671 -0.171 -0.138 0.701 0.164 0.267 0.234 B2 0.418 0.053 0.437 0.671 0.39 -0.212 0.872 0.478 0.014 0.09 A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 B3 -0.278 -0.41 -0.17 -0.171 0.39 -0.307 0.128 0.411 -0.088 -0.088 20 C1 -0.041 -0.167 -0.342 -0.138 -0.212 -0.307 0.004 0.101 -0.619 0.281 C2 0.472 0.159 0.44 0.701 0.872 0.128 0.004 0.534 -0.088 0.198 C3 -0.001 -0.338 0.038 0.164 0.478 0.411 0.101 0.534 -0.296 0.209 D1 0.391 0.165 0.368 0.267 0.014 -0.088 -0.619 -0.088 -0.296 -0.246 D2 0.293 0.101 0.199 0.234 0.09 -0.088 0.281 0.198 0.209 -0.246 D3 0.046 -0.061 -0.066 0.106 0.112 -0.123 0.786 0.282 0.292 -0.868 0.378 D3 Average 0.046 0.300 -0.061 0.052 -0.066 0.276 0.106 0.346 0.112 0.302 -0.123 -0.064 0.786 -0.059 0.282 0.337 0.292 0.145 -0.868 -0.091 0.378 0.150 0.080 Within group B, the networks using inventor diversification likelihood (B1) and organization diversification likelihood (B2) are far more correlated with other networks, than country diversification likelihood (B1). In group C, the network using organization co- occurrence frequency (C2) is the most correlated with other types of networks, in contrast to the analysis of edge weight correlations (see Table 3) that suggests the network using inventor co-occurrence frequency (C1) is the most correlated one from group C. The results of group D networks are mixed across the analyses of degree and eigenvector centralities, and the correlations of group D networks with other networks are generally weak. In the meantime, we find a few negative correlation coefficients in Table 4. The negative correlations between group A networks (based on knowledge distance) and country diversification likelihood (B3) and country co-occurrence frequency (C3) may suggest that, it is more often for countries to diversify into or combine knowledge of less central fields in the technology space, implying broad exploration. In brief, based on the analysis of pairwise network vertex centrality correlations, A1 and A3, B1, B2, and C2 lead to the most representative network maps. 4.3 Correlations of vertex centrality, popularity and impact in different networks The relative network positions of technology fields in the total technology space may affect their relative popularity (i.e. attracting innovation activities) and impact (i.e. influencing future innovation activities). For instance, for the technology classes that are strongly connected to many other classes (i.e. high centrality in the technology network), innovation agents from many other fields may enjoy the ease to diversify into them, resulting in a large number of patents. Innovation agents in highly central fields can also see many innovation opportunities via leveraging and recombining knowledge from many other fields strongly connected to their own. Thus, the relative network positions of technology classes in terms of centralities may predict their relative importance. Herein, we compare such predictabilities of the 12 networks. We focus on two indicators of the importance of a technology field: popularity and impact. Popularity of a technology field is measured by the total number of all patents in its patent class from 1976 to 2006. Impact of a field is measured by the number of total forward citations of all patents in the field, i.e. the number of later patents that cite a focal patent. 21 Forward citation count of a patent has been found to be an effective indicator of the economic impact of the patent in a number of prior studies (Albert et al., 1991; Hall et al., 2005; Harhoff et al., 1999; Lee et al., 2007; Trajtenberg, 1990). We calculate Spearman rank correlations between vertex centralities and popularity/impact indicators of the 121 technology classes in each of the 12 networks, because it is more appropriate for the purpose of investigating if more central vertices are also more important ones. Results are shown in Table 5. Table 5. Rank correlations of vertex centralities, forward citation counts and patent counts in different networks. Networks Degree Centrality Eigenvector Centrality # of future citations # of patents # of future citations # of patents A1 A2 A3 B1 B2 B3 C1 C2 C3 D1 D2 D3 0.859 -0.036 0.654 0.776 0.300 -0.279 -0.024 0.284 -0.126 0.738 0.312 -0.841 0.857 -0.036 0.657 0.773 0.296 -0.278 -0.032 0.280 -0.123 0.741 0.304 -0.845 0.875 -0.027 0.546 0.782 0.281 -0.277 0.290 0.292 -0.129 0.694 0.310 0.547 0.874 -0.025 0.550 0.782 0.278 -0.275 0.275 0.289 -0.125 0.701 0.300 0.531 Among all 12 networks, the one using normalized co-reference (A1) yields the highest correlations of vertices between their network centralities and total patent counts as well as forward citation counts. A1 is followed by the networks using inventor diversification likelihood (B1), normalized co-classification (D1) and class-to-patent cosine similarity (A3), in terms of the predictability of vertex centralities on actual importance. In these networks, it is highly likely that more central technology classes are also more popular and impactful ones. None of other networks than A1, B1, D1 and A3 provides a correlation coefficient greater than 0.5. 4.4 Brief summary of findings We have analyzed different kinds of correlations in terms of edge weights, vertex centrality and importance, among the 12 technology networks, in order to explore how similar each network is with other networks. We paid special attention to the networks that have the highest overall correlations with all other networks. Specifically, the measures of normalized co-reference (A1) and inventor diversification likelihood (B1) lead to network maps that are consistently the most correlated with other networks, in terms of edge and vertex properties of the networks, and also provide the best correlations between network centrality and 22 importance indicators of technology classes. These networks are the best representatives of the technology space from this set of 12 candidate alternatives compared in this study. A few findings on additional measures are noteworthy. First, in group A, class-to-class cosine similarity (A2) performs the worst in various correlation analyses, although it is popularly used for constructing network maps of patent technology classes in the literature. Class-to-patent cosine similarity (A3) follows the same formula of A2 but uses a higher resolution of data, and is highly correlated with A1. In some cases of our analysis, A3 is no worse than A1. Second, the networks using country diversification likelihood (B3) and country co-occurrence frequency (C3) are the least correlated with the networks using measures in group A. Furthermore, inventor co-occurrence frequency (C1), organization co- occurrence frequency (C2) and normalized co-classification (D1) perform well in some of our correlation analyses, but not always. 5. Conclusion This paper contributes to the research to develop and analyze patent technology network maps to explore technology diversification and knowledge combination opportunities, and thus support technology forecasting and road mapping practices. A main challenge to developing reasonable technology network maps is the ambiguity in the choice of measures of the distance between various technology fields in the total technology space. To address this challenge, we have proposed a strategy to assess and compare alternative measures through analyzing the overall structures of their resulting networks, because the structures of technology networks condition the strategic insights that can be potentially drawn for road- mapping and forecasting analyses but are affected by the choices of distance measures. We implemented the strategy in a comparative analysis of twelve distance measures, by correlating the edge and vertex properties of their resulting networks based on network structural properties. These twelve measures were chosen to represent the most common types of distance measures that have been proposed in the literature. These measures had not been previously compared via a consistent quantitative methodology. Particularly, our analyses in all cases consistently suggest the measures of normalized co-reference and inventor diversification likelihood lead to network maps that are the most similar to all other maps. That is, these two measures lead to relatively the most representative technology maps in our comparative set of twelve. The contribution of the present paper lies primarily in promising and demonstrating the strategy to assess alternative distance measures by analyzing the correlations or similarity of 23 the overall network structures resulting from those measures. For a consistent comparison of alternative distance measures, we utilized IPC 3-digit classes to represent technological fields and operationalize the vertices in the networks. Moving forward, the same network-based comparative strategy and analysis that we have demonstrated here can be also be carried out on alternative definitions of vertices (representing technology fields) and categorizations of patents, such as USPC (United States Patent Classification), CPC (Cooperative Patent Classification), and the hybrid patent categories proposed by Kay et al. (2014) and Benson and Magee (2013; 2015)5, to see which distance measures lead to the most representative maps. We consider this a promising avenue for future research. Also, we only compared twelve distance measures. Although they are representative, additional measures exist in the literature. Researchers may also propose new types of measures in future. Therefore, future work may compare a broader set of existing and new measures. In addition, the present analyses only made use of a few simple graph theory metrics to analyze the correlations of the networks in terms of their structures, for demonstrating our proposed distance measure comparison strategy based on network analysis. More sophisticated network analysis methods can be applied to this kind of analysis. For instance, one can investigate and compare the community structure of alternative patent technology networks, using community detection algorithms. Eventually, we aim to investigate how to effectively use the technology network maps to explore knowledge combination opportunities for innovation and technology diversification directions of individual inventors, technology companies, cities and countries. Acknowledgement We thank Loet Leydesdorff and Duncan Kushnir for sharing a unique patent dataset, and Kristin Wood, Aditya Mathur, Christopher Magee, Jeffrey Alstott and Giorgio Truilzi for many insightful and stimulating discussions. This research was supported by SUTD-MIT International Design Centre and Singapore Ministry of Education Tier 2 Research Grants. 5 Kay et al. (2014) regrouped patent classes in order to have more evenly distributed patents in hybrid classes for better visualization. Benson and Magee (2013; 2015)’s hybrid categories of patents aim to improve their completeness and relevancy in representing actual technologies from technologist perspective. 24 References Ahlgren, P., Jarneving, B., Rousseau, R., 2003. Requirement for a cocitation similarity measure, with special reference to pearson’s correlation coefficient. Journal of the American Society for Information Science and Technology 54, 550-560. Albert, M.B., Avery, D., Narin, F., McAllister, P., 1991. Direct validation of citation counts as indicators of industrially important patents. Research Policy 20, 251-259. Altuntas, S., Dereli, T., Kusiak, A., 2015. Analysis of patent documents with weighted association rules. Technological Forecasting and Social Change 92, 249-262. Benson, C. L., Magee, C. L. 2013. A hybrid keyword and patent class methodology for selecting relevant sets of patents for a technological field. Scientometrics 96, 69–82. Benson, C. L., Magee, C. L. 2015. Technology structural implications from the extension of a patent search method. Scientometrics 102, 1965-1985. Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E., 2008. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment 2008, P10008. Boschma, R., Minondo, A., Navarro, M., 2013. The Emergence of New Industries at the Regional Level in Spain: A Proximity Approach Based on Product Relatedness. Economic Geography 89, 29-51. Boschma, R., Balland, P.-A., Kogler, D.F., 2014. Relatedness and technological change in cities: the rise and fall of technological knowledge in US metropolitan areas from 1981 to 2010. Industrial and Corporate Change, in press. Breschi, S., Lissoni, F., Malerba, F., 2003. Knowledge-relatedness in firm technological diversification. Research Policy 32, 69-87. Cantwell, J., Vertova, G., 2004. Historical evolution of technological diversification. Research Policy 33, 511-529. Dosi, G., 1982. Technological paradigms and technological trajectories — a suggested interpretation of the determinants and directions of technical change. Research Policy 11, 147–162. Ejermo, O., 2005. Technological diversity and Jacobs' externality hypothesis revisited. Growth and Change 36, 167-195. Engelsman, E.C., van Raan, A.F.J., 1994. A patent-based cartography of technology. Research Policy 23, 1-26. Fleming, L., 2001. Recombinant Uncertainty in Technological Search. Management Science 47(1), 117-132. Fu, K., Chan, J., Cagan, J., Kotovsky, K., Schunn, C., Wood, K. L. 2013. The meaning of “near” and “far”: the impact of structuring design databases and the effect of distance of analogy on design output. Journal of Mechanical Design 135 (2), 021007. Hall, B.H., Jaffe, A., Trajtenberg, M., 2005. Market Value and Patent Citations. The RAND Journal of Economics 36, 16-38. Hall, B.H., Jaffe, A.B., Trajtenberg, M., 2001. The NBER patent citation data file: Lessons, insights and methodological tools. National Bureau of Economic Research. 25 Harhoff, D., Narin, F., Scherer, F.M., Vopel, K., 1999. Citation Frequency and the Value of Patented Inventions. The Review of Economics and Statistics 81, 511-515. Hidalgo, C.A., Klinger, B., Barabasi, A.L., Hausmann, R., 2007. The product space conditions the development of nations. Science 317, 482-487. Hinze, S., Reiss, T., Schmoch, U., 1997. Statistical Analysis on the Distance Between Fields of Technology. Fraunhofer-Inst. Systems and Innovation Research. Iwan von Wartburg, I., Teichert, T., Rost, K., 2005. Inventive progress measured by multi- stage patent citation analysis. Research Policy 34, 1591-1607. Jaccard, P., 1901. Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37, 241-272. Jaffe, A.B., 1986. Technological Opportunity and Spillovers of R & D: Evidence from Firms' Patents, Profits, and Market Value. American Economic Review 76, 984-1001. Joo, S., Kim, Y., 2010. Measuring relatedness between technological fields. Scientometrics 83, 435-454. Kajikawa, Y., Yoshikawa, J., Takeda, Y., Matsushima, K. 2008a. Tracking emerging technologies in energy research: Toward a roadmap for sustainable energy. Technological Forecasting & Social Change 75 (2008) 771–782. Kay, L., Newman, N., Youtie, J., Porter, A.L., Rafols, I., 2014. Patent overlay mapping: Visualizing technological distance. Journal of the Association for Information Science and Technology 65, 2432-2443. Kogler, D.F., Rigby, D.L., Tucker, I., 2013. Mapping Knowledge Space and Technological Relatedness in US Cities. European Planning Studies 21, 1374-1391. Lee, Y.-G., Lee, J.-D., Song, Y.-I., Lee, S.-J., 2007. An in-depth empirical analysis of patent citation counts using zero-inflated count data model: The case of KIST. Scientometrics 70, 27-39. Leydesdorff, L., 2007. Visualization of the citation impact environments of scientific journals: An online mapping exercise. Journal of the American Society for Information Science and Technology 58, 25-38. Leydesdorff, L., 2008. Patent classifications as indicators of intellectual organization. Journal of the American Society for Information Science and Technology 59, 1582-1597. Leydesdorff, L., Kushnir, D., Rafols, I., 2014. Interactive overlay maps for US patent (USPTO) data based on International Patent Classification (IPC). Scientometrics 98, 1583-1599. Leydesdorff, L., Vaughan, L., 2006. Co-occurrence matrices and their applications in information science: Extending ACA to the Web environment. Journal of the American Society for Information Science and Technology 57, 1616-1628. Li, G.-C., Lai, R., D’Amour, A., Doolin, D.M., Sun, Y., Torvik, V.I., Yu, A.Z., Fleming, L., 2014. Disambiguation and co-authorship networks of the U.S. patent inventor database (1975–2010). Research Policy 43, 941-955. 26 Nakamura, H., Suzuki, S., Sakata, I., Kajikawa, Y., 2014. Knowledge combination modeling: The measurement of knowledge similarity between different technological domains. Technological Forecasting and Social Change, In Press. Nesta, L., Dibiaggio, L., 2005. Patents Statistics, Knowledge Specialisation and the Organisation of Competencies. Revue d'économie industrielle, 103-126. Newman, M.E.J., 2005. A measure of betweenness centrality based on random walks. Social Networks 27, 39-54. Newman, M.E.J., 2010. Networks: An Introduction. Oxford University Press. Ogawa, T., Kajikawa, Y. 2015. Assessing the industrial opportunity of academic research with patent relatedness: A case study on polymer electrolyte fuel cells. Technological Forecasting & Social Change 90, 469–475. Rigby, D.L., 2013. Technological Relatedness and Knowledge Space: Entry and Exit of US Cities from Patent Classes. Regional Studies 0, 1-16. Schumpeter, J., 1934. The Theory of Economic Development. Harvard University Press, Cambridge. Small, H., 1973. Co-citation in the scientific literature: A new measure of the relationship between two documents. Journal of the American Society for Information Science 24, 265-269. Stigler, G. J., 1968. The Organization of Industry. Homewood, Ill.,: R. D. Irwin. Teece, D.J., Rumelt, R., Dosi, G., Winter, S., 1994. Understanding corporate coherence: Theory and evidence. Journal of Economic Behavior & Organization 23, 1-30. Trajtenberg, M., 1990. A Penny for Your Quotes: Patent Citations and the Value of Innovations. The RAND Journal of Economics 21, 172-187. Zitt, M., Bassecoulard, E., Okubo, Y., 2000. Shadows of the past in international cooperation: Collaboration profiles of the top five producers of science. Scientometrics 47, 627-657. 27
1711.07677
3
1711
2018-09-22T11:50:17
Corporate payments networks and credit risk rating
[ "cs.SI", "q-fin.RM" ]
Aggregate and systemic risk in complex systems are emergent phenomena depending on two properties: the idiosyncratic risks of the elements and the topology of the network of interactions among them. While a significant attention has been given to aggregate risk assessment and risk propagation once the above two properties are given, less is known about how the risk is distributed in the network and its relations with the topology. We study this problem by investigating a large proprietary dataset of payments among 2.4M Italian firms, whose credit risk rating is known. We document significant correlations between local topological properties of a node (firm) and its risk. Moreover we show the existence of an homophily of risk, i.e. the tendency of firms with similar risk profile to be statistically more connected among themselves. This effect is observed when considering both pairs of firms and communities or hierarchies identified in the network. We leverage this knowledge to show the predictability of the missing rating of a firm using only the network properties of the associated node.
cs.SI
cs
Corporate payments networks and credit risk rating Elisa Letizia1 and Fabrizio Lillo1,2,3 1Scuola Normale Superiore, piazza dei Cavalieri 7, 56126, Pisa, Italy - [email protected] 2Department of Mathematics, University of Bologna, Piazza di Porta San Donato 5, 40126, 3Center for Analysis, Decisions, and Society, Human Technopole, Milano, Italy Bologna, Italy - [email protected] Abstract Aggregate and systemic risk in complex systems are emergent phenomena depend- ing on two properties: the idiosyncratic risks of the elements and the topology of the network of interactions among them. While a significant attention has been given to aggregate risk assessment and risk propagation once the above two properties are given, less is known about how the risk is distributed in the network and its relations with the topology. We study this problem by investigating a large proprietary dataset of payments among 2.4M Italian firms, whose credit risk rating is known. We document significant correlations between local topological properties of a node (firm) and its risk. Moreover we show the existence of an homophily of risk, i.e. the tendency of firms with similar risk profile to be statistically more connected among themselves. This effect is observed when considering both pairs of firms and communities or hierar- chies identified in the network. We leverage this knowledge to show the predictability of the missing rating of a firm using only the network properties of the associated node. keyword financial networks - corporate networks - credit risk - credit rating - ma- chine learning JEL classification: C45 - C88 - G21 - G33 - L14 Assessing the aggregate risk emerging in complex systems is of paramount importance in disparate fields, such as economics, finance, epidemiology, infrastructure engineering, etc.. A large body of recent literature has explored, both theoretically and empirically, how risk propagates [Pozzi et al., 2013] and how to assess aggregate risk when the risk of each individ- ual entity is known [Nier et al., 2007], as well as the topology of the network of interaction among them. Both aspects have been shown to be important, however their mutual rela- tion is relatively less explored. In theoretical studies, one typically assumes independence between idiosyncratic risk and topology, while in empirical studies the correlation is the one present in the investigated dataset. But what is the relation (if any) between the idiosyncratic risk of a node and its local topological properties (e.g. degree, centrality, community, etc)? In this paper we answer this 1 question by studying a specific system where the assessment of aggregate risk is particularly important, namely the network of interaction between firms. Assessing the risk of firms is one of the fundamental activities of the credit system. Banks spend a significant amount of resources to scrutinise the balance sheet of firms in order to obtain accurate estimations of their riskiness, the internal rating, and provide credit conditions reflecting both the capability of the firm to repay the loans and its probability of default. The riskiness of a firm depends on many idiosyncratic factors (e.g. balance sheet, structure of management, etc.) as well as the industrial sector or its geographical location [Treacy and Carey, 2000, Crouhy et al., 2000, Crouhy et al., 2001]. However, corporate firms do not live in isolation but interact with each other on a daily basis. The interactions can be of different kinds, including those due to the supply chain, payments, business partnerships, financial contracts, and mutual ownership. The structure of interactions is complex and multifaceted but its knowledge is critical both for macroeconomists and for the credit and banking industry to understand the dynamics of the economy, the business cycle, the structure of corporate control, and, of course, the risk of firms (in isolation or in aggregation). Here we study the interplay between the risk of firms and the interlinkages connecting them. The network is built from a large proprietary dataset provided by a major European bank. The dataset contains the payments collected at daily granularity between more than two million Italian firms together with the information on internal risk rating for a large fraction of them. We want to understand whether and in which measure a firm's role in the network can be informative of its riskiness. This is important for two reasons. First, even if the risk of a firm is not known to all the counterparts, it may affect its ability to interact with other firms. For example, a poor rating (i.e. high riskiness) may prevent the access to credit and as a result it may cause a reduction or delay in payments toward suppliers. If the supplier has high risk, the missing or delayed payment can prevent its own payments, increasing the likelihood of a cascade of missing payments and a propagation of financial distress. The second reason is that, in certain cases, the knowledge of the riskiness of a firm or a group of firms is lacking or imprecise. In these cases, the existence of a correlation between network properties and risk can allow or improve the assessment of risk. Indeed, in the last part of the paper we will show how network properties of a node can be used to predict the risk of the corresponding firm. Previous works on networks of firms focussed mainly on ownership [Kogut and Walker, 2001, Souma et al., 2006, Vitali et al., 2011, Romei et al., 2015, Garcia-Bernardo et al., 2017], or dealt with the modelling but not with the empirical part [Huremovic and Vega-Redondo, 2016]. Exception are the empirical studies on the the Japanese economic system [Ohnishi et al., 2009, Watanabe et al., 2012], where links represent buyer-supplier relationship between, but with- out the information on the amount of money exchanged. In the seminal work [Acemoglu et al., 2012], even if the theoretical framework applies also to single firms, the empirical part focuses on the aggregate, sector network, due to lack of more granular data. The use of payments as a proxy of interactions between economic entities is not new and has been investi- gated mainly for banks [Soramaki et al., 2007, Rørdam et al., 2009, Battiston et al., 2012, Bargigli et al., 2015, Fukuyama and Matousek, 2016] in the context of systemic risk studies, where, however, other choices to characterise interactions are possible [Elliott et al., 2014, Cimini et al., 2015, Affinito and Pozzolo, 2017, DErrico et al., 2017]. Apparently much less is known about the payment network between firms, mostly because of lack of data. As 2 for rating prediction, it can be embedded in the now broad literature of classification prob- lems [Friedman et al., 2001]. The idea of employing machine learning techniques in credit rating scoring has been explored before [Altman et al., 1994], but in that case the pre- dictors for the rating are all derived from balance sheets, so the results are not compa- rable with ours. Other works use more heterogeneous information to predict the rating [Wilson and Sharda, 1994, Grunert et al., 2005, Lee, 2007, Parnes, 2012]. This paper contributes to these streams of literature in several aspects. First, we in- vestigate the topological properties of payment networks by considering standard network metrics, such as degree and strength distribution and components decomposition. We find that the large payment networks investigated in this paper share the properties observed in other complex networks, namely they are sparse but almost entirely made of a single com- ponent, they are scale free and small world. Then, we look into the distribution of risk of firms in the network of payments in order to quantify the dependence between the network property of a node or a group of nodes and the risk of the firm represented by the node(s). The main and most innovative contribution of this paper is to document the existence of such correlations. We find an homophily of risk, i.e. the tendency of a firm to interact with firms with similar risk. This is a two nodes properties, but a similar behaviour is ob- served, even more clearly, also at larger aggregation scales. Communities of firms, detected by using different methods, often display a statistically significant abundance of firms of a specific risk class, indicating the tendency of firms with similar rating to be linked together through payments. Risk is therefore not spread uniformly on the network, but rather it is concentrated in specific areas. This implies that an idiosyncratic shock on a single firm can propagate more or less quickly depending on the local network structure and the community the node belongs to. The last contribution, is to exploit this correlation between risk of a firm and network characteristics of the corresponding node to predict the risk rating of the firm using network properties alone. To this end, we employ machine learning techniques to build classifiers for risk rating whose inputs are only network properties (e.g. degree, community, etc.). We show that our classification method has a good performance both in terms of accuracy and of recall and that outperforms significantly random assignments. 1 The network of payments 1.1 The dataset The investigated dataset contains information on payments between more than two million Italian firms and is built from transactional data of the payment platform of a major Euro- pean bank. Transactions are registered with daily granularity for the year 2014, for a total of 47M records, each of which includes the two counterparts involved, date, type, amount and number of transactions in the same day. Transactions are originally identified by account, but in case of customers and former customers, multiple accounts associated to the same firm are aggregated into a single entity1. This results in a total of 2.4M entities (which will be referred to as firms, for brevity) operating through the platform during the whole 1In order to comply with privacy regulation any payment from or to physical persons is excluded, moreover the filter is implemented to exclude any ambiguous record. 3 investigated period. The counterparts can be of different types. In principle, any firm or public body can make use of the platform, but in practice in most cases at least one is a customer of the bank. Similar considerations hold for the total amount exchanged: in each month more than 50% of the volume is transferred between customers, and it rises to above 95% when considering transaction with at least one customer involved. More details on the dataset and some descriptive statistics is presented in A. For customers, the dataset contains information on the economic sector and on the internal rating of the firm on a three value scale: Low (L), Medium (M), and High (H) risk. 1.2 Networks definition and basic metrics A network, or graph, is identified by two sets: V , the sets of nodes with cardinality V = n, and E, the sets of links or edges, with cardinality E = m. The latter is the collection of ordered pairs of connected nodes. In our case, we also take into account the strength of interactions so a weight wij is associated with each link. Starting from transaction data, payment networks are constructed as follows: given a time window, each node represents a firm active in that period, if there is payment between two firms a link from the source to the recipient is added, with weight equal to the payment amount. If multiple transactions occur between the same (ordered) pair of nodes, the weight of the link is the sum of the amounts of the payments. Therefore for each time period we construct a directed and weighted network. The time window of analysis may vary depending on the type of information one wants to extract from the dataset. In the following the focus will be on monthly networks, for which results are quite stable, at the cost of dealing with fewer and larger graphs. For the period covered by the dataset, each monthly network consists on average of n = 1M nodes and m = 3.2M links with the lowest activity in August and the highest in July (see A.1). The density ρ = m n(n−1) is thus small, resulting in a so called sparse network. Nevertheless this low density does not imply a disaggregated system. Indeed for all the networks the diameter is very small compared to the size: on average starting from a node, one has to pass at most 19 links to reach any other node in the weakly connected component (see Table 1). Thus the networks have the so called small-world property. 1.3 Networks topology When considering a small number of firms, one would expect simple topologies: one firms is the supplier of intermediate products for another firm, resulting in a line (the simplest supply chain), or one firm is a supplier or a buyer for many others firms, resulting in a star network. Instead what is observed is a much more complex organisation, with a non negligible presence of cycles. At a very coarse level, it is possible to identify two large classes of firms. The first constitute the core of the network, which includes approximately 20% of the nodes and more than half of the links. This core has a density an order of magnitude larger than that of the whole network and it is characterised by the fact that any pair of firms is connected, directly or via intermediaries. Around 60% of the total volume circulates among the nodes of the core. The other class is made of payers-only, i.e nodes that have no incoming links. These represent each month about one half of the active firms and their activity is sporadic. To 4 month Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec nodes n 1,000,555 997,006 1,018,164 1,047,706 1,048,803 1,039,876 1,091,393 891,587 1,041,124 1,066,044 1,023,692 1,052,975 links m out-degree E[k(out)] Table 1: Basic metrics of the network of payments density ρ = m n(n−1) 3.27 · 10−6 3.09 · 10−6 3.04 · 10−6 3.05 · 10−6 3.05 · 10−6 3.00 · 10−6 2.95 · 10−6 2.92 · 10−6 3.20 · 10−6 2.89 · 10−6 2.96 · 10−6 2.71 · 10−6 in-degree E[k(in)] 6.61 6.11 6.19 6.52 6.58 6.30 6.44 5.21 6.80 6.11 6.15 5.60 3,271,861 3,067,029 3,146,559 3,346,763 3,359,315 3,239,886 3,510,435 2,319,697 3,465,233 3,289,946 3,103,365 3,000,284 4.20 3.98 3.98 4.09 4.08 4.02 4.14 3.44 4.25 4.00 3.90 3.74 diameter d 20 18 18 19 20 19 20 19 20 18 18 19 better understand the role of this significant subset of firms we check their customer status and we find that the majority of them are unclassified, and that their number is larger than one expects from the unconditional distribution among all the firms. This means that likely they are not customers and, more importantly, almost no information, for example about risk, is available on them. For further details on this refer to A.3. We now turn our attention to the distribution of degree and strength. In our case the in- (out-) degree is the number of payers (payees) of a given firm and the corresponding amount of Euro. For the monthly aggregation case the average in- and out-degree of a firm is 6 and 4, respectively (see Table 1). These low values are a direct consequence of the low density of the network. However the degrees and the strengths are extremely heterogeneous as testified by the degree and strength distribution. Figure 1 shows the empirical cumulative distribution for these two quantities in a double logarithmic scale. The approximately straight line indicates the presence of a fat tail with a power law behaviour. The fit of the exponent supports the observation that in- and out- degree distribution data are consistent with a power-law tail and the estimated exponents are around 2.6 and 2.8, respectively. Similarly, in-strength and out-strength are well fitted by power-law distributions of exponents around 2.1 and 2, respectively. Despite the fact that a large fraction of nodes is different in each month, the tail exponents are remarkably stable (see Table 6 of the A.3). This scale free behaviour is quite ubiquitous in complex networks has been found in many other real economic and financial networks [Serrano and Bogun´a, 2003, Garlaschelli and Loffredo, 2005, Boginski et al., 2005, Boss et al., 2004, Kim et al., 2002, Huang et al., 2009, Ohnishi et al., 2009]. The fat-tailed distribution for the degree has two interesting consequences: first, there is no characteristic scale for the average degree or strength; second, there are a few nodes that act as hubs for the system, in the sense that, having a large amount of connections, many pairs of nodes are connected through them. This partially explains the low values for the diameter. 5 Figure 1: Empirical complementary cumulative degree (left) and strength (right) distribu- tions and their power law fit. The scale is logarithmic for both axes. Data refers to January, but results are similar for the other months. (cid:80) 1 −(cid:80) i eii − aibi i aibi (1) i aibi i aibi Finally, we measure the tendency of firms to be connected to firms which are similar with respect to some attribute, namely the number and the total volume of connections (i.e. degree and strength). Following [Newman, 2002], we compute the assortativity coefficient for a categorical variable, r = where eij is the fraction of edges connecting vertices of type i and j, ai =(cid:80) (cid:80) (each node connects to a node of a different type) it is rmin = − (cid:80) 1−(cid:80) j eij and bj = i eij. It is rmax = 1 for perfect mixing, while when the network is perfectly disassortative . Using the number of connections as categorical variable, an high value for the assortativity coefficient indicates that highly connected firms tend to interact significantly more than average with other highly connected firms. Similar reasoning holds using the volume exchanged as categorical variable. Beside the entire graph, we also consider the subgraph of firms with rating and the subgraph of customers. The assortativity coefficient is consistently slightly negative for both attributes, for all months and graphs, namely around −0.03 for the entire graph and the subgraph of firms with rating, and −0.04 for the subgraph of customers, with no strong differences among months and attributes. Table 7 of A reports the summary of values of the assortativity coefficient for each month. A possible explanation can be that large, very interconnected firms are connected to many subsidiaries which in turn do not engage with many other firms, being their business almost exclusively focussed on the relationship with the large and central firms. To summarise, each month the payment network of firms is very sparse but almost entirely connected. Half of the firms appear in the network as payers only (no incoming links) and they are mainly unclassified with respect to customer status, so no much information is available on them. Of the remaining nodes, almost half constitutes the denser core of the network where more than a half of the transactions occur and above 60% of the volume circulates. Finally the network is small world, scale free, and slightly disassortative both for degree and for strength. 6 2 Risk distribution and network topology In this Section we investigate the distribution of risk of firms in the network of payments. We are interested in measuring the dependence between the network property of a node or a group of nodes and the risk of the firm represented by the node(s). We proceed in a bottom-up fashion, zooming out from single nodes to subsets. At first we consider a firm's local property (the number of connections) and we check if it correlates with the risk. Then we consider pairs of linked firms and measure the homophily in risk, i.e. whether firms with similar risk profile tend to do business together and thus to be linked. Finally, we divide firms into subsets induced by the network structure and we check whether the inferred subsets are informative with respect to the riskiness of the composing firms. Specifically, we partition the network in groups (or communities) of firms by using only network information, and we test if the distribution of risk within each group is statistically different from the global one. Thus the goal is to understand if the inferred communities are homogeneous with respect to the risk profile of the composing firms: a community with many firms with high risk rating is a clear indication of financial fragility and a possible source of instability, since the distress of one or few firms of the community is likely to propagate to the other firms. For the sake of brevity, in the following the analysis is carried on for one month, but results are consistent for all the months. 2.1 Degree and risk The first investigation is on the relation between the degree of a firm and its risk. The probability for each risk level r ∈ L, M, H conditional to the out-degree is computed2 and plotted against the degree. The results are shown in Figure 2. We notice an interesting correlation between degree and risk: small degree nodes are more likely medium risk firms, whereas large degree nodes are more likely low risk firms. The high risk firms are more evenly spread across degrees, even if a larger fraction is observed for low degree nodes. To assess if the three curves are statistically different we perform a multinomial logistic regression on data [Greene, 2003] (the solid lines in the plot). This choice is justified by the fact the quantities just described are the probabilities of outcomes in a multi-class problem given an independent variable (the degree). The estimated probabilities follow quite closely the trend of the empirical distribution and the coefficients are all significant. More detailed results of the fit are given in table 8 of B.1 (first two columns). The correlation just highlighted can be, at least in part, influenced by the effect of the size of the firm (in term of assets value from the balance sheet): a large firm is usually considered less risky than a small one, at the same time, a larger size generally implies a higher number of connections, as seen for example in the interbank network [Bargigli et al., 2015]. As the size of firms is not available to us, we use the sum of the incoming and outgoing amounts as proxy. Defined in this way, the size has a Pearson correlation of around 0.19 , 0.15 with in- and out- degree, but a Spearman rank correlation of 0.67 , 0.57 respectively. To control for the effect of the size, we repeat the same procedure on subsets of firms, grouping according to their size into tertiles. The results, not shown here but available upon request, hold true also 2The results for the in-degree are qualitatively very similar. 7 Figure 2: Probability of rating of a firm conditional to its out-degree. The solid lines show the fitted multinomial logistic distribution, with its confidence intervals (dashed lines) in matching colours. on the sub-samples, but slightly less sharply. We repeat the multinomial logistic regression adding the size tertiles among the predictors, and we still obtain statistically significant coefficients (last four column in 8 of B.1). Similarly, the three conditional degree distributions given the rating result statistically different, as for every month all pairs reject the null hypothesis in the 2-sample Kolmogorov- Smirnov test [Smirnov, 1939]. Therefore topological characteristics (the degree) of the node can be used to obtain information on the riskiness of the corresponding firm. From a risk management perspective this is an important results, since on average highly connected nodes are also less risky. 2.2 Assortative mixing of risk The next step is to check whether risk is correlated with direct connection preferences. To clarify this point, we consider two features: the assortative mixing of the risk and the conditional distribution of rating given the distance. In the first case we compute a weighted variant of the assortativity coefficient in Eq. (1) using as categorical variable the risk rating rather than the degree or the strength. In practice, the quantities eij are substituted by eij, the fraction of volume from nodes of type i to nodes of type j. The reason for this choice is to mitigate the impact of the aforementioned large number of uncategorised payers. In most cases their links are associated with low volume and few transactions. Also, customer firms, even if they represent only around 1/3 of the firms, exhibit a generally more intense activity, both in terms of number of transactions and of volume, hence accounting for the stronger ties between the firms. The metric is positive for all the three graphs, 0.070, 0.157, 0.163 for the whole set, the nodes with rating, and the customers, respectively, with significant variability across the months but always positive sign3. In Table 9 of B.2, the summary of values of the 3Results for the standard assortativity coefficient are quite different, and the choice of the subgraph 8 assortativity coefficients for each month is presented. With the same quantities eij we define metrics to assess different preferences in connection between incoming and outgoing payments. We test if firms are more concerned with the risk of payers than of the payees by testing for different risk distribution between incoming and outgoing connection. To discriminate between these two cases, for each node i we compute the percentage excess of volume with respect to the average toward nodes in certain risk class and we group according the rating of the node. The distributions are compared using MannWhitney U test [Mann and Whitney, 1947]. This non-parametric test allow to assess if one distribution is stochastically greater than the other. Details on the metrics and the test performed are given in B.2. We find that it is likely that firms are, at least in part, aware of the riskiness of their counterparts and results suggest they use this information in choosing their business partners. However the hypothesis that incoming payments show a more marked preference for low risk is not supported by data. Moreover the overall positive assortativity is mainly due to low risk nodes. This suggests that low risk firms are more careful in the choice of their business counterparts, possibly also because their relative larger creditworthiness allow them to find available partners more easily. The quantities considered so far in this section are pairwise comparisons between the rating of nearest neighbours, and give an aggregate measure. A possible4 way to enrich this information is to consider the conditional distribution of rating for nodes at a given distance5 and to compare it to the unconditional distribution. In the case of no influence of the rating on the connection pattern, the conditional distribution of risk given the distance should be statistically undistinguishable from the null unconditional distribution. To test if this is the case, we first compute the distance between all the nodes for which the rating is available. Then for any fixed k, the occurrences of ratings are computed by looking at the set of pairs at distance k. Finally, the estimated distributions are tested against the null one with an hyper-geometric test, as explained in details in B.3. Results for April are summarised in Figure 3, which considers the case when the source node is in class L. Results are similar when considering a medium or high risk source. For each k a marker indicates the percentage of nodes with low (green circles), medium (yellow squares) or high (red diamonds) risk at distance k. A marker is full when the percentage is statistically different from the null distribution (the dashed lines, with matching colours). We note that up to distance 5 the class of low risk firms is significantly over-represented in the distributions. At greater distances, medium and high risk groups are over-represented. This means that more steps in the networks are necessary to reach riskier firms. This fact is particularly interesting when considering that each firm is in theory unaware of others firms' ratings and in some cases even its own. appears to be crucial. When considering the entire network, the assortativity coefficient is negative, around −0.07, hence indicating a slightly disassortative behaviour with respect to risk. The subgraphs, instead, show an assortative tendency, with coefficients around 0.025 and 0.038 for the nodes with rating and for customers, respectively. This shift can be explained again by the impact of the large number of uncategorised nodes. 4An alternative strategy to go beyond first order neighbours in the computation of assortativity has been recently proposed by [Arcagni et al., 2017]. 5The distance between nodes in a network is defined as the length of the shortest directed path connecting two nodes, where a path is a sequence of links. Clearly, in a directed network in general d(u, v) (cid:54)= d(u, v) and moreover d(u, v) can be not defined (or ∞) if there is no path from u to v. 9 When considering the same quantities for incoming paths, results (not shown) are very similar, namely at short distances the low risk class is over-represented, while medium and high risk nodes are over-represented for longer distances. Figure 3: Distribution of ratings for nodes at distance k from a node with rating L. The dashed lines are the unconditional (null) distribution of ratings among nodes in the entire sample. A full marker indicates that the over or under representation with respect to the null distribution is statistically significant in the hyper-geometric test at 1% significance level with Bonferroni correction. A possible explanation for these observations is that among the hubs of the systems (i.e the most connected nodes) firms with rating L (i.e the most creditworthy) constitute the vast majority. This holds true when considering both in-coming and out-going links, and including also the nodes with no rating. Moreover, they are in the denser core previously described, while many high risk firms have a few or no out-going links and they are peripheral in network. This asymmetry in the position in the network is observed also when considering the distribution of the closeness centrality [Newman, 2010] of the nodes, i.e the harmonic mean of the distances to all other nodes, conditioning on the risk class (not shown6). 2.3 Network organization and risk In this Section we study the relation between the organization of the network at a more aggregate level and the distribution of risk. We are interested in two types of organization of networks into groups. The first is the modular organization: each module is composed by nodes, which are much more connected among themselves than with the rest of the network. In economic terms modules could represent, for example, firms operating in the same region or area, and the high density of the module reflects the fact that payments are more frequent with geographically close firms. We saw before that the network shows an assortative tendency with respect to risk, so we want to test if the homophily on risk can be observed beyond pairwise relationship. 6Results available upon requests 10 The second is a hierarchical organization. Since the payment network is directed, we look for a ranked partition (i.e. each group of nodes is labelled with an integer from 1 to the number of groups M ) such that most links are from nodes of low rank classes to nodes in high rank classes. This type of organization could represent, for example, a supply chain and the flow of payments between the firms of a group and those in the group in the next rank class reflects the (opposite) flow of goods or services. This classification is important because a high risk concentration in low class nodes of a strongly hierarchical network can trigger a cascade of distress in the higher rank classes. Modularity and hierarchy are conceptually opposite as the first penalises connections towards other groups, which instead are encouraged in the latter (provided that they go from low rank to high rank nodes). For each metric, we proceed in the following way: i. find the optimal partition according to the criterion; ii. compute the distribution of ratings within each subset of the partition; iii. test whether such local distribution is statistically different from the overall distribution of ratings by employing the hypergeometric test used in the previous Section and described in B.3. In order to have a sample large enough to perform the test, we only consider subsets with at least 500 known ratings. We showed so far that the structure of the payments network is very complex. Since our goal is to obtain information on the risk of the firms, it can be helpful to filter the network before performing communities detection, in order to keep the most relevant connections. Thus we focus on the subgraph of customers. The reasons for this choice are many. First, the percentage of nodes with rating active every month is quite low, around 20%, but it raises to 70% when considering only the customers (see Table 4 in A.1 for a summary). This will help having a more informative local distribution of risk when considering subsets of nodes. Secondly, more than a half of the volume is transferred between customers (see Table 3 in A.1), so even if a large fraction of transactions is dropped, we are mostly pruning weak connections, while keeping the strongest ones. Finally, as it has been shown in the previous Subsection about assortativity, considering the entire network can be misleading, especially when looking at the connections without considering the weights, as it will be necessary for some metrics. 2.3.1 Modular structure One of the standard methods for inferring a modular structure in a network is via modularity maximization. This method divides nodes into subsets, called modules, such that nodes are well connected with other nodes in the same module and there is a smaller number of links with nodes in other modules. Given a partition P in modules C the modularity is (2) (cid:18) Aij − kin i kout j 2m (cid:19) Q = 1 2m (cid:88) (cid:88) C∈P i,j∈C where Aij is the (i, j) element of the adjacency matrix and kin ) is the in- (out-) degree of node i. The optimal partition is the one which maximizes modularity. Despite the associated i (kout i 11 L M H L M H Figure 4: Distribution of ratings in the three partitions, modularity (top), hierarchy (bot- tom). The dashed lines are the unconditional (null) distribution of ratings among nodes in the entire sample. A full marker indicates that the over (above the dashed line) or under (below the dashed line) representation with respect to the null distribution is statistically significant in the hypergeometric test at 1% significance level with Bonferroni correction. 12 optimisation problem is NP-Hard, fast and reliable heuristics for an approximate solution exist, and here the well known Louvain method [Blondel et al., 2008] is employed. In each month we find that the optimal partition has around 2, 000 modules. These are really heterogeneous in size: for example, the 13 largest ones cover more than 95% of the nodes of the network. We perform the hypergeometric test of the null hypothesis of an homogeneous distribution of risk in each module with at least 500 known ratings. These are less than 1%, around 19 every month. (see Table 10 in B.3 for more details). These are clearly very large modules but a significant number of them shows an over or under-expression of one or two risk classes. For some specific module it is possible to draw statistical robust conclusions on its risk profile. The top panel of Fig. 4 shows the over- or under-representation for the largest modules for January. The seventh module, for example, has an over-representation of firms with low risk and an under-representation of the other two risk profiles, thus it represents a group of firms with small risk. On the contrary the eighth module has an over-representation of highly risky firms and under-representation of low risk firms, representing a possible warning for the bank. 2.3.2 Hierarchical organization We now consider explicitly the directed nature of the payment graph and the hierarchical organization of the network. An ordered partition is such that each subset is associated with an integer number (rank) r ∈ {1, ..., M}. A graph has a hierarchical organization if nodes are more likely linked to other nodes with a higher rank [Simon, 1991], such as in military organizations or in administrative staff. Finding the optimal ordered partition and revealing the hierarchy of a graph is in general complex and requires the minimization of a suitable cost function, similarly to what is done with modularity. In this paper we use a recently proposed cost function [Gupte et al., 2011]. Given a rank function r : V → {1, ..., M}, the cost function penalizes links from a high rank node to a low rank node. The penalization is a linear function of the difference between the ranks. Thus the optimal hierarchical partition is obtained by solving the optimisation problem A∗ = min r∈R f (r(u) − r(v)) , where R denotes the set of all ordered partitions and the cost function is (cid:88) (cid:40) (u,v)∈E x + 1 x ≥ 0 x < 0 0 . f (x) = The hierarchy of the graph is defined by h∗(G) = 1 − A∗ . m By definition, h ∈ [0, 1], and 0 is the value for the trivial partition with only one set, while h = 1 is obtained when the network is a Directed Acyclical Graph and it signals a perfect hierarchy. The linear choice of the penalization function is convenient because 13 the associated optimisation is solvable in polynomial time and few exact algorithms exist [Gupte et al., 2011, Tatti, 2017], while non-linear forms can lead to NP-hard problem. We apply the hierarchy detection to the monthly networks of payments and the results are summarized in Table 11 of B.3. First of all we notice that the number of inferred classes, roughly 18, is much lower than in the modular case. Moreover the size of the classes is much more homogeneous. The value of h is also quite stable, around 0.75, indicating a strong hierarchical structure, a remarkable result considering that we are studying only the customers network. We now consider the distribution of risk in each class and we study the over or under- expression of certain levels of risk as a function of the rank of the class in the inferred hierarchy. The test rejects the null hypothesis of uniform risk distribution a considerable number of times (also compared with the total number of subsets in the partitions). As displayed in the bottom panel of Figure 4, low rank classes have an over-expression of high and medium risk firms, while middle and low rank classes (i.e. r ∈ [8, 12]) have an over expression of low risk firms and an under-expression of medium and high risk firms. More details on the test results are given in This empirical evidence may signal the presence of paths of risk propagation, since low rank firms, typically more risky, are payers of high rank firms, which are instead less risky. We now consider the distribution of risk in each class and we study the over or under-expression of certain levels of risk as a function of the rank of the class in the inferred hierarchy. The test rejects the null hypothesis of uniform risk distribution a considerable number of times (also compared with the total number of subsets in the partitions). As displayed in the bottom panel of Figure 4, low rank classes have an over-expression of high and medium risk firms, while middle and low rank classes (i.e. r ∈ [8, 12]) have an over expression of low risk firms and an under-expression of medium and high risk firms. More details on the test results are given in This empirical evidence may signal the presence of paths of risk propagation, since low rank firms, typically more risky, are payers of high rank firms, which are instead less risky. We now consider the distribution of risk in each class and we study the over or under-expression of certain levels of risk as a function of the rank of the class in the inferred hierarchy. The test rejects the null hypothesis of uniform risk distribution a considerable number of times (also compared with the total number of subsets in the partitions). As displayed in the bottom panel of Figure 4, low rank classes have an over-expression of high and medium risk firms, while middle and low rank classes (i.e. r ∈ [8, 12]) have an over expression of low risk firms and an under-expression of medium and high risk firms. More details on the test results are given in 11 in B.3. This empirical evidence may signal the presence of paths of risk propagation, since low rank firms, typically more risky, are payers of high rank firms, which are instead less risky. 2.4 Discussion Both investigated partitions give interesting insights on the relationship between risk and network structure. On one side, the percentage of rejected tests in the case of modularity partition is consistent with the observed assortativity of risk. It may be noticed that the preference for low risk business partners is not always a realistic option, because in some sectors business partners are not replaceable for geographical reasons. To better assess this point, one possibility could be to include the comparison between modules and geographical 14 location of firms, which is not available to us. On the other side, the hierarchical partition appears to follow the risk distribution slightly better and this is probably related to the peculiar conditional distribution of risk with respect to the distance described in Subsection 2.2. Indeed, given the fact the high risk nodes are over represented for longer distances, they should be located in extreme positions in the ranking, either at the top or at the bottom, and this is what is observed. It must be stressed that in the case of the two methods chosen here, one does not exclude the other, as they give different and complementary standpoints for interpretation. In this sense a multi-dimensional perspective is needed, where the dimensions are the mechanisms that either favour or discourage the creation of business relationships. 3 Missing rating prediction using payments network data In the previous Sections we showed that network metrics can be informative of the risk of a firm. It is therefore natural to ask whether it is possible to predict the missing risk rating of a firm by using only information on network characteristics of the corresponding node, as well as risk rating of the neighbour firms. This problem is particularly relevant since we noticed that around 30% of the customers in the dataset do not have a rating and this percentage is even higher when the entire dataset is considered (see table 4 in A.1). Here we use network characteristics as predictors for the missing ratings into well known methods of machine learning for classification problem. The predictors we employ are the following: i. in- and out-degree; ii. weighted fraction of (in- and out-) neighbours with a given rating (H,M,L or NA) iii. rank of the class in the hierarchy inferred by agony minimisation; iv. membership in community inferred by modularity maximisation; v. sum of in- and out-strength. The fractions in (ii.) are computed considering the amount (weight) of each payment and are together a measure for rating assortativity, while (v.) is a proxy for the size. Data are preprocessed following [Friedman et al., 2001] so that variables are comparable in order of magnitude, as detailed in Appendix C.1. These transformations result into a total of 25 predictors. The dataset is the one which includes only the customers, and we consider the monthly network for January. In order to assess the performance of the prediction, we train each model using 75% of the data, and the remaining 25% is used for testing. We consider three methods for classification: i. multinomial logistic; ii. classification trees; iii. neural networks. See [Friedman et al., 2001] for a review of these methods. The class H is under-represented in the sample, as it includes only around 10% of the firms with rating. This affects the ability of any classifiers to recover this class. This is undesirable, since the class H the most critical for the riskiness. 15 To address this issue we proceed with a 2-step classification strategy for all the three methods. The intuition behind this strategy is to train a classifier more specialised in the recovery of one specific class at the first step, and then separate the remaining classes in the second step. In the first step we fix a risk class, say L, and we merge the other two classes into a fictitious class X. We fit a first instance of the chosen model on the modified database. In the second step, we train another instance of the model only on the two previously merged classes. This is repeated for all the three risk classes. In the case of class H being the one selected for step one, we apply SMOTE [Chawla et al., 2002] before training, a well-known algorithm for data rebalancing.7. Once the models are trained, the prediction are obtained by iterating the following two steps for each risk class (see the schematic representation in Figure 5) i. apply the first step classifier; ii. if the entry is classified as X, apply the second step classifier. Figure 5: Schematic representation of the 2-steps classifier The final prediction is the median of the predictions. In case of draw, more weight is given when the class is obtained from the first instance (as the classifier is more specialised). For the 2-steps method, the random classifier can be defined in the following way: the null distribution for the first step is obtained for each classifier, by taking into account the fictitious class, and at the second step by considering only the two classes previously merged. Table 2 shows the results for each classifier, together with the value for the same metrics computed for the random classification. In the case of classification trees and neural net- works, different combinations for the hyper-parameters have been tested (such as depth for the trees, and number and size of hidden layers for neural networks), here we present the results for the best choice for each model, and in Supplementary Information we explain the selecting procedure. The three models behave quite similarly, with slightly better overall performance of neural networks, and the training times are comparable. It must be noted that, among the predictors 7Using SMOTE in the 1-step classification would also be an option if the objective were to use the classifier as a first filter to detect possibly critical nodes. However, we found that the overall performance of the classifier is quite poor, especially when considering the cost of classifying as highly risky (H) a firm which is creditworthy (L). 16 Table 2: Accuracy and recall for 2-steps classifiers. R: random, ML: multinomial logistic, CT: classification tree, NN: neural network. method accuracy random 1-step random 2-steps multinomial logistic classification tree neural network 0.413 0.366 0.477 0.496 0.505 recall M 0.625 0.391 0.452 0.567 0.559 L 0.438 0.368 0.553 0.502 0.526 H 0.108 0.249 0.253 0.151 0.166 only network deduced metrics have been included, while any data from the balance sheet, which is likely to represent the main source for the risk rating model, as well as the sector or geographic location, are excluded. When adding the economic sector, which is the only metadata available to us, as further predictor the prediction power only slightly improves to from 49%− 50% to around 52% of accuracy for both classification trees and neural networks. The natural benchmark models are the random classifiers, both 1-step and 2-steps, due to the total lack of data employed in the proprietary rating model. We are able to outperform the first by 30% to 38%, and the latter by 15% to 22% in term of accuracy, and especially in the case of neural network, we are able to find a good compromise with recall for H. 4 Conclusions In this paper we empirically study the interactions and the risk distribution of 2 million Italian firms, via the investigation of payments networks built from transactional data. Our contribution is threefold. On one side, the empirical study of the relationship between the high number of firms to our knowledge has not been done before, especially with this granularity. The study of the structure of the network highlights a complex interdependence between firms; indeed particularly interesting is the presence of a relatively small core of firms, which are involved in most transactions. This feature, paired with the power-law tail distribution of the number of connections and the total volume exchanged by the firms, can be a symptom of an architecture which favours the spread of distress, or positive feedbacks. Also relevant is the observed tendency of large, well-connected firms to be connected to small (in terms of exchanged volume), poorly connected firms. This can be the result of almost exclusive relationships between a big producer and its subsidiaries. The second and main contribution is the assessment of the correlation between the net- work structure and the distribution of risk. From our analysis, we can conclude that the risk level of a firm is related to its features and role in the network at different levels. For single firms, we observed that low risk firms are more likely to have a high number of connections, and some of them acts as hubs for the entire network, being connected to thousands of other firms. When pairs of linked firms are considered, we observed the tendency to favour connec- tions towards firms with the same risk level. This tendency can be observed also on a more aggregate level. Indeed, we found that also groups of firms which are more connected among them that with the rest of the network, have a local distribution of risk which is statistically 17 different from the global one, meaning that some risk classes are over- or under- represented. Finally, we divided firms into a hierarchical organisation, in such a way to highlight the main direction along which money circulates. This simplified structure showed once more that many levels of the hierarchy have a local distribution of risk statistically different from the global one. As high risk firms are over-represented at the beginning of the flow of money, this can be a source of distress for the entire system. Finally, we showed that network metrics and communities can be successfully used to predict the missing ratings with machine learning models. We propose a simple 2-steps strategy to compromise between overall accuracy and recall on the smallest but most risky class. We test our strategy with three methods, namely multinomial logistic, classification trees and neural networks. Since predictors are all network-derived quantities, and no infor- mation from balance sheets or other meta-data are used, the random rating assignment is the natural benchmark. We find that all the three methods are able to outperform sizeably the benchmark, with slightly better results for neural networks. Acknowledgements We would like to thank Ilaria Bordino, Francesco Gullo, Francesco Montecuccoli degli Erri, Marcello Paris and Stefano Pascolutti from R&D team in UniCredit for useful discussions and technical support. We are also grateful for suggestions we have received from Giulia Livieri, and the participants to the Data Science Summer School at cole Polytechnique in Paris, XLI AMASES Annual Meeting in Cagliari and XVIII Workshop in Quantitative Finance in Milan. References [Abadi et al., 2015] Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G. S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man´e, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi´egas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., and Zheng, X. (2015). TensorFlow: Large-scale machine learning on heterogeneous systems. Software available from tensorflow.org. [Acemoglu et al., 2012] Acemoglu, D., Carvalho, V. M., Ozdaglar, A., and Tahbaz-Salehi, A. (2012). The network origins of aggregate fluctuations. Econometrica, 80(5):1977 -- 2016. [Affinito and Pozzolo, 2017] Affinito, M. and Pozzolo, A. F. (2017). The interbank network across the global financial crisis: Evidence from italy. Journal of Banking & Finance, 80:90 -- 107. [Altman et al., 1994] Altman, E. I., Marco, G., and Varetto, F. (1994). Corporate distress diagnosis: Comparisons using linear discriminant analysis and neural networks (the italian experience). Journal of Banking & Finance, 18(3):505 -- 529. 18 [Arcagni et al., 2017] Arcagni, A., Grassi, R., Stefani, S., and Torriero, A. (2017). Higher order assortativity in complex networks. European Journal of Operational Research, 262(2):708 -- 719. [Bargigli et al., 2015] Bargigli, L., di Iasio, G., Infante, L., Lillo, F., and Pierobon, F. (2015). The multiplex structure of interbank networks. Quantitative Finance, 15(4):673 -- 691. [Battiston et al., 2012] Battiston, S., Puliga, M., Kaushik, R., Tasca, P., and Caldarelli, G. (2012). Debtrank: Too central to fail? financial networks, the fed and systemic risk. Scientific reports, 2. [Bergstra and Bengio, 2012] Bergstra, J. and Bengio, Y. (2012). Random search for hyper- parameter optimization. Journal of Machine Learning Research, 13(Feb):281 -- 305. [Blondel et al., 2008] Blondel, V. D., Guillaume, J.-L., Lambiotte, R., and Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment, 2008(10):P10008. [Boginski et al., 2005] Boginski, V., Butenko, S., and Pardalos, P. M. (2005). Statistical analysis of financial networks. Computational statistics & data analysis, 48(2):431 -- 443. [Boss et al., 2004] Boss, M., Elsinger, H., Summer, M., and Thurner 4, S. (2004). Network topology of the interbank market. Quantitative Finance, 4(6):677 -- 684. [Chawla et al., 2002] Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. (2002). Smote: synthetic minority over-sampling technique. Journal of artificial intelli- gence research, 16:321 -- 357. [Chollet et al., 2015] Chollet, F. et al. (2015). Keras. [Cimini et al., 2015] Cimini, G., Squartini, T., Garlaschelli, D., and Gabrielli, A. (2015). Systemic risk analysis on reconstructed economic and financial networks. Scientific reports, 5:15758. [Clauset et al., 2009] Clauset, A., Shalizi, C. R., and Newman, M. E. (2009). Power-law distributions in empirical data. SIAM review, 51(4):661 -- 703. [Crouhy et al., 2000] Crouhy, M., Galai, D., and Mark, R. (2000). A comparative analysis of current credit risk models. Journal of Banking & Finance, 24(1):59 -- 117. [Crouhy et al., 2001] Crouhy, M., Galai, D., and Mark, R. (2001). Prototype risk rating system. Journal of banking & finance, 25(1):47 -- 95. [DErrico et al., 2017] DErrico, M., Battiston, S., Peltonen, T., and Scheicher, M. (2017). How does risk flow in the credit default swap market? Journal of Financial Stability. [Elliott et al., 2014] Elliott, M., Golub, B., and Jackson, M. O. (2014). Financial networks and contagion. American Economic Review, 104(10):3115 -- 53. 19 [Friedman et al., 2001] Friedman, J., Hastie, T., and Tibshirani, R. (2001). The elements of statistical learning, volume 1. Springer series in statistics New York. [Fukuyama and Matousek, 2016] Fukuyama, H. and Matousek, R. (2016). Modelling bank performance: A network dea approach. European Journal of Operational Research, 259(2):721 -- 732. [Garcia-Bernardo et al., 2017] Garcia-Bernardo, J., Fichtner, J., Takes, F. W., and Heemskerk, E. M. (2017). Uncovering offshore financial centers: Conduits and sinks in the global corporate ownership network. Scientific Reports, 7(1):6246. [Garlaschelli and Loffredo, 2005] Garlaschelli, D. and Loffredo, M. I. (2005). Structure and evolution of the world trade network. Physica A: Statistical Mechanics and its Applica- tions, 355(1):138 -- 144. [Greene, 2003] Greene, W. H. (2003). Econometric analysis. Pearson Education India. [Grunert et al., 2005] Grunert, J., Norden, L., and Weber, M. (2005). The role of non- financial factors in internal credit ratings. Journal of Banking & Finance, 29(2):509 -- 531. [Gupte et al., 2011] Gupte, M., Shankar, P., Li, J., Muthukrishnan, S., and Iftode, L. (2011). Finding hierarchy in directed online social networks. In Proceedings of the 20th interna- tional conference on World wide web, pages 557 -- 566. ACM. [Huang et al., 2009] Huang, W.-Q., Zhuang, X.-T., and Yao, S. (2009). A network analy- sis of the chinese stock market. Physica A: Statistical Mechanics and its Applications, 388(14):2956 -- 2964. [Huremovic and Vega-Redondo, 2016] Huremovic, K. and Vega-Redondo, F. (2016). Pro- duction networks. [Kim et al., 2002] Kim, H.-J., Lee, Y., Kahng, B., and Kim, I.-m. (2002). Weighted scale-free network in financial correlations. Journal of the Physical Society of Japan, 71(9):2133 -- 2136. [Kogut and Walker, 2001] Kogut, B. and Walker, G. (2001). The small world of germany and the durability of national networks. American sociological review, 66(3):317 -- 335. [Lee, 2007] Lee, Y.-C. (2007). Application of support vector machines to corporate credit rating prediction. Expert Systems with Applications, 33(1):67 -- 74. [Mann and Whitney, 1947] Mann, H. B. and Whitney, D. R. (1947). On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics, pages 50 -- 60. [Newman, 2010] Newman, M. (2010). Networks: an introduction. Oxford university press. [Newman, 2002] Newman, M. E. (2002). Assortative mixing in networks. Physical review letters, 89(20):208701. 20 [Nier et al., 2007] Nier, E., Yang, J., Yorulmazer, T., and Alentorn, A. (2007). Network models and financial stability. Journal of Economic Dynamics and Control, 31(6):2033 -- 2060. [Ohnishi et al., 2009] Ohnishi, T., Takayasu, H., and Takayasu, M. (2009). Hubs and au- thorities on japanese inter-firm network: Characterization of nodes in very large directed networks. Progress of Theoretical Physics Supplement, 179:157 -- 166. [Parnes, 2012] Parnes, D. (2012). Approximating default probabilities with soft information. The Journal of Credit Risk, 8(1):3. [Pedregosa et al., 2011] Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., and Duchesnay, E. (2011). Scikit- learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825 -- 2830. [Pozzi et al., 2013] Pozzi, F., Di Matteo, T., and Aste, T. (2013). Spread of risk across financial markets: better to invest in the peripheries. Scientific reports, 3:1665. [Romei et al., 2015] Romei, A., Ruggieri, S., and Turini, F. (2015). The layered structure of company share networks. In IEEE Data Science and Advanced Analytics , DSAA-2015, pages 1 -- 10. IEEE. [Rørdam et al., 2009] Rørdam, K. B., Bech, M. L., et al. (2009). The topology of danish interbank money flows. Banks and Bank Systems, 4:48 -- 65. [Serrano and Bogun´a, 2003] Serrano, M. A. and Bogun´a, M. (2003). Topology of the world trade web. Physical Review E, 68(1):015101. [Simon, 1991] Simon, H. A. (1991). The architecture of complexity. Facets of systems sci- ence, 106(6):457 -- 476. [Smirnov, 1939] Smirnov, N. V. (1939). On the estimation of the discrepancy between em- pirical curves of distribution for two independent samples. Bull. Math. Univ. Moscou, 2(2). [Soramaki et al., 2007] Soramaki, K., Bech, M. L., Arnold, J., Glass, R. J., and Beyeler, W. E. (2007). The topology of interbank payment flows. Physica A: Statistical Mechanics and its Applications, 379(1):317 -- 333. [Souma et al., 2006] Souma, W., Fujiwara, Y., and Aoyama, H. (2006). Change of ownership networks in Japan. In Practical Fruits of Econophysics, pages 307 -- 311. Springer. [Tatti, 2017] Tatti, N. (2017). Tiers for peers: a practical algorithm for discovering hierarchy in weighted networks. Data Mining and Knowledge Discovery, 31(3):702 -- 738. [Treacy and Carey, 2000] Treacy, W. F. and Carey, M. (2000). Credit risk rating systems at large us banks. Journal of Banking & Finance, 24(1):167 -- 201. 21 [Tumminello et al., 2011] Tumminello, M., Miccich`e, S., Lillo, F., Varho, J., Piilo, J., and Mantegna, R. N. (2011). Community characterization of heterogeneous complex systems. Journal of Statistical Mechanics: Theory and Experiment, 2011(01):P01019. [Vitali et al., 2011] Vitali, S., Glattfelder, J. B., and Battiston, S. (2011). The network of global corporate control. PloS one, 6(10):e25995. [Watanabe et al., 2012] Watanabe, H., Takayasu, H., and Takayasu, M. (2012). Biased dif- fusion on the japanese inter-firm trading network: estimation of sales from the network structure. New Journal of Physics, 14(4):043034. [Wilson and Sharda, 1994] Wilson, R. L. and Sharda, R. (1994). Bankruptcy prediction using neural networks. Decision support systems, 11(5):545 -- 557. 22 A Dataset and network metrics A.1 The dataset The dataset is built from transactional data of the payment platform of a major Italian bank for a total of 47M records. In table 3 the details of the exchanged volume by customer status is presented. Table 4 shows the distribution of rating across the firms, disaggregating them in terms of their customer status. Table 3: Percentage of volume by customer status, the row indicates the status of the payer, the column the recipient month no ex Jan Mar May Jul Sep Nov 0.000 0.009 0.000 0.000 0.000 0.023 0.000 0.000 0.000 0.023 0.000 0.000 0.000 0.019 0.000 0.000 0.000 0.019 0.000 0.000 0.000 0.013 0.000 0.000 yes 0.036 0.604 0.046 0.149 0.015 0.541 0.036 0.193 0.018 0.542 0.040 0.194 0.014 0.538 0.031 0.183 0.015 0.599 0.032 0.175 0.015 0.578 0.031 0.158 0.001 0.030 0.002 0.002 0.000 0.037 0.000 0.001 0.000 0.035 0.000 0.001 0.000 0.031 0.000 0.001 0.000 0.027 0.000 0.001 0.000 0.037 0.000 0.000 no no yes ex no yes ex no yes ex NA 0.001 0.000 0.110 0.027 0.003 0.000 0.006 NA 0.000 0.000 0.000 0.151 0.023 0.002 0.000 0.000 NA 0.000 0.000 0.000 0.018 0.144 0.001 0.000 0.000 NA 0.000 0.000 0.000 0.018 0.181 0.002 0.000 0.000 NA 0.000 0.000 0.000 0.022 0.131 0.001 0.000 0.000 NA 0.000 0.000 0.000 0.012 0.165 0.001 0.000 0.000 NA 0.000 no yes ex no yes ex no yes ex yes 0.014 0.543 0.037 0.184 0.018 0.525 0.040 0.199 0.015 0.534 0.033 0.189 0.014 0.591 0.029 0.172 0.013 0.581 0.037 0.175 0.014 0.578 0.028 0.137 ex 0.000 0.037 0.000 0.001 0.000 0.033 0.000 0.003 0.000 0.037 0.000 0.001 0.000 0.029 0.000 0.005 0.000 0.029 0.000 0.000 0.000 0.036 0.001 0.000 Feb Jun Apr NA month 0.000 0.154 0.002 0.000 0.000 0.155 0.002 0.000 0.000 0.172 0.001 0.000 0.000 0.140 0.001 0.000 0.000 0.141 0.001 0.000 0.000 0.194 0.001 0.000 Aug Dec Oct A.2 Time aggregation When defining a network from temporal data, choosing the time scale of analysis is crucial because it can affect deeply the topology. Shorter time scales (daily or weekly) emphasise peculiar behaviours as, for example, which supplier is paid first once liquidity is available. Longer time scales help giving a more stable picture of the supply chain structure among firms. 23 Table 4: Average monthly distribution of nodes by customer status and rating. status rating L M H ND L M H ND L M H ND not customer incl. NA customer former total count 2121 4592 305 676762 87801 95893 18811 85841 3901 7850 926 41775 1026577 % %with rating 0.000 0.003 0.000 0.990 0.305 0.333 0.065 0.298 0.017 0.179 0.017 0.767 0.010 0.702 0.340 0.217 In order to give an intuition of different behaviours, two quantities can be considered. The first is the persistence of links and nodes, which is measured by counting the number of times a node or an edge appears in the networks for different time aggregations. From Figure 6 one can see that most of nodes are active only for few days, while a small core of firms is intensely active through the whole year. Secondly, the size of the networks, both in terms of number of nodes and links, for different time aggregations is shown in Figure 7. Interestingly, for daily aggregation, see Left panel, both quantities show a high periodicity, with a very high peak (a factor ∼ 5 with respect to the other days) at the end of each month. This effect is evident also with weekly aggregation, see (central panel), but not in the monthly time scale. This last observation justifies the choice of monthly networks as focus of this analysis. y c n e u q e r f 105 100 107 105 103 0 100 200 300 10 20 30 40 50 days weeks nodes links 107 106 105 104 1 6 12 months Figure 6: Histogram for the number of days, weeks, months of activity for nodes (blue) and existence for edges (green) for different time aggregations 24 ·106 1.2 1 0.8 0.6 0.4 0.2 0 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec ·106 days 1.5 1 0.5 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec ·106 weeks 4 3 2 1 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec months Figure 7: Number of nodes (blue) and links (green) for each day, week, and month. Only with longer time aggregations one is able to eliminate periodicity. 25 A.3 Network metrics A network's component is a subsets of nodes such that there is path between any pair of nodes, either undirected (weakly connected components), or directed (strongly connected components). From the definition of the networks it is clear that there are no isolated nodes, since the smallest weak components include at least two nodes, namely a payer and a payee. As it is common for many other real networks, it is possible to identify a weak component, which is of the order of magnitude of the entire network. In our case this giant component (GC) includes on average 98% of the nodes. Considering instead the largest strongly connected component (SCC), it includes approximately 20% of the nodes but more than half of the links. As a consequence the density of the strongly connected component is an order of magnitude larger than the density of the whole network or of the weakly connected component. See Table 5 in for more details of these quantities. In the standard definition of the bow-tie structure of a network, the nodes in the GC but outside the strongly connected component are divided between the in-component, the nodes from which links arrive in the strongly connected component, and the out-component, the nodes reachable from the SCC. Nodes in the in-component that have no incoming links, represent each month about one half of the active firms and their activity is sporadic. Table 5: Percentage size (%n) and density (ρ) of the largest weakly (GC) and strongly (SCC) connected components. The last column (%w) contains the relative volume transferred among nodes in the SCC with respect to the total volume. month %n Jan 0.989 0.989 Feb 0.980 Mar Apr 0.980 0.981 May 0.980 Jun 0.982 Jul Aug 0.970 0.981 Sep 0.981 Oct Nov 0.979 0.979 Dec ρ GC 3.4 · 10−6 3.21 · 10−6 3.15 · 10−6 3.16 · 10−6 3.16 · 10−6 3.11 · 10−6 3.05 · 10−6 3.08 · 10−6 3.31 · 10−6 3.00 · 10−6 3.08 · 10−6 2.81 · 10−6 SCC ρ = m 3.29 · 10−5 2.99 · 10−5 2.98 · 10−5 3.09 · 10−5 3.06 · 10−5 3.03 · 10−5 2.88 · 10−5 3.23 · 10−5 3.23 · 10−5 2.81 · 10−5 3.00 · 10−5 2.69 · 10−5 n(n−1) %w 0.75 0.69 0.70 0.67 0.69 0.69 0.70 0.69 0.73 0.68 0.65 0.67 %n 0.232 0.237 0.235 0.231 0.232 0.230 0.237 0.204 0.233 0.237 0.227 0.228 26 Table 6: Results of power law fit of the degree and strength distribution for all the months obtained by using the algorithm described in [Clauset et al., 2009]. The α parameter is the fitted exponent and the kmin and wmin parameter is the estimated minimum value after which the behaviour of the distribution is consistent with a power law tail. Since the volume of payments are scaled, the values of wmins are not much informative, so for the strength F (wmin) = 1 − EDCF (wmin) is reported instead. month Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec αin 2.55 2.56 2.53 2.67 2.66 2.58 2.52 2.62 2.64 2.53 2.59 2.55 degree min αout kin 159 2.85 2.80 148 2.70 125 257 2.82 2.83 227 2.83 135 2.80 124 236 2.74 2.83 187 2.75 129 134 2.83 2.62 180 kout min 24 19 44 22 23 23 21 14 32 25 19 41 αin 1.89 2.10 2.11 2.14 2.12 2.07 2.07 2.07 2.09 2.05 2.06 2.06 strength min) αout F (wout min) 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 0.01 1.89 1.99 1.97 2.01 2.07 1.96 2.02 1.94 2.03 1.95 2.04 1.98 F (win 0.03 0.03 0.03 0.03 0.03 0.03 0.03 0.03 0.04 0.03 0.03 0.03 Table 7: Assortativity coefficient for degree and strength. The columns with rating refers to the subgraph of nodes with known rating. The columns customers refers to the subgraph of nodes with customer status yes. attribute degree nodes Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec all with rating -0.035 -0.027 -0.025 -0.027 -0.026 -0.025 -0.025 -0.027 -0.024 -0.028 -0.023 -0.027 -0.035 -0.029 -0.030 -0.027 -0.033 -0.027 -0.028 -0.035 -0.027 -0.028 -0.028 -0.030 strength all with rating -0.036 -0.030 -0.027 -0.030 -0.027 -0.028 -0.028 -0.032 -0.028 -0.032 -0.026 -0.031 -0.031 -0.031 -0.027 -0.029 -0.026 -0.030 -0.028 -0.034 -0.030 -0.033 -0.028 -0.035 clients -0.046 -0.039 -0.037 -0.041 -0.035 -0.037 -0.038 -0.041 -0.036 -0.043 -0.035 -0.041 clients -0.046 -0.036 -0.038 -0.037 -0.039 -0.032 -0.036 -0.040 -0.030 -0.037 -0.031 -0.034 27 B Risk distribution B.1 Degree and risk The multinomial logistic regression aims to model the probabilities for a classification prob- lem with more than two outcomes. Here we treat the responses (L, M, H) as categorical and ordered. In practice this means to find parameters that best fit the model (cid:18) P (r ≤ L) (cid:18)P (r ≤ M ) P (r > L) (cid:19) (cid:19) P (r > M ) log log = aL + b1 LX1... + bp LXp+ = aL + b1 M X1... + bp M Xp+ . Xi are the predictors, a and bi· are the coefficients. We consider the cases p = 1, where the predictor is the degree X1 = k, and the case p = 2 where also the size is used as predictor X2 = s. In the following table 8, the b coefficients are shown, together with an indication for the statistical significance. Table 8: Coefficients for multinomial logistic regression. The first two columns refer to the regression with the degree as only predictor. The last four columns refer to the regression with also the size as predictor. The superscript indicates the predictors: k for the degree, s for the size. The subscript indicates the risk rating. The stars indicate significance: one star if the p-value < 0.05, two stars if the p-value < 0.01 bk L 0.258 ** Jan 0.221 ** Feb Mar 0.226 ** 0.243 ** Apr May 0.229 ** 0.239 ** Jun 0.238 ** Jul 0.183 ** Aug 0.238 ** Sep 0.220 ** Oct 0.226 ** Nov Dec 0.219 ** bk M 0.352 ** 0.305 ** 0.314 ** 0.328 ** 0.324 ** 0.325 ** 0.344 ** 0.272 ** 0.355 ** 0.329 ** 0.338 ** 0.331 ** bk L 0.261 ** 0.210 ** 0.220 ** 0.240 ** 0.206 ** 0.232 ** 0.227 ** 0.175 ** 0.218 ** 0.207 ** 0.211 ** 0.220 ** bs L -0.007 0.024 ** 0.013 0.007 0.051 ** 0.017 * 0.026 ** 0.020 * 0.046 0.030 ** 0.034 ** -0.002 * bk M 0.312 ** 0.233 ** 0.237 ** 0.270 ** 0.237 ** 0.237 ** 0.263 ** 0.179 ** 0.255 ** 0.232 ** 0.233 ** 0.231 ** bs M 0.091 ** 0.159 ** 0.173 ** 0.131 ** 0.195 ** 0.199 ** 0.187 ** 0.211 ** 0.228 ** 0.220 ** 0.234 ** 0.227 ** 28 B.2 Assortativity of risk Table 9: Assortativity coefficient for risk rating. The columns with rating refers to the subgraph of nodes with known rating. The columns customers refers to the subgraph of nodes with customer status yes. In the last two columns, the metric for assortativity is modified in order to take into account weights, specifically eij is computed as the fraction of volume, not the number of edges (see main text for more details). metric nodes Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec all -0.063 -0.066 -0.067 -0.067 -0.067 -0.068 -0.072 -0.078 -0.067 -0.076 -0.072 -0.082 standard with rating 0.025 0.026 0.025 0.026 0.025 0.026 0.025 0.025 0.025 0.024 0.024 0.024 clients 0.035 0.038 0.039 0.036 0.038 0.039 0.037 0.040 0.040 0.037 0.039 0.040 all 0.073 0.106 0.073 0.069 0.065 0.060 0.046 0.078 0.087 0.080 0.070 0.037 weighted with rating 0.115 0.181 0.150 0.154 0.146 0.150 0.142 0.149 0.168 0.151 0.175 0.199 clients 0.109 0.188 0.150 0.156 0.139 0.128 0.137 0.224 0.216 0.213 0.149 0.151 To test if nodes show different preferences in connection between incoming and outgoing payments we define the quantities ∆(in) i (X) = ∆(out) i (X) = w(in) i w(out) i br(i) (X) − aX 1 − aX br(i) (X) − ar(i) 1 − ar(i) bX , X ∈ {L, M, H} bX , X ∈ {L, M, H} . The notation is consistent with the definition in (1): r(i) is the risk of node i; aX, bX are the percentage volume from or to nodes with rating X for the whole network, w(out) (X) (w(in) (X)) is the percentage of the volume from (to) node i to (from) nodes of rating X. Sam- ples are obtained by grouping nodes by rating, for a total of 18(= (3 ratings)2 · 2 directions) distributions. For example, the distribution of excess percentage volume from L towards M is given by i i {∆i(M )(out) i ∈ L} ∼ F (out) L (M ) . Similarly, the excess percentage volume entering M from H is given by {∆i(H)(in) i ∈ M} ∼ F (in) M (H) . Note that in general, F (in) X (Y ) (cid:54)= F (in) Y (X). 29 We perform two set of test. In the first case we fix one rating and we compare out- and in- excess percentage volume with respect to a certain rating. In all the cases the null hypothesis is rejected with very low p-values, however it is not straightforward to give an economic interpretation of the overall results: for all the rating, the excess percentage toward L is greater that the analogous for incoming volume, while the opposite holds for payments to and from H. In the second set of test we fix a rating and a direction (in or out), and we compare the excess percentage volume from (or to) all the ratings. Also in this case all the tests reject the null with very low p-values, so we are able to order the distributions and evaluate the preference in connection. For the outgoing volume, rating L is preferred to the more risky ones in all the case. Payments to nodes rated M follows in preference from nodes having risk M and H, but are last in order for nodes having rating L. For incoming payments, the situation is slightly different. Rating M is preferred by nodes rated M and H, and it is followed by L. While the preference is reversed for payments from nodes rated L. B.3 Test for risk distribution within a community The statistical test employed in the main text has the purpose to assess whether a given rating is under- or over- represented in a certain subset, obtained by one of the partitioning methods described in the paper. In general, this means to test if the distribution of ratings in a single subset is statistically different from the unconditional distribution obtained considering the entire sample. To do so, one computes the p-value representing the probability to observe a given number of ratings in each community under the null hypothesis of that ratings are distributed in the community as in the whole sample. As shown in [Tumminello et al., 2011] the probability under the null is the hyper-geometric distribution. Moreover, since for each community multiple tests (one for each rating and community) are performed, a correction for the p-value for multiple hypothesis testing is used. In particular, the Bonferroni correction is chosen, i.e. fixed a threshold ps for the p-value, the corrected threshold is given by ps , Nr where Nr is the number of tests. The threshold of is fixes at ps = 1% before correction. Specifically, given a partition {Ci}i the following quantities are computed kx,i = #{nodes in Ci with rating x} ni = #{nodes in Ci} Kx = #{nodes with rating x} N(cid:48) = #{nodes} kx,i ni kx,i ni > Kx N(cid:48) ) < Kx N(cid:48) ) , y ∼ hypergeom (cid:18) KL N(cid:48) , KM N(cid:48) , N(cid:48) ; N(cid:48)(cid:19) KH . and the p-value is given by p = (cid:40)P(y > kx,i P(y < kx,i Note that {Kx} and N(cid:48) are computed in the specific monthly network under considera- tion. In the case of the distribution conditioned on the distance, the subsets are obtained by considering pairs of nodes. For example, the fraction of nodes with rating L at distance k 30 from H is computed as p(k) HL = {(i, j) : d(i, j) = k, i ∈ H, j ∈ L} {(i, j) : d(i, j) = k, i ∈ H} . The partitions resulting from the other methods are very different in terms of number and size of subsets, so to make tests comparable, only communities including at least 500 nodes with known rating. In the cases of modularity, subsets are ordered by descending size. Note that, since each month the set of active nodes and the labelling of subsets changes, one cannot easily compare the behaviour of a subsets across months. Tables 10, 11, present a summary of the tests, recording for each month and risk class the number of times the null hypothesis has been rejected, separated in over- (+) and under- (−) representation. The last two columns contain the number classes respectively tested, and in total (nC). Table 10: Summary for test results: modularity L M H + - + - + - 5 4 7 5 5 4 6 4 5 3 6 5 6 3 5 5 4 3 5 4 4 5 3 3 8 9 7 7 8 11 10 8 9 9 7 10 9 11 13 9 9 12 8 12 9 11 9 11 4 2 2 3 2 3 5 3 2 2 4 3 6 9 8 7 7 6 5 8 4 6 5 7 tested nC95% 17 20 20 19 18 21 17 21 16 18 17 19 13 15 14 14 13 15 12 16 12 13 11 15 nC 1971 1900 2070 1902 1856 2148 1862 2608 1879 1922 2083 2323 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 31 Table 11: Summary for test results: hierarchy L M H + - + - + - 5 5 5 5 4 4 6 4 6 6 6 5 4 5 5 6 6 5 5 5 5 5 4 7 5 5 4 4 4 3 3 4 4 4 3 3 3 4 4 3 3 4 3 3 4 3 3 3 5 4 4 3 4 3 3 3 3 3 4 3 4 4 4 4 4 4 4 5 4 4 4 4 tested nC95% nC 18 17 18 15 18 17 16 20 17 17 18 19 12 12 12 12 12 12 12 14 12 12 12 12 11 11 11 10 13 11 11 11 10 11 10 12 h 0.75 0.74 0.74 0.75 0.74 0.75 0.74 0.78 0.74 0.73 0.75 0.75 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 32 C Classification C.1 Data pre-processing It is well established [Friedman et al., 2001] that rescaling/ transforming data in order them to be ∈ [0, 1] or ∈ [−1, 1] or standardised, generally improves the performance of classifica- tion, especially when different predictors have very different scale. So, before training the models we perform data preprocessing, in particular: i. for in- and out- degree we use quantile transformation of the logarithm of the degree. This choice is explained by the aforementioned power-law tail distribution of these quantities, and aim to avoid too scattered data; ii. the predictors for assortativity are already ∈ [0, 1] so they do not need preprocessing; iii. the distribution of nodes into hierarchy classes is standardised, i.e each rank is shifted and rescaled to have mean 0 ad variance 1; iv. the module is the only categorical variable. The usual binary transformation would result into a new binary variable for each possible value. As we discussed before, the number of modules is very high but a small fraction of them contains almost all the nodes, so we only keep those that have more than 500 nodes and merge all the remaining into a residual class; v. quantile transformation is applied also to the log-distribution of the size. C.2 Models training and hyper-parameter optimisation Models training is performed using already implemented packages: for multinomial logistic and classification trees Scikit-learn Python package [Pedregosa et al., 2011] has been em- ployed, while for neural networks Keras Python package [Chollet et al., 2015] and Tensor- flow [Abadi et al., 2015] have been used. However, during optimisation, the parameters that define the architecture of the model, the so called hyper-parameters, remain fixed. For this reason, a common practice is to train many models using different values for these hyper- parameters and compare performance according to the chosen metric(s). A thorough discus- sion on this topic is beyond the scope of this paper, we refer to [Bergstra and Bengio, 2012] and related literature for detailed information. Here we apply a simple grid search for the hyper-parameters of interest. This has been done for both 1-step and 2-steps classifiers. The metrics we employ take into account the domain specific interpretation of the risk classes. In particular we want to penalise more misclassification towards lower risk classes, i.e M → ¯L, H → ¯M , H → ¯L8, and towards distant classes, i.e L → ¯H, H → ¯L. For this reason, beside the standard accuracy and recall, we also consider weighted scores for accuracy wsacc, recall wsrec, precision wspr, which are function of the confusion matrix C. With the notation Cx,y = {x → ¯y} , C·,y = Cx,y, ∀x, y ∈ {L, M, H} (cid:88) 8X indicates the real class, while ¯X indicates the predicted class. x 33 (cid:88) (cid:88) (cid:88)   1  1  1 −0.25 −0.5 −0.25 1 −0.75 −1 −0.75   1 −0.25 −0.75 −0.25 1.75 −0.25 −0.75 −0.25 1.75 1 Cx,y Cx,· P rec x,y , Cx,y C·,y P pr x,y , P rec = P pr = −0.75 −1 −0.75 1 −0.75 −1 −0.75 wsacc = 1 C·,· x, y∈{L, M, H} Cx,yP acc x,y , P acc = wsrec = wspr = x, y∈{L, M, H} x, y∈{L, M, H} For classification trees, the hyper-parameter of interest is the depth, i.e the maximum number of condition to be satisfied for classification (or the length of the longest path from root to leaves). A higher value for depth results in lower training error but may lead to over-fitting. We considered value of depth from 3 to 10. For the 1-step model, the tree with depth 6 resulted the best choice, while for the 2-steps, the best results have been attained with a depth of 9 for the first step tree and 5 for the second. For neural networks, the hyper-parameters of interest are the number and size of hidden layers. As before, increasing too much these values may lead to over-fitting. In order to avoid extremely high number of parameters when adding layers, we consistently reduce their size as their number increases ili, where li is the size of the ith layer). For example, in the case of 1 (hidden) layer the number of nodes is between 10 and 100, while for two layers, it goes from 5 each to 10 each. For the 1-step model the best results are obtained with 1 layer of 50 nodes, while for the 2-steps the best choice is 2 layers of 5 nodes each for the first step and 1 layer of 10 nodes for the second. (intuitively, the number of parameter grows as(cid:81) 34
1912.12846
1
1912
2019-12-30T08:24:59
A Game-Theoretic Algorithm for Link Prediction
[ "cs.SI", "physics.soc-ph" ]
Predicting edges in networks is a key problem in social network analysis and involves reasoning about the relationships between nodes based on the structural properties of a network. In particular, link prediction can be used to analyse how a network will develop or - given incomplete information about relationships - to discover "missing" links. Our approach to this problem is rooted in cooperative game theory, where we propose a new, quasi-local approach (i.e., one which considers nodes within some radius k) that combines generalised group closeness centrality and semivalue interaction indices. We develop fast algorithms for computing our measure and evaluate it on a number of real-world networks, where it outperforms a selection of other state-of-the-art methods from the literature. Importantly, choosing the optimal radius k for quasi-local methods is difficult, and there is no assurance that the choice is optimal. Additionally, when compared to other quasi-local methods, ours achieves very good results even when given a suboptimal radius k as a parameter.
cs.SI
cs
A Game-Theoretic Algorithm for Link Prediction Mateusz Tarkowski, University of Oxford Tomasz P. Michalak, University of Warsaw Michael Wooldridge, University of Oxford January 1, 2020 Abstract Predicting edges in networks is a key problem in social network analysis and involves reasoning about the relationships between nodes based on the structural properties of a network. In particular, link prediction can be used to analyse how a network will develop or -- given incomplete information about relationships -- to discover "missing" links. Our approach to this problem is rooted in coopera- tive game theory, where we propose a new, quasi-local approach (i.e., one which considers nodes within some radius k) that combines generalised group closeness centrality and semivalue interaction indices. We develop fast algorithms for com- puting our measure and evaluate it on a number of real-world networks, where it outperforms a selection of other state-of-the-art methods from the literature. Im- portantly, choosing the optimal radius k for quasi-local methods is difficult, and there is no assurance that the choice is optimal. Additionally, when compared to other quasi-local methods, ours achieves very good results even when given a suboptimal radius k as a parameter. 1 Introduction In this paper we are concerned with link prediction -- an important research problem in social network analysis [4, 20, 23]. The aim is to predict between which pairs of nodes unknown links exist or should form based on the known structural characteristics of the network. Applications include biological networks, where some of the network is known, but checking whether other links actually exists is very costly (e.g., food web, protein-protein and metabolic networks [23]); social networks, where certain in- formation about links is impossible to attain or verify (e.g., covert networks [38]); and identifying potentially fruitful collaboration in organisations [20]. Predicting whether links exist or will form is strongly associated with the concept of node similarity [23]. If two nodes are similar, then there is a greater chance that they are connected. The three most common approaches to computing node similarity take into account either local, quasi-local or global topological information about nodes. In general, global methods produce better results than local ones, but are more computa- tionally involved. Furthermore, quasi-local methods, which only consider the network within a certain radius k around the pair of nodes, tend to do better than global ones 1 [23] when given an optimal radius. This is because, it is unlikely that features of the network that are far away from a pair of nodes (that are taken into account by global methods) will actually impact the chance of those two nodes being connected. Recently, Szczepanski et al. [31] proposed a new method to tackle the link predic- tion problem based on group k-degree group centrality and the concept of the game- theoretic interaction index. In particular, k-degree group centrality is a valuation of groups of nodes according to the number of nodes that are at a distance k or closer to the group [24]. In turn, the interaction index can be interpreted as a measure of the syn- ergy [1] or similarity of players in a cooperative situation. When applied to k-degree group centrality, the interaction index becomes an interesting measure of the similarity of the topological placement of nodes. In particular, two nodes produce negative syn- ergy according to k-degree group centrality whenever they have common neighbours. The interaction index is used to measure such negative synergies between any pair of nodes in the context of all the possible groups of nodes that these two nodes belong to. Considering all these groups allows the measure to prioritise the impact of unique common neighbours. The intuition behind considering all groups is as follows: if most of the nodes in a network neighbour a certain node, then this does not necessarily mean that they are similar; on the other hand, if only two nodes neighbour a certain node, then this is a unique characteristic shared only by these two nodes and suggests that they are similar. Szczepanski et al. show that their game-theoretic approach produces a very competitive link prediction method when compared to a selection of quasi-local measures. As for computational considerations, the authors develop a general algo- rithm for computing interaction indices of k-degree centrality that runs in O(V 4) and a more specific one that runs in O(V 3) time. In what follows, we propose an alternative game-theoretic method to tackle the link prediction problem. Our method builds upon the following intuition: while the k-degree centrality used by Szczepanski et al. [31] postulates that all nodes within a distance k of a pair of nodes impact their similarity equally, we postulate that those that are farther away should be considered less important than those that are closer from the pair. In order to develop a method based on this intuition, we use the con- cept of generalised group closeness centrality, which has precisely this property: the magnitude of the impact of a node on the value of a group reduces as the distance from this group increases.1 As compared to k-degree centrality, this allows us to reduce the impact of far-away nodes on synergy. As we are interested in developing a quasi-local measure, similarly to k-degree centrality, we introduce a restriction on the generalised group closeness centrality that only nodes inside of a radius k around a given group impact the value of this group value. Interestingly, despite the fact that our method is more general that the one developed by Szczepanski et al. [31], our algorithm for computing it is less demanding compu- tationally. In particular, we compute our generalised closeness semivalue interaction index with a complexity of O(V 2 k V 2), where Vk is the average number of nodes within a distance k of any node. We also develop an algorithm to compute the gen- eralised closeness Shapley value interaction index that runs in O(V 2 k V +V 2) time. 1See the work by Skibski and Sosnowska [30] for an overview of different centrality measures that focus on the distances between nodes. 2 This is an interesting result, since computing the interaction index given an arbitrary cooperative game is difficult (#-P complete, like the Shapley value [6, 8]). We should also highlight the generality of our algorithm stemming from the fact that we allow for any function of distance, f , to be used with our measure. For f (d) = 1 whenever d < k, our measure is equivalent to the k-degree interaction index. We evaluate our approach by considering 11 real-life networks on which we run a series of experiments. We find that -- in most cases -- our approach produces equal or better results than the state-of-the-art quasi-local measures in the literature. Among others, it outperforms the game-theoretic method proposed by Szczepanski et al. [31]. Furthermore, we consider an aspect of quasi-local measures that has thus-far been overlooked in the literature. In particular, most authors present the result of their mea- sure given an optimal parameter k [33, 31, 23]. However, the optimal value of this parameter is unknown and it must be estimated. Therefore, we study how the measures perform given a selection of values for the parameter k, and not only the optimal value of this parameter, since there is always a chance that the estimated value of k is not optimal. Two cases can be distinguished. If a value for k is chosen that is smaller than the optimal value of this parameter, then this results in a computational/accuracy trade-off. The measure can usually be computed faster, but it could perform better by having more information about the network (i.e., a larger value for k). For large networks, it may simply take too long to compute a quasi-local measure with an optimal k, and such a trade-off is necessary. In the worst case, k = 1 may be chosen, and the quasi-local measure becomes local. On the other extreme, if k is equal to the longest shortest path in the network, then it can be said that the quasi-local measure becomes global. What happens, then, if the value of k is larger than the optimal value? In our study, we show that such a k can result in a significant reduction of the quality of the similarity ranking for quasi-local measures. We find, however, that our proposed measure is largely resistant to this. For example, in one network that we study -- a Football network [13, 5] -- the precision of the ranking produced by the measure due to Szczepanski et al. [31] decreases by approximately 37% when the value of k is 3 instead of the optimal value 1, whereas the precision of our measure decreases by less than 1%. Interestingly, we also note that there are cases where the quality of other measures is reduced given a larger k, while the quality of our measure improves. This means that whereas other measures pick up more noise given more information about the network, our measure is still able to gather more insight in order to improve the ranking of potential edges. 2 Preliminaries In this section we introduce the key concepts required for the understanding of the paper. 3 2.1 Graph-Theoretic Concepts A network is a directed weighted graph G = (V, E, ω), where V is a set of nodes, E is a set of edges, i.e., unordered pairs (v, u) of nodes in V with v 6= u, and ω : E → R+ is a weight function from edges to the positive real numbers. A graph is unweighted if ω(e) = 1 for all e ∈ E. We denote the neighbours of a node v by E(v) = {u : (v, u) ∈ E} and the neighbours of a subset C of nodes by E(C) = Sv∈C E(v) \ C. We refer to the degree of a node v by deg(v) = E(v). We define the distance from a node s to a node t as the length of the shortest path from s to t and denote it by dist (s, t), and we define the distance between a node v and a subset of nodes C ⊆ V as dist (C, v) = minu∈C dist(u, v). The Generalised Group Closeness Centrality [11, 10, 26] of a group of nodes S in a graph G is defined as: νCL f (G)(S) = Xv∈V \S f (dist(S, v)); (1) 2.2 Game-Theoretic Concepts A cooperative game is defined by a group of players, I, and a characteristic function ν : 2I → R that assigns to each group of players a real value, with the restriction that ν(∅) = 0. For our purposes, the players are nodes within a graph (i.e., I = V ). A central concept to cooperative game theory is that of the marginal contribution, i.e., how much value a player i brings to a coalition C of players. Formally, M Cν(C, i) = ν(C∪ {i}) − ν(C). Whereas in the game-theoretic literature marginal contributions are used to measure the importance of players for a group in order to divide the value of said group fairly among its members [6], we are concerned with using them in order to rank the similarity of players. To achieve this, We follow Owen [27] in defining the synergy between two players, i and j, within the context of a coalition C as the difference between the marginal contribution of the group {i, j} and the marginal contributions of each node separately. Formally, Sν (C, i, j) = MC ν (C, {i, j}) − MC ν(C, {i}) − MC ν(C, {j}). The Shapley value interaction index of i and j is defined as: I Shapley i,j (ν) = Xπ∈Π(I i∧j ) Sν(Cπ({i, j}), i, j) (n − 1)! , (2) (3) where I i∧j = I \ {i, j} ∪ {{i, j}}, Π(X) is the set of permutations of the set X, and Cπ({i, j}) is the set of elements preceding {i, j} in the permutation π. Grabisch and Roubens [15] continued this work and introduced the Banzhaf interaction index. Szczepanski et al. [31] generalised these concepts further by introducing semivalue interaction indices, defined below: I SEMI i,j (ν) = n−2 Xk=0 XC∈C k(I\{i,j}) β(k) Sν (C, i, j) (cid:0)n−2 k (cid:1) 4 (4) For our purposes, the lower the interaction index of two nodes, the more similar they are. 2.3 Performance Metrics for Link Prediction Next, we present the main metrics used to evaluate link prediction methods. The first of these is the area under curve (AUC), and the second is precision [23]. The goal of a link prediction algorithm is to identify pairs of nodes that are not connected by an edge but which do (or will) exist in the real world (i.e., nodes that are "missing" from the graph). For example, people in an online social network are typically connected by their friendships. However, this is not to say that people who have not indicated their friendship via the social platform are not actually friends. Ideally, a link prediction algorithm would identify those pairs of individuals who are friends in real-life but not (yet) on the social network. In order to test link prediction methods, it is typical to remove a certain percentage of links from a real life network [23, 31, 33]. This altered network is given as input to a link-prediction algorithm, which ranks disconnected pairs of nodes in terms of the likelihood that they belong to the "removed," or "missing" set. ◮ Area Under Curve The area under the ROC curve is a good overall indicator of the quality of the ranking of edges that is produced by a link prediction algorithm and we can compute it using the Mann-Whitney U test [17]. Formally, let m be the number of edges in the network that are "missing." In other words, these edges do not exist in the graph that the link-prediction algorithm received as input, but do exist in the real world. These are the edges that we would like a link-prediction algorithm to discover and therefore give them a high rank. Let l be the number of edges that do not exist in the graph that are not missing. In other words, these are the edges that we would like a link-prediction algorithm to recognise as non-existent and therefore give them a low rank. There are a total of n = m × l comparisons between missing and non-existent edges. Let n′ be the number of such comparisons where a missing edge is ranked over a non-existent edge, and n′′ be the number of comparisons where a missing edge is given the same rank as a non-existent edge. AUC, then, is defined as follows: AUC = n′ + n′′ 2 n If all missing edges are ranked higher than non-existent edges, the resulting AUC is equal to 1. If the opposite is true (i.e., all non-existent edges are ranked higher than all missing edges), then this results in an AUC of 0. A random link-prediction algorithm results in an average AUC of 0.5. In short, AUC is the percentage of comparisons be- tween ranked edges that are "correct." For this reason, we present AUC as a percentage value. ◮ Precision For a given p ∈ N, let Top(p) be the set of top p edges according to the ranking generated by a link-prediction algorithm. Let Correct (p) be the set of edges in Top(p) that are "missing." The precision of the algorithm, then, is defined as follows: Precision(p) = Correct (p) p 5 If all of the top p edges ranked by an algorithm are missing edges, then the precision is equal to 1. If none of them are, then the precision is equal to 0. Note that this metric is dependent on the variable p, which indicates the depth to which the ranking is studied. In particular, this depth should never be higher than the actual number of missing edges. Whereas most literature [23] has focused on a static depth p, such as 100, we take a different approach. Since the sizes of our networks vary greatly, a static depth makes no sense, which is why we take p to be equal to the number of missing edges in the network. 3 Semivalue Closeness Interaction Index & Its Compu- tation In this section, we introduce our family of quasi-local measures for link prediction. Generally, quasi-local measures are characterised by requiring a parameter, k. When a quasi-local algorithm evaluates the likelihood of an edge existing between the nodes u and v, it only ever considers the nodes that are at distance of at most k away from u or v. If all other nodes that are farther than k from u and v would be removed from the graph, then this would not change the evaluation of the existence of an edge between u and v according to a quasi-local algorithm. Conversely, local algorithms are equivalent to quasi-local algorithms with k = 1 and global algorithms consider the whole graph in evaluating the likelihood of an edge existing. Following Szczepanski et al. [31], we apply semivalue interaction indices (see Equation 4) to a group centrality measure as a means to measure the similarity of disconnected nodes. Whereas Szczepanski et al. [31] used group k-degree centrality, we use a broader class of group centrality measures -- general group closeness centrality, νCL : f νCL f (G)(S) = Xv∈V f (dist(S, v)). If for any natural number k we define f as f (d) =(1 0 if d ≤ k otherwise, then νCL use the following distance function: f is equivalent to k-degree centrality. To develop our measure, however, we f (d) =( 1 d2 0 if d ≤ k otherwise. This choice has two benefits: (1) It retains the computational advantage of k-degree group centrality, whereby faraway nodes do not impact it. This not only improves computational performance, but also the accuracy of the resulting similarity measure, since Szczepanski et al. [31, 33] 6 and Szczepanski et al. [33] showed that faraway nodes are less likely to impact the similarity of nodes and therefore reduce the accuracy of the measure. In fact, this is well-known for various similarity measures, which is why some quasi-local mea- sures outperform global ones in many networks [23]. Faraway nodes do not impact the index, and therefore need not be considered, which leads to faster computation. We show that this also improves the AUC and precision of the index, since faraway nodes are less likely to impact the similarity of nodes. This is why some quasi-local measures outperform global ones [23]. (2) It is likely that nodes that are closer impact similarity more than those that are further away, so it makes sense to use a decreasing function such as 1 d2 for those nodes where d < k in order to decrease the impact of far-away nodes. We also studied functions such as 1 d2 produced the best results. 2d , but found that 1 d or 1 Let us now introduce our main computational results. We start off by proving that the generalised closeness semivalue interaction index can be computed in polynomial time of O(V 2 k V 2). Next, we consider a particular case of this general result, i.e., the generalised closeness Shapley value interaction index. We prove that it can be computed even faster, in O(V 2 k V +V 2) time. Importantly, for both algorithms, we leave the choice of f open, meaning that the analysis and algorithms can be used with any decreasing function. Theorem 1. I Semi s,t (νCL f (G)) can be computed in O(V 2 k V 2) time. Proof. Our goal is to compute I SEMI s,t (νCL f (G)) = V −2 Xk=0 XC∈C k(V \{s,t}) β(k) S(C, s, t) (cid:0)V −2 k (cid:1) , (5) f i.e., Equation 4, in polynomial time. We will be counting the number of coalitions for which certain common expressions appear in this sum. By multiplying these expres- sions by their number of appearances, we will achieve polynomial computation. Let us first look closer at the definition of νCL (G) in Equation 1. In particular, the equation itself consists of a sum over nodes u. We will only focus on one of these elements (G)). Let us define νu = f (dist (C, u)) for the remainder of our proof and focus on computing I SEMI s,t at a time, keeping in mind thatPu∈V I SEMI Moreover, we will focus on computing the inner sum of Equation 4 -- PC∈C k(V \{s,t}) β(k) S(C,s,t) for an arbitrary k, and our resulting algorithm will then sum the value of this inner part for all k such that 0 ≤ k ≤ V −2. We assume without loss of generality that dist (s, u) ≤ dist (t, u), meaning that S(C, s, t) = MC (C, t). Moreover, only coali- tions C such that dist (C, u) > dist (t, u) matter (since otherwise S(C, s, t) = 0). In effect, we arrive at the following simplification: (f (dist (C, u)) = I SEMI (νu) for some s and t. (νCL f s,t s,t -- (V −2 k ) XC∈C k(V \{s,t}) −β(k)( − νu({s}) (cid:0)V −2 k (cid:1) ) νu(C) (cid:0)V −2 k (cid:1) 7 . We will use the following notation: M C+(s, t, u, k) = C∈{C:C∈C k(V \{s,t}) and dist (C,u)>dist (s,u)} M C−(s, t, u, k) = C∈{C:C∈C k(V \{s,t}) and dist (C,u)>dist (s,u)} X X β(k) β(k) νu({s}) (cid:0)V −2 k (cid:1) νu(C) (cid:0)V −2 k (cid:1) The rest of the proof will focus on computing these values. In order do this, let us introduce the following notation: Nod ∼d(u) = {v : v ∈ V and c ∼ u}, where ∼ is one of <, >, ≤, or ≥. M C+(s, t, u, k) : Let d = dist (t, u). Computing M C+(s, t, u, k) is equivalent to computing the following expression: {C : C ∈ C k(V \ {s, t}) and dist (C, u) > d}, and multiplying it by β(k) f (d) (V −2 k ) . We need to count the number of coalitions C of size k such that dist (C, u) > d. Counting the number of such coalitions is as simple as counting the number of ways to choose k elements from N od>d. In other words: k (cid:0)N od>d (cid:1). This gives us the desired result: M C+(s, t, u, k) = β(k) M C−(s, t, u, k) : Let us define M C−(s, t, u, k, d) = f (d) k (cid:19) k (cid:1)(cid:18)N od>d (cid:0)V −2 X C∈{C:C∈C k(V \{s,t}) and dist (C,u)=d β(k) } . νu(C) (cid:0)V −2 k (cid:1) We now have M C−(s, t, u, k) = Xd∈{d: d∈dists(u) and d<dist(s,u) } M C−(s, t, u, k, d). We therefore have to find the number of coalitions of size k such that dist (C, u) = d. In other words, they need to have at least some node at distance d from u and no nodes that are closer. The answer is as follows:(cid:0)N od≥d result: k M C−(s, t, u, k, d) = (cid:1). This gives us the desired k f (d) (cid:1) −(cid:0)N od>d k (cid:19) −(cid:18)N od>d k (cid:1)(cid:18)(cid:18)N od≥d (cid:0)V −2 k (cid:19)(cid:19). 8 Algorithm 2 implements the equations from this proof and computes the semivalue closeness interaction index in the required time. As for the generalised closeness Shapley value interaction index, the following result holds. Theorem 2. I Shapley s,t (νCL f (G)) can be computed in O(V 2 k V +V 2) time. Proof. Our proof will be based on dissecting Equation 3. First, note that this equation is a sum of multiple expressions over various permutations. To achieve polynomial computation, we will group expressions that are equal to one another and count how many permutations these expressions appear in. Finally, by multiplying the expressions by their respective number of appearances we will achieve polynomial computation. As previously, we will focus on computing I Shapley (νu) for some s and t, and the resulting algorithm will be a sum over u ∈ V . Again, assuming that dist (s, u) ≤ dist (t, u) we have S(C, s, t) = −M C(C, {t}) = −(ν(C ∪ {t}) − ν(C)). s,t Continuing, our aim will be to dissect the formula for I Shapley (νu) into smaller, more manageable parts, and to compute those. Note that M C(C, {t}) 6= 0 if and only if dist (t, u) < dist (C, u). In this case ν(C ∪ {t}) = ν({t}) is independent of C. We refer to this as the left, or positive, part of the sum that constitutes the marginal contribution. We refer to ν(C) as the negative part. As previously, we note that νCL (G) in Equation 1 consists of a sum over nodes u and define νu = f (dist (C, u)). We will focus on computing our similarity metric for νu, and the final answer will be a sum of νu for all u 6= s, t. Next, let us introduce the following notation: s,t f X π∈Π(V s∧t) and dist (t,u)<dist (πt,u)} νu({t}), M C+(t, u) = π∈{π: M C−(t, u) = X νu(Cπ({s, t})), π∈{π: π∈Π(V s∧t) and dist (t,u)<dist (πt,u)} where Cπ(x) is the set of elements in the permutation π that precedes x, and arrive at the following simplification: I Shapley s,t (νu) = − (M C+(t, u) − M C−(t, u)) (V −1)! . The remainder of the proof will focus on computing M C+(t, u) and M C−(t, u). M C+(t, u) : Our goal here is to find the number of permutations π ∈ Π(V s∧t) such that dist (t, u) < Cπ({s, t}) and multiply this number by ν({t}). Let d = dist(t, u). We can construct all such permutations in the following manner: • First, choose Nod ≤d(u)−1 positions (we have to subtract 1, since s and t are treated as one node) for all of the nodes in V s∧t that are as close to u as t or closer. Out 9 of all of these positions, t has to be first, otherwise dist (t, u) < Cπ(t) will not be satisfied. There are(cid:0) the nodes except the first can be permuted in (Nod ≤d(u) − 2)! ways. Nod ≤d(u)−1(cid:1) ways that we can choose the positions and all of V −1 • Next, the rest of the nodes are placed in the rest of the positions, which can be permuted in (V −1 − (Nod ≤d(u))! −1) ways. When we combine both steps, there are(cid:0) such permutations, which simplifies to: Nod ≤d(u)−1(cid:1)(Nod ≤d(u)−2)! (V −Nod ≤d(u))! V −1 M C+(t, u) = (V −1)! Nod ≤d(u) − 1 M C−(t, u) : Let us introduce the following notation M C−(t, u, d) = π∈{π: X π∈Π(V s∧t) and dist (Cπ({s,t}),u)=d} νu(Cπ({s, t})) and let dists(u) be the set of distances from any node to u. In effect, we have M C−(t, u) = X d∈{d: d∈dists(u) and dist (t,u)<dist (d,u)} M C−(t, u, d). For a given d, then, we will focus on computing M C−(t, u, d). We need to capture all permutations π for which the coalition of nodes preceding {s, t} (i.e., Cπ({s, t}) is exactly at distance d from u. The requirement can be summarised as follows: there needs to be at least one node x in π preceding {s, t} such that dist (x, u) = d and no nodes that are closer than x to u preceding t. This can be counted using the inclu- sion/exclusion principle. Counting all permutations such that dist(Cπ({s, t}), u) ≥ d and subtracting those such that dist(Cπ({s, t}), u) > d provides the answer. We can use the techniques for counting MC +(t, u) to arrive at the following: M C−(t, u, d) = (V −1)! Nod <d(u) − 1 − (V −1)! Nod ≤d(u) − 1 Algorithm 3 implements the equations from this proof and computes the Shapley value closeness interaction index in the required time. This concludes our proof. Since our Algorithms require information about the distances between certain nodes to be presented in a sorted fashion and this information is used multiple times, it is ad- visable to compute these sorted vectors in a precomputation phase. Furthermore, since these precomputations are common between both the Shapley value and semivalue in- teraction indices, we present them in a common precomputation algorithm, the pseudo- code of which can be found in Algorithm 1. Algorithms 2 and 3 continue where the precomputations leave of to compute their respective indices. 10 Algorithm 1: Precomputations. input : Graph G = (V, E, ω), Closeness function f : R → R, Probability distribution function β : 0, 1, . . . V −1 → R, radius k output: Configuration Semivalue 1 dist[V ][V ]; 2 for v ∈ V do 3 for u ∈ V do dist[v][u] = ∞ distance[v] ← empty set; visited ← empty set; φv ← 0; 4 5 6 7 8 Q ← Priority Queue; 9 Q.enqueue(hv, 0i); 10 11 while Q not Empty do dist[v][v] = 0; 12 13 14 15 16 17 18 19 20 21 hu, di ← Q.pop(); II[v, u] = 0; visited.insert(u); for s ∈ E(u) do if (s 6∈ visited or dist[v][s] > dist[v][u] + ω(u, s)) and (dist[v][u] + ω(u, s) ≤ k) then dist[v][s] = dist[v][u] + ω(u, s); Q.enqueue(hs, dist[v][s]i); for u ∈ visited do distances[v] ← distances[v] ∪ hu, dist [u, v]i; sort in descending order(distances[v]); In particular, Algorithm 1 uses a modified Dijkstra's algorithm [9] in order to com- pute the distance between the k nearest nodes to each node in O(V (Vk log(Vk)+Ek)) time, where Vk is the average number of nodes at distance k from any node and Ek is the average number of edges within a distance of k around any node. The algorithm also sets up the data structures required for the computation of the interaction index. Algorithms2 and 3 use dynamic programming in order to compute the negative part of the marginal contributions (M C− from our proof). Algorithm 2 runs in O(V 2V 2 k ) time, and Algorithm 3 runs in O(V V 2 k + V 2) time. We already mentioned that generalised closeness centrality is equivalent to k-degree centrality given the appropriate function f , and our algorithms can therefore also com- pute the k-degree interaction index. Interestingly, despite being more sophisticated, our algorithm is actually faster. Szczepanski et al. [31] quote the complexity of their algorithm as O(V 3), however the authors did not consider the complexity of finding the intersection of two sets. We give the authors the benefit of the doubt, since it is possible to do this in linear time, 11 Algorithm 2: Semivalue Closeness Interaction Index. 1 for u ∈ V do prev d ← largest distance in distances[u]; 2 3 Nod>[prev d ] ← V −distances[u].size(); 4 N od≥[prev d] ← V −distances[u].size(); 5 for (v, d) ∈ distances[u] do 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 if d 6= prev d then N od>[d] ← N od≥[prev d]; N od≥[d] ← N od≥[prev d]; prev d ← d; N od≥[d] ← N od≥[d] + 1; prev d ← largest distance in distances[u]; for k ∈ [0, V ] do MC − ← 0; for (s, d) ∈ distances[u] do if d 6= prev d then MC − ← MC − + f (prev d )((cid:0)N od≥[d] prev d ← d; k k (cid:1)(cid:0)N od>[d] (cid:1)); for (t, dt) ∈ distances[u] do d ← max(d, dt); MC + ← f (d)(cid:0)N od≥[d] (cid:1); II[s, t] = M C− − M C+; k which gives their algorithm a complexity of O(V 2Vk). This, however, requires a modification of their algorithm in order to sort the neighbour sets in the precomputation phase. As opposed to querying every pair of nodes and then every node s within the radius k of the pair, our algorithm reverses this, and first considers any node s and then all pairs of nodes within its vicinity. In doing this, we avoid altogether querying pairs of nodes that are far away (except to first initialise the distance between each node to infinity and interaction index to 0). Combined with our restricted Dijkstra algorithm, this results in a total time complexity of O(V V 2 k + V 2). We study the running time of both algorithms using randomly generated graphs according to the preferential attachment (PA) model due to Barabasi and Albert [2]. In particular, we study two cases: a relatively sparse network, where we start with a clique of 3 nodes and in each iteration add a node with 2 edges, and a denser, more centralised network that starts with a clique of 5 nodes and with each node adds 3 edges. The running times of both algorithms are presented in Tables 1 and 2, where m0 is the size of the initial clique and m is the number of edges added during each iteration of the preferential attachment algorithm. We note that the comparison is heavily dependent on our implementation of the algorithms, and that we implemented the algorithm due 12 Algorithm 3: Shapley Value Closeness Interaction Index. 1 for u ∈ V do prev d ← largest distance in distances[u]; 2 3 Nod>[prev d ] ← V −distances[u].size(); 4 N od≥[prev d] ← V −distances[u].size(); 5 for (v, d) ∈ distances[u] do 6 7 8 9 10 if d 6= prev d then N od>[d] ← N od≥[prev d]; N od≥[d] ← N od≥[prev d]; prev d ← d; N od≥[d] ← N od≥[d] + 1; prev d ← largest distance in distances[u]; 11 12 MC − ← 0; 13 for (s, d) ∈ distances[u] do 14 15 16 17 18 19 20 if d 6= prev d then MC − ← MC − + prev d ← d; f (prev d ) N od<[prev d]−1 − f (prev d) N od≤[prev d]−1 ; for (t, dt) ∈ distances[u] do d ← max(d, dt); MC + ← f (d) II[s, t] = M C− − M C+; N od≤[d]−1 ; to Szczepanski et al. [31] with the benefit of our restricted Dijkstra algorithm. We note that although our algorithm is significantly faster given a sparse network or low radius k, due to the more complicated nature of our algorithm it actually becomes somewhat slower given a high enough Vk. This is because our algorithm performs more complicated operations, which cannot be expressed by its asymptotic complexity alone. 4 Empirical Evaluation In this section, we compare our generalised closeness Shapley interaction index to four other state-of-the-art link prediction methods from the literature on 11 real-life networks. 4.1 Setting & Datasets We compare our algorithm (referred to as Shp. Cls.) to the Shapley k-degree interac- tion index [31], to k-Common Neighbours [31], and to the SRW and LRW algorithms [21]. We briefly introduce these algorithms below: 13 V 500 400 300 200 100 k 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 Vk 3.788 18.2011 65.1542 3.785 17.9544 57.734 3.78 17.1246 60.0592 3.77 15.5977 46.0083 3.74 12.0278 30.4716 Algorithm 3 3.153 17.417 106.436 2.331 12.295 70.226 1.669 9.199 50.777 1.053 5.517 26.046 0.476 2.324 8.147 Szczepanski et al. [31] 21.789 32.648 107.116 16.412 24.916 72.582 10.096 15.626 49.086 6.169 8.668 25.923 2.874 3.416 8.757 Table 1: Average running time (in milliseconds) of Algorithm 3 compared to Szczepan- ski et al. [31] for 1000 random PA graphs using the parameters m0 = 3 and m = 2. • Shapley k-Degree Interaction Index (Shp. Deg.): This similarity measure is equivalent to our measure with the parameter f (d) = 1 for d ≤ k and f (d) = 0 otherwise. • k-Common Neighbours (CN): According to this measure, which is used to rank undirected, unweighted graphs, the rank of every non-existing edge between a pair of nodes is the number of common k-neighbours between the two nodes. Let Ek(v) = {u : v 6= u and dist (v, u) < k}. k-Common Neighbours, then, is defined as fol- lows: CN k(u, v) = Ek(u) ∩ Ek(v) . • Local Random Walk (LRW): This measure ranks the similarity of nodes based on the concept of a random walk. Assume that at time step t = 0 a walker starts at node u. In other words, there is 100% probability that the current node is u at time step t = 0. At any other time step, the walker can visit any of the neighbours of the current node with equal probability. Denote by Puv(t) the probability that a walker that started at u is at node v at time step t. LRW, then, is defined as follows: LRW k(u, v) = E(u) 2E Puv(k) + E(v) 2E Pvu(k) • Superimposed Random Walk (SRW): This measure is considered by the authors to be a more advanced version of LRW. It is defined as the sum of all LRW measures 14 V 500 400 300 200 100 k 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 Vk 5.184 38.5843 158.143 5.18 34.162 139.181 5.1733 33.2759 133.982 5.16 26.6135 88.1525 5.12 22.4189 65.1413 Algorithm 3 4.14 39.503 360.747 3.437 27.707 251.65 2.329 21.42 160.85 1.397 11.172 77.701 0.691 4.253 16.191 Szczepanski et al. [31] 39.241 66.001 318.472 25.969 45.686 206.952 18.799 31.384 140.103 10.756 17.757 75.709 5.189 6.685 16.797 Table 2: Average running time (in milliseconds) of Algorithm 3 compared to Szczepan- ski et al. [31] for 1000 random PA graphs using the parameters m0 = 5 and m = 3. from time step 0 to time step k. Formally, we have: SRW k(u, v) = LRW t(u, v) k Xt=0 An important facet of our analysis is that whereas, as far as we are aware, the anal- ysis of quasi-local similarity measures in the literature has focused on the performance of algorithms given an optimal choice of k, there is no analysis on the impact of a suboptimal k on the algorithms. To combat this, we chose to compare all algorithms using k values of 1, 2 and 3. For the datasets we evaluated, we found that none of the methods significantly benefited from a higher k value (in fact, in most cases a higher value was detrimental), but comparing these 3 values was sufficient to highlight the differences between the methods. In order to compare the methods, we take 11 networks and randomly remove 30% of the edges from each of them. Next, we rank non-existing edges within the net- works (including those that were removed) according to each algorithm. We use the area under the curve (AUC) and precision to compare the results. We repeat this process 1000 times for all networks, methods and parameters k and present the av- erage AUC and precision in Tables 4, and 5, respectively. The networks that we used to evaluate the algorithms on2 are as follows: Youtube 20 and Amazon 100 [19], Football [13, 5], Taro [16, 28, 35], Jazz [14, 35], Zachary [40, 35], and Dolpins citekonect:dolphins,konect:2017. 2All datasets except Polbbokos are available at http://konect.uni-koblenz.de/networks/ [35], https://snap.stanford.edu/data/ [19], or http://vlado.fmf.uni-lj.si/pub/networks/data/ [5] 15 • Youtube 20: A network of users belonging to the 20 top groups in the SNAP dataset from the popular video-sharing website Youtube [19]. Connections between users indicate friendship between their user accounts. Link prediction can predict friend- ships between users whose user accounts are not formally connected as friends on the website. • Amazon 100: A network of products from the 100 top product categories in the SNAP dataset from the Amazon online store website. Connections between products were mined using the "Customers Who Bought This Item Also Bought" feature [19]. Link prediction methods can be used to discover new product associations and therefore improve the impact of the recommendation service. • US AIR: A network of airports in the USA and their connections [5]. Link prediction can be used as a method of predicting up and coming flight connections. • Football: A network of college football teams [13, 5]. Edges represent matches between the teams. • Taro: A network of gift-giving (taro) between households in a Papuan village [16, 28, 35]. • Jazz: A collaboration network of jazz musicians from 2003 [14, 35]. Edges indicate that two musicians performed together in a band. • Zachary: A friendship network of the Zachary karate club [40, 35]. • Surfers: A network of the interpersonal contacts of windsurfers in southern Califor- nia in the fall of 1986 [12, 35]. • Dolphins: A network representing a community bottlenose dolphins off Doubtful Sound and their associations observed between 1994 and 2001 [22, 35]. • Terrorists: The network of suspected terrorists who orchestrated the 2004 Madrid train bombing [18, 35]. A connection between two terrorists indicates that they communicated with each other. • Polbooks: This network represents books about politics sold through Amazon. Two books are connected if they were frequently co-purchased [39]. This dataset was kindly provided by [33]. We present some of the characteristics of the networks in Table 3. 4.2 Results In all but the Zachary network (where LRW 3 achieved the best result), our closeness Shapley interaction index achieved the best AUC, and in all but the Football network (where the simplest common neighbour algorithm with a radius of 1 achieved the best result) our algorithm achieved the best precision. Even in these two networks, how- ever, the comparative advantage of other methods was marginal. Interestingly, in the 16 Dataset V E Youtube 20 436 1384 Amazon 100 433 2014 Football 115 1226 Taro 22 78 Jazz 198 5484 Zachary 32 156 Surfers 43 672 Dolphins 62 318 Polbooks 105 822 k 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 Average Vk with 30% edges randomly removed 3.22018 16.8829 40.7019 4.25173 6.39215 6.81899 8.46087 34.3531 87.2797 3.45455 7.18136 11.602 20.3838 113.99 177.578 4.27647 14.1438 22.6532 11.9302 38.1082 42.939 4.58065 13.7555 26.2656 6.86667 28.5871 54.9784 Table 3: The networks' characteristics. 17 Dataset Youtube 20 Amazon 100 US Air Football Taro Jazz Zachary Surfers Dolphins Terrorists Polbooks k 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 Shp. Cls. 61.351 Shp. Deg. 61.351 70.016 66.896 92.554 96.961 96.992 92.94 91.591 91.285 81.361 82.861 81.291 59.282 51.26 48.993 95.836 94.497 94.995 65.883 67.76 67.842 82.091 81.362 81.825 71.397 77.142 76.816 89.573 88.992 88.469 83.795 87.898 87.515 69.723 66.527 92.554 96.914 96.99 92.94 88.693 84.295 81.361 80.392 54.998 59.282 49.354 44.516 95.836 84.4259 74.376 65.883 63.607 62.803 82.091 69.836 52.137 71.397 76.716 74.841 89.573 85.685 78.282 83.795 85.828 81.134 CN 61.102 69.175 65.898 92.466 96.875 96.834 91.654 85.598 83.885 81.382 77.99 53.042 59.087 42.494 40.734 94.412 80.361 72.735 63.412 59.996 60.997 80.668 68.69 52.131 71.493 74.67 71.378 88.173 79.728 75.632 83.0612 83.379 79.551 SRW 58.75 63.561 62.391 74.426 91.641 92.031 86.436 91.695 91.420 67.18 77.559 76.832 48.41 48.662 45.985 84.561 90.442 89.434 54.199 66.065 67.078 58.715 66.917 65.899 62.996 72.7849 72.618 68.404 82.872 83.128 73.511 83.629 83.741 LRW 58.75 63.626 62.613 74.426 91.594 91.937 86.436 91.801 90.827 67.18 78.423 74.938 48.41 49.17 44.04 84.561 90.73 85.352 54.199 67.447 68.351 58.715 69.018 63.69 62.996 73.160 72.235 68.404 84.334 82.86 73.511 84.643 83.301 Table 4: Average AUC (best result indicated in gray). 18 Data Set Youtube 20 Amazon 100 US Air Football Taro Jazz Zachary Surfers Dolphins Terrorists Polbooks k 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 Shp. Cls. 9.23527 8.73816 9.37343 60.594 60.988 60.865 53.8612 49.186 50.9319 40.856 40.546 40.104 15.9455 15.2364 12.9273 63.697 60.812 62.261 24.487 19.387 20.587 49.378 49.287 49.391 18.447 20.232 19.728 65.9319 64.4972 64.8903 29.367 29.739 Shp. Deg. 9.23527 3.22899 5.70435 60.594 60.587 64.735 53.8612 37.0044 27.8438 40.856 20.489 3.3776 15.9455 11.4091 4.00909 63.697 28.051 19.901 24.487 9.0522 13.974 49.378 33.981 25.035 18.447 18.002 11.355 65.9319 41.8264 28.5861 29.367 22.363 CN 6.11643 1.35217 4.96667 58.1 49.064 36.161 45.1463 34.402 28.8824 41.105 17.596 3.1885 12.9455 3.8664 3.12727 57.666 24.832 18.588 15.544 7.5696 13.778 47.155 33.552 25.052 20.753 12.172 9.7085 55.8806 35.7958 28.5806 26.664 21.186 SRW 4.17198 5.58599 6.82899 49.129 57.1358 57.443 41.0411 47.1418 47.0859 21.958 28.272 28.52 14.1636 13.7182 12.4273 36.83 42.33 40.858 10.5652 15.178 17.704 26.213 30.671 30.424 13.879 15.975 14.977 26.1722 37.4875 39.3431 16.884 20.049 LRW 4.17198 7.39179 7.91884 49.129 58.59 58.256 41.0411 48.3915 44.7281 21.958 32.802 26.277 14.1636 10.7909 7.73636 36.83 42.244 36.682 10.565 20.096 19.913 26.213 33.475 28.723 13.879 16.515 15.496 26.1722 45.5889 39.0875 16.884 22.404 29.899 15.115 13.077 20.767 20.427 Table 5: Average precision (best result indicated in gray). 19 Football and Dolphins networks the quality the AUC of our method increased when k was raised from 1 to 2, however the quality of the Shapley k-degree interaction index fell. We attribute this to the fact that the latter algorithm over-stresses the importance of second- and third-order relationships. For precision, we see this phenomenon in the Amazon 100, Dolphins, and most prominently Surfers and Polbooks (where our rank- ing was slightly improved, but the Shapley degree ranking decreased by approximately 24% and 14%, respectively) networks. In general, we note that the quality of all algorithms tends to fall when the k value is too high. It seems that the Shapley value closeness measure is very resilient to this phenomenon. Even in cases when the quality of SRW and LRW does not fall as much, they produce worse results at any k value, making this irrelevant. In fact, the results of both algorithms given any k were worse than random in the Taro network. This network seems especially difficult, with many of the results being worse than random. We also note that our algorithm is -- generally -- more resilient than LRW and SRW when choosing a k value that is too low. We see that the Shapley degree interaction index and common neighbours are the most likely to under-perform given a high k value. In fact, this can decrease the AUC of both measures by nearly 30% (as seen in the Surfers network), and precision by approximately 40% (in the case of the Jazz and Football networks). Given this, it is difficult to recommend these algorithms as quasi-local link prediction methods, given that providing them with too much information (i.e., a k parameter that is too high) can result in a ranking that is little better than random. Although it is possible to estimate this parameter when using these methods, there is no way to know whether the parameter is too high, potentially dramatically decreasing the effectiveness of the measure. Finally, we note that whereas SRW is generally viewed as being superior to LRW, it is LRW that usually achieves the better result in our experiments when each algorithm is given its own, respective optimal paramter k. We note, however, that given the same k for a high value of k, it is usually SRW that is superior. 5 Conclusions and Future Work We developed a new game-theoretic quasi-local algorithm for link prediction that is based on generalised closeness centrality. Our approach achieves competitive results when compared to the state-of-the-art, especially given a suboptimal radius, k, within which to query for similarities between nodes. We are particularly keen on two future research directions. First, we aim to study a variable radius for different pairs of nodes. It goes to reason that if a different radius is required to achieve the optimal result in different networks, perhaps various sections of the network (such as connected components) should also be studied with a different radii. Moreover, other group centrality measures may prove to be even more effec- tive when paired with the interaction index in predicting links between nodes. Group betweenness centrality [10, 32], for example, has not been studied for this purpose. We are also keen on studying how resilient the game-theoretic link prediction algo- rithm proposed in this paper is to strategic manipulation by an evader who purposefully 20 attempts to hide her links. A number of such studies have been recently proposed in the literature [38, 41, 42, 7]. Interestingly, in a similar line of research on evading detec- tion by centrality measures [37, 36], it has been shown that game-theoretic centrality measures [34, 29, 25] are more difficult to evade than the conventional ones [3]. We believe the same will be the case 6 Acknowledgements This paper was supported by the Polish National Science Centre grant DEC-2013/09/D/ST6/03920. Michael Wooldridge was supported by the European Research Council under Ad- vanced Grant 291528 ("RACE"). References [1] B. K. Alshebli, T. P. Michalak, O. Skibski, M. Wooldridge, and T. Rahwan. A measure of added value in groups. ACM Transactions on Autonomous and Adap- tive Systems (TAAS), 13(4):18, 2019. [2] A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. [3] M. Baranowski and A. G´orski. New heuristic for hiding vertices in a social net- work. Master Thesis, University of Warsaw, 2018. [4] N. Barbieri, F. Bonchi, and G. Manco. Who to follow and why: link predic- tion with explanations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1266 -- 1275. ACM, 2014. [5] V. Batagelj and A. Mrvar. Pajek datasets. http://vlado.fmf.uni-lj.si/pub/networks/data/, 2006. [6] G. Chalkiadakis, E. Elkind, and M. Wooldridge. Computational Aspects of Coop- erative Game Theory. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan & Claypool, 2012. [7] J. Chen, Z. Shi, Y. Wu, X. Xu, and H. Zheng. Link prediction adversarial attack. arXiv preprint arXiv:1810.01110, 2018. [8] X. Deng and C. Papadimitriou. On the complexity of cooperative solution con- cepts. Mathematics of Operations Research, 19(2):257 -- 266, 1994. [9] E. Dijkstra. A note on two problems in connexion with graphs. Numerische Mathematik, 1(1):269 -- 271, 1959. [10] M. G. Everett and S. P. Borgatti. The centrality of groups and classes . Journal of Mathematical Sociology, 23(3):181 -- 201, 1999. 21 [11] L. Freeman. Centrality in social networks: Conceptual clarification. Social Net- works, 1(3):215 -- 239, 1979. [12] L. C. Freeman, S. C. Freeman, and A. G. Michaelson. On human social intelli- gence. J. of Social and Biological Structures, 11(4):415 -- 425, 1988. [13] M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the national academy of sciences, 99(12):7821 -- 7826, 2002. [14] P. M. Gleiser and L. Danon. Community structure in jazz. Advances in Complex Systems, 6(4):565 -- 573, 2003. [15] M. Grabisch and M. Roubens. An axiomatic approach to the concept of interac- tion among players in cooperative games. International Journal of Game Theory, 28(4):547 -- 565, 1999. [16] P. Hage and F. Harary. Structural Models in Anthropology. Cambridge University Press, 1983. [17] J. A. Hanley and B. J. McNeil. The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology, 143(1):29 -- 36, 1982. [18] B. Hayes. Connecting the dots. can the tools of graph theory and social-network studies unravel the next big plot? American Scientist, 94(5):400 -- 404, 2006. [19] J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset col- lection. http://snap.stanford.edu/data, 2014. [20] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social net- journal of the Association for Information Science and Technology, works. 58(7):1019 -- 1031, 2007. [21] W. Liu and L. Lu. Link prediction based on local random walk. EPL (Europhysics Letters), 89(5):58007, 2010. [22] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson. The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behavioral Ecology and Sociobiology, 54:396 -- 405, 2003. [23] L. Lu and T. Zhou. Link prediction in complex networks: A survey. Physica A, 390(6):11501170, 2011. [24] P. T. Michalak, K. V. Aaditha, P. L. Szczepa´nski, B. Ravindran, and N. R. Jen- nings. Efficient computation of the shapley value for game-theoretic network centrality. Journal of Artificial Intelligence Research, 46:607 -- 650, 2013. [25] T. P. Michalak, T. Rahwan, O. Skibski, and M. Wooldridge. Defeating terrorist networks with game theory. IEEE Intelligent Systems, 30:53 -- 61, 2015. 22 [26] T. P. Michalak, T. Rahwan, P. L. Szczepa´nski, O. Skibski, R. Narayanam, M. J. Wooldridge, and N. R. Jennings. Computational analysis of connectivity games with applications to the investigation of terrorist networks. In F. Rossi, editor, Proceedings of the Twenty-Third international joint conference on Artificial In- telligence (IJCAI'13), pages 293 -- 301. AAAI Press, 2013. [27] G. Owen. Multilinear extensions of games. Management Science, 18(5):P64 -- P79, 1972. [28] E. Schwimmer. Exchange in the Social Structure of the Orokaiva: Traditional and Emergent Ideologies in the Northern District of Papua. St. Martin's Press, 1973. [29] O. Skibski, T. P. Michalak, and T. Rahwan. Axiomatic characterization of game- theoretic centrality. Journal of Artificial Intelligence Research, 62:33 -- 68, 2018. [30] O. Skibski and J. Sosnowska. Axioms for distance-based centralities. In Thirty- Second AAAI Conference on Artificial Intelligence, 2018. [31] P. L. Szczepanski, A. S. Barcz, T. P. Michalak, and T. Rahwan. The game- theoretic interaction index on social networks with applications to link prediction and community detection. In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015, pages 638 -- 644, 2015. [32] P. L. Szczepa´nski, T. P. Michalak, and T. Rahwan. Efficient algorithms for game- theoretic betweenness centrality. Artificial Intelligence, 231:39 -- 63, 2016. [33] P. L. Szczepanski, T. P. Michalak, T. Rahwan, and M. Wooldridge. An extension of the owen-value interaction index and its application to inter-links prediction. In ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands - Including Prestigious Applica- tions of Artificial Intelligence (PAIS 2016), pages 90 -- 98, 2016. [34] M. K. Tarkowski, P. L. Szczepa´nski, T. P. Michalak, P. Harrenstein, and M. Wooldridge. Efficient computation of semivalues for game-theoretic network centrality. Journal of Artificial Intelligence Research, 63:145 -- 189, 2018. [35] University of Koblen-Landau. KONECT. http://konect.uni-koblenz.de/networks/, 2017. [36] M. Waniek, T. P. Michalak, T. Rahwan, and M. Wooldridge. On the construc- tion of covert networks. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pages 1341 -- 1349. International Foundation for Autonomous Agents and Multiagent Systems, 2017. [37] M. Waniek, T. P. Michalak, M. J. Wooldridge, and T. Rahwan. Hiding individuals and communities in a social network. Nature Human Behaviour, 2(2):139, 2018. 23 [38] M. Waniek, K. Zhou, Y. Vorobeychik, E. Moro, T. P. Michalak, and T. Rahwan. How to hide one's relationships from link prediction algorithms. Scientific re- ports, 9(1):1 -- 10, 2019. [39] Q. Wu, X. Qi, E. Fuller, and C.-Q. Zhang. "follow the leader": A centrality guided clustering and its application to social network analysis. The Scientific World Journal, 2013, 2013. [40] W. W. Zachary. An information flow model for conflict and fission in small groups. Journal of anthropological research, 33(4):452 -- 473, 1977. [41] K. Zhou, T. P. Michalak, and Y. Vorobeychik. Adversarial robustness of similarity-based link prediction. arXiv preprint arXiv:1909.01432, 2019. [42] K. Zhou, T. P. Michalak, M. Waniek, T. Rahwan, and Y. Vorobeychik. Attacking similarity-based link prediction in social networks. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, pages 305 -- 313. International Foundation for Autonomous Agents and Multiagent Sys- tems, 2019. 24
1905.09923
1
1905
2019-05-23T21:01:41
An Integrated Model for User Innovation Knowledge Based on Super-network
[ "cs.SI" ]
Online user innovation communities are becoming a promising source of user innovation knowledge and creative users. With the purpose of identifying valuable innovation knowledge and users, this study constructs an integrated super-network model, i.e., User Innovation Knowledge Super-Network (UIKSN), to integrate fragmented knowledge, knowledge fields, users and posts in an online community knowledge system. Based on the UIKSN, the core innovation knowledge, core innovation knowledge fields, core creative users, and the knowledge structure of individual users were identified specifically. The findings help capture the innovation trends of products, popular innovations and creative users, and makes contributions on mining, and integrating and analyzing innovation knowledge in community based innovation theory.
cs.SI
cs
An Integrated Model for User Innovation Knowledge Based on Super-network Xiao Liao1, Zhihong Li1, Yunjiang Xi1, Haibo Wang2, Kenneth Zantow*3 1 School of Business Administration, South China University of Technology, 510641 GZ China 2 A.R.Sanchez, Jr. School of Business, Texas A&M International University, 78041 TX USA 3 College of Business, University of Southern Mississippi, 39560 MS USA i.e., User Innovation Knowledge Super-Network (UIKSN), Abstract:Online user innovation communities are becoming a promising source of user innovation knowledge and creative users. With the purpose of identifying valuable innovation knowledge and users, this study constructs an integrated super-network model, to integrate fragmented knowledge, knowledge fields, users and posts in an online community knowledge system. Based on the UIKSN, the core innovation knowledge, core innovation knowledge fields, core creative users, and the knowledge structure of individual users were identified specifically. The findings help capture the innovation trends of products, popular innovations and creative users, and makes contributions on mining, and integrating and analyzing innovation knowledge in community based innovation theory. Keywords: User innovation knowledge, super-network, integrated model 1. Introduction innovations Users are highly innovative and often innovate or create new products because the users are more conscious about their needs. Nowadays, more and more companies are trying to follow the trend to adopt users and their new product development (NPD). As the internet facilitates the the production of user generated content (UGC), opinions and innovations created by users about products are being shaped in real time amongst users through online communities. interaction between users their and in As many scholars have indicated, user innovation, which is also defined as customer innovation, open innovation and co-creation, plays a significant role in the process of product innovation and NPD. In terms of online community based user innovation, prior research has provided abundant findings on the co-creation value of users and on how to motivate user innovation and user interaction *Corresponding Author: Email:[email protected]; [email protected] 1 online Online communities. user in communities are becoming promising sources of user innovations [1-3] which leads to the following research question:" What are the innovations and who are the innovators?" Recent studies mainly emphasize capturing the innovative ideas [4-6] and interactions among users in communities [7-9]. to submit and share As more and more innovative users gathered in online innovation communities, users began to share what they have developed or innovated through their postings rather than just providing innovative ideas. Some communities even have a special space for these users their innovations. However, many firms do not very have the innovations lack of systematic standards to evaluate them. For example, what are the main focuses and fields of the innovations? What are the innovative posts and who are the creative innovators related to the hot innovations? While the prior research innovation communities on identifying the motivation of users' innovation clear and suffer has mainly from a focused criteria online judge to on user [10-11], there is limited research identifying and integrating user innovation knowledge in a systematic view. in our user study online attempts Therefore, to construct an integrated model of innovation knowledge innovation communities. Through integrating the users, innovation posts, and innovation knowledge, our study constructs a systematic knowledge integration model that offers a practical tool to identify important or popular innovation knowledge, knowledge fields, the users and posts related to these innovations. We first identify some online innovation communities as the empirical settings to mine all the posts, users and the relations. We then mine the innovation knowledge keywords from each post. Knowledge mined from posts can be fragmented and lack contextual meaning, which consequently may result in incomplete and fragmented analysis of user innovation activities and decrease the integrity of the measures. To avoid this fragmentation, our research will use the super-network model as an integrated tool. online innovation among users, Super-network was defined as "the networks above and beyond the existing networks" by Nagurney [12]. It can be used to describe and analyze the structure of systems composed of multi-type or multi-tie networks. communities, In the relations innovation posts, innovation knowledge and users' interactions frame the innovation knowledge system which is composed of the four elements and their multi-tie Consequently, super-network is not only used to integrate the fragmented knowledge but also construct and analyze the knowledge system in online innovation communities. relations. The objective of this research is therefore (1) to analyze the different elements and the relations in an online innovation community knowledge an system and construct 2 by user analyzing of innovation integrating model to construct a novel knowledge, and (2) the super-network model innovation knowledge in characteristic of online communities. The research contributes to the community-based innovation theory for mining innovation knowledge knowledge system. user community integrating and in a 2. Theoretical Background 2.1 User Innovation Communities The importance of users as a valuable source of innovation has been emphasized from 1980s and then gained much more attention in the past ten years [13-14]. and how to support users Prior research on user innovation mainly focused on how to motivate users to innovate [15-20] as innovators [21-22]. Various ways have been used to invite users during the innovation process, such as providing them with toolkits [23]or virtual customer environments [24], talking to lead users [25], and establishing online user communities [26]. Recently, with more and more innovative users gathered in online communities, user innovation in online communities has been receiving more and more attention from researchers [10, 27-30]. and cooperation Online user innovation communities are groups of individuals who share similar interests and needs and be seen as valuable sources of innovation because of their product experience [31]. The innovation behavior of communities members is influenced by their innovation willingness, perceived control and group norm factors [32](Zhang, 2012), and highly motivated by the prospect of improvements in their use of the product [33]. To be seen as a hobbyist and be recognized by the firm are two important motivations community. Members tend to reveal and share their ideas and innovations in communities, join the firm's domain, and in process innovation engage [34]. Community members intend to gain high reputations in the eyes of others such as colleagues and other community members or related companies, so the chance to exchange ideas and experiences and to gain reputation are also the main motivations for community members [35-38]. ideas innovation about user from online Dong & Wu(2015)analyzed two online community-enabled user capabilities: ideation capability in collecting user-generated potential innovation innovation communities, and implementation capability ideas in for innovation introducing developed user innovation communities. They found that ideation capability actually does not influence firm value, whereas implementation capability increases firm value [39]. user-generated and development innovation selecting online via user Since online innovation communities have been drawing an increasing number of attention from academic scholars and firms, these communities have become a vital source of product and service innovations and have helped innovation-related knowledge to blossom[40-42]. and innovative users Therefore, the innovation knowledge and innovative users in order to improve the firm's implementation capability of online user is needed. 2.2 Knowledge Super-network an approach to integrate innovations Nagurney and Dong(2002) defined super-network as being "above and beyond" the existing network, and can be used to solve intertwined the decision problem in multi networks[12]. Other regarded networks which as hyper-graphs as a super-network. researchers described can be Since the concept of the super-network can describe the structure of complex network system more the and reflect accurately, 3 of In prior share spread, network between properties knowledge, and networks and interaction and impact between the networks, it provides a new way and useful tool to study complex network system and gain gradual attentions from researchers. Knowledge super-network research mainly focuses on the the study inter-relations in knowledge transfer management. the research, Knowledge Super-Network(KSN) models are comprised of three types of nodes and six types of edges, reflecting persons, material storage media, and the complex interrelations between them. The KSN model can describe complex compositions and the structure of organizational knowledge systems [43]. Yu (2008) constructed a super-network model of in which organizational personnel there were three types of networks: the organization personnel network, the material carrier network and the knowledge network [44]. a purposed super-network model organizational knowledge sharing network based on a knowledge network and a social network [45]. Ni et.al (2013) constructed a super-network model of Wiki ontology based on the concepts and their multi relations [46]. Wang (2015) presented an improved knowledge diffusion hyper-network (IKDH) model and found out that the diffusion speed of IKDH model is 3.64 times faster traditional knowledge diffusion (TKDH) model [47]. (2011) of than that of training, Liao et.al innovation communities Based on the prior researches, we present an improved super-network model of online user (UIWKSN) based on the community's interactions and the characteristics of user innovations. 3. The Super-network Model of User Innovation Knowledge System In the opinion of system science, users' innovation activities can be viewed as an innovation is system which knowledge four elements: users, posts, composed of innovation innovation knowledge fields. The elements and their relations can be expressed as fig.1: knowledge and it can be seen that Fig. 1 Composition of UI Knowledge System In fig.1, the UI knowledge system is composed of 4 kinds of elements and 6 relations, which can be described as a super-network model: ( QEV UIKSN  The expression of each element and (1) ) , , relation is defined and explained as: i j f f  u 1 2 1 2 2 2 , , , , , , , , , , f f , , , , , ) ( kp  { } fp   k k  { } { E E p  F V P F  bf  ck mp E ku  E kk  E fu  , p 1 set , E fk  of u K of } nu P ) vertices, E edges, }1 ( E  pu  different {( E u  p , U types , , uu  1 users, the ,  denotes in different denotes the set of which U  community } {  of denotes denotes the set of posts; K innovation knowledge points mining from posts; denotes the set of innovation knowledge fields integrated from knowledge points above. , , E types ) p  den otes in which denot es the relation set of users and posts, in which iu is the author u of post den otes the relation set of posts and innovation knowledge in the which post knowledge ip point de f notes the relation set of posts and innovation knowledge fields, in which 1),( means that the post is related to the knowledge innovation field ; den E 1),( p k contains {( E  f means the )  means user 1),(  ),(  ),(  ),(  ),( points, p jk ; jp ;  k }1 }1 }1 ip ) jf )  {( {(  E p p  p p p p k k k k f , f f , , f p  p k i j j i j i j i j i j i f i j i j i j i j 4 i j i j i j i j f f i j i j i j k k   , f , f f f f k k k k k   ;  if {(  ) ik }1 in f to {( that ),( fields,  ),( the )  1),( means the field 1),( and otes the relation set of knowledge points and knowledge which means the knowledge point 1),( f k belongs knowledge ik field }1 jf E denotes the relation set of knowledge points, in which the means k jk co-exist in the knowledge point posts; same denotes the E affiliation relation set of innovation fields, in which is the direct subordinate to field ( de notes the weights of vertices and edges, in denotes the set of which knowledge points' weight, ( ) ik ; denotes the weight of the knowledge point of denotes set UQ knowledge fields' weight, denotes the weight knowledge denotes the set of field if )} knowledge fields' weight, denotes the ( knowledge weight field if deno ,1 tes the set of links' weights of knowledge points. kEWFQ in which UQKQ of ({ kw of ({ q  EW jf ), ikq iuq FQ , nm the KQ }, l iu ) )} ik if Q kk  if ))  ), ), )} k   q  { ; ; ) ( .  ( ( ( ( ) ( ) q { ( ) ( , m ( ) ( n  k Therefore the UIKSN model can be expressed as: ( QEV  , UIKSN ,  k  ), EWFQUQKQ , EFKPU ( p ), ( ( p ( E ), ( ) , , , ,  u , E f  f , E k  k  f k )) (2) 4. The Construction of UIKSN The construction of UIWKSN includes 4 steps: (1) Data collection: we use the software of LocoySpider to collect the data including users and their innovation posts in the selected user innovation community. The data of innovation posts is composed of the post titles, content, authors, posting time, reviewing and replying numbers. (2) Content mining: first, we encode authors and posts to get the user set of U and posts set of P; second, we identify word segments for each post to get keywords to set of K after develop the knowledge preprocessing third, we calculate the frequency of each keyword and get the set of knowledge weights Q. keywords; the (3) Construction of knowledge network: we construct a weighted knowledge network (WKN) based on the knowledge set, the user attention degree set and the co-occurrence relations between knowledge points; then based on the WKN model, knowledge is clustered into several groups (each group represents a knowledge field) that weighted knowledge is constructed. clustering network (WCN) (4) Construction of super-network: we relations between different calculate elements the weighted knowledge super-network of user innovation community (UIKSN). the and construct 5. The Analysis of UIKSN in Xiaomi Community 5.1 Data Mining in Xiaomi community setting is Our empirical the Xiaomi community which was created by the Xiaomi company aiming to provide a platform where the brand's most hardcore users, dubbed "Mi fans," meet to discuss gadgets, and share knowledge. The Xiaomi community is a famous site of user innovation communication in China. In the community, there is a special section that allows users to present their We use the innovations software LocoySpider 8.2 to collect all the posts released before April 29, 2015. After preprocessing of all the posts, a total of 16741 posts were found and we determined that 5715 of those posts to be excellent posts. for products. Considering the quality of posts, we use excellent posts and 30% of the non-excellent posts in our research. In Xiaomi Community, the excellent posts are identified and marked by their Community staffs. The total number of the posts used in this research is 9024, with 3824 users in them. First, the posts set (P) and the users set and pp 1 ,......, P  9024 p } 2 { , (U) were encoded as U  ,...... u ,{ uu 1 3824 } 2 . Second, the software of NLPIR was used to segment the content of each post and get at least 5 keywords for each post. Then we got the knowledge set (K) and their frequency set (Q(K)). According to the selection rule of high frequency words, we totally got 47 high frequency words as the hot keywords, with the lowest frequency of 200. The hot keywords is as table 2. 5.2 Construction of UIKSN The construction of UIWKSN is based Table 2. Hot Keywords and Their Frequency in Xiaomi Community Knowledge Freq. Knowledge Freq. Knowledge Freq. Knowledge Freq. Knowledge Freq. points Function System Files Set up Downloa Select App Computer 5 Links Networks points points 1264 Method 1154 Desktop Interface 891 Program 780 Games 708 707 Screen Data 658 Themes 643 564 Battery Mode 506 476 Support 468 Manage Picture 459 Icon 455 Time 437 430 Display Users 423 Test 413 399 Video Effect 368 points Input Intelligent Phone Operate Music Headset Password Memory Version Share 363 356 329 328 316 299 282 281 280 250 points Mobile Router Modify Package Service 248 Data Volume 244 243 241 233 231 231 230 227 225 Information 223 219 217 217 212 212 208 in on the construction of the WKN model knowledge level and the WCN model in knowledge field level. After integrating all the relations between each element and the WKN and WCN model, the UIWKSN in Xiaomi community can be constructed as followed: Fig 2. UIWKSN in Xiaomi Community (Part) In figure 2, the red circle nodes represent knowledge points; the purple rectangle nodes represent users; the green square nodes represent posts, and the blue triangle nodes represent knowledge fields. 6.The Analysis of Knowledge Integration Based on UIKSN 6.1 The Discovery and Integration of UI Hot Knowledge UI Hot Knowledge means the innovation knowledge in community. In WKN, it can be shown as the knowledge points with higher frequency. create most users that 1 )   ( { kqk i K The users and posts related to the hot  (3) , iq 0 }, n ,1 i i i i i b b a    ) ) { { p u i  (4) (5) ,1) k  i ,1 ) k  ( , kp  a ( , k u  knowledge ik can be expressed as: } 1K } 1K ( kP ( kU Then, according to the relations between knowledge points and the knowledge fields, we can also figure out the hot knowledge related fields. kL ( Let ( knowledge ) FL 0f these paths and k , i i , ik 0f ) to the cluster denote the path from the , and then the set of nodes in 0f represent the set represent k EL 0f ) ( , i 6 ik 0f f . Then ) ,  0 0f and ) can be expressed as: ( ), kEL of links between knowledge point field 0f ( kL i ( kL , ( kL i ( ( kFL clearly show the subordinate ik and the relations between hot knowledge knowledge field it belongs to. (6) f , )) ) f , , 0 0 i i i k k  ), i ( EV of The analysis innovation can also be done through the hot knowledge ik construction of ego super-network. ( kQV ), i ), ) i ( kV (7) ({ kV ( ( KSN Here, ( ( kUkP )} denotes the nodes set of users, posts and fields that related denotes the set of to knowledge links between the nodes in and QV denotes the set of weights of nodes and links in ikV EV FL ik ik ik ik )) V ), ; .  k ) ( ( ) ( ) ) ( ( ) i i i i i Based on the above analysis method, we chose 47 core knowledge points (see Table 2) as the hot innovation knowledge to construct the hot knowledge super-network in Xiaomi community was as followed: Fig 3. The Hot Knowledge sub-KSN in Xiaomi Community (Part) There are 3067 related users and 2816 posts with these 47 hot knowledge points. In this sub-graph, the size of the node's label represents the total contribution of each user in these 47 hot knowledge categories. So we can clearly figure out that user 479 and user 300 made the greatest contribution in these hot knowledge, followed by user 191, user 431 and user 433. Through the super-network, we can also find out the hot knowledge related posts of each user. If we want to know more about a single user or knowledge point, we can construct the ego super-network to have a deep analysis. Figure 4 is a ego super-network of the node "screen". The ego super-network was constructed by calculating the shortest path between the node "screen" and the related knowledge points, users, posts, and knowledge field. From figure 4, we can see that user 366 and user 7 made the greatest contribution in screen innovation, followed by user 191, user 269, user 479, user 535, user 413 and user 341. These users and their posts can be taken into consideration when the company is going to innovate the mobile's screen later Fig 4. Ego Super-network of "Screen" 6.2 The Discovery of Core Innovative Users of Community The core innovative users in community are the users who create and make great contribution to the core innovation knowledge in community. Through the UIWKSN, the core innovative users can be identified. ' ( ( ( { ),' ),' )}' (8) ( KW KWK EWKE First, we need to find out the core innovation knowledge which can be expressed as a sub-WKSN: ,' WKN  'K denotes the set of core innovation denotes the set of knowledge and nodes' weights. is the threshold value which is used to judge the core innovation knowledge. denotes the set of links between )' ( KE innovation knowledge core denotes the set of links' weights. K Here, ( EW and (9) kq 0q 0q )' )'   } { k ) ( ' j j 7 KE ( )'  {( k , k i ) k i j  ,' kK j  K }' (10) can construct and posts, we Based on the relations among WKN', the users sub-WKSN of core innovation knowledge super-network in the community. Then, the related users and posts of core innovation knowledge can be identified easily. ( ),' )' ),' ( WKSN E KE  ),' ( ( ),' ( ( K E K E K u ( ),' ))}' ( EWKW K ,' KUKPK E p ( K ),' ),' K E ( EW ( ( k )), { ),' p ),' p  K K p (  ' (    u u u k u  k p  k (10) The set of core knowledge related users is expressed as: {)' ku i ( j i j )    K }' q , kuq (11) KU Here, ( uq  jk , i k and (,1)' (,' , qu  i the core knowledge represent ) points; represent the related level of jk iu user is a threshold value which used to judge the core knowledge related users. 'q ; j j (,'  , kp b 'K related posts is: , kpq  The set of {)' ( Kkp KP  b 1q is also a threshold value which is Here, used to judge the core knowledge related posts. (12) (,1)  } 1q  ) b j j Based on the relations between the 47 core knowledge points and the related users and posts, the sub-WKSN can be constructed. Then, by setting the threshold value of the relations between core knowledge and users, we can clearly figure out the core innovative users in community (see fig. 5) Fig. 5 Sub-WKSN of Core Innovative Users (edges' weight higher than 15) In figure 5, the size of knowledge points represents the knowledge frequency in posts; the size of users' labels represents the total For example, contribution in these 47 core innovation knowledge points of each user; the size of edge between users and core knowledge points represents the users' contribution in each core knowledge point. Thus, we can clearly find out the main core users in the community. knowledge "function" and "system" have the similar word frequency, but the number of related users is far different. There are many more related users on the innovation of "system" than "function". Although there are few users on the innovation of "function", there are more users who create innovations on it more than once. Next, the frequency of the knowledge of "application" is about half of the frequency of "system", but the number of related core users who create innovations on it more than once is much more than "system", which implies that only some core users concentrate on the innovation of "application" and innovate it repeatedly. Furthermore, from this figure, we can also identify the users' main innovation knowledge. For example, users "479 " and "300" made the most contributions on the core knowledge, while their innovation focuses are different. User " 479" mainly focuses on the innovation of "program" and "system"; while user "300" mainly focuses on "function" and "theme". Therefore, through the sub-WKSN of the core knowledge, we can not only identify the core innovative users, but also identify their main focus on innovations. 6.3 The Discovery of Hot Innovation Fields of Community hot be constructed as the sub-WCN with higher cluster weights which is expressed as: innovation fields The can i i 1 2 ( ) , f i ) { q   if F ,1 FV }, c  ( fq denotes the set of knowledge fields and their knowledge points included in the field innovation (13) hot 8 ) . K if if (2 denotes the knowledge points , which and if directly or indirectly included in can be expressed as: (  (2 fK Based on the UIKSN, the hot innovation fields related users and posts can also be identified: (14) }1   { k k ) ) f , a a i i i j j i a a , f ) ) k k { p  (  (*)  The posts related to hot fields if : (2 }1 , fP p  The related users: (2 (*) fU  In order to analyze the hot innovation it can also be constructed to a ( pu  c {)  j (16) (15) , kp a j }1)  (*)  , fk a u , i j i fields, sub-WKSN: ( KSN f V Here, i ) (  f ({ fV i ) (  ), EV ( fP ( k ), ), i U QV ( f ( ), f )} i ( K (17) )) f i i i i de notes the nodes' set of related users, posts, fields to the field if denotes the set of in ; QV denotes the set of nodes and edges weights in relations ( if ; among ) if nodes EV if V if V . ( ( ) ) ) ( The sub-KSN can integrate all the related essences to the hot innovation fields that we can find out most of the useful information in these hot fields. In the UIWKSN of Xiaomi community, there are 8 innovation fields with 104 sub-fields in them. Here, we chose the fields "FA251" and "FA6" as the two hot innovation fields with the threshold of q . In these two hot fields, there are 3749 related users and 8931 related posts. Through the calculation of all these users' contribution on the two fields, we can identify the core innovative users in the hot fields. Figure 6 is the sub-KSN of hot innovation fields 90 innovative users whose contributions are the head 30% of the whole related users. community with in Xiaomi 10000 2  In figure 6, the size of the nodes' label represents the word frequency or the total contributions in the hot fields of each user. Therefore, we can clearly see that the core innovative users who made great contribution in hot fields include users "U479", "U4 31", "U433", "U447", "U878" and so on. such as users "U479", "U431", "U433" and "U300". Thus these users can be seen as the core innovative users in these two fields. 6.4The Integration and Analysis of Users' Self Innovation Knowledge 6.4.1 The User's Self UIKSN Model the f ), i k i ( ), i i k ( i i u  (  { The online communities gather a large amount of users who have different expertise. Through the UIKSN, we can construct the sub-KSN model for each user so that we can know more about his or her innovation knowledge structure. Based on the relations between U-F, U-P and U-K, the sub-WKSN of each user can be expressed as: , ( ( ( ), ) uK uFu u WKSN E k i i  ( ), ( ( ), ( ( uKWu E u u E E ku i f   ( ( )), ( ) ( ), u EW u EW uFW super-network sub-KSN is This including (user, posts, the innovation fields and innovation knowledge) in community's knowledge system which is helpful in user's and expertise when knowledge companies need to invite users to their innovation or NPD process. 6.4.2 The Construction of User's Self UIKSN Model a elements the structure identification u i ) i ))} (18) ), ), ku  i k  k i of 4 Based on the analysis of the above hot innovation knowledge and hot innovation fields, we found that user "U479" is one of the users who made the most contributions. Thus, we chose "U479" and the other randomly chosen user "U127" as the two subjects to construct their UIKSN model. Table 2 lists the two users' number of related posts, knowledge points and the innovation fields. Table 2 The Innovation Info of "U479" and"U127" Based on the basic information in table 2, the two users' UIKSN was constructed and shown User No. of P No. of K No. of F U127 U479 46 143 127 272 32 43 in figure 8 and 9. Fig. 6 The Sub-KSN of Hot Innovation Fields in Xiaomi Community Based on the sub-KSN of hot innovation fields, we can have a better understanding on the relations between the hot innovation fields and the related core innovative users through calculating the edges' weights between them, which implies the contributions each user made in the related fields. Figure 7 is the sub-KSN of hot innovation fields and the related users in which the threshold of edges' weight is 20. Fig. 7 The Sub-WKSN of Hot Innovation Fields and the Related Users (edges' weight higher than 20) In figure 7, we can see that user "U479" is the core innovative users in hot fields who made the most contributions in most of the hot fields such as "FG1", "FG2", "FF261" and "FE289". And among the hot fields, "FG1"has the most related users followed by "FE289" and "FG2". While the fields "FF261" and "FF91" have fewer related users but some of the users made repeat contributions on them 9 Fig. 8 The Self UIKSN of "U127" Fig. 10 The Core Innovation Knowledge Super-network of "U127" Fig. 9 The Self UIKSN of "U479" Fig. 11 The Core Innovation Knowledge on contributions Since the user "U479" had more posts, the self UIKSN is much more complicated than "U127". From the figures, we know that the main innovation fields of "U127" focused on "FG1", "FG2", "FE296" and "FD103" with the most knowledge "function", "system", "desktop", "icon" and "download"; while the main innovation fields of "FG2", "FF92", "FG1", "FE289" and "FE296" with the most knowledge "system", "program", "permission", and "management". "application", "files", focused on "FF261", contributions "download" "U479" on of the Through construction user's sub-UIKSN, we can have more specific analysis such as the user's core innovation knowledge, core innovation field. 6.4.3The Identification of User's Self Core Innovation Knowledge Based on the basic rule of high frequency words selection, the super-network of each user's core knowledge was constructed and drew as figure 10 and 11. 10 Super-network of "U479" related "FE296" the are and knowledge Figure 10 and 11 clearly show us the core innovation knowledge and core innovation fields of these two users. For example, the core innovation fields of "U127" are "FG1", core "FG2", innovation "function", "interface", "files", "design", "mode", "video" and so on; while the core innovation fields of "U479" "FG1", "FE296" and the related core innovation "backup", knowledge "permission", "clear", "space", "advertisement", "data" and so on. 6.4.4The Analysis of Ego UIKSN "program", "FF261", "screen", "FG2", "files", are are Besides the user's self UIKSN model, we can also construct the ego UIKSN model for each innovation knowledge, innovation field and innovation post to have a deep analysis. For example, the ego super-network of a user in a certain innovation field (see fig. 12-13); the ego super-network of a user in a certain innovation knowledge and the related posts (see fig. 14-15); the ego super-network of a in a user knowledge (see fig. 16-17). certain post and the related the knowledge "desktop" and "system". This ego UIWKSN also showed us related innovation field and the related posts. So if we want to know more details in this knowledge area, we can find the related posts. Fig. 12 The Ego UIKSN of "U127" in "FG2" Fig. 16 The Ego UIKSN of "U127" in "P2782" Fig. 13 The Ego UIKSN of "U479" in "FG2" From the analysis above, we know "FG2" is the core innovation field of users "U127" and "U479". But the figures 15-16 showed that the two users have different innovation focus on this field. For example, "U127" mainly focused on "files", "design" and "mode"; while "U479" mainly focused on "files", "clear", "screen" and "internet access". Fig. 14 The Ego UIKSN of "U127" in "Desktop" Fig. 15 The Ego UIKSN of "U479" in "System" Figures 14-15 showed us the two users' innovations on a certain knowledge such as 11 Fig. 17 The Ego UIKSN of "U479" in "P1613" Figure 16-17 showed us the two users' innovations in a certain post. In this ego UIKSN, we can easily identify the main knowledge in the post. For example, the innovation knowledge in "P2782" posted by "U127" are "function", "desktop", "download", "password" the innovation knowledge in "P1613" posted by "U479" "program", "application", "permission" and "information". "delivery"; while "system", and are 7. Conclusion innovation in two ways: This paper aims to provide an knowledge integrating method in online user innovation communities by constructing the UIWKSN model. It contributes to the existing literature on user (1) by analyzing the elements in communities, we integrate all the elements into a super-network model which provide a new tool for us to integrate the different relations between the elements and (2) by construction the UIKSN, it provides us with a more specific and deeper analysis on the hot and core innovation knowledge, knowledge fields and so on. that users proved process development The internet as an advanced information and communication medium has led to a large amount of valuable user generated innovation content in the online communities. Literature findings innovation knowledge and the related innovative users are valuable for the product innovation and the new product of companies. Users' innovations not only meet the needs of users but also imply the innovation trend of products. Therefore, how to find out the innovation knowledge created by users is very important for companies. The UIKSN model constructed in this paper helps to integrate and analyze the users' innovation knowledge in these communities. The hot and core innovation knowledge, innovation fields, the core innovative users and the related posts were identified and showed good in the empirical setting: Xiaomi community. Further research might try to focus on more different communities and consider more elements such as the interaction among users in the knowledge system. Acknowledgment: This work was supported by the National Natural Science Foundation of China under grant No.71371077 and No.71571073, China Postdoctoral Science Foundation under grant No.2016M602475. References [1] Morrison P.D., Roberts J.H., Midgley D.F..The nature of lead users and measurement of leading edge status[J]. Research Policy, 2004, 33(2): 351 -- 362 [2] Füller J., Jawecki G., MühlbacherH..Innovation creation by on-line basketball communities[J]. Journal of Business Research, 2007, 60: 60 -- 71 [3] Shin J., Shin H., Rao P.M..User innovation and 12 knowledge sourcing: The case of software[J]. Management Research, 2012, 23: 58 -- 70 financial of High Technology Journal [4] Füller J., Bartl M., EmstH.,et al. Community based innovation: how to integrate members of virtual communities into new product development[J]. Electronic Commerce Research, 2006, 6: 57 -- 73 [5] Füller J. Why consumers engage in virtual new product developments initiated by producers[J]. Advances in Consumer Research, 2006, 33: 639 -- 646 [6] Van Oost, E Verhaegh, S Oudshoorn. From innovation community to community innovation: user-initiated innovation in wireless Leiden. Science[J]. Technology & Human Value, 2009, 34(2),182-205 [7] Kohler T, Matzler K, Fuller J. Acatar-based innovation: using virtual worlds for real-world innovation[J]. 29(6): 395-407 Technovation, 2009, [8] Berthon P R, Pitt L F, McCarthy I, Kates SM. When clever: managerial approaches to dealing with creative customers[J]. Business Horizons, 2007, 50(1), 39-47. customer get [9] Sou-Chin Wu, Wen Chang Fang. The effect of idea community Technovation, 2010, 30: consumer-to-consumer generation relationships [J]. 570-581. interactions virtual brand in in [10] P M Di Gangi, M Wasko. Open Innovation in: W R King Through Online Communities, (Ed.), and Organizational Learning[M]. Springer Publishing Company, London, 2009: 206-206. Management Knowledge [11] T Schulze, M Indulska, D Geiger, A Korthaus. Idea assessment in open innovation: a state of practice[A], ECIS 2012 Proceedings, 2012: 149-149. [12] A, Dong Nagurney J. Super-networks: Decision-Making the Information Age[M]. Cheltenham: Edward Elgar Publishing, 2002. for [13] von Hippel E. Lead Users: A Source of Novel Product Concepts[J]. Management Science, 1986, 32(7): 691-706. [14] Lettl C, Herstatt C, Gemuenden H G. Users' contributions to radical innovation: evidence from four cases in the field of medical equipment technology [J]. R and D Management, 2006, 36(3): 251-272. [15] G R Foxall, J D Tieney. From CAP1 to CAP2: user-initiated innovation from the user's point of view [J]. Management Decision, 1984, 22(5): 3-15. [16] N Franke, S Shah. How communities support innovative activities: an exploration of assistance and security software[J]. Research Policy, 2003, 32: 157-178. [17] J Füller, K Matzler, M Hoppe. Brand community members as source of innovation[J]. Journal of Product Innovation Management, 2008, 25(6) : 608-619. [18] J Füller, H Mühlbacher, K Matzler, G Jawecki. Consumer empowerment through internet-based co-creation[J]. of Management Information Systems, 2010, 26(3): 71-102. Journal [19] K R Lakhani, E von Hippel. How open source software works: "free" user-to-user assistance[J]. Research Policy, 2003, 32: 923-943. Leveraging [20] J M Leimeister, M Huber, U Bretschneider, H Krcmar. sourcing: activation-supporting components in IT-based idea competitions[J]. Journal of Management Information Systems, 2009, 26(1): 197-224. crowd [21] B Douthwaite, J D H Keatinge, J R Park. Why promising technologies fail: the neglected role of user innovation during adoption[J]. Research Policy, 2001, 30:819-836. Leveraging [22] J M Leimeister, M Huber, U Bretschneider, H Krcmar. sourcing: activation-supporting components in IT-based idea competitions[J]. Journal of Management Information Systems, 2009, 26(1): 197-224. crowd [23] E von Hippel, R Katz. Shifting innovation to users via toolkits[J]. Management Science, 2002, 48(7): 821-833. 13 [24] S Nambisan, P Nambisan. How to profit from a better "virtual customer environment"[J]. MIT Sloan Management Review, 2008, 49(3): 52-63. [25] G L Lilien, P D Morrison, K Searls, M Sonnack, E von Hippel. Performance assessment of the lead user for new product development[J]. Management Science, 2002, 48(8): 1042-1059. idea-generation process [26] J Füller, K Matzler, M Hoppe. Brand community members as source of innovation[J]. Journal of Product Innovation Management, 2008, 25(6): 608-619. [27] S C Wu, W C Fang. The interactions of idea consumer-to-consumer generation community relationships[J]. Technovation, 2010, 30(11-12) : 570-581. effect on virtual brand in [28] Mingguo Li, Atreyi Kankanhalli, Seung Hyun Kim. Which ideas are more likely to be implemented innovation communities? An empirical analysis[J]. Decision Support System, 2016, 84: 28-40 online user in [29] P M Di Gangi, M Wasko. Steal my idea! Organizational adoption of user innovations from a user innovation community: a case study of Dell Idea Storm[J]. Decision Support System, 2009, 48: 303-312. [30] P M Di Gangi, M Wasko, R Hooker. Getting customers' ideas to work for you: learning from dell how to succeed with online user innovation communities[J]. MIS Quarterly Executive, 2010, 9(4): 213-228. [31] N Franke, E von Hippel, M Schreier. Finding commercially attractive user innovations: a test of Journal of Product Innovation Management, 2006, 23: 301-315. theory[J]. lead-user [33] T Burger-Helmchen, P Cohendet. User community and social softwarein the video game industry[J]. Long Range Plan, 44: 317-343. 2012, [34] L B Jeppesen, L Frederiksen. Why do users contribute to firm-hosted user communities? The case of computer-controlled music instruments[J]. Organ. Sci., 2006, 17: 45-63. knowledge sharing in the online user community: social capital and The mediating roles of perceived behavioral control[J]. International Journal of Information Management, 2016, 36: 520-530. [43] Yunjiang Xi, Yanzhong Dang, Kaiji Liao. Its Supernetwork Model Knowledge Application in Organizational Knowledge Systems[J]. Journal of Management Sciences in China, 2009(6), 12(3):12-21. and [44] Yang Yu, Yanzhong Dang. Super-network Model of PersonelTraining in Organization[J]. Systems Engineering Theory & Practice, 2009, 04: 154-160. [45] Kaiji Liao, Binbin Yang. Similarity Computing of Documents Based on Weighted Semantic Network [J]. Journal of The China Society For Scientific and Technical Information, 2012, 07: 182-186. [46] Zijiang Ni, Lili Rong, Quan Liu. Study on Evolving Hyper-network Model of Wiki Ontology[J]. Journal of Management Sciences in China, 2013, 16(12):68-78. [47] Jiangpan Wang, Qiang Guo, Guangyong Yang, Improved knowledge diffusion collaboration 2015, 428: on Physica A. Jianguo Liu. model based hyper-network[J]. 250-256. the [35] L Dahlander, M G Magnusson. Relationships between open source software companies and communities: observations from Nordic firms[J]. Res. Policy, 2005, 34: 481. [36] J Lerner, J Tirole. Some simple economics of open source[J]. J. Ind. Econ., 2002, 50:197. customers [37] C Wiertz, K de Ruyter. Beyond the call of duty: why firm-hosted commercial online communities[J], Organization Study, 2007, contribute to 28: 347-376. [38] Guy Parmentier, Vincent Mangematin. Orchestrating innovation with user communities in the industries[J]. Technological Forecasting & Social Change , 2014, 83,40-53. creative [39] Dong Q J, Wu W F. Business value of social media technologies: Evidence from online user innovation communities[J]. Journal of Strategic Information Systems, 2015, 24: 113-127. [40] Mahr D, Lievens A. Virtual lead user communities: drivers of knowledge creation for innovation[J]. Research Policy, 2012, 41(1), 167 -- 177. [41] Füller J, Mühlbacher H, Matzler K, Jawecki G. Consumer empowerment through internet-based co-creation[J]. of Management Information Systems, 2009, 26(3): 71-102. Journal [42] Yong Sauk Haua, Minhyung Kang. Extending innovation-related theory to users' lead user 14
1912.02602
1
1912
2019-12-05T14:42:13
Regularity of $R(X)$ does not pass to finite unions
[ "math.FA" ]
We show that there are compact plane sets $X$, $Y$ such that $R(X)$ and $R(Y)$ are regular but $R(X \cup Y)$ is not regular.
math.FA
math
Regularity of R(X) does not pass to finite unions J. F. Feinstein Creative Commons License: CC-BY-NC-ND Abstract We show that there are compact plane sets X, Y such that R(X) and R(Y ) are regular but R(X ∪ Y ) is not regular. 1 Introduction In [11], McKissick gave the first example of a non-trivial, regular uniform alge- bra. His example was R(X) for a suitable compact plane set X. (We recall the relevant definitions in the next section.) In [5, Corollary 7.7] it was shown that if X and Y are compact plane sets such that R(X) and R(Y ) are regular and X ∩ Y is countable, then R(X ∪ Y ) is also regular. This note addresses the question of whether R(X ∪ Y ) is regular whenever R(X) and R(Y ) are regular, without any additional assumptions on the compact plane sets X and Y . If the answer was positive, the result would clearly also hold for all finite unions. Bearing this in mind, we show that the answer is negative, in Theorem 6 below, by the slightly indirect method of finding four compact plane sets Xk, 1 ≤ k ≤ 4, such that each R(Xk) is regular, but such that R 4 [k=1 Xk! is not regular. We describe this result by saying that regularity of R(X) does not pass to finite unions. Along the way, in Theorem 5, we give a slightly easier example showing that (in an obvious sense) regularity of R(X) does not pass to countable unions. 2 Preliminaries Throughout this note, by a compact space we shall mean a non-empty, compact, Hausdorff topological space; by a compact plane set we shall mean a non-empty, compact subset of the complex plane. We shall use the term clopen to describe sets which are both open and closed in a given topological space (typically a compact plane set). 1 Let a ∈ C and let r > 0. We denote the open disk of radius r and centre a by D(a, r) and the corresponding closed disk by ¯D(a, r). We denote the diameter of a non-empty, bounded subset E of C by diam(E). We assume that the reader has some familiarity with uniform algebras. We refer the reader to [1, 9, 12] for further background. For the general theory of commutative Banach algebras, the reader may consult [2, 10]. Let X be a compact space, and let C(X) be the algebra of all continuous complex-valued functions on X. For each function f ∈ C(X) and each non- empty subset E of X, we denote the uniform norm of the restriction of f to E by f E. In particular, we denote by · X the uniform norm on X. When endowed with the norm · X , C(X) is a Banach algebra. A uniform algebra on X is a closed subalgebra of C(X) that contains the constant functions and separates the points of X. We say that a uniform algebra A on X is nontrivial if A 6= C(X), and is natural (on X) if X is the character space of A (under the usual identification of points of X with evaluation functionals). Let A be a natural uniform algebra on X, and let x ∈ X. We denote by Jx the ideal of functions f in A such that x is in the interior of the zero set of f , f −1({0}). We denote by Mx the ideal of functions f in A such that f (x) = 0. We say that x is a point of continuity (for A) if, for all y ∈ X \ {x} we have Jy * Mx; we say that x is an R-point (for A) if, for all y ∈ X \ {x} we have Jx * My. We say that A is regular if, for every closed subset F of X and every y ∈ X \ F , there exists f ∈ A with f (y) = 1 and f (F ) ⊆ {0}. The natural uniform algebra A is regular if and only if every point of X is a point of continuity, and this is also equivalent to the condition that every point of X is an R-point ([6, 7]). Let X be a compact plane set. By R(X) we denote the set of those functions f ∈ C(X) which can be uniformly approximated on X by rational functions with no poles on X. It is standard that R(X) is a natural uniform algebra on X. Let x ∈ X. As we will sometimes need to work with different compact plane sets simultaneously, in this note we will denote the ideals Jx and Mx in R(X) by J X x and M X We will occasionally use the fact that all idempotents in C(X) are automat- ically in R(X). This does not require the full force of the Shilov Idempotent Theorem, as for R(X) it follows from Runge's theorem. x respectively. Let X be a compact plane set, let Y be a compact subset of X and suppose that x, y ∈ Y with x 6= y. Trivially the restriction R(X)Y is contained in R(Y ). It follows immediately that if J X y . Thus if x is an R-point for R(X) then x is also an R-point for R(Y ). Similarly, if x is a point of continuity for R(X) then x is a point of continuity for R(Y ). If R(X) is regular, then so is R(Y ). x * M X y then J Y x * M Y We now discuss some conditions under which converses to some of these implications hold. 2 Lemma 1. Let X be a compact plane set and suppose that E is a non-empty, clopen subset of X. Let x ∈ E. If x is an R-point for R(E) then x is an R-point for R(X). Similarly, if x is a point of continuity for R(E) then x is a point of continuity for R(X). Proof. This is almost trivial in view of the idempotents available in R(X). The only point that may be worth noting is the fact that, for all y ∈ E, each function in J E y . This is because every function in R(E) can be extended to give a function in R(X) which is constantly zero on X \ E. (cid:3) y has an extension in J X Let X and Y be compact plane sets, with Y ⊆ X, and suppose that X contains no bounded component of C \ Y . Then, by Runge's theorem, R(X)Y is dense in R(Y ). This condition concerning the bounded components of C \ Y is, of course, automatically satisfied if X has empty interior. Theorem 2. Let X and Y be compact plane sets, with Y ⊆ X and suppose that x, y ∈ Y with x 6= y. Suppose that X contains no bounded component of C \ Y and that X \ Y is the union of a sequence of pairwise disjoint, non- empty relatively clopen subsets Yn of X whose diameters tend to 0 as n → ∞. Then Y is a peak set for R(X) and R(X)Y = R(Y ). Moreover the following implications hold. (i) If J Y x * M Y y then J X x * M X y . (ii) If x is an R-point for R(Y ) then x is an R-point for R(X). (iii) If x is a point of continuity for R(Y ) then x is a point of continuity for R(X). Proof. In this proof, we work on X when discussing clopen sets or characteristic functions: the characteristic functions of the clopen sets are then precisely the idempotents in R(X). Note that clopen subsets of X are automatically peak sets (using idempo- tents in R(X)). Clearly Y is an intersection of (a sequence of) clopen subsets of X, so Y is also a peak set for R(X). Thus R(X)Y is a uniformly closed subset of R(Y ). As X contains no bounded component of C \ Y , R(X)Y is dense in R(Y ), so equality holds. Using idempotents, we also see that, for each z ∈ X \ Y , we have J X x * M X z and J X z * M X x . Thus (ii) and (iii) follow quickly from (i). y . Choose f ∈ J Y x * M Y To prove (i), suppose that J Y that f has an extension in J X extension, say F , in R(X). However F might not be in J X follows. y . We shall show x , from which (i) follows. We know that f has an x , so we modify F as x \ M Y Choose r > 0 such that f ( ¯D(x, r) ∩ Y ) = {0}. Set S = {n ∈ N : Yn ∩ ¯D(x, r) 6= ∅} . 3 If S is finite, then F is already in J X x . So we may assume that S is infinite, say S = {n1, n2, . . . } with n1 < n2 < · · · . Set U =Sn∈S Yn =S∞ We define f : X → C by f = (1 − χU )F . We claim that f is the extension of f that we need. Clearly f vanishes on X ∩ D(x, r). It remains to show that f ∈ R(X) (and, in particular, that f is continuous). k=1 Ynk . For each m ∈ N, set Um = Sm k=m+1 Ynk . Then Um is clopen in X, so χUm ∈ R(X) and hence (1−χUm)F ∈ R(X). Since diam(Ynk ) → 0 as k → ∞, we see that the the sequence of clopen sets Ynk can accumulate only at points of ¯D(x, r) ∩ Y , and that dist(Ynk , ¯D(x, r) ∩ Y ) → 0 as k → ∞. It then follows that F Vm → 0 as m → ∞, and hence (1 − χUm )F → f uniformly on X. The result follows. (cid:3) k=1 Ynk and Vm = S∞ Using Theorem 2 and our earlier observations, we immediately obtain the following corollary concerning the regularity of R(X) for this type of compact plane set X. Corollary 3. Let X and Y be compact plane sets, with Y ⊆ X. Suppose that X contains no bounded component of C \ Y and that X \ Y is the union of a sequence of pairwise disjoint, non-empty relatively clopen subsets Yn of X whose diameters tend to 0 as n → ∞. Then R(X) is regular if and only if R(Y ) is regular and each R(Yn) is regular. 3 Main results We are almost ready to construct the examples mentioned in the introduction. First we need the following result, which is taken from [3] (see also [4, 8]). Proposition 4. There exist a compact plane set X and a non-degenerate closed interval J in R with J ⊆ X such that R(X) is not regular, but every point of X \ J is a point of continuity for R(X). Let X, J be as in Proposition 4. Clearly X has empty interior. For every non-empty compact subset K of X \ J, R(K) is regular, because every point of K is a point of continuity for R(K). We have R(J) = C(J), and so R(J) is regular. However, R(X) is not regular, so not every point of X is a point of continuity for R(X). The points of X which are not points of continuity for R(X) must all be in J. By Lemma 1, J is not clopen in X. In particular, X 6= J. Using this example, we next show that, in a suitable sense, regularity of R(X) does not pass to countable unions. Theorem 5. There exist a compact plane set X and a sequence of compact plane sets Xk (k ∈ N) such that X = Sk∈N Xk and each R(Xk) is regular, but R(X) is not regular. Proof. Let X and J be as in Proposition 4. Scaling X if necessary, we may assume that {z ∈ X : dist(z, J) ≥ 1/2} 6= ∅. Set X1 = J and, for k ≥ 2, set 4 Xk = {z ∈ X : dist(z, J) ≥ 1/k }. Then R(X) is not regular, but each R(Xk) is (cid:3) regular, and X =Sk∈N Xk as required. Thus regularity of R(X) does not pass to countable unions. We finish by showing that regularity of R(X) does not pass to finite unions either. Theorem 6. There exist a compact plane set X and four compact plane sets Xk, k = 1, 2, 3, 4, such that X = is not regular. 4 [k=1 Xk and each R(Xk) is regular, but R(X) Proof. Again, let X and J be as in Proposition 4. Scaling X if necessary, we may assume that X ⊆ {z ∈ C : dist(z, J) ≤ 1}. We begin by defining subsets Ko and Ke as follows. Set {z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n} and Ko = J ∪ [n∈N Ke = J ∪ [n∈N {z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1)} . Then X = Ko ∪ Ke, and R(X) is not regular. It is not clear whether or not R(Ko) or R(Ke) are regular. In the following, we assume that J is clopen in neither Ko nor Ke (otherwise the arguments may be simplified). We now show that each of Ko and Ke is a union of two sets where we can establish regularity using Corollary 3. We may write Ko = X1 ∪ X3 and Ke = X2 ∪ X4, where the sets Xk are defined with the help of vertical bands as follows: X1 = J ∪ [n∈N X2 = J ∪ [n∈N X3 = J ∪ [n∈N X4 = J ∪ [n∈N {z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n and sin(nRe(z)) ≤ 0} ; {z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1) and sin(nRe(z)) ≤ 0} ; {z ∈ X : 1/(2n + 1) ≤ dist(z, J) ≤ 1/2n and sin(nRe(z)) ≥ 0} ; {z ∈ X : 1/2n ≤ dist(z, J) ≤ 1/(2n − 1) and sin(nRe(z)) ≥ 0} . Then, for 1 ≤ k ≤ 4, it is easy to see that Xk is the disjoint union of J with a sequence (Yk,n)∞ n=1 of pairwise disjoint, non-empty relatively clopen subsets of Xk whose diameters tend to 0. Each of the sets Xk then satisfies the conditions 5 of Corollary 3 with Y = J and Yn = Yk,n (n ∈ N). Since R(J) and all of the R(Yk,n) are regular, each R(Xk) is regular by Corollary 3. Certainly X = Xk, and R(X) is not regular, as required. (cid:3) 4 [k=1 As noted earlier, it follows that regularity of R(X) does not pass to unions of two sets either. However, we do not know which pair of sets mentioned above demonstrates this. Clearly at least one of the following pairs of sets must provide a suitable example: X1 and X3; X2 and X4; Ko and Ke. We do not know whether or not regularity of R(X) does pass to unions of two sets if the sets are assumed to be connected. We are grateful to the referee for a careful reading and for useful comments and suggestions. References [1] A. Browder, Introduction to Function Algebras, Benjamin, New York (1969). [2] H. G. Dales, Banach Algebras and Automatic Continuity, London Math- ematical Society Monographs, New Series, vol. 24, The Clarendon Press Oxford University Press, New York, 2000. [3] J. F. Feinstein, Trivial Jensen measures without regularity, Studia Math., 148 (2001), 67 -- 74. [4] J. F. Feinstein and S. Morley, Quasianalyticity in certain Banach function algebras, Studia Math., 238 (2017), 133 -- 153 [5] J. F. Feinstein, S. Morley and H. Yang, Abstract Swiss cheese space and classicalisation of Swiss cheeses, J. Math. Anal. Appl., 438 (2016), 119 -- 141. [6] J. F. Feinstein, R. Mortini, Partial regularity and t-analytic sets for Banach function algebras, Math. Z., 271 (2012), 139 -- 155. [7] J. F. Feinstein and D. W. B. Somerset, Non-regularity for Banach function algebras, Studia Math., 141 (2000), 53 -- 68. [8] J. F. Feinstein and H. Yang, Regularity points and Jensen measures for R(X), Studia Math., 235 (2016), 1 -- 15 [9] T. W. Gamelin, Uniform Algebras, 2nd ed., Chelsea Publishing Company, New York, NY, 1984. [10] E. Kaniuth, A Course in Commutative Banach Algebras, Graduate Texts in Mathematics 246, Springer, New York, 2009. 6 [11] R. McKissick, A nontrivial normal sup norm algebra, Bull. Amer. Math. Soc., 69 (1963), 391 -- 395. [12] E. L. Stout, The Theory of Uniform Algebras, Bogden & Quigley, New York, 1971. 7
1912.00720
1
1912
2019-12-02T12:40:04
On Multipliers and completely bounded Multipliers -- the case SL(2,R)
[ "math.FA" ]
For the Fourier Algebra of SL(2,R) any bounded multiplier is completely bounded.
math.FA
math
ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) VIKTOR LOSERT A(G) Fourier algebra of a locally compact group G . B(G) Fourier-Stieltjes algebra. A(G)′′ bidual of A(G) with (first) Arens product ⊙ . M(A(G)) multipliers of A(G) with norm k kM . Every f ∈ M(A(G)) is given by (and identified with) a bounded continuous function on G. It extends to A(G)′′ and this is again denoted by f ⊙ ξ for ξ ∈ A(G)′′ (bidual mapping). M0(A(G)) completely bounded multipliers of A(G) with norm k kM0 (see [CH] for basic properties). VN (G) group von Neumann algebra (generated by the left regular representation on L2(G) ), we use the standard identification with the dual space A(G)′. C0(G) continuous functions on G vanishing at infinity. B(H) bounded linear operators on a Hilbert space H . N (H) nuclear operators (trace class), identified with the predual B(H)∗ , using (t, s) = tr(t s). sin ϕ For G = SL(2, R) (real 2x2-matrices of determinant one), let K be the subgroup cos ϕ (cid:19) and H the subgroup of matrices (cid:18)a 0 of rotations kϕ =(cid:18)cos ϕ − sin ϕ a(cid:19) with a > 0, b ∈ R . Recall (part of the Iwasawa decomposition) that G = KH , the decomposition of the elements x = kh being unique. We parametrize the dual group bK of the compact abelian group K by χj(kϕ) = eijϕ (j ∈ Z, ϕ ∈ R). For a bounded continuous function f on G, m, n ∈ Z put fmn = (χn ∗ f ∗ χm)H . To simplify, we describe the main result in the case of PSL(2, R) = SL(2, R)/{±I} (projective special linear group; {±I} being the centre of SL(2, R) ). Then K is replaced by K/{±I} and fmn is defined only for even m, n . 1 b Theorem. For G = PSL(2, R) we have M(A(G)) = M0(A(G)). kfkM = kfkM0 holds for all f ∈ M(A(G)). Date: December 2014. Summary of talks given at the School of Mathematics, University of Leeds, 28 May -- 2 June 2010; revised version. 1 ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 2 Then, putting A = VN (H) ¯⊗B(l2(2Z)), the following statements are equivalent for f ∈ C0(G): (1) f ∈ M(A(G)) (2) (fmn)m,n∈2Z defines an element of the predual A∗ of A and θf (ekl) = (fm−k n−l)m,n∈2Z extends to a continuous linear mapping N (l2(2Z)) → A∗ . Furthermore kfkM = kfkM0 = kθfk holds. For general f ∈ M(A(G)), we have that λ = limx→∞ f (x) exists. Then f − λ ∈ M(A(G)) ∩ C0(G) and kfkM = kf − λkM + λ . As in [Ta] p.184, elements t ∈ VN (H) ¯⊗B(l2(Z)) are described by matrices (tmn)m,n∈Z , where tmn ∈ VN (H) and similarly s ∈ A∗ is given by (smn)m,n∈2Z , where smn ∈ A(H). This amounts to (t, s) = Pm,n(tmn , snm) (compare [Ta] p.65(18)). Analogously for elements of B(l2(Z)) and N (l2(Z)). ekl denotes the element of N (l2(Z)) given by the matrix with 1 at (k, l) and 0 elsewhere. For G = SL(2, R) one has to observe that fmn = 0 whenever m− n is odd. With θf (ekl) = (fm−k n−l)m,n∈Z for k, l ∈ 2Z and A = VN (H) ¯⊗B(l2(Z)) (or the subal- gebra of operators commuting with the projection l2(Z) → l2(2Z)), the Theorem holds in the same way. Similarly, the Theorem holds for all connected groups G that are locally isomorphic to SL(2, R) and have finite centre. With some modifi- cations, one can find presumably also a version for the universal covering group of SL(2, R). For general G , we have A(G) ⊆ B(G) ⊆ M0(A(G)) ⊆ M(A(G)). When G is amenable (e.g. abelian or compact), M(A(G)) = B(G) holds. When G is non- amenable (e.g., SL(2, R) or the discrete free group F2), it is known that B(G) is a proper subspace of M0(A(G)). For a general discrete group G, containing F2 as a subgroup, Bozejko (1981) has shown that M0(A(G)) is a proper subspace of M(A(G)). If K is a compact subgroup of some locally compact group G, a function f on G is called radial (with respect to K) or K -- bi-invariant, if f (k1xk2) = f (x) holds for all x ∈ G, k1, k2 ∈ K . If there exists a closed amenable subgroup H of G such that G = KH holds set-theoretically, then for a radial function f , Cowling and Haagerup [CH] have shown that the following conditions are equivalent: (i) f ∈ M(A(G)) (ii) f ∈ M0(A(G)) (iii) fH ∈ B(H) (with equality of norms). This applies, in particular, for a semisimple Lie group G with finite centre, K a maximal compact subgroup. ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 3 For G = SL(2, R) (or PSL(2, R)) and m, n ∈ Z, using our notation above, we call f (m, n)-radial, if f (k1xk2) = χm(k1)f (x)χn(k2) holds for all x ∈ G, k1, k2 ∈ K . Then the same equivalence as above holds for (m, n)-radial functions f and for (m, n) 6= (0, 0) one even gets (by our Theorem) fH ∈ A(H). Furthermore, one can show that the closure of A(G) in M(A(G)) ∩ C0(G) contains all K-finite functions (i.e., all f for which fmn = 0 apart of finitely many (m, n) ). In some cases (e.g., when f is of diagonal type, i.e., fmn = 0 for m 6= n), one can show that the condition (fmn)m,n∈2Z ∈ A∗ of the Theorem is already sufficient to conclude that f ∈ M(A(G)). But one can show that there are f ∈ C0(G) satisfying (fmn)m,n∈2Z ∈ A∗ but f /∈ M(A(G)), i.e., the first condition of (2) above is not sufficient in general (contrary to the assertion in the first version of this draft). Observe that our definition of fmn involves transposition, i.e., fmn is (the restriction of) an (n, m)- radial function. On the following pages, we indicate the proof of the Theorem: In one direction, we use a slight extension of the results of [S] Th. 2.1 and 3.1 (the proofs there work quite similarly). Proposition 1. Let A0,B0 be unital C*-algebras, H0,H be Hilbert spaces and assume that given are *-representations of A0 and B0 on both spaces H0 and H (the operators defined by elements of A0 and B0 will be denoted by the same letters). Let E be a linear subspace of B(H0) such that aeb ∈ E for a ∈ A0, e ∈ E, b ∈ B0 (i.e., E is an A0 -B0 submodule of B(H0)). Let φ : E → B(H) be a linear map satisfying φ(aeb) = aφ(e)b for a ∈ A0, e ∈ E, b ∈ B0 . (i) If φ is bounded and there exist ξ, η ∈ H such that A0ξ and B0η are dense in H , then φ is completely bounded and kφkcb = kφk. (ii) If E = K(H0), φ is completely bounded, then (for some index set I) there exist families (si), (ti) ⊆ B(H,H0) such that bsi = sib, ati = tia for a ∈ A0, b ∈ B0, i ∈ I (i.e., si , ti are intertwining operators for the actions of A0 and B0), Pi s∗ i ksi holds for all k ∈ K(H0). In fact, we will use statement (ii) slightly more generally for E = K(H1) ⊕ K(H2) where H1,H2 are A0,B0-invariant subspaces of H0 = H1 ⊕ H2 . As a further ex- tension (for the case of the universal covering group of SL(2, R)), this holds when E is a von Neumann subalgebra of B(H0), φ is w*-continuous and the operators on H0 defined by A0,B0 belong to E . cb and φ(k) = Pi t∗ i sik kPi t∗ i si ,Pi t∗ i ti ∈ B(H), kPi s∗ i tik = kφk2 ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 4 To show that (2) ⇒ (1) assume that f : G → C is continuous, (fmnH)m,n∈2Z defines an element of the predual of VN (H) ¯⊗B(l2(2Z)) and θf is defined as in (2), with kθfk = c . As explained later (after Lemma 6), VN (H) is isomorphic (as a W*- algebra) to B(cid:0)L2(]−∞, 0])(cid:1)⊕B(cid:0)L2([0,∞[)(cid:1) using a certain representation π0 of H on L2(R). We apply now Proposition 1, taking H = l2(2Z), H0 = L2(R) ⊗ l2(2Z), A0 = B0 = C ∗(2Z) (operating by translations) and for φ (the restriction of) the dual mapping of θf . Obtaining (si), (ti) as above, we put pi = si(e0), qi = ti(e0) (en denoting the standard basis of l2(2Z)). Then pi = (pik)k∈2Z , qi = i si ,Pi t∗ (qik)k∈2Z ∈ L2(R)⊗ l2(2Z). This gives fmn(h) =Pi(π0(h) pim qin) for h ∈ H . For x = hz ∈ G, where h ∈ H, z ∈ K put P (x) = (Pk χk(z)π0(h)pik)i∈I , Q(x) = (Pk χk(z)π0(h)qik)i∈I. Then (observe that Pi s∗ i ti ∈ VN (2Z)) it fol- lows that P, Q define (a.e.) bounded measurable functions G → L2(R) ⊗ l2(I), x,y∈G kP (x)k kQ(y)k = c and f (y−1x) = ( P (x) Q(y) ) holds a.e. on G × G. ess sup By [CH] p. 508, we get f ∈ M0(A(G)) and kfkM0 ≤ c (to avoid problems of con- vergence and sets of measure zero, one can use Fejer sums and first consider the K-finite case [i.e. where only finitely many fmn are non-zero] ). One can also show that f ∈ C0(G). For the other direction, we start by recalling the description of the irreducible unitary representations (going back to Bargmann). We use (essentially) the notations (and parametrization) of Vilenkin [V]. Put H = L2(R) (for ordinary Lebesgue measure), g =(cid:18)α β γ δ(cid:19), for f ∈ H . βx + δ(cid:17)βx + δ2l (cid:0)Tl(g)f(cid:1) (x) = f(cid:16)αx + γ 2 + iλ with λ ∈ R this gives unitary (strongly continuous, irreducible) 2 ± iλ gives equivalent repre- For l = − 1 representations of SL(2, R) (first principal series). − 1 sentations, hence it will be enough to consider λ ≥ 0. For l ∈ Z one gets the discrete series (but here the inner product has to be changed to make Tl unitary, also restricting to subspaces of H for irreducibility; see below). Further cases for unitary representations are l ∈] − 1, 0[, which gives the comple- mentary series (again with a different inner product) and, finally, there is also the trivial (one-dimensional) representation. These are all the irreducible unitary rep- resentations defined on PSL(2, R). Tl arises from the right action of SL(2, R) on R2 (and the corresponding action on the projective line). In the notation of [V] this is Tχ with χ = (l, 0) (the second parameter can be used to describe further representations of SL(2, R) and other ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 5 Integer case: covering groups). (notation of [V]) and for l < 0 the part T + conjugate representation of Tl . for l ≥ 0 , we take Tl to be only the part T − χ χ . Thus T−l−1 is (equivalent to) the Multiplication in A(G) and B(G) corresponds to tensor products of representa- tions. For SL(2, R) the decompositions have been determined by Pukanszky (1961). A completed and better accessible account has been given by Repka [R]. For lj = − 1 2 + iλj Tl1 ⊗ Tl2 ∼ 2 T− 1 2 + iλ1 , l2 ∈ N0 For l1 = − 1 For lj ∈ N0 Similarly in the remaining cases. T− 1 Tl1 ⊗ Tl2 ∼ Tl1 ⊗ Tl2 ∼ Pl>l1+l2 ⊕RR+ ⊕RR+ 2 +iλdλ ⊕ Pl∈Z 2 +iλdλ ⊕Pl≥0 Tl . Tl . Tl . n el mn(g) = (Tl(g)el m = e2miϕel m = χ2m(kϕ) el m ("elliptic basis"). m) of the Hilbert space Hl of Tl . For l = − 1 To get coefficients for the unitary representations, we use (corresponding to [V]) an orthonormal basis (el 2 + iλ (principal series), we have Hl = H and the basis is indexed by m ∈ Z . For l ∈ N0 , the range is m > l and for integers l < 0 : m ≤ l . The basis vectors satisfy Tl(kϕ) el We put tl m). This gives the unitary matrix coefficients of Tl(g). tl mn is (2m, 2n)-radial (we get only even integers, since we restrict to representations of PSL(2, R) ). For l = − 1 reduced Fourier-Stieltjes algebra Bρ(G), i.e., the w*-closure of A(G) in B(G)). For l ∈ Z , the representations Tl are square-integrable, thus tl for l ∈ N0, m, n > l and for l < 0, m, n ≤ l . For l = − 1 2 + iλ , the "non-radial component" of tl mn(cid:18)eτ e−τ(cid:19) for τ ≥ 0 (ch denoting the hyperbolic cosine). In [V] the functions 0 tl Pl mn are defined (and investigated) for all l ∈ C , but (apart of the principal series) using a non-normalized orthogonal basis for the matrix representation. For the mn ∈ B(G) for all m, n ∈ Z (it even belongs to the mn ∈ A(G) ∩ L2(G) mn is described by Pl 2 + iλ , we have tl mn(ch 2τ ) = 0 discrete series, the corresponding functions arising from the unitary coefficients are denoted by P l mn in [VK] (l ∈ Z). For l ∈ N0 , m, n > l they are related by (m + l)! (n − l − 1)!(cid:17) 1 mn =(cid:16) (m − l − 1)! (n + l)! 2P l Pl mn . Technically, the continuous part in the decomposition of tensor products is more difficult to handle (and the appearance of multiplicities causes additional compli- cations). Therefore we restrict to the discrete part. ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 6 For l1 = − 1 2 + iλ , l2 ∈ N0 , we define the Clebsch-Gordan coefficients by el1 j ⊗ el2 C(l1, l2, l; j, m, j + m) el j+m + cont. part . m = Xl≥0 The same for l1 ∈ Z with l1 ≥ −l2− 1 (for l1 < −l2− 1 the discrete part of Tl1 ⊗ Tl2 contains only Tl with l < 0 ). We put C(l1, l2, l; j, m, j + m) = 0 when j + m ≤ l (in addition, for l1 ∈ Z , the coefficients will be 0 outside the range l > l1 + l2 for l1 ∈ N0 and outside 0 ≤ l ≤ l1 + l2 for −1− l2 ≤ l1 < 0 ). The isomorphism between Tl and a component of Tl1 ⊗ Tl2 is determined only up to a factor of modulus 1 . This is fixed by requiring that C(l1, l2, l; l − l2, l2 + 1, l + 1) > 0 (of course, in the integer case this refers only to those l ≥ 0 that have not been excluded above). For l1, l2 as above, this gives a decomposition of products in B(G) (1) tl1 jj ′ tl2 Xl≥0 mm′ = C(l1, l2, l; j, m, j + m) C(l1, l2, l; j′, m′, j′ + m′) tl j+m j ′+m′ + cont. part . Now, we consider the behaviour for large l2 . Proposition 2 (Asymptotics of CG-coefficients). For fixed l1 = − 1 and finite κ ≥ 1, we have lim l2→∞ m →κ l2 C(l1, l2, l2 + s; j, m, j + m) = Pl1 s j(κ) . 2 + iλ , j, s ∈ Z For κ = 1, one has to add the restriction m > l2 . Corresponding results hold for l1 ∈ Z (discrete series), e.g., when l1 ∈ N0 , j, s > l1 , the limit is P l1 s j(κ). Similarly for the complementary series and unitary representations of covering groups. This is the counterpart of a classical result of Brussaard, Tolhoek (1957) on the CG- coefficients of SU(2). Since (Pl1 norm 1 (in l2(Z)). From kel1 of the continuous part in the decomposition of el1 l1, j fixed, m It was already noted by Pukanszky that the densities arising in the continuous part s j(κ))s,j∈Z is the matrix of a unitary operator, its column vectors have mk = 1, it follows by orthogonality that the norm m tends to 0 for l2 → ∞ (with l2 → κ). The same holds for the decomposition of tl1 mm′ in (1). j ⊗ el2 j ⊗ el2 jj ′ tl2 are given by analytic functions. Thus (with at most contably many exceptions) all λ ≥ 0 will appear in the decomposition of el1 2 + iλ1). But from a more quantitative viewpoint, most of the product will be concentrated on the (positive part of the) discrete series when l2 is large. m (for l1 = − 1 j ⊗ el2 ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 7 Idea of Proof. Recall the Fourier inversion formula: ∞Z 0 1 2 (l + h(e) = tr(T− 1 2 +iλ(h)) λ th(πλ) dλ +Xl≥0 )(cid:0) tr(Tl(h)) + tr(T−l−1(h))(cid:1) . for h ∈ A(PSL(2, R)) ∩ L1(PSL(2, R)) and the extensions of the representations to L1(PSL(2, R)) for an appropriate choice of the Haar measure. This describes also the Plancherel measure. On the level of coefficients, applied to (2m, 2n)-radial functions with m, n ≥ 0, this gives a generalization of the Mehler-Fock transformation (l + 1 2 ) b(l)P l mn(x) + ∞Z 0 a(λ) P 2 +iλ − 1 mn (x) λ th(πλ) dλ g(x) = min(m,n)−1Xl=0 ∞R1 g(x)P l with b(l) = discrete part is just the expansion with respect to the orthogonal system (P l L2([1,∞]) (m, n fixed) and the coefficients are obtained from inner products. We apply this to g = Pl1 mn(x) dx for g ∈ L2([1,∞]) (convergence in L2). Thus the mn) ⊆ l2+1 l2+1 and get for l = l2 + s by (1) ss P l2 C(l1, l2, l2 + s; s, l2 + 1, l2 + s + 1)2 = ∞Z (l2 + s + 1 2 l2+s+1 l2+s+1(x) dx 1 ) ss(x)P l2 Pl1 l+1 l+1(x) = (cid:16) 2 2 )P l2 l2+1 l2+1(x)P l2+s x + 1(cid:17)l+1 . l2+1 l2+1 P l2+s l+1 l+1(x) = Pl By [V] we have P l for l2 → ∞ and s ∈ Z fixed, (l2 + s + 1 l2+s+1 l2+s+1 → δ1 (point measure) holds weakly with respect to bounded continuous functions on [1,∞[ . Since Pl1 2 +iλ is fixed) and by our choice of the phase, we get C(l1, l2, l2 +s; s, l2+1, l2 +s+1) → 1. Next we take g = Pl1 ss(1) = 1, this gives C(l1, l2, l2+s; s, l2+1, l2+s+1) → 1 (when l1 = − 1 l2+1 m and get for l = l2 + s by (1) It follows easily that s j P l2 C(l1, l2, l2 + s; s, l2 + 1, l2 + s + 1) C(l1, l2, l2 + s; j, m, j + m) = → 1 (l2 + s + 1 2 ) ∞Z 1 Pl1 s j(x)P l2 l2+1 m(x)P l2+s l2+s+1 j+m(x) dx Let µl2m be the measure on [1,∞[ with density (l2 + s + 1 Again one can use the formulas of [V] for Pl coordinates, one gets that l2+s+1 j+m. l+1 m(x). With a slight change of has a β′-distribution and from the values of l2+1 m P l2+s 2)P l2 µl2m kµl2mk ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 8 expectation and variance one can conclude that kµl2mk → 1 and µl2m → δκ for l2 → ∞, In the next step we use ultraproducts to work with these limit relations. Such m l2 → κ . (cid:3) l→p l→p khlk = 0 . We use the notation lim constructions for group representations have been done by Cowling and Fendler. We take some element p ∈ βN\N (Stone- Cech compactification). The ultraproduct of the Hilbert spaces (Hl)l>0 (with respect to p) is denoted by Hp . It consists of equivalence classes of all sequences (hl) ∈QHl such that lim l→p khlk < ∞ , factoring by the subspace of sequences with lim hl to denote the equivalence class of (hl). Hp is again a Hilbert space and we get a repre- sentation Tp of the C*-algebra VN (G) on Hp putting Tp(S)(lim Tl(S)hl (for S ∈ VN (G) ). Each function f : N → N satisfying f (l) > l ∀ l (or more generally, lim f (l)−l > 0 ) el defines a unit vector in Hp by e(p, f ) = lim f (l) . Of course, it is enough to require that f is defined for l ≥ l0 . For functions f, f ′ we get a coefficient functional by f f ′ , S ) = (cid:0)Tp(S) e(p, f ′) e(p, f )(cid:1) for S ∈ VN (G) . Then tp (tp f f ′ ∈ VN (G)′ (dual space) and tp Recall that βN \ N is a Z-module under addition. Thus we get in the same way Hilbert spaces Hp+s and representations Tp+s for all s ∈ Z . For f as above, put κp(f ) = lim l→p Write κ = κp(f ), κ′ = κp(f ′). Assuming, 1 < κ, κ′ < ∞, l1 = − 1 from (1) and Proposition 2 tl f (l) f ′(l) (w*-limit). 2 + iλ , we get (possibly infinite). hl) = lim l→p f f ′ = lim l→p f (l) l→p l→p l→p l jj ′ tl2 tl1 f (l2)f ′(l2) =Xs∈Z Pl1 sj(κ) Pl1 sj ′(κ′) lim l2→p tl2+s f (l2)+j f ′(l2)+j ′ f f ′ = lim l2→p jj ′ ⊙ tp tl1 (note that (cid:0) Pl1 sj(κ) Pl1 f (l2)+j f ′(l2)+j ′ = tp+s tl2+s lim l2→p (2) f ◦us+j f ′◦us+j ′ and we arrive at sj ′(κ′)(cid:1)s∈Z ∈ l1 ). Put u(l) = l − 1 for l ∈ Z , then f f ′ =Xs∈Z f ◦us+j f ′◦us+j ′ . sj ′(κ′) tp+s sj(κ) Pl1 Pl1 jj ′ ⊙ tp tl1 Tp+s of VN (G). Next, we consider Hp = Ls∈Z Hp+s (l2-sum) and the corresponding representation T p = Ls∈Z For 1 < κ < ∞ , Kκ shall be the closed subspace of Hp generated by the vectors e(p, f ), taking all functions f with κp(f ) = κ . We put K = L1<κ<∞Kκ . hl−1 defines an isometric isomorphism of Hp+s and Hp+s+1 and this extends to a unitary operator U : Hp → Hp (in particular U(cid:0)e(p+s, f )(cid:1) = hl) = lim U( lim l→p+s l→p+s+1 ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 9 e(p+s+1, f◦u) ). Let Kκ be the closed U-invariant subspace of Hp generated by Kκ (it is generated by the vectors e(p+s, f ), taking all functions f with κp+s(f ) = κ for some s ∈ Z ). Clearly, Kκ ⊥ Kκ′ holds for κ 6= κ′ and we write K = L1<κ<∞Kκ (the closed U-invariant subspace of Hp generated by K ). V(cid:0)e(p+s, f )(cid:1) = e(p+s, f +1) defines a unitary operator on Kκ (for 1 < κ < ∞) and this extends to a unitary operator V : K → K satisfying V (Kκ) ⊆ Kκ and V U = UV on K . (For κ = 1, V is no longer surjective). For a fixed function f with κ = κp(f ) satisfying 1 < κ < ∞ , it follows easily that {e(p + s, f ◦ us + j)} = {U sV je(p, f ) : s, j ∈ Z} defines an orthonormal system of vectors in Kκ . A special case, used below, will be the functions fκ(l) = [κ l] (integer part), satis- fying κp(fκ) = κ for each p and 1 < κ < ∞ . Lemma 1. For λ ∈ R , j ∈ Z , 1 < κ < ∞ j = V j Ps∈Z Aλ U s defines a bounded linear operator Kκ → Kκ . − 1 sj 2 +iλ P (κ)(cid:12)(cid:12)2s(cid:12)(cid:12)iλ Taking Aλ linear operator Aλ j = 0 on K⊥ (in particular, Aλ j : Hp → Hp satisfying V Aλ j = Aλ j V on K. j = 0 on Hp+s when s 6= 0) gives a bounded (Here we adopt 0iλ = 1). jj ′ ⊙ t, S) = (T p(S)Aλ Corollary. Given e, e′ ∈ K define t ∈ VN (G)′ by (t, S) = (Tp(S) e′ e ). Then for l = − 1 2 + iλ (λ ∈ R) and j, j′ ∈ Z we have (tl j ′e′ Aλ j e) (S ∈ VN (G)). Lemma 2. T p(VN (G)) is w*-dense in Qs∈ZB(Hp+s) . In particular, this implies that Tp is irreducible and (Tp,Hp) is the cyclic represen- tation for the state tp f f (with cyclic vector e(p, f ) ) for every function f as above. Furthermore (slightly more general than in Lemma 2), one has Tp ≁ Tp′ for p 6= p′. Considering L1(G) as a (w*-dense) subalgebra of VN (G), it is not hard to see that Tp(h) = 0 for h ∈ L1(G), hence these are singular representations of VN (G). For the final step we need a refinement of Lemma 2. Although T p(VN (G)) is not a von Neumann algebra, the fact that VN (G) is a von Neumann algebra allows to get a stronger result on the size of T p(VN (G)). Recall that the representations Tl are square integrable for l ∈ Z . Thus they are equivalent to subrepresentations of the left regular representation on L2(G) and we can consider Ql≥0B(Hl) as a subalgebra of VN (G). ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 10 For 1 ≤ α < β ≤ ∞ let Pαβ ∈ VN (G) be the orthogonal projection on the closed < β, l > 0(cid:9). For α < β ≤ α′ < β′, it subspace ofLl>0Hl generated by (cid:8)el follows that PαβPα′β ′ = Pα′β ′Pαβ = 0 . For α < κ < β we have Kκ ⊆ im(cid:0)T p(Pαβ)(cid:1) . Lemma 3. Assume that αm ր ∞ . For m ≥ 1, m : α < m l Em (⊆ Hp) shall be a finite dimensional subspace of Sm ∈ B(Hp) are such that kSmk ≤ 1, Sm(Em) ⊆ im(cid:0)T p(Pαmαm+1)(cid:1) and Sm(Hp+s) ⊆ Hp+s for all s ∈ Z . Then there exists S ∈ VN (G) such that (cid:13)(cid:13)(cid:0)Sm − T p(S)(cid:1)(cid:12)(cid:12)Em(cid:13)(cid:13) → 0 for m → ∞ . im(cid:0)T p(Pαmαm+1)(cid:1) , At the Harmonic Analysis Conference in Istanbul 2004, I talked about the case G = SU(2). For that group, one could use a limit of averages of states tp f f (for f = fκ ; approaching Lebesgue measure on [−1, 1] ) to get a singular state ζ ∈ VN (G)′ satisfying kf ⊙ ζk = kfk for all f ∈ A(G). This cannot exist for Instead of this, we will use another G = SL(2, R), because of non-amenability. type of asymptotics. Now, we fix p ∈ βN \ N and write T for T p . We choose p1 ∈ βN \ N satisfying (2m) ∈ p1 (a sufficiently "thin" ultrafilter). (Hp)p1 shall denote the ultrapower of Hp with respect to p1 . If (h(n)) is a bounded sequence in Hp , we write, as before, h(n) for the corresponding equivalence class, defining an element of (Hp)p1 . lim n→p1 The representation T of VN (G) on Hp defines a representation T of VN (G) on (Hp)p1 . We define ¯¯e ∈ (K)p1 ⊆ (Hp)p1 and ζ ∈ VN (G)′ by ¯¯e = lim n→p1 1 n n2−1Xr=1 e(p, fch(n+ )) , r n (ζ, S) = ( T (S) ¯¯e ¯¯e ) V defines a unitary operator on (K)p1 , again denoted by V . Since (for fixed f ) {V je(p, f ) : j ∈ Z} is an orthonormal family in Kκ(f ), Kκ ⊥ Kκ′ for κ 6= κ′ and V is unitary , it follows that {V j ¯¯e : j ∈ Z} is orthonormal in (K)p1 . Thus for γ = (γn) ∈ l2(Z), ¯¯e(γ) = Pj∈Z γjV j ¯¯e defines an isometric embedding l2(Z) → (K)p1 . For γ1, γ2 ∈ l2(Z), we define (ζγ1γ2 , S) = ( T (S) ¯¯e(γ2) ¯¯e(γ1) ) and for brevity ( (en) denoting the standard basis of l2(Z)) ζij = ζeiej (thus ¯¯e = ¯¯e(e0), ζ = ζ00). For g ∈ K( (R \ {0}) × Z ) (K(Ω) : continuous functions with compact support), we put ϕ(g) = lim n→p1 1 n n2−1Xr=1 Xj,s∈Z ec , j(cid:1) (−1)s √2 g(cid:0)2s ec/2 U sV j e(p, fch c) with c = n + r n ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 11 Note that the support condition makes the sum finite and restricts it to s 6= 0, hence ϕ(g) ⊥ (Hp)p1 . Lemma 4. ϕ(g) ∈ (K)p1 ⊆ (Hp)p1 , kϕ(g)k = kgk2 . Thus ϕ extends to an isometry ϕ : L2(R × Z) → (Hp)p1 . Putting ϕ1(g+γ) = ϕ(g)+¯¯e(γ) defines an isometry ϕ1 : L2(R×Z)⊕l2(Z) → (Hp)p1 . Let P ∈ B(cid:0)(Hp)p1(cid:1) be the orthogonal projection to ϕ(L2(R × Z)) . For S ∈ VN (G), g, h ∈ L2(R × Z) put (ψ(S)g h) = (T (S)ϕ(g) ϕ(h)) . This defines a contractive linear mapping ψ : VN (G) → B(L2(R × Z)) , ψ(VN (G)) being isometrically isomorphic to the dilation P T (VN (G)) P . Similarly, for P1 the projection to ϕ1(L2(R × Z) ⊕ l2(Z)), one gets ψ1 : VN (G) → B(L2(R × Z)) ⊕ B(l2(Z)) (note that (Hp)p1 is invariant under T (VN (G)) ). For n = 2m, αm = ch 2m, the n-th term in the limits defining ¯¯e and ϕ(g) belongs to im(cid:0)T p(Pαmαm+1)(cid:1). This makes it possible to apply Lemma 3. Lemma 5. ψ(VN (G)) is w*-dense in B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1). Similarly, for ψ1 one has to add a sum with B(l2(Z)). As above, the w*-closure of ψ(VN (G)) is isometrically isomorphic to P T (VN (G))−P (− denoting the w*-closure in B(cid:0)(Hp)p1(cid:1) ). The proof shows that corresponding density results hold for the image of the unit ball of VN (G). For the final step, we will use the Whittaker functions. They are defined by ∞Z 2 Wλ,µ(z) = e−zu uµ−λ− 1 2 (1 + u)µ+λ− 1 for Re z > 0, Re(µ− λ + 1 Proposition 3 (Approximation of coefficients). For n ∈ Z, l = − 1 zµ+ 1 2 e− z Γ(µ − λ + 1 2) 2) > 0 and then for all λ, µ ∈ C by analytic continuation. 2 m2 : τ ≥ 0, m ≥ n, m > 0(cid:27) mn(ch τ ) − (−1)n−m 2 + iλ fixed, 2 du 0 τ lim eτ (cid:1)(cid:17) e m→∞(cid:16) Pl In particular, mn(ch τ ) − ml+1Γ(n − l) τ 2 = 0 holds uni- Wn,iλ(cid:0) 4m formly for τ ≥ 0 . This complements classical results on the asymptotic be- haviour of Pl if m = n, λ 6= 0 recall that mn for fixed values l, m, n ; τ Pl cos(λτ + η) → 0 for τ → ∞ (where η ∈ R de- 2 − mn(ch τ )(cid:1)m>0 can be Moreover, the Proposition implies also that the row vector(cid:0) Pl pπλ th(πλ) pends on λ and m). mm(ch τ ) e e.g., 2 sup(cid:26)(cid:12)(cid:12)(cid:12) Pl is finite. ml+1Γ(n − l) eτ (cid:17)(cid:12)(cid:12)(cid:12) e Wn,iλ(cid:16) 4m (−1)n−m ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 12 eτ (cid:1)(cid:17) for τ → ∞ . An approximation mn = Pl −m −n . Wj,iλ(2x) 2 + iλ , we put ml+1Γ(n−l) Wn,iλ(cid:0) 4m approximated in l2-norm by(cid:16) (−1)n−m for the "lower half"(cid:0) Pl mn(ch τ )(cid:1)m<0 is obtained using the identity Pl For j ∈ Z, λ ∈ R, l = − 1   0 (−1)j 2iλ Γ(j − l)√ x (−1)j 2iλ Γ(−j − l)√−x W−j,iλ(−2x) gj,λ(x, j′) = for j′ 6= j for j′ = j , x > 0 Then gj,λ ∈ L2(R × Z). j ∈ B(Hp) defines a bounded operator on (Hp)p1 , again denoted by Aλ Aλ other side, for g ∈ L2(R × Z), we define (V g)(t, j) = g(t, j − 1). Lemma 6. We have Aλ Furthermore, V ϕ(g) = ϕ(V g) for g ∈ L2(R× Z), in particular, Aλ holds for all s ∈ Z . Corollary. (tl jj ′ ⊙ ζ , S) = (ψ(S) gj ′,λ gj,λ) (S ∈ VN (G)). j ¯¯e = ϕ(gj,λ) . for j′ = j , x < 0 More generally, (tl jj ′ ⊙ ζii′ , S) = (ψ(S) V i′gj ′,λ V igj,λ) for i, i′ ∈ Z . j . At the j V s ¯¯e = ϕ(V sgj,λ) The basis of L2(R) used by [V] to define the coefficients of Tl for l = − 1 x + i(cid:17)m(cid:0)1 + x2(cid:1)l . given by el e2mi arctan(x)(1 + x2)l = (−1)m √π m(x) = 1 2 + iλ is We consider the real Fourier transform f (y) = e−ixyf (x) dx . Then we have √π(cid:16)x − i √2π RR 1 Wsgn(y)m,iλ(2y) = gm,λ(y, m)y−iλ . cel m(y) = (−1)m (The functions el Plancherel transform). 2 −iλ 2iλy− 1 Γ(sgn(y)m − l) m are not integrable, so strictly speaking, this is the Fourier- 1 b tion with Fourier transform defines equivalent representations (Whittaker model) a(cid:19) ∈ H , we have (Tl(h)f )(x) = a−2lf (a2x + a b). Composi- For h = (cid:18)a 0 πλ(g) f = (Tl(g)f )b. For h ∈ H this gives (πλ(h) η)(y) = a−1−2iλ eiy Put (ρλη)(y) = yiλ η(y) . Then ρλ : L2(R) → L2(R) is an isometric isomorphism and πλ(h) = ρ−1 λ ◦ π0(h) ◦ ρλ (in particular, all Tl and πλ define equivalent repre- sentations of H ). π0 splits into two irreducible representations (the restrictions to L2(] − ∞, 0] and L2([0,∞[) and these are the only infinite dimensional irreducible unitary representations of H (up to equivalence). Thus π0 defines a normal isomor- phism of the von Neumann algebras VN (H) and B(cid:0)L2(]−∞, 0])(cid:1)⊕ B(cid:0)L2([0,∞[)(cid:1) a2(cid:1). a η(cid:0) y b ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 13 (3) jj ′H) and this extends to a normal isomorphism π0 of the von Neumann algebras A = VN (H) ¯⊗B(l2(2Z)) and B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1). j(cid:1) = We have gj,λ(·, j) = ρλ bel ρλ(cid:0)(Tl(S) el j)b(cid:1), resulting in (cid:0)π0(S) gj ′,λ(·, j′) gj,λ(·, j)(cid:1) = ( S , tl j , consequently π0(S) gj,λ(·, j) = ρλ(cid:0)πλ(S)bel for S ∈ VN (H) . For f ∈ M(A(G)) put Φ(f ) = (fmn)m,n∈2Z with fmn = (χn ∗ f ∗ χm)H (the matrix operators, used in the Theorem). Put λ = limx→∞ f00(x), f0 = f − λ, Φ1(f ) = Φ(f0) + λ e00 . Extend π0 to a normal isomorphism (π0 ⊕ 1)∼ of the von Neumann algebras (VN (H) ⊕ C) ¯⊗B(l2(2Z)) and B(cid:0)L2(] − ∞, 0] × Z)(cid:1) ⊕ B(cid:0)L2([0,∞[×Z)(cid:1) ⊕ B(l2(Z)). Recall that f is said to be K-finite, if only finitely many fmn are non-zero. Lemma 7. For f ∈ M(A(G)) ∩ C0(G), Φ(f ) defines an element of the predual of VN (H) ¯⊗B(l2(2Z)) and, if f is K-finite, we have (4) (f ⊙ ζ , S) =(cid:0) π−1 (f ⊙ ζi′i , S) =(cid:0) π−1 0 ◦ ψ(S) , Φ(f )(cid:1) for S ∈ VN (G) , 0 ◦ ψ(S) , θf (e2i 2i′)(cid:1) for i, i′ ∈ Z . θf extends to a continuous linear mapping N (l2(2Z)) → A∗ with kθfk ≤ kfkM . For general f ∈ M(A(G)), f0 ∈ C0(G) holds and Φ1(f ) defines an element of the predual of (cid:0)VN (H) ⊕ C(cid:1) ¯⊗B(l2(2Z)) . If f is K-finite, we have With θ1f = θf0 + λ ( θ1f : N (l2(2Z)) → A∗ ⊕N (l2(2Z)), identified with the predual of A ⊕ B(l2(2Z))), we get (for K-finite f ) (f ⊙ ζ , S) =(cid:0) ((π0 ⊕ 1)∼)−1 ◦ ψ1(S) , Φ1(f )(cid:1) for S ∈ VN (G) . (f ⊙ ζi′i , S) =(cid:0) ((π0 ⊕ 1)∼)−1 ◦ ψ1(S) , θ1f (e2i 2i′)(cid:1) for S ∈ VN (G) . Corollary. kΦ1(f )k = kΦ(f0)k + λ ≤ kf ⊙ ζk and kθf0k + λ = kθ1fk ≤ kfkM holds for all f ∈ M(A(G)). As indicated earlier this supplies the remaining step for the proof of the Theorem. Idea of Proof. Recall that the left and right actions of G on A(G) are continuous and isometric. It follows easily that f ∈ M(A(G)) implies µ ∗ f, f ∗ µ ∈ M(A(G)) for every bounded measure µ on G . For general f ∈ M(A(G)), the same argument as in [CH] gives fH ∈ B(H). As mentioned before, the unitary dual of H (ax + b -group) has a very simple structure and this implies B(H) = A(H) + B(H/[H, H]). Thus for f ∈ M(A(G)) ∩ C0(G), we get (since [H, H] is not compact) fH ∈ A(H), in particular, fmn ∈ A(H) for all m, n ∈ Z.. ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 14 2 +iλ − 1 mn jj ′, with l = − 1 Let M1 be the set of all f ∈ M(A(G)) ∩ C0(G) such that (4) holds. For γ1, γ2 ∈ l2(Z), it follows from the definition that kζγ1γ2k ≤ kγ1kkγ2k and this gives kPk,l αklζklk ≤ k(αkl)kN for (αkl) ∈ N (l2(Z)). Thus if f ∈ M1 , then (4) im- plies, using bilinearity that θf is bounded and kθfk ≤ kfkM and then the earlier argument, based on Proposition 1 shows kfkM = kfkM0 = kθfk. If f ∈ M1 is (m, n)-radial, it follows that kfkM = kΦfk = kfHkA(H) . M1 is clearly a linear subspace and one can show that if (f (k)) is a bounded sequence in M1 , converging pointwise to a continuous function f , then kθfk ≤ lim supkθf (k)k. In particular, if (f (k)) is a Cauchy-sequence, then f ∈ M1 and f (k) → f in M(A(G)). For f = tl 2 + iλ the evaluation of (f ⊙ ζ , S) follows from (3) and the Corollary of Lemma 6. Thus f ∈ M1 . This works in a similar way for the coefficients of discrete series representations. Now observe that (using the formulas H (R → A(H)) is continuous. Then above) for fixed m, n the function λ 7→ t for (m, n)-radial f ∈ A(G) one can approximate the Fourier transform by finitely supported measures, giving an approximation of f (in M(A(G))-norm) by linear combinations of coefficients tl mn . By the properties above this implies f ∈ M1 and this extends to arbitrary f ∈ A(G) (and its norm closure in M(A(G))). For general f ∈ M(A(G)) such that fmn ∈ A(H) for all m, n ∈ 2Z, one can use approximations (e.g. by Fejer sums) and the properties of M1 above to see that Φ(f ) belongs to the predual and kθfk ≤ kfkM . In the case of the (n, m)-radial functions f ′ mn = χn ∗ f ∗ χm , it follows easily (using G = HK , fmn ∈ B(H) ) that f ′ mn is weakly almost periodic and for f K-finite, this implies that f is weakly almost periodic. By the results of [Ve] it follows that λ = limx→∞ f (x) exists and f0 ∈ C0(G) . For general f ∈ M(A(G)) this implies that fmn ∈ A(H) for (m, n) 6= (0, 0) and there exists λ ∈ C such that (f − λ)00 = f00− λ ∈ A(H) . Then the formulas involving Φ1(f ) and θ1f follow first for K-finite f , applying the previous results to f0 . Finally, approximation gives the general case of the Corollary and the earlier argument, based on Proposition 1 shows f − λ ∈ C0(G) (i.e., λ = limx→∞ f (x) ). As mentioned before we have restricted to representations of PSL(2, R) and this produces only (m, n)-radial functions with m, n even; the other representations of SL(2, R) give odd values for m, n and this amounts to extend the definition of Hp , ϕ, . . . to half-integer j, s . (cid:3) ON MULTIPLIERS AND COMPLETELY BOUNDED MULTIPLIERS -- THE CASE SL(2, R) 15 References [CH] Cowling, Haagerup, Inventiones Math. 96 (1989). [DH] De Canni`ere, Haagerup, American J. Math. 107 (1985). [R] Repka, American J. Math. 100 (1978). [S] R.R. Smith, Completely bounded module maps..., J. Funct. Anal. 102 (1991), 156175. [Ta] M. Takesaki, Theory of operator algebras I, Springer, New York -- Heidelberg 1979. [V] Vilenkin, Special Functions...,AMS Transl. 1968. [VK] Vilenkin, Klimyk, Representation of Lie groups..., Vol.1, Kluwer 1991. [Ve] Veech, Monatsh. Math. 88 (1979). Institut fur Mathematik, Universitat Wien, Strudlhofg. 4, A 1090 Wien, Austria E-mail address: [email protected]